Research the efficiency of image processing algorithms in zero watermark schemes

Subject matter: image transformation algorithms used in zero-watermarking techniques for development authentication algorithm. Objectives: identify effective image transformation algorithms for use in zero-watermarking schemes. The study addresses the following tasks: examining the range of existing...

Full description

Saved in:
Bibliographic Details
Published in:Sučasnij stan naukovih doslìdženʹ ta tehnologìj v promislovostì (Online) no. 1(31); pp. 102 - 114
Main Authors: Poddubnyi, Vadym, Sievierinov, Oleksandr, Nepokrytov, Dmytro
Format: Journal Article
Language:English
Published: 31.03.2025
ISSN:2522-9818, 2524-2296
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Subject matter: image transformation algorithms used in zero-watermarking techniques for development authentication algorithm. Objectives: identify effective image transformation algorithms for use in zero-watermarking schemes. The study addresses the following tasks: examining the range of existing image transformation algorithms, formulating informal requirements for image transformation algorithms to be used in zero-watermarking-based authentication schemes, and making assumptions about the feasibility of using each analyzed image transformation algorithm. To achieve these objectives, the following methods are employed: modeling – software implementation of each studied algorithm, empirical methods – application of algorithms and observation of transformation results, mathematical methods – calculation of normal correlation metrics and peak signal-to-noise ratio (PSNR). Results: an analysis was conducted on a set of algorithms that could potentially be used in zero-watermarking schemes for authentication purposes. A methodology was developed to evaluate algorithms while considering image dimensionality reduction due to compression. Additionally, requirements for image processing algorithms in zero-watermarking-based authentication were established. Conclusions: the study identified the most effective image transformation algorithms for use in zero-watermarking authentication schemes: DWT (Discrete Wavelet Transform), SVD (Singular Value Decomposition), DCT (Discrete Cosine Transform), and K-means clustering. For low-resolution images, DCT is a viable option. The most effective algorithm combinations are DWT + DCT and DWT + K-means, as these combinations ensure optimal robustness to noise while maintaining sensitivity to distinguish similar images. Future authentication schemes based on these algorithms may be useful (in combination with IoT devices), including for user authentication in enterprises and organizations.
AbstractList Subject matter: image transformation algorithms used in zero-watermarking techniques for development authentication algorithm. Objectives: identify effective image transformation algorithms for use in zero-watermarking schemes. The study addresses the following tasks: examining the range of existing image transformation algorithms, formulating informal requirements for image transformation algorithms to be used in zero-watermarking-based authentication schemes, and making assumptions about the feasibility of using each analyzed image transformation algorithm. To achieve these objectives, the following methods are employed: modeling – software implementation of each studied algorithm, empirical methods – application of algorithms and observation of transformation results, mathematical methods – calculation of normal correlation metrics and peak signal-to-noise ratio (PSNR). Results: an analysis was conducted on a set of algorithms that could potentially be used in zero-watermarking schemes for authentication purposes. A methodology was developed to evaluate algorithms while considering image dimensionality reduction due to compression. Additionally, requirements for image processing algorithms in zero-watermarking-based authentication were established. Conclusions: the study identified the most effective image transformation algorithms for use in zero-watermarking authentication schemes: DWT (Discrete Wavelet Transform), SVD (Singular Value Decomposition), DCT (Discrete Cosine Transform), and K-means clustering. For low-resolution images, DCT is a viable option. The most effective algorithm combinations are DWT + DCT and DWT + K-means, as these combinations ensure optimal robustness to noise while maintaining sensitivity to distinguish similar images. Future authentication schemes based on these algorithms may be useful (in combination with IoT devices), including for user authentication in enterprises and organizations.
Author Nepokrytov, Dmytro
Poddubnyi, Vadym
Sievierinov, Oleksandr
Author_xml – sequence: 1
  givenname: Vadym
  orcidid: 0000-0002-4380-491X
  surname: Poddubnyi
  fullname: Poddubnyi, Vadym
– sequence: 2
  givenname: Oleksandr
  orcidid: 0000-0002-6327-6405
  surname: Sievierinov
  fullname: Sievierinov, Oleksandr
– sequence: 3
  givenname: Dmytro
  orcidid: 0000-0003-1752-8496
  surname: Nepokrytov
  fullname: Nepokrytov, Dmytro
BookMark eNotUNtqwzAMNaODdV0_YeAfSGbJSSs_jrIbFDZG343jyE22Jil2YXRfv7Tdk4TOBZ1zKyb90LMQ96ByrUgvH7BEzAwB5aiwzCEHhVdiOp6LDNEsJuf9QrkR85S-lFJIy4VCmIqPT07som_koWHJIbS-5d4f5RBk27kty30cPKfU9lvpdtshtoemS7Lt5S_HQf64A8fOxW-ZfMMdpztxHdwu8fx_zsTm-Wmzes3W7y9vq8d15o3GTNdGcaUcamJalK4MZIrgyFDBAFgTACxr5oqqChQYqLUvPJW1G-VUkZ6J8mLr45BS5GD3cfw3Hi0oey7GnlLbU2p7KsbCiKD-A0jXWKA
ContentType Journal Article
DBID AAYXX
CITATION
DOI 10.30837/2522-9818.2025.1.102
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList CrossRef
DeliveryMethod fulltext_linktorsrc
Discipline Business
EISSN 2524-2296
EndPage 114
ExternalDocumentID 10_30837_2522_9818_2025_1_102
GroupedDBID AAYXX
ADBBV
ALMA_UNASSIGNED_HOLDINGS
BCNDV
CITATION
GROUPED_DOAJ
ID FETCH-LOGICAL-c932-3d90eb0a238e865a5f894fa8984e112d81117deeb8bb10191d3c4c85dac938b83
ISSN 2522-9818
IngestDate Sat Nov 29 07:59:10 EST 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1(31)
Language English
License http://creativecommons.org/licenses/by-nc-sa/4.0
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c932-3d90eb0a238e865a5f894fa8984e112d81117deeb8bb10191d3c4c85dac938b83
ORCID 0000-0002-4380-491X
0000-0003-1752-8496
0000-0002-6327-6405
OpenAccessLink https://journals.uran.ua/itssi/article/download/328663/318483
PageCount 13
ParticipantIDs crossref_primary_10_30837_2522_9818_2025_1_102
PublicationCentury 2000
PublicationDate 2025-03-31
PublicationDateYYYYMMDD 2025-03-31
PublicationDate_xml – month: 03
  year: 2025
  text: 2025-03-31
  day: 31
PublicationDecade 2020
PublicationTitle Sučasnij stan naukovih doslìdženʹ ta tehnologìj v promislovostì (Online)
PublicationYear 2025
SSID ssj0002876021
ssib044762074
ssib036251356
Score 2.2874277
Snippet Subject matter: image transformation algorithms used in zero-watermarking techniques for development authentication algorithm. Objectives: identify effective...
SourceID crossref
SourceType Index Database
StartPage 102
Title Research the efficiency of image processing algorithms in zero watermark schemes
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 2524-2296
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002876021
  issn: 2522-9818
  databaseCode: DOA
  dateStart: 20170101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2524-2296
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssib044762074
  issn: 2522-9818
  databaseCode: M~E
  dateStart: 20170101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lj9MwELaqBSEuiKdYXvKBnqKUJnFa-9jtLuJU9lChvUVObLPpw6nSNGz5ufwSxk6dRhVC7IFLVDnNeNT5Og9nPhuhjyRTCiJb6EsVG0qOCnxuVpskURBgY6EimdrDJsazGb25Yde93i_HhalXY63p3R3b_FdTwxgY21Bn72HuVigMwGcwOlzB7HD9J8O7XjrXrpHbf699kZ6vTYfOpuEGWHbi6ntR5tXt2nbF_pRl4f3g1lmXSw_qXun4IQvHG7HJ5yXf6nxhlyE8zXfLos5vPVGYRDXqT6aiP437F1fg0KaT_gXzKu5VslnAb76w8GqjBUBsVdSGdWJHT3c-bVx2IcQu1XvbdPCNi_26XRPKbUzPdVGbe19XcrnlWrTNxjMoLZblvmpuX673VVl01zjC2JH-nCsMIUv0GT14aunGiB-GzXm4DqWgaBQ4JRuXHAzDTnQPGsrqaeCIIBM1767biQZGjUEwaJ_ubtR9EkDbtkYoqKygxIhJjJjEiEmCJDD7nT4IxzFjnbIffB7kD3HQ2SKQEIhObn-ihV38HI-Glj7Y6tYQ0exMn_6kcCfF6uRK86foyaHIwZMGnM9QT-rn6JHjWLxA1w6jGDCKjxjFhcIWo_iIUXzEKM41NhjFLUbxAaMv0fzz1Xz6xT8c7eFnUDD4kWBDmQ455IuSjmIeK8qI4pRRIqEAEBQi8FhImdI0hZjBAhFlJKOx4PA4TWn0Cp3pQsvXCIMYIiShSo4UlAacCUKGYSpTFcIEcnSOBu7HSDbNBi7JX-305r4PvEWPj5h9h86qciffo4dZXeXb8oO19m_cvYv0
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Research+the+efficiency+of+image+processing+algorithms+in+zero+watermark+schemes&rft.jtitle=Su%C4%8Dasnij+stan+naukovih+dosl%C3%ACd%C5%BEen%CA%B9+ta+tehnolog%C3%ACj+v+promislovost%C3%AC+%28Online%29&rft.au=Poddubnyi%2C+Vadym&rft.au=Sievierinov%2C+Oleksandr&rft.au=Nepokrytov%2C+Dmytro&rft.date=2025-03-31&rft.issn=2522-9818&rft.eissn=2524-2296&rft.issue=1%2831%29&rft.spage=102&rft.epage=114&rft_id=info:doi/10.30837%2F2522-9818.2025.1.102&rft.externalDBID=n%2Fa&rft.externalDocID=10_30837_2522_9818_2025_1_102
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2522-9818&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2522-9818&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2522-9818&client=summon