scholarly journals DIGITAL IMAGE AUTHENTICATION MODEL

2021 ◽  
Vol 5 (1) ◽  
pp. 113-117
Author(s):  
Igor Ruban ◽  
Nataliia Bolohova ◽  
Vitalii Martovytskyi ◽  
Oleh Koptsev

The development of new technologies, the growing volume of data and the total consumption of content in the digital environment are changing the ecosystem of modern media. Data can be easily and completely duplicated. It brings great convenience to life, work, scientific research and other areas of human activity. However, information security issues have appeared that have attracted a lot of attention. The purpose of this article is to present a model for digital image authentication. This article proposes a model for reliable verification of digital image authenticity with a high degree of protection and parameters for assessing the effectiveness of such systems.  Reliability is achieved because the watermark is hidden not in the whole image, but in its fragment, which is most suitable for hiding the image, as well as for using anti-noise codes as a watermark. Based on the current state of watermarking methods, it is recommended to use modern algorithms and architectures of convolutional neural networks to ensure a high degree of security.

2021 ◽  
Vol 16 (3) ◽  
pp. 53-68
Author(s):  
A.V. SKIPERSKIKH ◽  

The purpose of the research is to present how the carnival element in the regional policy is associated with the legitimating of power. Also made of the current state of the regional political process in some constituent entities of the Russian Federation, characterized by a high degree of carnivalization. As a result, the importance of the practices of the regional elite, resorting to game forms of their own positioning. The legitimacy of the regional power to depend on festive discourse. A routine political process in the constituent entities of the Russia does not evoke public emotions that have a positive effect on the legitimation of power. The demand for the politics of spectacle is also present in municipal political practices in a very dangerous epoch of COVID-19. A social organism that needs emotions, as well as control, does not experience serious transformations. In society penchant for spectacle, as well as the political class in the production of carnival events, there are deep historical roots, as well as the cultural specificity of a particular region. The points out that in the regional political process one can increasingly see accents on festivals. So, the government solves two important problems: the first one is a public request for a show, it is resolved in conditions of a rather unpleasant and unpromising accumulation of negative for the authorities due to the deterioration of the socio-economic situation in general, the second one is the production of the play solves the issues of legitimation regional and municipal authorities.


2018 ◽  
Vol 189 ◽  
pp. 10015 ◽  
Author(s):  
Karim Zkik ◽  
Said EL Hajji ◽  
Ghizlane Orhanou

The information technology sector has experienced phenomenal growth during recent years. To follow this development many new technologies have emerged to satisfy the expectations of businesses and customers, such as Cloud Computing, mobility, virtualization, Internet of things and big data. Traditional network cannot longer support this growth and suffers more and more in terms of misconfiguration,management and configurations complexity. Software defined network (SDN) architectures can be considered as a big revolution in the field of computer networks, because they offer a centralized control on infrastructure, services and the applications deployed which facilitate configuration and management on the network. The implementation of this type of architecture is not obvious and requires great expertise and good handling and management of network equipment. To remedy this problem the SDN architectures have evolved towards distributed and hybrid architectures. Despites the advantages of using SDN, security issues remain a real obstacle in front of the deployment of this type of architecture. The centralized architecture of this type of networks makes it vulnerable to several types of attacks and intrusions, and the implementation of security equipment generally causes a decrease in performance and increase latency.


Author(s):  
Martin Kiselicki ◽  
Saso Josimovski ◽  
Lidija Pulevska Ivanovska ◽  
Mijalce Santa

The research focuses on introducing social media platforms as either a complementary or main channel in the company sales funnel. Internet technologies and Web 2.0 continue to provide innovations in digital marketing, with the latest iteration being lead generation services through social media. Data shows that almost half of the world population is active on social media, with the new Generation Alpha being projected to be entirely online dependent and proficient in the use of new technologies. The paper provides an overview of the digitalization of sales funnels, as well as the benefits that social media platforms can offer if implemented correctly. Secondary data provides the basis for transforming sales funnels with social media, where previous research provides limited data on the effectiveness of these types of efforts. Primary data demonstrates that introducing social media platforms can provide improvements of up to 3 to 4 times in analyzed case studies, as well as the shorter time when deciding about purchase in use case scenarios. Social media advertising can also be utilized to shorten the sales funnel process and serve as a unified point of entrance and exit in the first few stages.


2016 ◽  
Author(s):  
George Dimitriadis ◽  
Joana Neto ◽  
Adam R. Kampff

AbstractElectrophysiology is entering the era of ‘Big Data’. Multiple probes, each with hundreds to thousands of individual electrodes, are now capable of simultaneously recording from many brain regions. The major challenge confronting these new technologies is transforming the raw data into physiologically meaningful signals, i.e. single unit spikes. Sorting the spike events of individual neurons from a spatiotemporally dense sampling of the extracellular electric field is a problem that has attracted much attention [22, 23], but is still far from solved. Current methods still rely on human input and thus become unfeasible as the size of the data sets grow exponentially.Here we introduce the t-student stochastic neighbor embedding (t-sne) dimensionality reduction method [27] as a visualization tool in the spike sorting process. T-sne embeds the n-dimensional extracellular spikes (n = number of features by which each spike is decomposed) into a low (usually two) dimensional space. We show that such embeddings, even starting from different feature spaces, form obvious clusters of spikes that can be easily visualized and manually delineated with a high degree of precision. We propose that these clusters represent single units and test this assertion by applying our algorithm on labeled data sets both from hybrid [23] and paired juxtacellular/extracellular recordings [15]. We have released a graphical user interface (gui) written in python as a tool for the manual clustering of the t-sne embedded spikes and as a tool for an informed overview and fast manual curration of results from other clustering algorithms. Furthermore, the generated visualizations offer evidence in favor of the use of probes with higher density and smaller electrodes. They also graphically demonstrate the diverse nature of the sorting problem when spikes are recorded with different methods and arise from regions with different background spiking statistics.


Author(s):  
Mykola Ryzhkov ◽  
Anastasiia Siabro

Achievements in the sphere of automatization and telecommunication are an essential component of transformation of the international peace and security system. This article presents, that consequences of changes are of a dual character. On the one hand, new technologies are becoming an important component of society modernization strategies in developing countries, on the other hand, they can be used for armament modernization or creation of new means of confrontation in modern international relations. APR countries face the most relevant issue of information technologies usage. The article deals with the process of discussion of new challenges and threats to international security, emerging as a result of development and large-scale implementation of information-communication technologies. Positions of states regarding the adoption of resolution in the sphere of international information security were studied through examples of Japan, India, and China. It is proved in the article, that information technologies have become an important component of the security system in the world. Technologies usage may lead to steady international development as well as to information arms race. That is why working out a common position on international information security issues is of crucial importance. It is within the framework of the UN, that different states of the world are given an opportunity to express their visions of the problem of international information security and work out common approaches to its solution. The article shows, that states’ positions have similar as well as different features. For instance, all states express concern regarding possible limitation of technology transfer for the establishment of a more controlled international political environment. But states’ positions have major differences as to mechanisms of information security provision. Thus, Japan and India strive to achieve a balanced system of international information security, which should at the same time have preventive mechanisms against the emergence of threats in the information and science and technology spheres and guarantee continuation of scientific-technological development, which is a crucial component of development and modernization strategies in many countries of the world. China came forward with position of strong regulation of international information security issues and suggested framing of corresponding regulations of the states’ conduct in the cyberspace.


2021 ◽  
Vol 13 (19) ◽  
pp. 10684
Author(s):  
Stepan Kavan

This paper deals with education in security issues. The aim of this work is to examine and evaluate the current approach to education of future educators in the field of security issues at selected universities in the Czech Republic. The primary method of research was a survey through questionnaires, where information was collected at selected universities. The evaluation is performed using SWOT analysis. The fragmentation and inconsistency of the approach of individual universities is evident from the results of the survey. New knowledge, which is based on the research, is the identification of the current state of training of future teachers in the field of security. The result of the survey is used by an expert group of the Ministry of the Interior and the Ministry of Education, Youth and Sports of the Czech Republic as input information for the development of minimum standards for pedagogical universities.


2019 ◽  
Vol 9 (3) ◽  
pp. 167-181
Author(s):  
Cintia Alejandra Briones Nieva ◽  
Mercedes Villegas ◽  
Alicia Graciela Cid ◽  
Analía Irma Romero ◽  
José María Bermúdez

Background: Chitosan (CS) is a biomaterial derived from chitin, known for its excellent biological properties. One of the most interesting features of CS is its potential for chemical derivatization, which makes it a versatile material and allows to expand its applications. In the last years, the interest on this polymer and its pharmaceutical applications has notably increased. This biopolymer is being widely studied for its interesting properties, such as bioadhesion, antimicrobial activity, biocompatibility, and biodegradability. Other promising properties of CS include its modulation of immunological response, hemostasis, and wound and bone healing activity. Objective: In this work, a critical review is performed covering its conventional and novel applications, specially focused on pharmaceutical area, providing a clear picture of the current state of art to serve as a basis to direct future research in this field. Conclusion: Despite all the qualities of this polymer, there are only few CS-based products in the market, so it is a priority to enhance the research to develop new technologies and CS-based systems to enforce this biopolymer in the industry.


Sign in / Sign up

Export Citation Format

Share Document