{"id":"https://openalex.org/W4415004346","doi":"https://doi.org/10.1109/acit65614.2025.11185880","title":"Embedding a Digital Watermark into an Image Using a Hamming Code and a Solver of the Square Root of a Prime Number","display_name":"Embedding a Digital Watermark into an Image Using a Hamming Code and a Solver of the Square Root of a Prime Number","publication_year":2025,"publication_date":"2025-09-17","ids":{"openalex":"https://openalex.org/W4415004346","doi":"https://doi.org/10.1109/acit65614.2025.11185880"},"language":"en","primary_location":{"id":"doi:10.1109/acit65614.2025.11185880","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit65614.2025.11185880","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 15th International Conference on Advanced Computer Information Technologies (ACIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056683254","display_name":"Nataliia Kukharska","orcid":"https://orcid.org/0000-0002-0896-8361"},"institutions":[{"id":"https://openalex.org/I98435010","display_name":"Lviv Polytechnic National University","ror":"https://ror.org/0542q3127","country_code":"UA","type":"education","lineage":["https://openalex.org/I98435010"]}],"countries":["UA"],"is_corresponding":true,"raw_author_name":"Nataliia Kukharska","raw_affiliation_strings":["Lviv Polytechnic National University,Department of Security of Information Technologies,Lviv,Ukraine"],"affiliations":[{"raw_affiliation_string":"Lviv Polytechnic National University,Department of Security of Information Technologies,Lviv,Ukraine","institution_ids":["https://openalex.org/I98435010"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042167602","display_name":"\u0410\u043d\u0434\u0440\u0456\u0439 \u041b\u0430\u0433\u0443\u043d","orcid":"https://orcid.org/0000-0001-7856-9174"},"institutions":[{"id":"https://openalex.org/I98435010","display_name":"Lviv Polytechnic National University","ror":"https://ror.org/0542q3127","country_code":"UA","type":"education","lineage":["https://openalex.org/I98435010"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Andrii Lagun","raw_affiliation_strings":["Lviv Polytechnic National University,Department of Information Systems and Technologies,Lviv,Ukraine"],"affiliations":[{"raw_affiliation_string":"Lviv Polytechnic National University,Department of Information Systems and Technologies,Lviv,Ukraine","institution_ids":["https://openalex.org/I98435010"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031305355","display_name":"S. A. Semenyuk","orcid":"https://orcid.org/0000-0002-8143-5887"},"institutions":[{"id":"https://openalex.org/I98435010","display_name":"Lviv Polytechnic National University","ror":"https://ror.org/0542q3127","country_code":"UA","type":"education","lineage":["https://openalex.org/I98435010"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Serhiy Semenyuk","raw_affiliation_strings":["Lviv Polytechnic National University,Department of Security of Information Technologies,Lviv,Ukraine"],"affiliations":[{"raw_affiliation_string":"Lviv Polytechnic National University,Department of Security of Information Technologies,Lviv,Ukraine","institution_ids":["https://openalex.org/I98435010"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088086986","display_name":"Orest Polotai","orcid":"https://orcid.org/0000-0003-4593-8601"},"institutions":[{"id":"https://openalex.org/I4210160829","display_name":"Lviv State University of Life Safety","ror":"https://ror.org/057g9bh47","country_code":"UA","type":"education","lineage":["https://openalex.org/I4210160829"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Orest Polotai","raw_affiliation_strings":["Lviv State University of Life Safety,Department of Information Security Management,Lviv,Ukraine"],"affiliations":[{"raw_affiliation_string":"Lviv State University of Life Safety,Department of Information Security Management,Lviv,Ukraine","institution_ids":["https://openalex.org/I4210160829"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119925242","display_name":"Oles Hospodarskyy","orcid":null},"institutions":[{"id":"https://openalex.org/I98435010","display_name":"Lviv Polytechnic National University","ror":"https://ror.org/0542q3127","country_code":"UA","type":"education","lineage":["https://openalex.org/I98435010"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Oles Hospodarskyy","raw_affiliation_strings":["Lviv Polytechnic National University,Department of Security of Information Technologies,Lviv,Ukraine"],"affiliations":[{"raw_affiliation_string":"Lviv Polytechnic National University,Department of Security of Information Technologies,Lviv,Ukraine","institution_ids":["https://openalex.org/I98435010"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033288187","display_name":"Mykhailo Ozhha","orcid":null},"institutions":[{"id":"https://openalex.org/I4210108513","display_name":"Ternopil Volodymyr Hnatiuk National Pedagogical University","ror":"https://ror.org/02j98rq95","country_code":"UA","type":"education","lineage":["https://openalex.org/I4210108513"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Mykhailo Ozhha","raw_affiliation_strings":["Ternopil Volodymyr Hnatiuk National Pedagogical University,Department of Computer Technologies,Ternopil,Ukraine"],"affiliations":[{"raw_affiliation_string":"Ternopil Volodymyr Hnatiuk National Pedagogical University,Department of Computer Technologies,Ternopil,Ukraine","institution_ids":["https://openalex.org/I4210108513"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5056683254"],"corresponding_institution_ids":["https://openalex.org/I98435010"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.29547172,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"537","last_page":"541"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12923","display_name":"Digital Image Processing Techniques","score":0.9850999712944031,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12923","display_name":"Digital Image Processing Techniques","score":0.9850999712944031,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13234","display_name":"advanced mathematical theories","score":0.933899998664856,"subfield":{"id":"https://openalex.org/subfields/2610","display_name":"Mathematical Physics"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12292","display_name":"Graph Theory and Algorithms","score":0.9322999715805054,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/pseudorandom-number-generator","display_name":"Pseudorandom number generator","score":0.6330999732017517},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.5393000245094299},{"id":"https://openalex.org/keywords/hamming-code","display_name":"Hamming code","score":0.527999997138977},{"id":"https://openalex.org/keywords/digital-image","display_name":"Digital image","score":0.5041999816894531},{"id":"https://openalex.org/keywords/steganography","display_name":"Steganography","score":0.5040000081062317},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.4812000095844269},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.4781000018119812},{"id":"https://openalex.org/keywords/pixel","display_name":"Pixel","score":0.45680001378059387},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4406000077724457},{"id":"https://openalex.org/keywords/hamming-distance","display_name":"Hamming distance","score":0.4106999933719635}],"concepts":[{"id":"https://openalex.org/C140642157","wikidata":"https://www.wikidata.org/wiki/Q1623338","display_name":"Pseudorandom number generator","level":2,"score":0.6330999732017517},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.5393000245094299},{"id":"https://openalex.org/C73150493","wikidata":"https://www.wikidata.org/wiki/Q853922","display_name":"Hamming code","level":4,"score":0.527999997138977},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5231000185012817},{"id":"https://openalex.org/C42781572","wikidata":"https://www.wikidata.org/wiki/Q1250322","display_name":"Digital image","level":4,"score":0.5041999816894531},{"id":"https://openalex.org/C108801101","wikidata":"https://www.wikidata.org/wiki/Q15032","display_name":"Steganography","level":3,"score":0.5040000081062317},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.4812000095844269},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.4781000018119812},{"id":"https://openalex.org/C160633673","wikidata":"https://www.wikidata.org/wiki/Q355198","display_name":"Pixel","level":2,"score":0.45680001378059387},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4406000077724457},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4366999864578247},{"id":"https://openalex.org/C193319292","wikidata":"https://www.wikidata.org/wiki/Q272172","display_name":"Hamming distance","level":2,"score":0.4106999933719635},{"id":"https://openalex.org/C124913957","wikidata":"https://www.wikidata.org/wiki/Q1232548","display_name":"Zoom","level":3,"score":0.3887999951839447},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.3869999945163727},{"id":"https://openalex.org/C184992742","wikidata":"https://www.wikidata.org/wiki/Q7243229","display_name":"Prime (order theory)","level":2,"score":0.38190001249313354},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.37880000472068787},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.3610000014305115},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3562000095844269},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.35530000925064087},{"id":"https://openalex.org/C4305246","wikidata":"https://www.wikidata.org/wiki/Q3885225","display_name":"Least significant bit","level":2,"score":0.3544999957084656},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.34850001335144043},{"id":"https://openalex.org/C201866948","wikidata":"https://www.wikidata.org/wiki/Q228206","display_name":"Random number generation","level":2,"score":0.3427000045776367},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3255000114440918},{"id":"https://openalex.org/C2780992000","wikidata":"https://www.wikidata.org/wiki/Q17016113","display_name":"Generator (circuit theory)","level":3,"score":0.32339999079704285},{"id":"https://openalex.org/C2778770139","wikidata":"https://www.wikidata.org/wiki/Q1966904","display_name":"Solver","level":2,"score":0.3222000002861023},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.30309998989105225},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.2849999964237213},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.2750000059604645},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.2667999863624573},{"id":"https://openalex.org/C105344744","wikidata":"https://www.wikidata.org/wiki/Q958957","display_name":"Spread spectrum","level":3,"score":0.26570001244544983},{"id":"https://openalex.org/C9417928","wikidata":"https://www.wikidata.org/wiki/Q1070689","display_name":"Image processing","level":3,"score":0.2637999951839447},{"id":"https://openalex.org/C151881341","wikidata":"https://www.wikidata.org/wiki/Q910571","display_name":"Pseudorandom noise","level":4,"score":0.25870001316070557},{"id":"https://openalex.org/C153207627","wikidata":"https://www.wikidata.org/wiki/Q863873","display_name":"Code word","level":3,"score":0.2572000026702881},{"id":"https://openalex.org/C93058836","wikidata":"https://www.wikidata.org/wiki/Q1453572","display_name":"Chain code","level":3,"score":0.25369998812675476},{"id":"https://openalex.org/C2775936607","wikidata":"https://www.wikidata.org/wiki/Q466845","display_name":"Tracking (education)","level":2,"score":0.25360000133514404}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acit65614.2025.11185880","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit65614.2025.11185880","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 15th International Conference on Advanced Computer Information Technologies (ACIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"In":[0],"today's":[1],"digital":[2,35,56,76,85,118,192],"world,":[3],"images":[4,36,193],"are":[5],"an":[6],"essential":[7],"tool":[8],"for":[9,80,145,190],"transmitting":[10],"information,":[11],"which":[12,59,120],"is":[13,52,110,132,140],"actively":[14],"used":[15],"in":[16,178],"education,":[17],"journalism,":[18],"medicine,":[19],"military,":[20],"banking,":[21],"and":[22,41,66,82,92,116,126,148,194],"other":[23],"fields.":[24],"However,":[25],"with":[26,156],"the":[27,31,46,53,72,89,100,103,137,143,168,171,184,188],"development":[28],"of":[29,33,45,50,55,74,102,106,114,129,136,159,170,187],"technologies,":[30],"problem":[32],"protecting":[34,195],"from":[37,99],"unauthorized":[38],"use,":[39],"forgery,":[40],"distortion":[42],"arises.":[43],"One":[44],"most":[47],"effective":[48],"methods":[49],"protection":[51],"use":[54,73],"watermarks":[57],"(DW),":[58],"allow":[60],"authenticating":[61,191],"content,":[62],"tracking":[63],"its":[64],"distribution,":[65],"preventing":[67],"counterfeiting.":[68],"This":[69],"paper":[70],"considers":[71],"fragile":[75],"watermarks.":[77],"An":[78],"algorithm":[79],"embedding":[81],"detecting":[83,146],"a":[84,93,107],"watermark":[86],"based":[87],"on":[88],"Hamming":[90],"code":[91],"pseudorandom":[94],"number":[95,109],"generator":[96],"(PRNG)":[97],"derived":[98],"calculation":[101],"square":[104],"root":[105],"prime":[108],"proposed.":[111],"The":[112,134,180],"process":[113],"generating":[115],"extracting":[117],"watermarks,":[119],"provides":[121],"high":[122,185],"resistance":[123],"to":[124,174],"attacks":[125,160],"accurate":[127],"detection":[128],"modified":[130,147],"areas,":[131],"described.":[133],"effectiveness":[135],"proposed":[138,172],"approach":[139],"evaluated":[141],"using":[142],"metrics":[144],"unmodified":[149],"pixels":[150],"(TPR,":[151],"TNR,":[152],"FPR,":[153],"FNR).":[154],"Experiments":[155],"various":[157],"types":[158],"(copying,":[161],"collaging,":[162],"adding":[163],"text,":[164],"deleting":[165],"objects)":[166],"demonstrate":[167],"ability":[169],"scheme":[173],"reliably":[175],"detect":[176],"changes":[177],"images.":[179],"obtained":[181],"results":[182],"confirm":[183],"efficiency":[186],"method":[189],"their":[196],"integrity.":[197]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
