<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3.dtd">
<article article-type="research-article" dtd-version="1.3" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="ru"><front><journal-meta><journal-id journal-id-type="publisher-id">tuzsut</journal-id><journal-title-group><journal-title xml:lang="ru">Труды учебных заведений связи</journal-title><trans-title-group xml:lang="en"><trans-title>Proceedings of Telecommunication Universities</trans-title></trans-title-group></journal-title-group><issn pub-type="ppub">1813-324X</issn><issn pub-type="epub">2712-8830</issn><publisher><publisher-name>СПбГУТ</publisher-name></publisher></journal-meta><article-meta><article-id custom-type="elpub" pub-id-type="custom">tuzsut-349</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research Article</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="ru"><subject>Статьи</subject></subj-group></article-categories><title-group><article-title>ИСПОЛЬЗОВАНИЕ МЕТОДА 3‐БИТНОГО КВАНТОВАНИЯ ДЛЯ АЛГОРИТМА СЕЛЕКТИВНОЙ АУТЕНТИФИКАЦИИ ИЗОБРАЖЕНИИ, УСТОЙЧИВОГО К JPEG СЖАТИЮ</article-title><trans-title-group xml:lang="en"><trans-title>THE USAGE OF 3-BIT QUANTIZATION METHOD FOR SELECTIVE IMAGE AUTHENTICATION ALGORITHM ROBUST TO JPEG COMPRESSION</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Жувикин</surname><given-names>А. Г.</given-names></name><name name-style="western" xml:lang="en"><surname>Zhuvikin</surname><given-names>A.</given-names></name></name-alternatives><bio xml:lang="ru"><p>Жувикин Алексей Георгиевич - аспирант кафедры защищённых систем связи Санкт-Петербургского государственного университета телекоммуникаций им. проф. М.А. Бонч-Бруевича</p></bio><email xlink:type="simple">zhuvikin@ya.ru</email><xref ref-type="aff" rid="aff-1"/></contrib><contrib contrib-type="author" corresp="yes"><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Коржик</surname><given-names>В. И.</given-names></name><name name-style="western" xml:lang="en"><surname>Korzhik</surname><given-names>V.</given-names></name></name-alternatives><bio xml:lang="ru"><p>Коржик Валерий Иванович - доктор технических наук, профессор кафедры защищённых систем связи Санкт-Петербургского государственного университета телекоммуникаций им. проф. М.А. Бонч-Бруевича</p></bio><email xlink:type="simple">val-korzhik@yandex.ru</email><xref ref-type="aff" rid="aff-1"/></contrib></contrib-group><aff-alternatives id="aff-1"><aff xml:lang="ru">Санкт-Петербургский государственный университет телекоммуникаций им. проф. М.А. Бонч-Бруевича<country>Россия</country></aff></aff-alternatives><pub-date pub-type="collection"><year>2016</year></pub-date><pub-date pub-type="epub"><day>13</day><month>04</month><year>2022</year></pub-date><volume>2</volume><issue>1</issue><fpage>52</fpage><lpage>57</lpage><permissions><copyright-statement>Copyright &amp;#x00A9; Жувикин А.Г., Коржик В.И., 2022</copyright-statement><copyright-year>2022</copyright-year><copyright-holder xml:lang="ru">Жувикин А.Г., Коржик В.И.</copyright-holder><copyright-holder xml:lang="en">Zhuvikin A., Korzhik V.</copyright-holder><license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/" xlink:type="simple"><license-p>This work is licensed under a Creative Commons Attribution 4.0 License.</license-p></license></permissions><self-uri xlink:href="https://tuzs.sut.ru/jour/article/view/349">https://tuzs.sut.ru/jour/article/view/349</self-uri><abstract><p>Преимуществом использования цифровых водяных знаков является то, что они не  требуют использования дополнительного объёма памяти для хранения метаданных. Однако, применение JPEG сжатия, как наиболее распространённого метода уменьшения размера изображений, приводит к нарушению целостности при использовании точной аутентификации. В данной работе предложен улучшенный метод селективной аутентификацииизображений, устойчивый к JPEG сжатию, основанный на применении центральных конечных разностей и алгоритма 3-битного квантования вектора свойств. Экспериментальныерезультаты показали высокую устойчивость к JPEG сжатию с параметром качества Q ≥ 8, высокую вероятность обнаружения искажений небольших искажений изображений, показатели PSNR ≥ 40 дБ после погружения цифровых водяных знаков и низкую вычислительную сложность алгоритма по сравнению с предыдущим методам.</p></abstract><trans-abstract xml:lang="en"><p>The advantage of watermarking usage is it does not require to store of metadata in extra memory space. However, JPEG algorithm, being a common method for image compression, leads to break-in of strict image authentication. An improved algorithm of selective image authentication tolerant to JPEG compression is presented. Proposed method is based on central finite differences and 3-bit quantization of the feature vector. The experimental results show that algorithm has strong resistance to JPEG compression with quality factor Q ≥ 8, the high probability of malicious tampering detection and low order of calculation complexity comparing with the previous presented. A visual quality (PSNR) of the watermarked image is higher than 40 dB.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>цифровые изображения</kwd><kwd>селективная аутентификация</kwd><kwd>JPEG</kwd><kwd>3-битное квантование</kwd><kwd>вейвлет-преобразование Хаара</kwd><kwd>центральные конечные разности</kwd></kwd-group><kwd-group xml:lang="en"><kwd>digital images</kwd><kwd>selective authentication</kwd><kwd>JPEG</kwd><kwd>3-bit quantization</kwd><kwd>discrete wavelet transform</kwd></kwd-group></article-meta></front><back><ref-list><title>References</title><ref id="cit1"><label>1</label><citation-alternatives><mixed-citation xml:lang="ru">Menezes A. A. J., Van Oorschot P., and Vanstone, S. Handbook of Applied Crytography // Discrete Mathematics and Its Applications Series. Crc Press. 1997.</mixed-citation><mixed-citation xml:lang="en">Menezes A. A. J., Van Oorschot P., and Vanstone, S. Handbook of Applied Crytography // Discrete Mathematics and Its Applications Series. Crc Press. 1997.</mixed-citation></citation-alternatives></ref><ref id="cit2"><label>2</label><citation-alternatives><mixed-citation xml:lang="ru">Lee M. H., Korzhik V. I., Morales-Luna G., Lusse S., and Kurbatov E. Image authentication based on modular embedding. IEICE Transactions 89-D. 2006. N 4. PP. 1498–1506.</mixed-citation><mixed-citation xml:lang="en">Lee M. H., Korzhik V. I., Morales-Luna G., Lusse S., and Kurbatov E. Image authentication based on modular embedding. IEICE Transactions 89-D. 2006. N 4. PP. 1498–1506.</mixed-citation></citation-alternatives></ref><ref id="cit3"><label>3</label><citation-alternatives><mixed-citation xml:lang="ru">Goljan M., Fridrich J. J., and Du R. Distortion-free data embedding for images // In Proceedings of the 4th International Workshop on Information Hiding. IHW '01. Springer-Verlag, London, UK. 2001. PP. 27–41.</mixed-citation><mixed-citation xml:lang="en">Goljan M., Fridrich J. J., and Du R. Distortion-free data embedding for images // In Proceedings of the 4th International Workshop on Information Hiding. IHW '01. Springer-Verlag, London, UK. 2001. PP. 27–41.</mixed-citation></citation-alternatives></ref><ref id="cit4"><label>4</label><citation-alternatives><mixed-citation xml:lang="ru">Fridrich J., Goljan M., and Du R. Invertible authentication watermark for JPEG images / In ITCC (2004-01-26). IEEE Computer Society. PP. 223–227.</mixed-citation><mixed-citation xml:lang="en">Fridrich J., Goljan M., and Du R. Invertible authentication watermark for JPEG images / In ITCC (2004-01-26). IEEE Computer Society. PP. 223–227.</mixed-citation></citation-alternatives></ref><ref id="cit5"><label>5</label><citation-alternatives><mixed-citation xml:lang="ru">Ni Z., Shi Y., Ansari N., and Su W. Reversible data hiding // IEEE Trans. Circuits Syst. Video Techn. 2006. 16, 3. PP. 354–362.</mixed-citation><mixed-citation xml:lang="en">Ni Z., Shi Y., Ansari N., and Su W. Reversible data hiding // IEEE Trans. Circuits Syst. Video Techn. 2006. 16, 3. PP. 354–362.</mixed-citation></citation-alternatives></ref><ref id="cit6"><label>6</label><citation-alternatives><mixed-citation xml:lang="ru">Korzhik V., Zhuvikin A., and Morales-Luna G. Selective image authentication tolerant to JPEG compression // In 6th IISA 2015. IEEE, 06–08.</mixed-citation><mixed-citation xml:lang="en">Korzhik V., Zhuvikin A., and Morales-Luna G. Selective image authentication tolerant to JPEG compression // In 6th IISA 2015. IEEE, 06–08.</mixed-citation></citation-alternatives></ref><ref id="cit7"><label>7</label><citation-alternatives><mixed-citation xml:lang="ru">Eberly D. Derivative approximation by finite differences. Tech. rep. 2008.</mixed-citation><mixed-citation xml:lang="en">Eberly D. Derivative approximation by finite differences. Tech. rep. 2008.</mixed-citation></citation-alternatives></ref><ref id="cit8"><label>8</label><citation-alternatives><mixed-citation xml:lang="ru">Zivic N. Robust Image Authentication in the Presence of Noise. Springer International Publishing, 2015. 187 p.</mixed-citation><mixed-citation xml:lang="en">Zivic N. Robust Image Authentication in the Presence of Noise. Springer International Publishing, 2015. 187 p.</mixed-citation></citation-alternatives></ref><ref id="cit9"><label>9</label><citation-alternatives><mixed-citation xml:lang="ru">Porwik P. and Lisowska A. The Haar wavelet transform in digital image processing: its status and achievements // Int. Journal Machine Graphics &amp; Vision. 2004. V. 13. N 1. PP. 79–98.</mixed-citation><mixed-citation xml:lang="en">Porwik P. and Lisowska A. The Haar wavelet transform in digital image processing: its status and achievements // Int. Journal Machine Graphics &amp; Vision. 2004. V. 13. N 1. PP. 79–98.</mixed-citation></citation-alternatives></ref></ref-list><fn-group><fn fn-type="conflict"><p>The authors declare that there are no conflicts of interest present.</p></fn></fn-group></back></article>
