A. Zadereyko, A. Troyanskiy, Nataliia Loginova, E. Trofimenko
{"title":"The implementation of depersonalization algorithm of digital images","authors":"A. Zadereyko, A. Troyanskiy, Nataliia Loginova, E. Trofimenko","doi":"10.1109/AIACT.2017.8020065","DOIUrl":null,"url":null,"abstract":"The study was conducted and the classification of the signs of digital images was proposed in the article. These signs can uniquely identify the digital devices which the images were created. There was proposed the depersonalizing algorithm of digital images to ensure confidentiality during using of different photo, web cameras and scanners. Practical application of the developed depersonalization algorithm of digital images has shown its effectiveness in protecting equipment from identification by third parties by breaking the direct connection between the digital optoelectronic devices and created digital images.","PeriodicalId":367743,"journal":{"name":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 2nd International Conference on Advanced Information and Communication Technologies (AICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AIACT.2017.8020065","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The study was conducted and the classification of the signs of digital images was proposed in the article. These signs can uniquely identify the digital devices which the images were created. There was proposed the depersonalizing algorithm of digital images to ensure confidentiality during using of different photo, web cameras and scanners. Practical application of the developed depersonalization algorithm of digital images has shown its effectiveness in protecting equipment from identification by third parties by breaking the direct connection between the digital optoelectronic devices and created digital images.