User authentication model using zero watermarking based on RGB images
DOI:
https://doi.org/10.30837/2522-9818.2025.3.102Keywords:
digital watermarking; authentication; image; model; password.Abstract
The subject of the research is the methods and schemes of user authentication in information and communication networks. The aim of the work is to develop a user authentication model in information and communication systems using the zero-watermarking method based on RGB images. Objectives: to examine the main issues arising during the integration of access control systems; to develop a user authentication model using zero-watermarking; to study potential characteristics and put forward proposals/recommendations for its application in authentication; to construct graphical schemes that illustrate processes and procedures. Methods used: modeling methods and formal description methods. Results achieved: an improved user authentication model based on the zero-watermarking algorithm has been proposed as an alternative to existing authentication schemes in information and communication systems; its potential characteristics have been studied, confirming the prospects of the development; graphical representations of processes and procedures have been constructed. Conclusions: in the course of the work, the main problems faced by owners of information and communication systems during the integration of authentication systems were briefly reviewed; an improved authentication model using zero-watermarking was proposed. The zero-watermarking method is based on RGB images employing K-means clustering and DWT, while a password is used as the second factor. Three operating modes are presented: registration, authentication, and modification of key authentication data. This model serves as an alternative to existing schemes and can potentially reduce the cost of authentication, lower Type I and Type II error rates compared to similar authentication schemes, and improve the convenience of authentication in information and communication systems. It also expands the range of authentication schemes available to system owners during integration.
References
Список літератури
Lal N. A., Prasad S., Farik M. A Review of Authentication Methods. International Journal of Scientific & Technology Research. 2016. Vol. 5, No. 11. P. 246–249. URL: https://www.researchgate.net/publication/311514269_A_Review_Of_Authentication_Methods
Arévalo-Ancona R. E., Cedillo-Hernandez M., Ramirez-Rodriguez A. E., Nakano-Miyatake M., Perez-Meana H. Secure Medical Image Authentication Using Zero-Watermarking Based on Deep Learning Context Encoder. Computación y Sistemas. 2024. Vol. 28, No. 1. P. 199–210. DOI: 10.13053/cys-28-1-4898
Seenivasagam V., Velumani R. A QR Code Based Zero-Watermarking Scheme for Authentication of Medical Images in Teleradiology Cloud. Computational and Mathematical Methods in Medicine. 2013. Article ID 516465. 10 p. DOI: 10.1155/2013/516465
Chapple M. Implementing Access Control Systems. Indiana (USA): Wiley, 2020. P. 110–135.
Айко О. В., Василенко О. Д., Степаненко В. М. Системи автоматизації контролю доступу на об’єкти. Всеукраїнська науково-практична конференція студентів, аспірантів та молодих вчених. 2023. Р. 106-108. URL: https://ela.kpi.ua/server/api/core/bitstreams/e4de99d9-a572-452d-8194-3ba4a39f5bb4/content;
Qi X., Liu Y. Cloud Model Based Zero-Watermarking Algorithm for Authentication of Text Document. Proceedings of the 2013 Ninth International Conference on Computational Intelligence and Security (Emeishan, China, 2013). 2013. P. 712–715. DOI: 10.1109/CIS.2013.15
Hasan B. M. S., Ameen S. Y., Hasan O. M. Image Authentication Based on Watermarking Approach: Review. Asian Journal of Research in Computer Science And Information Technology. 2021. Vol. 9, No. 3. P. 34-51. DOI: 10.9734/AJRCOS/2021/v9i330224
Arévalo-Ancona, R. E., Cedillo-Hernández, M., Ramírez-Rodríguez, A. E., Nakano-Miyatake, M., Pérez-Meana, H. Secure Medical Image Authentication Using Zero-Watermarking Based on Deep Learning Context Encoder. Computación y Sistemas. 2024. Vol. 28, No. 1 P. 199-210. DOI: 10.13053/CyS-28-1-4898
Seenivasagam V., Velumani R. A QR Code Based Zero-Watermarking Scheme for Authentication of Medical Images in Teleradiology Cloud. Computational and Mathematical Methods in Medicine. 2013. Vol. 2013, Article ID 516465, 16 p. DOI: 10.1155/2013/516465
Tayan O., Kabir M. N., Alginahi Y. M. A Hybrid Digital-Signature and Zero-Watermarking Approach for Authentication and Protection of Sensitive Electronic Documents. The Scientific World Journal. 2014. Article ID 514652. 10 p. DOI: 10.1155/2014/514652
Поддубний В., Сєвєрінов О., Непокритов Д. Дослідження ефективності алгоритмів оброблення зображень у схемах нульового водяних знаків. Сучасний стан наукових досліджень та технологій в промисловості. 2025. № 1(31). С. 102–114. DOI: 10.30837/2522-9818.2025.1.102
Поддубний В. О., Сєвєрінов О. В., Гвоздьов Р. Ю. Використання нульових водяних знаків для підтвердження авторства зображень та багатофакторної автентифікації. Радіотехніка. 2024. Вип. 218. С. 35–43. DOI: 10.30837/rt.2024.3.218.02
Poddubnyi V., Sievierinov O. Method of User Authentication in Information and Communication Systems Using Zero Watermark. Innovative Technologies and Scientific Solutions for Industries. 2025. № 2(32). P. 69–78. DOI: 10.30837/2522-9818.2025.2.069
Pal A., Mondal B., Bhattacharyya N., Ghosh S. Similarity in Fuzzy Systems. Journal of Uncertainty Analysis and Applications. 2014. Vol. 2. Article 18. DOI: 10.1186/s40467-014-0018-0
Altinkemer K., Wang T. Cost and Benefit Analysis of Authentication Systems. Decision Support Systems. 2011. Vol. 51, No. 3. P. 394–404. DOI: 10.1016/j.dss.2011.01.005
Phillips T. Usability and Security of Different Authentication Methods for an Electronic Health Records System. Proceedings of the 14th International Conference on Health Informatics (HEALTHINF). 2021. 8 р. URL: https://www.academia.edu/125169716/Usability_and_Security_of_Different_Authentication_Methods_for_an_Electronic_Health_Records_System
Kruzikova A., Knapova L., Smahel D., Dedkova L., Matyas V. Usable and Secure? User Perception of Four Authentication Methods for Mobile Banking. Computers & Security. 2022. Vol. 115. Article 102603. DOI: 10.1016/j.cose.2022.102603
Nadipally M. Optimization of Methods for Image-Texture Segmentation Using Ant Colony Optimization. In: Intelligent Data-Centric Systems: Intelligent Data Analysis for Biomedical Applications. Academic Press, 2019. Ch. 2. P. 21–47. DOI: 10.1016/B978-0-12-815553-0.00002-1
References
Lal, N.A., Prasad, S. Farik, M. (2016), "A review of authentication methods", International Journal of Scientific & Technology Research, Vol. 5, No. 11, Р. 246–249. available at: https://www.researchgate.net/publication/311514269_A_Review_Of_Authentication_Methods
Arévalo-Ancona, R.E., Cedillo-Hernandez, M., Ramirez-Rodriguez, A.E., Nakano-Miyatake, M. Perez-Meana, H. (2024), "Secure medical image authentication using zero-watermarking based on deep learning context encoder", Computación y Sistemas, Vol. 28, No. 1, Р. 199–210. DOI:10.13053/cys-28-1-4898
Seenivasagam, V. & Velumani, R. (2013), "A QR code based zero-watermarking scheme for authentication of medical images in teleradiology cloud", Computational and Mathematical Methods in Medicine, 2013, Article ID 516465, 10 p. DOI:10.1155/2013/516465
Chapple, M. (2020), Implementing Access Control Systems, Indiana (USA): Wiley, Р. 110–135.
Aiko, O.V., Vasylenko, O.D. Stepanenko, V.M. (2023), "Systems for access control automation at facilities" ["Systemy avtomatyzatsii kontroliu dostupu na ob’yekty"], Vseukrainska naukovo-praktychna konferentsiia studentiv, aspirantiv ta molodykh vchenykh. Р. 106-108. available at: https://ela.kpi.ua/server/api/core/bitstreams/e4de99d9-a572-452d-8194-3ba4a39f5bb4/content
Qi, X. Liu, Y. (2013), "Cloud model based zero-watermarking algorithm for authentication of text document", Proceedings of the 2013 Ninth International Conference on Computational Intelligence and Security (Emeishan, China), Р. 712–715. DOI:10.1109/CIS.2013.15
Hasan, B.M.S., Ameen, S.Y. and Hasan, O.M. (2021), "Image Authentication Based on Watermarking Approach: Review", Asian Journal of Research in Computer Science and Information Technology, № 9(3), Р. 34–51. DOI:10.9734/AJRCOS/2021/v9i330224
Arévalo-Ancona, R.E., Cedillo-Hernández, M., Ramírez-Rodríguez, A.E., Nakano-Miyatake, M. and Pérez-Meana, H. (2024), "Secure Medical Image Authentication Using Zero-Watermarking Based on Deep Learning Context Encoder", Computación y Sistemas, 28(1), Р. 199–210. DOI:10.13053/CyS-28-1-4898
Seenivasagam, V. and Velumani, R. (2013), "A QR Code Based Zero-Watermarking Scheme for Authentication of Medical Images in Teleradiology Cloud", Computational and Mathematical Methods in Medicine, Article ID 516465, 16 p. DOI:10.1155/2013/516465
Tayan, O., Kabir, M.N. Alginahi, Y.M. (2014), "A hybrid digital-signature and zero-watermarking approach for authentication and protection of sensitive electronic documents", The Scientific World Journal, Article ID 514652, 10 p. DOI:10.1155/2014/514652
Poddubnyi, V., Sievierinov, O. & Nepokrytov, D. (2025), "Research of the effectiveness of image processing algorithms in zero-watermarking schemes", ["Doslidzhennia efektyvnosti alhorytmiv obroblennia zobrazhen u skhemakh nulovoho vodianoho znaka"], Suchasnyi stan naukovykh doslidzhen ta tekhnolohii v promyslovosti, No. 1(31), Р. 102–114. DOI:10.30837/2522-9818.2025.1.102
Poddubnyi, V.O., Sievierinov, O.V. & Hvozdiov, R.Yu. (2024), "Using zero watermarks for image copyright protection and multifactor authentication" ["Vykorystannia nulʹovykh vodianykh znakiv dlia pidtverdzhennia avtorstva zobrazhenʹ ta bahatofaktornoï avtentyfikatsii"], Radiotekhnika, Issue 218, Р. 35–43. DOI:10.30837/rt.2024.3.218.02
Poddubnyi, V. Sievierinov, O. (2025), "Method of user authentication in information and communication systems using zero watermark", Innovative Technologies and Scientific Solutions for Industries, No. 2(32), Р. 69–78. DOI:10.30837/2522-9818.2025.2.069
Pal, A., Mondal, B., Bhattacharyya, N. Ghosh, S. (2014), "Similarity in fuzzy systems", Journal of Uncertainty Analysis and Applications, Vol. 2, Article 18. DOI:10.1186/s40467-014-0018-0
Altinkemer, K. Wang, T. (2011), "Cost and benefit analysis of authentication systems", Decision Support Systems, Vol. 51, No. 3, Р. 394–404. DOI: 10.1016/j.dss.2011.01.005
Phillips, T. (2021), "Usability and security of different authentication methods for an electronic health records system", Proceedings of the 14th International Conference on Health Informatics (HEALTHINF). 8 р. available at: https://www.academia.edu/125169716/Usability_and_Security_of_Different_Authentication_Methods_for_an_Electronic_Health_Records_System
Kruzikova, A., Knapova, L., Smahel, D., Dedkova, L. Matyas, V. (2022), "Usable and secure? User perception of four authentication methods for mobile banking", Computers & Security, Vol. 115, Article 102603. DOI: 10.1016/j.cose.2022.102603
Nadipally, M. (2019), "Optimization of methods for image-texture segmentation using ant colony optimization". In: Intelligent Data-Centric Systems: Intelligent Data Analysis for Biomedical Applications. Academic Press, Ch. 2, Р. 21–47. DOI: 10.1016/B978-0-12-815553-0.00002-1
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Our journal abides by the Creative Commons copyright rights and permissions for open access journals.
Authors who publish with this journal agree to the following terms:
Authors hold the copyright without restrictions and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (CC BY-NC-SA 4.0) that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
Authors are able to enter into separate, additional contractual arrangements for the non-commercial and non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
Authors are permitted and encouraged to post their published work online (e.g., in institutional repositories or on their website) as it can lead to productive exchanges, as well as earlier and greater citation of published work.












