11 research outputs found
ΠΡΠ΅Π΄Π΅Π»ΡΠ½ΡΠ΅ Π±ΠΈΠΏΠΎΠ»ΡΡΠ½ΡΠ΅ ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠΈ Π΄Π»Ρ ΡΠΎΠ±Π°ΡΡΠ½ΠΎΠ³ΠΎ ΠΌΠ°ΡΠΊΠΈΡΠΎΠ²Π°Π½ΠΈΡ ΡΠΈΡΡΠΎΠ²ΡΡ Π°ΡΠ΄ΠΈΠΎΡΠΈΠ³Π½Π°Π»ΠΎΠ² ΠΏΠΎ ΠΌΠ΅ΡΠΎΠ΄Ρ Π»ΠΎΡΠΊΡΡΠ°
Ensuring the robustness of digital audio watermarking under the influence of interference, various transformations and possible attacks is an urgent problem. One of the most used and fairly stable marking methods is the patchwork method. Its robustness is ensured by the use of expanding bipolar numerical sequences in the formation and embedding of a watermark in a digital audio and correlation detection in the detection and extraction of a watermark. An analysis of the patchwork method showed that the absolute values of the ratio of the maximum of the autocorrelation function (ACF) to its minimum for expanding bipolar sequences and extended marker sequences used in traditional digital watermarking approach 2 with high accuracy. This made it possible to formulate criteria for searching for special expanding bipolar sequences, which have improved correlation properties and greater robustness. The article developed a mathematical apparatus for searching and constructing limit-expanding bipolar sequences used in solving the problem of robust digital audio watermarking using the patchwork method. Limit bipolar sequences are defined as sequences whose autocorrelation functions have the maximum possible ratios of maximum to minimum in absolute value. Theorems and corollaries from them are formulated and proved: on the existence of an upper bound on the minimum values of autocorrelation functions of limit bipolar sequences and on the values of the first and second petals of the ACF. On this basis, a rigorous mathematical definition of limit bipolar sequences is given. A method for searching for the complete set of limit bipolar sequences based on rational search and a method for constructing limit bipolar sequences of arbitrary length using generating functions are developed. The results of the computer simulation of the assessment of the values of the absolute value of the ratio of the maximum to the minimum of the autocorrelation and cross-correlation functions of the studied bipolar sequences for blind reception are presented. It is shown that the proposed limit bipolar sequences are characterized by better correlation properties in comparison with the traditionally used bipolar sequences and are more robust.ΠΠ±Π΅ΡΠΏΠ΅ΡΠ΅Π½ΠΈΠ΅ ΡΡΡΠΎΠΉΡΠΈΠ²ΠΎΡΡΠΈ ΠΌΠ°ΡΠΊΠΈΡΠΎΠ²Π°Π½ΠΈΡ ΡΠΈΡΡΠΎΠ²ΡΡ
Π°ΡΠ΄ΠΈΠΎΡΠΈΠ³Π½Π°Π»ΠΎΠ² Π² ΡΡΠ»ΠΎΠ²ΠΈΡΡ
Π΄Π΅ΠΉΡΡΠ²ΠΈΡ ΠΏΠΎΠΌΠ΅Ρ
, ΡΠ°Π·Π»ΠΈΡΠ½ΡΡ
ΠΏΡΠ΅ΠΎΠ±ΡΠ°Π·ΠΎΠ²Π°Π½ΠΈΠΉ ΠΈ Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΡΡ
Π°ΡΠ°ΠΊ ΡΠ²Π»ΡΠ΅ΡΡΡ Π°ΠΊΡΡΠ°Π»ΡΠ½ΠΎΠΉ ΠΏΡΠΎΠ±Π»Π΅ΠΌΠΎΠΉ. ΠΠ΄Π½ΠΈΠΌ ΠΈΠ· Π½Π°ΠΈΠ±ΠΎΠ»Π΅Π΅ ΠΈΡΠΏΠΎΠ»ΡΠ·ΡΠ΅ΠΌΡΡ
ΠΈ Π΄ΠΎΡΡΠ°ΡΠΎΡΠ½ΠΎ ΡΡΡΠΎΠΉΡΠΈΠ²ΡΡ
ΠΌΠ΅ΡΠΎΠ΄ΠΎΠ² ΠΌΠ°ΡΠΊΠΈΡΠΎΠ²Π°Π½ΠΈΡ ΡΠ²Π»ΡΠ΅ΡΡΡ ΠΌΠ΅ΡΠΎΠ΄ Π»ΠΎΡΠΊΡΡΠ°. ΠΠ³ΠΎ ΡΠΎΠ±Π°ΡΡΠ½ΠΎΡΡΡ ΠΎΠ±Π΅ΡΠΏΠ΅ΡΠΈΠ²Π°Π΅ΡΡΡ ΠΏΡΠΈΠΌΠ΅Π½Π΅Π½ΠΈΠ΅ΠΌ ΡΠ°ΡΡΠΈΡΡΡΡΠΈΡ
Π±ΠΈΠΏΠΎΠ»ΡΡΠ½ΡΡ
ΡΠΈΡΠ»ΠΎΠ²ΡΡ
ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠ΅ΠΉ ΠΏΡΠΈ ΡΠΎΡΠΌΠΈΡΠΎΠ²Π°Π½ΠΈΠΈ ΠΈ Π²Π½Π΅Π΄ΡΠ΅Π½ΠΈΠΈ ΠΌΠ°ΡΠΊΠ΅ΡΠ° Π² ΡΠΈΡΡΠΎΠ²ΠΎΠΉ Π°ΡΠ΄ΠΈΠΎΡΠΈΠ³Π½Π°Π» ΠΈ ΠΊΠΎΡΡΠ΅Π»ΡΡΠΈΠΎΠ½Π½ΠΎΠ³ΠΎ Π΄Π΅ΡΠ΅ΠΊΡΠΈΡΠΎΠ²Π°Π½ΠΈΡ ΠΏΡΠΈ ΠΎΠ±Π½Π°ΡΡΠΆΠ΅Π½ΠΈΠΈ ΠΈ ΠΈΠ·Π²Π»Π΅ΡΠ΅Π½ΠΈΠΈ ΠΌΠ°ΡΠΊΠ΅ΡΠ½ΠΎΠΉ ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠΈ. ΠΠ½Π°Π»ΠΈΠ· ΡΠ²ΠΎΠΉΡΡΠ² Π±ΠΈΠΏΠΎΠ»ΡΡΠ½ΡΡ
ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠ΅ΠΉ, ΡΠ΅Π°Π»ΠΈΠ·ΡΠ΅ΠΌΡΡ
Π² ΠΌΠ΅ΡΠΎΠ΄Π΅ Π»ΠΎΡΠΊΡΡΠ°, ΠΏΠΎΠΊΠ°Π·Π°Π», ΡΡΠΎ Π°Π±ΡΠΎΠ»ΡΡΠ½ΡΠ΅ Π·Π½Π°ΡΠ΅Π½ΠΈΡ Π²Π΅Π»ΠΈΡΠΈΠ½Ρ ΠΎΡΠ½ΠΎΡΠ΅Π½ΠΈΡ ΠΌΠ°ΠΊΡΠΈΠΌΡΠΌΠ° Π°Π²ΡΠΎΠΊΠΎΡΡΠ΅Π»ΡΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΡΠ½ΠΊΡΠΈΠΈ (ΠΠΠ€) ΠΊ Π΅Ρ ΠΌΠΈΠ½ΠΈΠΌΡΠΌΡ Π΄Π»Ρ ΡΠ°ΡΡΠΈΡΡΡΡΠΈΡ
Π±ΠΈΠΏΠΎΠ»ΡΡΠ½ΡΡ
ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠ΅ΠΉ ΠΈ ΡΠ°ΡΡΠΈΡΠ΅Π½Π½ΡΡ
ΠΌΠ°ΡΠΊΠ΅ΡΠ½ΡΡ
ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠ΅ΠΉ, ΠΈΡΠΏΠΎΠ»ΡΠ·ΡΠ΅ΠΌΡΡ
ΠΏΡΠΈ ΡΡΠ°Π΄ΠΈΡΠΈΠΎΠ½Π½ΠΎΠΌ ΠΌΠ°ΡΠΊΠΈΡΠΎΠ²Π°Π½ΠΈΠΈ, Ρ Π²ΡΡΠΎΠΊΠΎΠΉ ΡΠΎΡΠ½ΠΎΡΡΡΡ ΠΏΡΠΈΠ±Π»ΠΈΠΆΠ°ΡΡΡΡ ΠΊ 2. ΠΡΠΎ ΠΏΠΎΠ·Π²ΠΎΠ»ΠΈΠ»ΠΎ ΡΡΠΎΡΠΌΡΠ»ΠΈΡΠΎΠ²Π°ΡΡ ΠΊΡΠΈΡΠ΅ΡΠΈΠΈ Π΄Π»Ρ ΠΏΠΎΠΈΡΠΊΠ° ΡΠΏΠ΅ΡΠΈΠ°Π»ΡΠ½ΡΡ
ΡΠ°ΡΡΠΈΡΡΡΡΠΈΡ
Π±ΠΈΠΏΠΎΠ»ΡΡΠ½ΡΡ
ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠ΅ΠΉ, ΠΎΠ±Π»Π°Π΄Π°ΡΡΠΈΡ
ΡΠ»ΡΡΡΠ΅Π½Π½ΡΠΌΠΈ ΠΊΠΎΡΡΠ΅Π»ΡΡΠΈΠΎΠ½Π½ΡΠΌΠΈ ΡΠ²ΠΎΠΉΡΡΠ²Π°ΠΌΠΈ ΠΈ Π±ΠΎΠ»ΡΡΠ΅ΠΉ ΡΡΡΠΎΠΉΡΠΈΠ²ΠΎΡΡΡΡ. Π ΡΡΠ°ΡΡΠ΅ ΡΠ°Π·ΡΠ°Π±ΠΎΡΠ°Π½ ΠΌΠ°ΡΠ΅ΠΌΠ°ΡΠΈΡΠ΅ΡΠΊΠΈΠΉ Π°ΠΏΠΏΠ°ΡΠ°Ρ Π΄Π»Ρ ΠΏΠΎΠΈΡΠΊΠ° ΠΈ ΠΏΠΎΡΡΡΠΎΠ΅Π½ΠΈΡ ΠΏΡΠ΅Π΄Π΅Π»ΡΠ½ΡΡ
ΡΠ°ΡΡΠΈΡΡΡΡΠΈΡ
Π±ΠΈΠΏΠΎΠ»ΡΡΠ½ΡΡ
ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠ΅ΠΉ, ΠΈΡΠΏΠΎΠ»ΡΠ·ΡΠ΅ΠΌΡΡ
ΠΏΡΠΈ ΡΠ΅ΡΠ΅Π½ΠΈΠΈ Π·Π°Π΄Π°ΡΠΈ ΡΠΎΠ±Π°ΡΡΠ½ΠΎΠ³ΠΎ ΠΌΠ°ΡΠΊΠΈΡΠΎΠ²Π°Π½ΠΈΡ ΡΠΈΡΡΠΎΠ²ΡΡ
Π°ΡΠ΄ΠΈΠΎΡΠΈΠ³Π½Π°Π»ΠΎΠ² ΠΏΠΎ ΠΌΠ΅ΡΠΎΠ΄Ρ Π»ΠΎΡΠΊΡΡΠ°. ΠΡΠ΅Π΄Π΅Π»ΡΠ½ΡΠ΅ Π±ΠΈΠΏΠΎΠ»ΡΡΠ½ΡΠ΅ ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠΈ ΠΎΠΏΡΠ΅Π΄Π΅Π»Π΅Π½Ρ ΠΊΠ°ΠΊ ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠΈ, Ρ ΠΊΠΎΡΠΎΡΡΡ
Π°Π²ΡΠΎΠΊΠΎΡΡΠ΅Π»ΡΡΠΈΠΎΠ½Π½ΡΠ΅ ΡΡΠ½ΠΊΡΠΈΠΈ ΠΎΠ±Π»Π°Π΄Π°ΡΡ ΠΌΠ°ΠΊΡΠΈΠΌΠ°Π»ΡΠ½ΠΎ Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΡΠΌΠΈ ΠΏΠΎ Π°Π±ΡΠΎΠ»ΡΡΠ½ΠΎΠΌΡ Π·Π½Π°ΡΠ΅Π½ΠΈΡ ΠΎΡΠ½ΠΎΡΠ΅Π½ΠΈΡΠΌΠΈ ΠΌΠ°ΠΊΡΠΈΠΌΡΠΌΠ° ΠΊ ΠΌΠΈΠ½ΠΈΠΌΡΠΌΡ. Π‘ΡΠΎΡΠΌΡΠ»ΠΈΡΠΎΠ²Π°Π½Ρ ΠΈ Π΄ΠΎΠΊΠ°Π·Π°Π½Ρ ΡΠ΅ΠΎΡΠ΅ΠΌΡ ΠΈ ΡΠ»Π΅Π΄ΡΡΠ²ΠΈΡ ΠΈΠ· Π½ΠΈΡ
: ΠΎ ΡΡΡΠ΅ΡΡΠ²ΠΎΠ²Π°Π½ΠΈΠΈ Π²Π΅ΡΡ
Π½Π΅ΠΉ Π³ΡΠ°Π½ΠΈΡΡ ΠΌΠΈΠ½ΠΈΠΌΠ°Π»ΡΠ½ΡΡ
Π·Π½Π°ΡΠ΅Π½ΠΈΠΉ Π°Π²ΡΠΎΠΊΠΎΡΡΠ΅Π»ΡΡΠΈΠΎΠ½Π½ΡΡ
ΡΡΠ½ΠΊΡΠΈΠΉ ΠΏΡΠ΅Π΄Π΅Π»ΡΠ½ΡΡ
Π±ΠΈΠΏΠΎΠ»ΡΡΠ½ΡΡ
ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠ΅ΠΉ ΠΈ ΠΎ Π·Π½Π°ΡΠ΅Π½ΠΈΡΡ
ΠΏΠ΅ΡΠ²ΠΎΠ³ΠΎ ΠΈ Π²ΡΠΎΡΠΎΠ³ΠΎ Π»Π΅ΠΏΠ΅ΡΡΠΊΠΎΠ² ΠΠΠ€. ΠΠ° ΡΡΠΎΠΉ ΠΎΡΠ½ΠΎΠ²Π΅ Π΄Π°Π½ΠΎ ΡΡΡΠΎΠ³ΠΎΠ΅ ΠΌΠ°ΡΠ΅ΠΌΠ°ΡΠΈΡΠ΅ΡΠΊΠΎΠ΅ ΠΎΠΏΡΠ΅Π΄Π΅Π»Π΅Π½ΠΈΠ΅ ΠΏΡΠ΅Π΄Π΅Π»ΡΠ½ΡΡ
Π±ΠΈΠΏΠΎΠ»ΡΡΠ½ΡΡ
ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠ΅ΠΉ. Π Π°Π·ΡΠ°Π±ΠΎΡΠ°Π½Ρ ΠΌΠ΅ΡΠΎΠ΄ ΠΏΠΎΠΈΡΠΊΠ° ΠΏΠΎΠ»Π½ΠΎΠ³ΠΎ ΠΌΠ½ΠΎΠΆΠ΅ΡΡΠ²Π° ΠΏΡΠ΅Π΄Π΅Π»ΡΠ½ΡΡ
Π±ΠΈΠΏΠΎΠ»ΡΡΠ½ΡΡ
ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠ΅ΠΉ Π½Π° ΠΎΡΠ½ΠΎΠ²Π΅ ΡΠ°ΡΠΈΠΎΠ½Π°Π»ΡΠ½ΠΎΠ³ΠΎ ΠΏΠ΅ΡΠ΅Π±ΠΎΡΠ° ΠΈ ΠΌΠ΅ΡΠΎΠ΄ ΠΏΠΎΡΡΡΠΎΠ΅Π½ΠΈΡ ΠΏΡΠ΅Π΄Π΅Π»ΡΠ½ΡΡ
Π±ΠΈΠΏΠΎΠ»ΡΡΠ½ΡΡ
ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠ΅ΠΉ ΠΏΡΠΎΠΈΠ·Π²ΠΎΠ»ΡΠ½ΠΎΠΉ Π΄Π»ΠΈΠ½Ρ Ρ ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°Π½ΠΈΠ΅ΠΌ ΠΏΠΎΡΠΎΠΆΠ΄Π°ΡΡΠΈΡ
ΡΡΠ½ΠΊΡΠΈΠΉ. ΠΡΠ΅Π΄ΡΡΠ°Π²Π»Π΅Π½Ρ ΡΠ΅Π·ΡΠ»ΡΡΠ°ΡΡ ΠΊΠΎΠΌΠΏΡΡΡΠ΅ΡΠ½ΠΎΠ³ΠΎ ΠΌΠΎΠ΄Π΅Π»ΠΈΡΠΎΠ²Π°Π½ΠΈΡ ΠΏΠΎ ΠΎΡΠ΅Π½ΠΊΠ΅ Π·Π½Π°ΡΠ΅Π½ΠΈΠΉ Π°Π±ΡΠΎΠ»ΡΡΠ½ΠΎΠΉ Π²Π΅Π»ΠΈΡΠΈΠ½Ρ ΠΎΡΠ½ΠΎΡΠ΅Π½ΠΈΡ ΠΌΠ°ΠΊΡΠΈΠΌΡΠΌΠ° ΠΊ ΠΌΠΈΠ½ΠΈΠΌΡΠΌΡ Π°Π²ΡΠΎΠΊΠΎΡΡΠ΅Π»ΡΡΠΈΠΎΠ½Π½ΠΎΠΉ ΠΈ Π²Π·Π°ΠΈΠΌΠ½ΠΎΠΉ ΠΊΠΎΡΡΠ΅Π»ΡΡΠΈΠΎΠ½Π½ΡΡ
ΡΡΠ½ΠΊΡΠΈΠΉ ΠΈΡΡΠ»Π΅Π΄ΡΠ΅ΠΌΡΡ
Π±ΠΈΠΏΠΎΠ»ΡΡΠ½ΡΡ
ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠ΅ΠΉ Π΄Π»Ρ ΡΠ»Π΅ΠΏΠΎΠ³ΠΎ ΠΏΡΠΈΠ΅ΠΌΠ°. ΠΠΎΠΊΠ°Π·Π°Π½ΠΎ, ΡΡΠΎ ΠΏΡΠ΅Π΄Π»ΠΎΠΆΠ΅Π½Π½ΡΠ΅ ΠΏΡΠ΅Π΄Π΅Π»ΡΠ½ΡΠ΅ Π±ΠΈΠΏΠΎΠ»ΡΡΠ½ΡΠ΅ ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠΈ Ρ
Π°ΡΠ°ΠΊΡΠ΅ΡΠΈΠ·ΡΡΡΡΡ Π»ΡΡΡΠΈΠΌΠΈ ΠΊΠΎΡΡΠ΅Π»ΡΡΠΈΠΎΠ½Π½ΡΠΌΠΈ ΡΠ²ΠΎΠΉΡΡΠ²Π°ΠΌΠΈ Π² ΡΡΠ°Π²Π½Π΅Π½ΠΈΠΈ Ρ ΡΡΠ°Π΄ΠΈΡΠΈΠΎΠ½Π½ΠΎ ΠΈΡΠΏΠΎΠ»ΡΠ·ΡΠ΅ΠΌΡΠΌΠΈ Π±ΠΈΠΏΠΎΠ»ΡΡΠ½ΡΠΌΠΈ ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΡΠΌΠΈ ΠΈ ΠΎΠ±Π»Π°Π΄Π°ΡΡ Π±ΠΎΠ»ΡΡΠ΅ΠΉ ΡΡΡΠΎΠΉΡΠΈΠ²ΠΎΡΡΡΡ
ΠΡΠ΅Π΄Π΅Π»ΡΠ½ΡΠ΅ Π±ΠΈΠΏΠΎΠ»ΡΡΠ½ΡΠ΅ ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠΈ Π΄Π»Ρ ΡΠΎΠ±Π°ΡΡΠ½ΠΎΠ³ΠΎ ΠΌΠ°ΡΠΊΠΈΡΠΎΠ²Π°Π½ΠΈΡ ΡΠΈΡΡΠΎΠ²ΡΡ Π°ΡΠ΄ΠΈΠΎΡΠΈΠ³Π½Π°Π»ΠΎΠ² ΠΏΠΎ ΠΌΠ΅ΡΠΎΠ΄Ρ Π»ΠΎΡΠΊΡΡΠ°
ΠΠ±Π΅ΡΠΏΠ΅ΡΠ΅Π½ΠΈΠ΅ ΡΡΡΠΎΠΉΡΠΈΠ²ΠΎΡΡΠΈ ΠΌΠ°ΡΠΊΠΈΡΠΎΠ²Π°Π½ΠΈΡ ΡΠΈΡΡΠΎΠ²ΡΡ
Π°ΡΠ΄ΠΈΠΎΡΠΈΠ³Π½Π°Π»ΠΎΠ² Π² ΡΡΠ»ΠΎΠ²ΠΈΡΡ
Π΄Π΅ΠΉΡΡΠ²ΠΈΡ ΠΏΠΎΠΌΠ΅Ρ
, ΡΠ°Π·Π»ΠΈΡΠ½ΡΡ
ΠΏΡΠ΅ΠΎΠ±ΡΠ°Π·ΠΎΠ²Π°Π½ΠΈΠΉ ΠΈ Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΡΡ
Π°ΡΠ°ΠΊ ΡΠ²Π»ΡΠ΅ΡΡΡ Π°ΠΊΡΡΠ°Π»ΡΠ½ΠΎΠΉ ΠΏΡΠΎΠ±Π»Π΅ΠΌΠΎΠΉ. ΠΠ΄Π½ΠΈΠΌ ΠΈΠ· Π½Π°ΠΈΠ±ΠΎΠ»Π΅Π΅ ΠΈΡΠΏΠΎΠ»ΡΠ·ΡΠ΅ΠΌΡΡ
ΠΈ Π΄ΠΎΡΡΠ°ΡΠΎΡΠ½ΠΎ ΡΡΡΠΎΠΉΡΠΈΠ²ΡΡ
ΠΌΠ΅ΡΠΎΠ΄ΠΎΠ² ΠΌΠ°ΡΠΊΠΈΡΠΎΠ²Π°Π½ΠΈΡ ΡΠ²Π»ΡΠ΅ΡΡΡ ΠΌΠ΅ΡΠΎΠ΄ Π»ΠΎΡΠΊΡΡΠ°. ΠΠ³ΠΎ ΡΠΎΠ±Π°ΡΡΠ½ΠΎΡΡΡ ΠΎΠ±Π΅ΡΠΏΠ΅ΡΠΈΠ²Π°Π΅ΡΡΡ ΠΏΡΠΈΠΌΠ΅Π½Π΅Π½ΠΈΠ΅ΠΌ ΡΠ°ΡΡΠΈΡΡΡΡΠΈΡ
Π±ΠΈΠΏΠΎΠ»ΡΡΠ½ΡΡ
ΡΠΈΡΠ»ΠΎΠ²ΡΡ
ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠ΅ΠΉ ΠΏΡΠΈ ΡΠΎΡΠΌΠΈΡΠΎΠ²Π°Π½ΠΈΠΈ ΠΈ Π²Π½Π΅Π΄ΡΠ΅Π½ΠΈΠΈ ΠΌΠ°ΡΠΊΠ΅ΡΠ° Π² ΡΠΈΡΡΠΎΠ²ΠΎΠΉ Π°ΡΠ΄ΠΈΠΎΡΠΈΠ³Π½Π°Π» ΠΈ ΠΊΠΎΡΡΠ΅Π»ΡΡΠΈΠΎΠ½Π½ΠΎΠ³ΠΎ Π΄Π΅ΡΠ΅ΠΊΡΠΈΡΠΎΠ²Π°Π½ΠΈΡ ΠΏΡΠΈ ΠΎΠ±Π½Π°ΡΡΠΆΠ΅Π½ΠΈΠΈ ΠΈ ΠΈΠ·Π²Π»Π΅ΡΠ΅Π½ΠΈΠΈ ΠΌΠ°ΡΠΊΠ΅ΡΠ½ΠΎΠΉ ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠΈ. ΠΠ½Π°Π»ΠΈΠ· ΡΠ²ΠΎΠΉΡΡΠ² Π±ΠΈΠΏΠΎΠ»ΡΡΠ½ΡΡ
ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠ΅ΠΉ, ΡΠ΅Π°Π»ΠΈΠ·ΡΠ΅ΠΌΡΡ
Π² ΠΌΠ΅ΡΠΎΠ΄Π΅ Π»ΠΎΡΠΊΡΡΠ°, ΠΏΠΎΠΊΠ°Π·Π°Π», ΡΡΠΎ Π°Π±ΡΠΎΠ»ΡΡΠ½ΡΠ΅ Π·Π½Π°ΡΠ΅Π½ΠΈΡ Π²Π΅Π»ΠΈΡΠΈΠ½Ρ ΠΎΡΠ½ΠΎΡΠ΅Π½ΠΈΡ ΠΌΠ°ΠΊΡΠΈΠΌΡΠΌΠ° Π°Π²ΡΠΎΠΊΠΎΡΡΠ΅Π»ΡΡΠΈΠΎΠ½Π½ΠΎΠΉ ΡΡΠ½ΠΊΡΠΈΠΈ (ΠΠΠ€) ΠΊ Π΅Ρ ΠΌΠΈΠ½ΠΈΠΌΡΠΌΡ Π΄Π»Ρ ΡΠ°ΡΡΠΈΡΡΡΡΠΈΡ
Π±ΠΈΠΏΠΎΠ»ΡΡΠ½ΡΡ
ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠ΅ΠΉ ΠΈ ΡΠ°ΡΡΠΈΡΠ΅Π½Π½ΡΡ
ΠΌΠ°ΡΠΊΠ΅ΡΠ½ΡΡ
ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠ΅ΠΉ, ΠΈΡΠΏΠΎΠ»ΡΠ·ΡΠ΅ΠΌΡΡ
ΠΏΡΠΈ ΡΡΠ°Π΄ΠΈΡΠΈΠΎΠ½Π½ΠΎΠΌ ΠΌΠ°ΡΠΊΠΈΡΠΎΠ²Π°Π½ΠΈΠΈ, Ρ Π²ΡΡΠΎΠΊΠΎΠΉ ΡΠΎΡΠ½ΠΎΡΡΡΡ ΠΏΡΠΈΠ±Π»ΠΈΠΆΠ°ΡΡΡΡ ΠΊ 2. ΠΡΠΎ ΠΏΠΎΠ·Π²ΠΎΠ»ΠΈΠ»ΠΎ ΡΡΠΎΡΠΌΡΠ»ΠΈΡΠΎΠ²Π°ΡΡ ΠΊΡΠΈΡΠ΅ΡΠΈΠΈ Π΄Π»Ρ ΠΏΠΎΠΈΡΠΊΠ° ΡΠΏΠ΅ΡΠΈΠ°Π»ΡΠ½ΡΡ
ΡΠ°ΡΡΠΈΡΡΡΡΠΈΡ
Π±ΠΈΠΏΠΎΠ»ΡΡΠ½ΡΡ
ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠ΅ΠΉ, ΠΎΠ±Π»Π°Π΄Π°ΡΡΠΈΡ
ΡΠ»ΡΡΡΠ΅Π½Π½ΡΠΌΠΈ ΠΊΠΎΡΡΠ΅Π»ΡΡΠΈΠΎΠ½Π½ΡΠΌΠΈ ΡΠ²ΠΎΠΉΡΡΠ²Π°ΠΌΠΈ ΠΈ Π±ΠΎΠ»ΡΡΠ΅ΠΉ ΡΡΡΠΎΠΉΡΠΈΠ²ΠΎΡΡΡΡ. Π ΡΡΠ°ΡΡΠ΅ ΡΠ°Π·ΡΠ°Π±ΠΎΡΠ°Π½ ΠΌΠ°ΡΠ΅ΠΌΠ°ΡΠΈΡΠ΅ΡΠΊΠΈΠΉ Π°ΠΏΠΏΠ°ΡΠ°Ρ Π΄Π»Ρ ΠΏΠΎΠΈΡΠΊΠ° ΠΈ ΠΏΠΎΡΡΡΠΎΠ΅Π½ΠΈΡ ΠΏΡΠ΅Π΄Π΅Π»ΡΠ½ΡΡ
ΡΠ°ΡΡΠΈΡΡΡΡΠΈΡ
Π±ΠΈΠΏΠΎΠ»ΡΡΠ½ΡΡ
ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠ΅ΠΉ, ΠΈΡΠΏΠΎΠ»ΡΠ·ΡΠ΅ΠΌΡΡ
ΠΏΡΠΈ ΡΠ΅ΡΠ΅Π½ΠΈΠΈ Π·Π°Π΄Π°ΡΠΈ ΡΠΎΠ±Π°ΡΡΠ½ΠΎΠ³ΠΎ ΠΌΠ°ΡΠΊΠΈΡΠΎΠ²Π°Π½ΠΈΡ ΡΠΈΡΡΠΎΠ²ΡΡ
Π°ΡΠ΄ΠΈΠΎΡΠΈΠ³Π½Π°Π»ΠΎΠ² ΠΏΠΎ ΠΌΠ΅ΡΠΎΠ΄Ρ Π»ΠΎΡΠΊΡΡΠ°. ΠΡΠ΅Π΄Π΅Π»ΡΠ½ΡΠ΅ Π±ΠΈΠΏΠΎΠ»ΡΡΠ½ΡΠ΅ ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠΈ ΠΎΠΏΡΠ΅Π΄Π΅Π»Π΅Π½Ρ ΠΊΠ°ΠΊ ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠΈ, Ρ ΠΊΠΎΡΠΎΡΡΡ
Π°Π²ΡΠΎΠΊΠΎΡΡΠ΅Π»ΡΡΠΈΠΎΠ½Π½ΡΠ΅ ΡΡΠ½ΠΊΡΠΈΠΈ ΠΎΠ±Π»Π°Π΄Π°ΡΡ ΠΌΠ°ΠΊΡΠΈΠΌΠ°Π»ΡΠ½ΠΎ Π²ΠΎΠ·ΠΌΠΎΠΆΠ½ΡΠΌΠΈ ΠΏΠΎ Π°Π±ΡΠΎΠ»ΡΡΠ½ΠΎΠΌΡ Π·Π½Π°ΡΠ΅Π½ΠΈΡ ΠΎΡΠ½ΠΎΡΠ΅Π½ΠΈΡΠΌΠΈ ΠΌΠ°ΠΊΡΠΈΠΌΡΠΌΠ° ΠΊ ΠΌΠΈΠ½ΠΈΠΌΡΠΌΡ. Π‘ΡΠΎΡΠΌΡΠ»ΠΈΡΠΎΠ²Π°Π½Ρ ΠΈ Π΄ΠΎΠΊΠ°Π·Π°Π½Ρ ΡΠ΅ΠΎΡΠ΅ΠΌΡ ΠΈ ΡΠ»Π΅Π΄ΡΡΠ²ΠΈΡ ΠΈΠ· Π½ΠΈΡ
: ΠΎ ΡΡΡΠ΅ΡΡΠ²ΠΎΠ²Π°Π½ΠΈΠΈ Π²Π΅ΡΡ
Π½Π΅ΠΉ Π³ΡΠ°Π½ΠΈΡΡ ΠΌΠΈΠ½ΠΈΠΌΠ°Π»ΡΠ½ΡΡ
Π·Π½Π°ΡΠ΅Π½ΠΈΠΉ Π°Π²ΡΠΎΠΊΠΎΡΡΠ΅Π»ΡΡΠΈΠΎΠ½Π½ΡΡ
ΡΡΠ½ΠΊΡΠΈΠΉ ΠΏΡΠ΅Π΄Π΅Π»ΡΠ½ΡΡ
Π±ΠΈΠΏΠΎΠ»ΡΡΠ½ΡΡ
ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠ΅ΠΉ ΠΈ ΠΎ Π·Π½Π°ΡΠ΅Π½ΠΈΡΡ
ΠΏΠ΅ΡΠ²ΠΎΠ³ΠΎ ΠΈ Π²ΡΠΎΡΠΎΠ³ΠΎ Π»Π΅ΠΏΠ΅ΡΡΠΊΠΎΠ² ΠΠΠ€. ΠΠ° ΡΡΠΎΠΉ ΠΎΡΠ½ΠΎΠ²Π΅ Π΄Π°Π½ΠΎ ΡΡΡΠΎΠ³ΠΎΠ΅ ΠΌΠ°ΡΠ΅ΠΌΠ°ΡΠΈΡΠ΅ΡΠΊΠΎΠ΅ ΠΎΠΏΡΠ΅Π΄Π΅Π»Π΅Π½ΠΈΠ΅ ΠΏΡΠ΅Π΄Π΅Π»ΡΠ½ΡΡ
Π±ΠΈΠΏΠΎΠ»ΡΡΠ½ΡΡ
ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠ΅ΠΉ. Π Π°Π·ΡΠ°Π±ΠΎΡΠ°Π½Ρ ΠΌΠ΅ΡΠΎΠ΄ ΠΏΠΎΠΈΡΠΊΠ° ΠΏΠΎΠ»Π½ΠΎΠ³ΠΎ ΠΌΠ½ΠΎΠΆΠ΅ΡΡΠ²Π° ΠΏΡΠ΅Π΄Π΅Π»ΡΠ½ΡΡ
Π±ΠΈΠΏΠΎΠ»ΡΡΠ½ΡΡ
ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠ΅ΠΉ Π½Π° ΠΎΡΠ½ΠΎΠ²Π΅ ΡΠ°ΡΠΈΠΎΠ½Π°Π»ΡΠ½ΠΎΠ³ΠΎ ΠΏΠ΅ΡΠ΅Π±ΠΎΡΠ° ΠΈ ΠΌΠ΅ΡΠΎΠ΄ ΠΏΠΎΡΡΡΠΎΠ΅Π½ΠΈΡ ΠΏΡΠ΅Π΄Π΅Π»ΡΠ½ΡΡ
Π±ΠΈΠΏΠΎΠ»ΡΡΠ½ΡΡ
ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠ΅ΠΉ ΠΏΡΠΎΠΈΠ·Π²ΠΎΠ»ΡΠ½ΠΎΠΉ Π΄Π»ΠΈΠ½Ρ Ρ ΠΈΡΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°Π½ΠΈΠ΅ΠΌ ΠΏΠΎΡΠΎΠΆΠ΄Π°ΡΡΠΈΡ
ΡΡΠ½ΠΊΡΠΈΠΉ. ΠΡΠ΅Π΄ΡΡΠ°Π²Π»Π΅Π½Ρ ΡΠ΅Π·ΡΠ»ΡΡΠ°ΡΡ ΠΊΠΎΠΌΠΏΡΡΡΠ΅ΡΠ½ΠΎΠ³ΠΎ ΠΌΠΎΠ΄Π΅Π»ΠΈΡΠΎΠ²Π°Π½ΠΈΡ ΠΏΠΎ ΠΎΡΠ΅Π½ΠΊΠ΅ Π·Π½Π°ΡΠ΅Π½ΠΈΠΉ Π°Π±ΡΠΎΠ»ΡΡΠ½ΠΎΠΉ Π²Π΅Π»ΠΈΡΠΈΠ½Ρ ΠΎΡΠ½ΠΎΡΠ΅Π½ΠΈΡ ΠΌΠ°ΠΊΡΠΈΠΌΡΠΌΠ° ΠΊ ΠΌΠΈΠ½ΠΈΠΌΡΠΌΡ Π°Π²ΡΠΎΠΊΠΎΡΡΠ΅Π»ΡΡΠΈΠΎΠ½Π½ΠΎΠΉ ΠΈ Π²Π·Π°ΠΈΠΌΠ½ΠΎΠΉ ΠΊΠΎΡΡΠ΅Π»ΡΡΠΈΠΎΠ½Π½ΡΡ
ΡΡΠ½ΠΊΡΠΈΠΉ ΠΈΡΡΠ»Π΅Π΄ΡΠ΅ΠΌΡΡ
Π±ΠΈΠΏΠΎΠ»ΡΡΠ½ΡΡ
ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠ΅ΠΉ Π΄Π»Ρ ΡΠ»Π΅ΠΏΠΎΠ³ΠΎ ΠΏΡΠΈΠ΅ΠΌΠ°. ΠΠΎΠΊΠ°Π·Π°Π½ΠΎ, ΡΡΠΎ ΠΏΡΠ΅Π΄Π»ΠΎΠΆΠ΅Π½Π½ΡΠ΅ ΠΏΡΠ΅Π΄Π΅Π»ΡΠ½ΡΠ΅ Π±ΠΈΠΏΠΎΠ»ΡΡΠ½ΡΠ΅ ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΠΈ Ρ
Π°ΡΠ°ΠΊΡΠ΅ΡΠΈΠ·ΡΡΡΡΡ Π»ΡΡΡΠΈΠΌΠΈ ΠΊΠΎΡΡΠ΅Π»ΡΡΠΈΠΎΠ½Π½ΡΠΌΠΈ ΡΠ²ΠΎΠΉΡΡΠ²Π°ΠΌΠΈ Π² ΡΡΠ°Π²Π½Π΅Π½ΠΈΠΈ Ρ ΡΡΠ°Π΄ΠΈΡΠΈΠΎΠ½Π½ΠΎ ΠΈΡΠΏΠΎΠ»ΡΠ·ΡΠ΅ΠΌΡΠΌΠΈ Π±ΠΈΠΏΠΎΠ»ΡΡΠ½ΡΠΌΠΈ ΠΏΠΎΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΡΡΡΠΌΠΈ ΠΈ ΠΎΠ±Π»Π°Π΄Π°ΡΡ Π±ΠΎΠ»ΡΡΠ΅ΠΉ ΡΡΡΠΎΠΉΡΠΈΠ²ΠΎΡΡΡΡ
Are Social Networks Watermarking Us or Are We (Unawarely) Watermarking Ourself?
In the last decade, Social Networks (SNs) have deeply changed many aspects of
society, and one of the most widespread behaviours is the sharing of pictures.
However, malicious users often exploit shared pictures to create fake profiles
leading to the growth of cybercrime. Thus, keeping in mind this scenario,
authorship attribution and verification through image watermarking techniques
are becoming more and more important. In this paper, firstly, we investigate
how 13 most popular SNs treat the uploaded pictures, in order to identify a
possible implementation of image watermarking techniques by respective SNs.
Secondly, on these 13 SNs, we test the robustness of several image watermarking
algorithms. Finally, we verify whether a method based on the Photo-Response
Non-Uniformity (PRNU) technique can be successfully used as a watermarking
approach for authorship attribution and verification of pictures on SNs. The
proposed method is robust enough in spite of the fact that the pictures get
downgraded during the uploading process by SNs. The results of our analysis on
a real dataset of 8,400 pictures show that the proposed method is more
effective than other watermarking techniques and can help to address serious
questions about privacy and security on SNs.Comment: 43 pages, 6 figure
Are Social Networks Watermarking Us or Are We (Unawarely) Watermarking Ourself?
In the last decade, Social Networks (SNs) have deeply changed many aspects of society, and one of the most widespread behaviours is the sharing of pictures. However, malicious users often exploit shared pictures to create fake profiles, leading to the growth of cybercrime. Thus, keeping in mind this scenario, authorship attribution and verification through image watermarking techniques are becoming more and more important. In this paper, we firstly investigate how thirteen of the most popular SNs treat uploaded pictures in order to identify a possible implementation of image watermarking techniques by respective SNs. Second, we test the robustness of several image watermarking algorithms on these thirteen SNs. Finally, we verify whether a method based on the Photo-Response Non-Uniformity (PRNU) technique, which is usually used in digital forensic or image forgery detection activities, can be successfully used as a watermarking approach for authorship attribution and verification of pictures on SNs. The proposed method is sufficiently robust, in spite of the fact that pictures are often downgraded during the process of uploading to the SNs. Moreover, in comparison to conventional watermarking methods the proposed method can successfully pass through different SNs, solving related problems such as profile linking and fake profile detection. The results of our analysis on a real dataset of 8400 pictures show that the proposed method is more effective than other watermarking techniques and can help to address serious questions about privacy and security on SNs. Moreover, the proposed method paves the way for the definition of multi-factor online authentication mechanisms based on robust digital features
Combination of fast hybrid classification and k value optimization in k-nn for video face recognition
Nowadays, the need for face recognition is no longer include images only but also videos. However, there are some challenges associated with the addition of this new technique such as how to determine the right pre-processing, feature extraction, and classification methods to obtain excellent performance. Although nowadays the k-Nearest Neighbor (k-NN) is widely used, high computational costs due to numerous features of the dataset and large amount of training data makes adequate processing difficult. Several studies have been conducted to improve the performance of k-NN using the FHC (Fast Hybrid Classification) method by optimizing the local k values. One of the disadvantages of the FHC Method is that the k value used is still in the default form. Therefore, this research proposes the use of k-NN value optimization methods in FHC, thereby, increasing its accuracy. The Fast Hybrid Classification which combines the k-means clustering with k-NN, groups the training data into several prototypes called TLDS (Two Level Data Structure). Furthermore, two classification levels are applied to label test data, with the first used to determine the n number of prototypes with the same class in the test data. The second classification using the optimized k value in the k-NN method, is employed to sharpen the accuracy, when the same number of prototypes does not reach n. The evaluation results show that this method provides 86% accuracy and time performance of 3.3 seconds
Spies, Trolls, and Bots: Combating Foreign Election Interference in the Marketplace of Ideas
Foreign disinformation operations on social media pose a significant and rapidly evolving risk, particularly when aimed at American elections. We must urgently and effectively address this form of election interference. This Article examines potential responses to those risks, through a review of the unique characteristics, both practical and legal, of political advertising on social media platforms. This Article analyzes proposed legislative responses to foreign disinformation, noting that no single proposed law to date adequately addresses the threats and challenges posed by foreign disinformation. This Article considers the election law landscape in which the proposed laws would operate. It evaluates the proposed legislative responses for judicial review resilience, with a focus on the First Amendment challenges to regulating political advertisement microtargetingβthe use of data mining and algorithms to microtarget particular audiences. Some scholars have argued that a fundamental change in how we understand and therefore regulate social media in society is necessary to prevent the abuse of the First Amendment. This Article, however, approaches the problem from the position that the U.S. Supreme Court is highly unlikely to abandon its extremely robust interpretation of the First Amendment to impose broad restrictions on online platforms. The Article argues that an appropriate response to the threat of disinformation must be consistent with robust protections for political speech and with the First Amendment theory of a βmarketplace of ideas.β This Article then reviews the role that various actorsβfrom state and federal agencies to social media platforms, and academics and researchersβcan play in crafting a βwhole of societyβ response to disinformation operations
Recommended from our members
Final Report: National Security Commission on Artificial Intelligence
Final report presenting the National Security Commission for Artificial Intelligence (NSCAI)'s recommendations for winning the AI era. It includes a 16 chapter Main Report and "Blueprints for Action that outline the concrete steps departments and agencies can take to implement NSCAI's recommendations." - Introduction