TY - BOOK AB - The development of new technologies, the growing volume of data and the total consumption of content in the digital environment are changing the ecosystem of modern media. Data can be easily and completely duplicated. It brings great convenience to life, work, scientific research and other areas of human activity. However, information security issues have appeared that have attracted a lot of attention. The purpose of this article is to present a model for digital image authentication. This article proposes a model for reliable verification of digital image authenticity with a high degree of protection and parameters for assessing the effectiveness of such systems. Reliability is achieved because the watermark is hidden not in the whole image, but in its fragment, which is most suitable for hiding the image, as well as for using antinoise codes as a watermark. Based on the current state of watermarking methods, it is recommended to use modern algorithms and architectures of convolutional neural networks to ensure a high degree of security. AU - Ruban, Igor, AU - Bolohova, Nataliia, AU - Martovytskyi, Vitalii, AU - Koptsev, Oleh, DO - 10.20998/tind.2522-9052.2021.1.16 DO - doi ID - 46155 KW - Science. KW - Mathematics. KW - Computer science. KW - Information theory. LA - eng LK - https://doi.org/10.20998/2522-9052.2021.1.16 LK - https://dx.doi.org/ N1 - 2522-9052 (Print) N1 - This resource was extracted from the Directory of Open Access Journals (DOAJ) N2 - The development of new technologies, the growing volume of data and the total consumption of content in the digital environment are changing the ecosystem of modern media. Data can be easily and completely duplicated. It brings great convenience to life, work, scientific research and other areas of human activity. However, information security issues have appeared that have attracted a lot of attention. The purpose of this article is to present a model for digital image authentication. This article proposes a model for reliable verification of digital image authenticity with a high degree of protection and parameters for assessing the effectiveness of such systems. Reliability is achieved because the watermark is hidden not in the whole image, but in its fragment, which is most suitable for hiding the image, as well as for using antinoise codes as a watermark. Based on the current state of watermarking methods, it is recommended to use modern algorithms and architectures of convolutional neural networks to ensure a high degree of security. T1 - Digital Image Authentication Model. TI - Digital Image Authentication Model. UR - https://doi.org/10.20998/2522-9052.2021.1.16 UR - https://dx.doi.org/ VL - Vol. 5, no. 1, 2021. ER -