1. bookVolume 43 (2017): Issue 1 (October 2017)
Journal Details
License
Format
Journal
eISSN
2083-4608
First Published
26 Feb 2008
Publication timeframe
4 times per year
Languages
English
access type Open Access

Protection of a Control System of a Technical Object from Negative Influence of Human Factors by Using Steganographic Methods

Published Online: 30 Apr 2018
Volume & Issue: Volume 43 (2017) - Issue 1 (October 2017)
Page range: 301 - 312
Journal Details
License
Format
Journal
eISSN
2083-4608
First Published
26 Feb 2008
Publication timeframe
4 times per year
Languages
English
Abstract

It is difficult to avoid influence of human factor on work of complex technical objects, so safety systems of technical objects have to contain tools of analysis and withstanding possible negative influences from the side of service personnel (SP). To withstand negative influence of human factors on work of a complex technical object, this paper proposes to use steganographic methods of hiding certain information. For that, information is hidden from some members of service personnel (SP), for which the corresponding information is negative. Besides, certain information is hidden from some SP members that can block its transfer in the system of controlling the management process. Methods of implementing the steganographic data concealment are to a great degree dependent on the type of a digital environment that is considered to be used. Introducing the information fragments in a graphic digital environment is performed so that they would be invisible in this environment. Thus, it is necessary for values of parameters that characterize the invisibility degree to be consistent with parameters used to describe the environment itself.

Keywords

[1] Shenfield J. Mathematical logic. - Moscow: Nauka, 1975, -527 p.Search in Google Scholar

[2] Boolos J., Jeffrey R. Computability and logic. - Moscow: Mir, 1994, - 396 p.Search in Google Scholar

[3] Curry H. Foundations of mathematical logic. Moscow: Mir, 1969.Search in Google Scholar

[4] Ershov Y.L., Palyutin Y.A. Mathematical logic. Moscow: Nauka, 1979. – 320 p.Search in Google Scholar

[5] Takeuchi G. Theory of proof. Moscow: Mir, 1978. – 412 p.Search in Google Scholar

[6] Afanasyeva O.Y., Y.M.Korostil. Features of using parameters of steganosystems.// Collected studies. Institute of problems of modeling in energetics (IPME NSA of Ukraine). – Kyiv 2006. – Issue 32. P. 158-161.Search in Google Scholar

[7] Afanasyeva O.Y., Sabat V.I. Method of describing graphic images in a steganosystem and semantic conflicts.// Collected studies. Institute of problems of modeling in energetics (IPME NSA of Ukraine). – Kyiv 2008. – Issue. 45. P. 132-137.Search in Google Scholar

[8] Ilyin Y.P. Motivation and motives. – Saint-Petersburg: Piter, 2000.Search in Google Scholar

[9] Mlodkowski J. Aktywnosc wizualna czlowieka. - Warszawa: PWN, 2000.Search in Google Scholar

[10] Knut D. Art of programming for computers. Basic algorithms. Moscow: Mir. – 730 p.Search in Google Scholar

Recommended articles from Trend MD

Plan your remote conference with Sciendo