The method of information security based on micrographics

1Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Printed and electronic data storage were considered. Existing protective methods of files and documents were analyzed. The method of micrographics was suggested for protection. Micrographics as background nets are built on the basis of mathematical formulas of Ateb-functions theory. The investigation was conducted, and selection of the line width for the protective image generation was rationalized. Technical data of the paper and printing inks were taken into account, and selection of the printing method was substantiated. The file format for the protected information and the encryption method for electronic documents were considered. The algorithms of micrographics generation for information protection were presented. The work of the method was instantiated. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Dronjuk, I., Nazarkevych, M., Medykovski, N., & Gorodetska, O. (2012). The method of information security based on micrographics. In Communications in Computer and Information Science (Vol. 291 CCIS, pp. 207–215). https://doi.org/10.1007/978-3-642-31217-5_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free