Method of user authentication in information and communication systems using zero watermark

Authors

DOI:

https://doi.org/10.30837/2522-9818.2025.2.069

Keywords:

ccess control systems; zero watermarking; method; authentication; image.

Abstract

The subject access control systems is information and communication networks. The purpose is to develop a user authentication method for information and communication systems as an access control system using a zero watermarking algorithm. Objectivs: develop a user authentication method based on zero watermarking, test the proposed method, provide suggestions and recommendations for the further application of the authentication method. To accomplish the defined tasks, the following methods computer simulation of the proposed method to study its characteristics; empirical methods – applying the method and observing the transformation results; tatistical methods – calculating indicators such as Pearson correlation coefficients, peak signal-to-noise ratio (PSNR), and Spearman’s rank correlation coefficients. Results achieved: novel user authentication method based on a unique zero watermarking algorithm was proposed for the first time within an information and communication system. Suggestions for further application of the method were formulated, and the method was successfully tested. Conclusions. During the study, an authentication method based on a zero watermarking algorithm was proposed, designed to be used as an access control system at industrial enterprises. The method was tested, and the test results confirm its operability and effectiveness. This method has the potential to reduce the cost of two-factor authentication when deploying authentication systems in large enterprises.

Author Biographies

Vadym Poddubnyi, Kharkiv National University of Radio Electronics

PhD Student at the Department of Information Technology Security

Oleksandr Sievierinov, Kharkiv National University of Radio Electronics

PhD (Engineering Sciences), Associate Professor at the Department of Information Technology Security

References

Список літератури

Roček A., Javorník M., Slavíček K. et al. Zero Watermarking: Critical Analysis of Its Role in Current Medical Imaging. Journal of Digital Imaging. 2021. Vol. 34. P. 204–211. DOI: 10.1007/s10278-020-00396-0

Адміністрація Держспецзв’язку. Про визначення Базового профілю безпеки інформації: Наказ від 24.06.2024 № 317. URL: https://cip.gov.ua/ua/docs/nakaz-administraciyi-derzhspeczv-yazku-vid-24-06-2024-317-pro-viznachennya-bazovogo-profilyu-bezpeki-informaciyi

Міжнародна електротехнічна комісія. EN IEC 62443. Security for industrial automation and control systems URL: https://www.isa.org/standards-and-publications/isa-standards/isa-iec-62443-series-of-standards

ChappleM., Implementing Access Control Systems, Indiana, USA, 2020, Р. 110-135. URL: https://eforum.lntu.edu.ua/index.php/jurnal/article/download/1506/1433/

Айко О. В., Василенко О. Д., Степаненко В. М. Системи автоматизації контролю доступу на об’єкти. Всеукраїнська науково-практична конференцiя студентiв, аспiрантiв та молодих вчених URL: https://ela.kpi.ua/server/api/core/bitstreams/e4de99d9-a572-452d-8194-3ba4a39f5bb4/content

Поддубний В. О., Сєвєрінов О. В., Гвоздьов Р. Ю. Використання нульових водяних знаків для підтвердження авторства зображень та багатофакторної автентифікації. Радіотехніка. 2024. Вип. 218. С. 35–43. DOI: https://doi.org/10.30837/rt.2024.3.218.02

Поддубний В., Сєвєрінов О., Непокритов Д. Дослідження ефективності алгоритмів оброблення зображень у схемах нульового водяного знака. Сучасний стан наукових досліджень та технологій в промисловості. 2025. № 1(31). С. 102–114. DOI: 10.30837/2522-9818.2025.1.102

Poddubnyi V., Gvozdov R., Sievierinov O., Sukhoteplyi V., Bulba S., Lysytsia D. A Zero-Watermarking Algorithm for Use in RGB and Monochrome Images. 2024 IEEE 5th KhPI Week on Advanced Technology (KhPIWeek). P. 1–5. DOI: https://doi.org/10.1109/KhPIWeek61434.2024.10878081.

Sethi N., Krishna R., Arora R.P. Image Compression Using Haar Wavelet Transform. Computer Engineering and Intelligent Systems. Vol. 2, No. 3. URL: https://scispace.com/pdf/image-compression-using-haar-wavelet-transform-1q7fxnv973.pdf

Accord.NET Framework. KMeans Class URL: http://accord-framework.net/docs/html/T_Accord_MachineLearning_KMeans.htm

Ramachandran P., Zoph B., Le Q.V. Swish: A Self-Gated Activation Function. URL: https://arxiv.org/pdf/1710.05941v1.pdf.

Berman J. J. Data Simplification. Chapter 4 - Understanding Your Data. 2016. P. 135–187. ISBN 9780128037812

McClenaghan E. Spearman Rank Correlation. Technology Networks. 2024. URL: https://www.technologynetworks.com/tn/articles/spearman-rank-correlation-385744

The USC-SIPI Image Database URL: https://sipi.usc.edu/database/

Nasa Image and Video Library URL: https://images.nasa.gov/

Lorem Picsum URL: https://picsum.photos/

Nadipally M. Optimization of Methods for Image-Texture Segmentation Using Ant Colony Optimization. Intelligent Data-Centric Systems: Intelligent Data Analysis for Biomedical Applications. Academic Press, 2019. Ch. 2. 2019. P. 21–47. DOI:10.1016/B978-0-12-815553-0.00002-1

References

Roček, A., Javorník, M., Slavíček, K. et al. (2021), "Zero Watermarking: Critical Analysis of Its Role in Current Medical Imaging", Journal of Digital Imaging, Vol. 34, Р. 204–211. DOI: 10.1007/s10278-020-00396-0

"State Special Communications Service Administration" (2024), Order on the definition of the Basic information security profile: Order No. 317 dated 24.06.2024 ["Administratsiia Derzhspetszviazku. Pro vyznachennia Bazovoho profiliu bezpeky informatsii: Nakaz vid 24.06.2024 № 317"]. available at: https://cip.gov.ua/ua/docs/nakaz-administraciyi-derzhspeczv-yazku-vid-24-06-2024-317-pro-viznachennya-bazovogo-profilyu-bezpeki-informaciyi

"International Electrotechnical Commission (n.d.)", EN IEC 62443. Security for industrial automation and control systems. [Online]. available at: https://www.isa.org/standards-and-publications/isa-standards/isa-iec-62443-series-of-standards

"ChappleM., Implementing Access Control Systems", Indiana, USA, 2020, Р. 110-135. available at: https://eforum.lntu.edu.ua/index.php/jurnal/article/download/1506/1433/

Aiko, O.V., Vasylenko, O.D., Stepanenko, V.M. "Systems for Access Control Automation at Facilities", All-Ukrainian Scientific and Practical Conference of Students, Postgraduates and Young Scientists ["Systemy avtomatyzatsii kontroliu dostupu na ob’yekty. Vseukrainska naukovo-praktychna konferentsiia studentiv, aspirantiv ta molodykh vchenykh"]. available at: https://ela.kpi.ua/server/api/core/bitstreams/e4de99d9-a572-452d-8194-3ba4a39f5bb4/content

Poddubnyi, V.O., Sievierinov, O.V., Hvozdiov, R.Y. (2024), "Using Zero Watermarks for Image Authorship and Multifactor Authentication", Radiotekhnika, No. 218, Р. 35–43. DOI: https://doi.org/10.30837/rt.2024.3.218.02

Poddubnyi, V., Sievierinov, O., Nepokrytyov, D. (2025), "Efficiency Study of Image Processing Algorithms in Zero Watermarking Schemes", Modern State of Scientific Research and Technologies in Industry ["Suchasnyi stan naukovykh doslidzhen ta tekhnolohii v promyslovosti"], No. 1(31), Р. 102–114. DOI: 10.30837/2522-9818.2025.1.102

Poddubnyi, V., Gvozdov, R., Sievierinov, O., Sukhoteplyi, V., Bulba, S., Lysytsia, D. (2024), "A Zero-Watermarking Algorithm for Use in RGB and Monochrome Images", 2024 IEEE 5th KhPI Week on Advanced Technology (KhPIWeek), Р. 1–5. DOI: https://doi.org/10.1109/KhPIWeek61434.2024.10878081

Sethi, N., Krishna, R., Arora, R.P. "Image Compression Using Haar Wavelet Transform", Computer Engineering and Intelligent Systems, Vol. 2, No. 3. available at: https://scispace.com/pdf/image-compression-using-haar-wavelet-transform-1q7fxnv973.pdf

"Accord.NET Framework", KMeans Class. available at: http://accord-framework.net/docs/html/T_Accord_MachineLearning_KMeans.htm

Ramachandran, P., Zoph, B., Le, Q.V. "Swish: A Self-Gated Activation Function". 2017. available at: https://arxiv.org/pdf/1710.05941v1.pdf

Berman, J.J. (2016), "Data Simplification. Chapter 4 Understanding Your Data", Р. 135–187. ISBN 9780128037812

McClenaghan, E. (2024), "Spearman Rank Correlation", Technology Networks. available at: https://www.technologynetworks.com/tn/articles/spearman-rank-correlation-385744

"University of Southern California, The USC-SIPI Image Database". available at: https://sipi.usc.edu/database/

NASA (n.d.), NASA Image and Video Library. [Online]. Available at: https://images.nasa.gov/

Lorem Picsum, "Free Placeholder Image Service". available at: https://picsum.photos/

Nadipally, M. (2019), "Optimization of Methods for Image-Texture Segmentation Using Ant Colony Optimization", Intelligent Data-Centric Systems: Intelligent Data Analysis for Biomedical Applications, Academic Press, Ch. 2, Р. 21–47.

Published

2025-07-08

How to Cite

Poddubnyi, V., & Sievierinov, O. (2025). Method of user authentication in information and communication systems using zero watermark. INNOVATIVE TECHNOLOGIES AND SCIENTIFIC SOLUTIONS FOR INDUSTRIES, (2(32), 69–78. https://doi.org/10.30837/2522-9818.2025.2.069