Method of user authentication in information and communication systems using zero watermark
DOI:
https://doi.org/10.30837/2522-9818.2025.2.069Keywords:
ccess control systems; zero watermarking; method; authentication; image.Abstract
The subject access control systems is information and communication networks. The purpose is to develop a user authentication method for information and communication systems as an access control system using a zero watermarking algorithm. Objectivs: develop a user authentication method based on zero watermarking, test the proposed method, provide suggestions and recommendations for the further application of the authentication method. To accomplish the defined tasks, the following methods computer simulation of the proposed method to study its characteristics; empirical methods – applying the method and observing the transformation results; tatistical methods – calculating indicators such as Pearson correlation coefficients, peak signal-to-noise ratio (PSNR), and Spearman’s rank correlation coefficients. Results achieved: novel user authentication method based on a unique zero watermarking algorithm was proposed for the first time within an information and communication system. Suggestions for further application of the method were formulated, and the method was successfully tested. Conclusions. During the study, an authentication method based on a zero watermarking algorithm was proposed, designed to be used as an access control system at industrial enterprises. The method was tested, and the test results confirm its operability and effectiveness. This method has the potential to reduce the cost of two-factor authentication when deploying authentication systems in large enterprises.
References
Список літератури
Roček A., Javorník M., Slavíček K. et al. Zero Watermarking: Critical Analysis of Its Role in Current Medical Imaging. Journal of Digital Imaging. 2021. Vol. 34. P. 204–211. DOI: 10.1007/s10278-020-00396-0
Адміністрація Держспецзв’язку. Про визначення Базового профілю безпеки інформації: Наказ від 24.06.2024 № 317. URL: https://cip.gov.ua/ua/docs/nakaz-administraciyi-derzhspeczv-yazku-vid-24-06-2024-317-pro-viznachennya-bazovogo-profilyu-bezpeki-informaciyi
Міжнародна електротехнічна комісія. EN IEC 62443. Security for industrial automation and control systems URL: https://www.isa.org/standards-and-publications/isa-standards/isa-iec-62443-series-of-standards
ChappleM., Implementing Access Control Systems, Indiana, USA, 2020, Р. 110-135. URL: https://eforum.lntu.edu.ua/index.php/jurnal/article/download/1506/1433/
Айко О. В., Василенко О. Д., Степаненко В. М. Системи автоматизації контролю доступу на об’єкти. Всеукраїнська науково-практична конференцiя студентiв, аспiрантiв та молодих вчених URL: https://ela.kpi.ua/server/api/core/bitstreams/e4de99d9-a572-452d-8194-3ba4a39f5bb4/content
Поддубний В. О., Сєвєрінов О. В., Гвоздьов Р. Ю. Використання нульових водяних знаків для підтвердження авторства зображень та багатофакторної автентифікації. Радіотехніка. 2024. Вип. 218. С. 35–43. DOI: https://doi.org/10.30837/rt.2024.3.218.02
Поддубний В., Сєвєрінов О., Непокритов Д. Дослідження ефективності алгоритмів оброблення зображень у схемах нульового водяного знака. Сучасний стан наукових досліджень та технологій в промисловості. 2025. № 1(31). С. 102–114. DOI: 10.30837/2522-9818.2025.1.102
Poddubnyi V., Gvozdov R., Sievierinov O., Sukhoteplyi V., Bulba S., Lysytsia D. A Zero-Watermarking Algorithm for Use in RGB and Monochrome Images. 2024 IEEE 5th KhPI Week on Advanced Technology (KhPIWeek). P. 1–5. DOI: https://doi.org/10.1109/KhPIWeek61434.2024.10878081.
Sethi N., Krishna R., Arora R.P. Image Compression Using Haar Wavelet Transform. Computer Engineering and Intelligent Systems. Vol. 2, No. 3. URL: https://scispace.com/pdf/image-compression-using-haar-wavelet-transform-1q7fxnv973.pdf
Accord.NET Framework. KMeans Class URL: http://accord-framework.net/docs/html/T_Accord_MachineLearning_KMeans.htm
Ramachandran P., Zoph B., Le Q.V. Swish: A Self-Gated Activation Function. URL: https://arxiv.org/pdf/1710.05941v1.pdf.
Berman J. J. Data Simplification. Chapter 4 - Understanding Your Data. 2016. P. 135–187. ISBN 9780128037812
McClenaghan E. Spearman Rank Correlation. Technology Networks. 2024. URL: https://www.technologynetworks.com/tn/articles/spearman-rank-correlation-385744
The USC-SIPI Image Database URL: https://sipi.usc.edu/database/
Nasa Image and Video Library URL: https://images.nasa.gov/
Lorem Picsum URL: https://picsum.photos/
Nadipally M. Optimization of Methods for Image-Texture Segmentation Using Ant Colony Optimization. Intelligent Data-Centric Systems: Intelligent Data Analysis for Biomedical Applications. Academic Press, 2019. Ch. 2. 2019. P. 21–47. DOI:10.1016/B978-0-12-815553-0.00002-1
References
Roček, A., Javorník, M., Slavíček, K. et al. (2021), "Zero Watermarking: Critical Analysis of Its Role in Current Medical Imaging", Journal of Digital Imaging, Vol. 34, Р. 204–211. DOI: 10.1007/s10278-020-00396-0
"State Special Communications Service Administration" (2024), Order on the definition of the Basic information security profile: Order No. 317 dated 24.06.2024 ["Administratsiia Derzhspetszviazku. Pro vyznachennia Bazovoho profiliu bezpeky informatsii: Nakaz vid 24.06.2024 № 317"]. available at: https://cip.gov.ua/ua/docs/nakaz-administraciyi-derzhspeczv-yazku-vid-24-06-2024-317-pro-viznachennya-bazovogo-profilyu-bezpeki-informaciyi
"International Electrotechnical Commission (n.d.)", EN IEC 62443. Security for industrial automation and control systems. [Online]. available at: https://www.isa.org/standards-and-publications/isa-standards/isa-iec-62443-series-of-standards
"ChappleM., Implementing Access Control Systems", Indiana, USA, 2020, Р. 110-135. available at: https://eforum.lntu.edu.ua/index.php/jurnal/article/download/1506/1433/
Aiko, O.V., Vasylenko, O.D., Stepanenko, V.M. "Systems for Access Control Automation at Facilities", All-Ukrainian Scientific and Practical Conference of Students, Postgraduates and Young Scientists ["Systemy avtomatyzatsii kontroliu dostupu na ob’yekty. Vseukrainska naukovo-praktychna konferentsiia studentiv, aspirantiv ta molodykh vchenykh"]. available at: https://ela.kpi.ua/server/api/core/bitstreams/e4de99d9-a572-452d-8194-3ba4a39f5bb4/content
Poddubnyi, V.O., Sievierinov, O.V., Hvozdiov, R.Y. (2024), "Using Zero Watermarks for Image Authorship and Multifactor Authentication", Radiotekhnika, No. 218, Р. 35–43. DOI: https://doi.org/10.30837/rt.2024.3.218.02
Poddubnyi, V., Sievierinov, O., Nepokrytyov, D. (2025), "Efficiency Study of Image Processing Algorithms in Zero Watermarking Schemes", Modern State of Scientific Research and Technologies in Industry ["Suchasnyi stan naukovykh doslidzhen ta tekhnolohii v promyslovosti"], No. 1(31), Р. 102–114. DOI: 10.30837/2522-9818.2025.1.102
Poddubnyi, V., Gvozdov, R., Sievierinov, O., Sukhoteplyi, V., Bulba, S., Lysytsia, D. (2024), "A Zero-Watermarking Algorithm for Use in RGB and Monochrome Images", 2024 IEEE 5th KhPI Week on Advanced Technology (KhPIWeek), Р. 1–5. DOI: https://doi.org/10.1109/KhPIWeek61434.2024.10878081
Sethi, N., Krishna, R., Arora, R.P. "Image Compression Using Haar Wavelet Transform", Computer Engineering and Intelligent Systems, Vol. 2, No. 3. available at: https://scispace.com/pdf/image-compression-using-haar-wavelet-transform-1q7fxnv973.pdf
"Accord.NET Framework", KMeans Class. available at: http://accord-framework.net/docs/html/T_Accord_MachineLearning_KMeans.htm
Ramachandran, P., Zoph, B., Le, Q.V. "Swish: A Self-Gated Activation Function". 2017. available at: https://arxiv.org/pdf/1710.05941v1.pdf
Berman, J.J. (2016), "Data Simplification. Chapter 4 Understanding Your Data", Р. 135–187. ISBN 9780128037812
McClenaghan, E. (2024), "Spearman Rank Correlation", Technology Networks. available at: https://www.technologynetworks.com/tn/articles/spearman-rank-correlation-385744
"University of Southern California, The USC-SIPI Image Database". available at: https://sipi.usc.edu/database/
NASA (n.d.), NASA Image and Video Library. [Online]. Available at: https://images.nasa.gov/
Lorem Picsum, "Free Placeholder Image Service". available at: https://picsum.photos/
Nadipally, M. (2019), "Optimization of Methods for Image-Texture Segmentation Using Ant Colony Optimization", Intelligent Data-Centric Systems: Intelligent Data Analysis for Biomedical Applications, Academic Press, Ch. 2, Р. 21–47.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Our journal abides by the Creative Commons copyright rights and permissions for open access journals.
Authors who publish with this journal agree to the following terms:
Authors hold the copyright without restrictions and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (CC BY-NC-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-commercial and non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
Authors are permitted and encouraged to post their published work online (e.g., in institutional repositories or on their website) as it can lead to productive exchanges, as well as earlier and greater citation of published work.












