Valery I. Korzhik

According to our database1, Valery I. Korzhik authored at least 50 papers between 1991 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Channel Traffic Minimizing Key Sharing Protocol Intended for the Use over the Internet and Secure without any Cryptographic Assumptions.
Proceedings of the 32nd Conference of Open Innovations Association, 2022

Key Sharing Protocol Using Exchange by Integers over Public Noiseless Channels Between Users that Provides Security without Cryptographic Assumptions.
Proceedings of the 31st Conference of Open Innovations Association, 2022

2021
Optimization of the Key Sharing Protocol for Noiseless Public Channels without the Use of Cryptographic Assumptions.
Proceedings of the 44th International Convention on Information, 2021

Authentication of Diffie-Hellman Protocol for Mobile Units Executing a Secure Device Pairing Procedure in Advance.
Proceedings of the 29th Conference of Open Innovations Association, 2021

Digital Watermarking System for Hard Cover Objects Against Cloning Attacks.
Proceedings of the 30th Conference of Open Innovations Association, 2021

2020
Side Attacks on Stegosystems Executing Message Encryption Previous to Embedding.
J. Inf. Hiding Multim. Signal Process., 2020

An Approach to Assessing Information Security Effectiveness in Control Systems.
Autom. Control. Comput. Sci., 2020

2019
Perceptual Image Hashing: Tolerant to Brightness and Contrast Corrections Method Based on Cumulative Histogram Slicing.
Proceedings of the 25th Conference of Open Innovations Association, 2019

Cipher Modification Against Steganalysis Based on NIST Tests.
Proceedings of the 24th Conference of Open Innovations Association, 2019

Information theoretical secure key sharing protocol for noiseless public constant parameter channels without cryptographic assumptions.
Proceedings of the 2019 Federated Conference on Computer Science and Information Systems, 2019

2018
Secret Key Sharing Protocol between Units Connected by Wireless MIMO Fading Channels.
Proceedings of the 2018 Federated Conference on Computer Science and Information Systems, 2018

2017
Steganalysis Based on Statistical Properties of the Encrypted Messages.
Proceedings of the Computer Network Security, 2017

Investigation of keyless cryptosystem proposed by dean and Goldsmith.
Proceedings of the 21st Conference of Open Innovations Association, 2017

Detection of stegosystems using block ciphers for encryption of the embedded messages.
Proceedings of the 20th Conference of Open Innovations Association, 2017

Design of Audio Digital Watermarking System Resistant to Removal Attack.
Proceedings of the 2017 Federated Conference on Computer Science and Information Systems, 2017

2016
Design of High Speed Stegosystem Based on Trellis Codes Jointly with Generalised Viterbi Algorithm.
Int. J. Comput. Sci. Appl., 2016

Semi-Fragile Image Authentication based on CFD and 3-Bit Quantization.
CoRR, 2016

Secret key agreement based on a communication through wireless MIMO-based fading channels.
Proceedings of the 2016 Federated Conference on Computer Science and Information Systems, 2016

2015
Analysis of Keyless Massive MIMO-based Cryptosystem Security.
IACR Cryptol. ePrint Arch., 2015

Selective image authentication tolerant to JPEG compression.
Proceedings of the 6th International Conference on Information, 2015

Using the generalised Viterbi algorithm to achieve a highly effective stegosystem for images.
Proceedings of the 2015 Federated Conference on Computer Science and Information Systems, 2015

2014
Concatenated digital watermarking system robust to different removal attacks.
Comput. Sci. Inf. Syst., 2014

Wire-tap channel concept in nature and society.
Proceedings of the 5th International Conference on Information, 2014

2013
Audio Watermarking Based on Echo Hiding with Zero Error Probability.
Int. J. Comput. Sci. Appl., 2013

A stegosystem with blind decoder based on a noisy channel.
Proceedings of the 18th International Conference on Digital Signal Processing, 2013

Fingerprinting System for Still Images Based on the Use of a Holographic Transform Domain.
Proceedings of the 2013 Federated Conference on Computer Science and Information Systems, 2013

2012
The Capacity of a Stegosystem for the Noisy Attack Channel.
J. Inf. Hiding Multim. Signal Process., 2012

A Multiple Robust Digital Watermarking System for Still Images.
Int. J. Comput. Sci. Appl., 2012

Optimization of Key Distribution Protocols Based on Extractors for Noisy Channels within Active Adversaries.
Proceedings of the Computer Network Security, 2012

The Use of Wet Paper Codes With Audio Watermarking Based on Echo Hiding.
Proceedings of the Federated Conference on Computer Science and Information Systems, 2012

2011
Stegosystems Based on Noisy Channels.
Int. J. Comput. Sci. Appl., 2011

Secret Key Agreement Over Multipath Channels Exploiting a Variable-Directional Antenna
CoRR, 2011

Robust Digital Watermarking System for Still Images.
Proceedings of the Federated Conference on Computer Science and Information Systems, 2011

2010
Collusion-Resistant Fingerprints Based on Real Superimposed Codes.
Int. J. Comput. Sci. Appl., 2010

Key Distribution Protocols Based on Extractors Under the Condition of Noisy Channels in the Presence of an Active Adversary
CoRR, 2010

Undetectable Spread-time Stegosystem Based on Noisy Channels.
Proceedings of the International Multiconference on Computer Science and Information Technology, 2010

2009
Collusion-resistant fingerprints based on the use of superimposed codes in real vector spaces.
Proceedings of the International Multiconference on Computer Science and Information Technology, 2009

2008
Key Distribution Protocols Based on Noisy Channels in Presence of an Active Adversary: Conventional and New Versions With Parameter Optimization.
IEEE Trans. Inf. Theory, 2008

On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems.
Trans. Data Hiding Multim. Secur., 2008

Wet Paper Coding for Watermarking of Binary Images
CoRR, 2008

2006
Image Authentication Based on Modular Embedding.
IEICE Trans. Inf. Syst., 2006

2005
On the Existence of Perfect Stegosystems.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005

2003
Watermarking of binary messages in conditions of an additive binary noise attack.
IEEE Signal Process. Lett., 2003

Hybrid authentication based on noisy channels.
Int. J. Inf. Sec., 2003

Achievability of the Key-Capacity in a Scenario of Key Sharing.
Proceedings of the Computer Network Security, 2003

Digital Watermarking under a Filtering and Additive Noise Attack Condition.
Proceedings of the Computer Network Security, 2003

2002
Digital Semipublic Watermarking.
Informatica (Slovenia), 2002

1995
Error detecting codes - general theory and their application in feedback communication systems.
The Kluwer international series in engineering and computer science 335, Kluwer, ISBN: 978-0-7923-9629-1, 1995

1992
Nonasymptotic Estimates of Information Protection Efficiency for the Wire-tape Channel Concept (invited talk).
Proceedings of the Advances in Cryptology, 1992

1991
Cryptanalysis of McEliece's Public-Key Cryptosystem.
Proceedings of the Advances in Cryptology, 1991


  Loading...