000046155 000__ 02598cam\a22004455i\4500 000046155 001__ 46155 000046155 003__ SzGeWIPO 000046155 005__ 20240708150229.0 000046155 006__ m\\\\eo\\d\\\\\\\\ 000046155 007__ cr bn |||m|||a 000046155 008__ 220524s2021\\\\sz\\\\\\\\\\\\000\0\eng\d 000046155 0247_ $$a10.20998/tind.2522-9052.2021.1.16$$2doi 000046155 035__ $$a(OCoLC)1335038982 000046155 040__ $$aSzGeWIPO$$beng$$erda$$cSzGeWIPO$$dCaBNVSL 000046155 041__ $$aeng 000046155 24500 $$aDigital Image Authentication Model. 000046155 264_1 $$aUkraine:$$bNational Technical University "Kharkiv Polytechnic Institute",$$c2021 000046155 300__ $$a1 volume 000046155 336__ $$atext$$btxt$$2rdacontent 000046155 337__ $$aunmediated$$bn$$2rdamedia 000046155 338__ $$avolume$$bnc$$2rdacarrier 000046155 4901_ $$aСучасні інформаційні системи;$$vVol. 5, no. 1, 2021. 000046155 500__ $$a2522-9052 (Print) 000046155 500__ $$aThis resource was extracted from the Directory of Open Access Journals (DOAJ) 000046155 520__ $$aThe development of new technologies, the growing volume of data and the total consumption of content in the digital environment are changing the ecosystem of modern media. Data can be easily and completely duplicated. It brings great convenience to life, work, scientific research and other areas of human activity. However, information security issues have appeared that have attracted a lot of attention. The purpose of this article is to present a model for digital image authentication. This article proposes a model for reliable verification of digital image authenticity with a high degree of protection and parameters for assessing the effectiveness of such systems. Reliability is achieved because the watermark is hidden not in the whole image, but in its fragment, which is most suitable for hiding the image, as well as for using antinoise codes as a watermark. Based on the current state of watermarking methods, it is recommended to use modern algorithms and architectures of convolutional neural networks to ensure a high degree of security. 000046155 588__ $$aCrossref 000046155 590__ $$aPublished online: Feb-21 000046155 650_0 $$aScience. 000046155 650_0 $$aMathematics. 000046155 650_0 $$aComputer science. 000046155 650_0 $$aInformation theory. 000046155 7001_ $$aRuban, Igor,$$eauthor. 000046155 7001_ $$aBolohova, Nataliia,$$eauthor. 000046155 7001_ $$aMartovytskyi, Vitalii,$$eauthor. 000046155 7001_ $$aKoptsev, Oleh,$$eauthor. 000046155 830_0 $$aСучасні інформаційні системи ;$$vVol. 5, no. 1, 2021. 000046155 85641 $$uhttps://doi.org/10.20998/2522-9052.2021.1.16$$yOnline version 000046155 85648 $$3Abstract with links to full text$$uhttps://dx.doi.org/ 000046155 904__ $$aJournal article 000046155 980__ $$aBIB