V. Barannik, S. Podlesny, A. Krasnorutskyi, A. Musienko, Viktoria Himenko
{"title":"网络攻击行动下信息流的完整性保障","authors":"V. Barannik, S. Podlesny, A. Krasnorutskyi, A. Musienko, Viktoria Himenko","doi":"10.1109/EWDTS.2016.7807752","DOIUrl":null,"url":null,"abstract":"Problem of providing information security of video information resource in aerial surveillance systems and video conferencing is considered. Procedure for creating code by using the structural coding technology is represented. The dependence of the distribution error on column component values from its position in the code during restoration of transform is shown. The method for encoding technology for the structural code formation is proposed. The threat of data integrity reduces also. The method for detecting and eliminating single bit errors for transform's significant component is proposed.","PeriodicalId":364686,"journal":{"name":"2016 IEEE East-West Design & Test Symposium (EWDTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"The ensuring the integrity of information streams under the cyberattacks action\",\"authors\":\"V. Barannik, S. Podlesny, A. Krasnorutskyi, A. Musienko, Viktoria Himenko\",\"doi\":\"10.1109/EWDTS.2016.7807752\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Problem of providing information security of video information resource in aerial surveillance systems and video conferencing is considered. Procedure for creating code by using the structural coding technology is represented. The dependence of the distribution error on column component values from its position in the code during restoration of transform is shown. The method for encoding technology for the structural code formation is proposed. The threat of data integrity reduces also. The method for detecting and eliminating single bit errors for transform's significant component is proposed.\",\"PeriodicalId\":364686,\"journal\":{\"name\":\"2016 IEEE East-West Design & Test Symposium (EWDTS)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE East-West Design & Test Symposium (EWDTS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EWDTS.2016.7807752\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE East-West Design & Test Symposium (EWDTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EWDTS.2016.7807752","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The ensuring the integrity of information streams under the cyberattacks action
Problem of providing information security of video information resource in aerial surveillance systems and video conferencing is considered. Procedure for creating code by using the structural coding technology is represented. The dependence of the distribution error on column component values from its position in the code during restoration of transform is shown. The method for encoding technology for the structural code formation is proposed. The threat of data integrity reduces also. The method for detecting and eliminating single bit errors for transform's significant component is proposed.