Class-based n-gram models of natural language
Computational Linguistics
Stretching the Limits of Steganography
Proceedings of the First International Workshop on Information Hiding
Universal Coding of Function Spaces as a Model for Signal Compression
DCC '04 Proceedings of the Conference on Data Compression
An information-theoretic approach to the design of robust digital watermarking systems
ICASSP '99 Proceedings of the Acoustics, Speech, and Signal Processing, 1999. on 1999 IEEE International Conference - Volume 04
Statistical parsing with a context-free grammar and word statistics
AAAI'97/IAAI'97 Proceedings of the fourteenth national conference on artificial intelligence and ninth conference on Innovative applications of artificial intelligence
Hi-index | 0.00 |
In this paper, the problem of increasing information transfer authenticity is formulated. And to reach a decision, the control methods and algorithms based on the use of statistical and structural information redundancy are presented. It is assumed that the controllable information is submitted as the text element images and it contains redundancy, caused by statistical relations and non-uniformity probability distribution of the transmitted data. The use of statistical redundancy allows to develop the adaptive rules of the authenticity control which take into account non-stationarity properties of image data while transferring the information. The structural redundancy peculiar to the container of image in a data transfer package is used for developing new rules to control the information authenticity on the basis of pattern recognition mechanisms. The techniques offered in this work are used to estimate the authenticity in structure of data transfer packages. The results of comparative analysis for developed methods and algorithms show that their parameters of efficiency are increased by criterion of probability of undetected mistakes, labour input and cost of realization.