<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3.dtd">
<article article-type="research-article" dtd-version="1.3" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="ru"><front><journal-meta><journal-id journal-id-type="publisher-id">tuzsut</journal-id><journal-title-group><journal-title xml:lang="ru">Труды учебных заведений связи</journal-title><trans-title-group xml:lang="en"><trans-title>Proceedings of Telecommunication Universities</trans-title></trans-title-group></journal-title-group><issn pub-type="ppub">1813-324X</issn><issn pub-type="epub">2712-8830</issn><publisher><publisher-name>СПбГУТ</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="doi">10.31854/1813-324X-2023-9-5-121-129</article-id><article-id custom-type="elpub" pub-id-type="custom">tuzsut-519</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research Article</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="ru"><subject>РЕЗУЛЬТАТЫ ИССЛЕДОВАНИЙ МОЛОДЫХ УЧЕНЫХ</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="en"><subject>RESEARCH RESULTS BY YOUNG SCIENTISTS</subject></subj-group></article-categories><title-group><article-title>Экспериментальное исследование метода защиты от атаки клонирования бумажных сертификатов</article-title><trans-title-group xml:lang="en"><trans-title>Experimental Investigation of Protection Method for Detection of Cloning Attack on Paper Certificates</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-0326-4592</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Флаксман</surname><given-names>Д. А.</given-names></name><name name-style="western" xml:lang="en"><surname>Flaksman</surname><given-names>D.</given-names></name></name-alternatives><bio xml:lang="ru"><p>программист ООО «Научно-производственное предприятие Новые Технологии Телекоммуникаций»</p></bio><email xlink:type="simple">flxdima4951@gmail.com</email><xref ref-type="aff" rid="aff-1"/></contrib></contrib-group><aff-alternatives id="aff-1"><aff xml:lang="ru">ООО «Научно-производственное предприятие Новые Технологии Телекоммуникаций»<country>Россия</country></aff><aff xml:lang="en">Research and Production Enterprise “Novye Tekhnologii Telekommunikatsii”, Ltd<country>Russian Federation</country></aff></aff-alternatives><pub-date pub-type="collection"><year>2023</year></pub-date><pub-date pub-type="epub"><day>15</day><month>11</month><year>2023</year></pub-date><volume>9</volume><issue>5</issue><fpage>121</fpage><lpage>129</lpage><permissions><copyright-statement>Copyright &amp;#x00A9; Флаксман Д.А., 2023</copyright-statement><copyright-year>2023</copyright-year><copyright-holder xml:lang="ru">Флаксман Д.А.</copyright-holder><copyright-holder xml:lang="en">Flaksman D.</copyright-holder><license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/" xlink:type="simple"><license-p>This work is licensed under a Creative Commons Attribution 4.0 License.</license-p></license></permissions><self-uri xlink:href="https://tuzs.sut.ru/jour/article/view/519">https://tuzs.sut.ru/jour/article/view/519</self-uri><abstract><p>В работе экспериментально исследуется метод защиты бумажных сертификатов от атаки клонирования, ранее теоретически описанный в одной из работ автора. Предлагаемый метод основывается на использовании цифровых водяных знаков. Для защиты от атаки клонирования производится анализ уровня шумов, возникающих при сканировании и печати цифровых водяных знаков. В работе рассмотрены предложенные ранее алгоритмы вложения цифровых водяных знаков в изображение и последующего их извлечения, а также описывается метод выявления атаки клонирования. Приводятся результаты проведенного экспериментального вычисления вероятностей ошибок первого и второго рода для предлагаемой системы цифровых водяных знаков, которые, в основном, совпали с полученными ранее теоретическими расчетами.</p></abstract><trans-abstract xml:lang="en"><p>A method of paper certificate protection against a cloning attack is investigated, that was proposed recently theoretically in a paper of the same author. This method is based on the use of digital watermarks. In order to extend watermark approach to a protection against cloning attacks, it has been suggested to execute estimation of the noise power which appear during the image scanning and printing. Algorithms of embedding and extraction of watermarks out of the images are presented along with a method of detecting of the cloning attack after scanning and printing by an attacker. Numerical results of the experiments for the error probabilities of a cloning missing and a false alarm are also presented and are in agreement with theoretical results obtained before.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>цифровые водяные знаки</kwd><kwd>клонирование</kwd><kwd>сертификаты продукции</kwd><kwd>вероятности пропуска и ложной тревоги факта клонирования</kwd></kwd-group><kwd-group xml:lang="en"><kwd>digital watermarks</kwd><kwd>cloning</kwd><kwd>certificates</kwd><kwd>the missing and false alarm probabilities</kwd></kwd-group></article-meta></front><back><ref-list><title>References</title><ref id="cit1"><label>1</label><citation-alternatives><mixed-citation xml:lang="ru">Коржик В.И., Анфиногенов С.О., Кочкарёв А.И., Федянин И.А., Жувикин А.Г., Флаксман Д.А. Цифровая стеганография и цифровые водяные знаки. Часть 2. Цифровые водяные знаки. СПб: СПбГУТ, 2017. 198 с.</mixed-citation><mixed-citation xml:lang="en">Korzhik V.I., Anfinogenov S.O., Kochkaryov A.I., Fedyanin I.A., Zhuvikin A.G., Flaksman D.A. Digital steganography and digital watermarks. Part 2. Digital watermarks. St. Petersburg: The Bonch-Bruevich Saint Petersburg State University of Telecommunications Publ.; 2017. 198 p.</mixed-citation></citation-alternatives></ref><ref id="cit2"><label>2</label><citation-alternatives><mixed-citation xml:lang="ru">Tkachenko I. Generation and analysis of graphical codes using textured patterns for printed document authentication. D.Sc Thesis. Montpellier: Université de Montpellier, 2015.</mixed-citation><mixed-citation xml:lang="en">Tkachenko I. Generation and analysis of graphical codes using textured patterns for printed document authentication. D.Sc Thesis. Montpellier: Université de Montpellier; 2015.</mixed-citation></citation-alternatives></ref><ref id="cit3"><label>3</label><citation-alternatives><mixed-citation xml:lang="ru">Nguyen H.P., Delahaies A., Retraint F., Nguyen D.H., Pic M., Morain-Nicolier F. A watermarking technique to secure printed QR codes using a statistical test // Proceedings of the IEEE Global Conference on Signal and Information Processing (GlobalSIP, Montreal, Canada, 14‒16 November 2017). IEEE, 2017. PP. 288‒292. DOI:10.1109/GlobalSIP.2017.8308650</mixed-citation><mixed-citation xml:lang="en">Nguyen H.P., Delahaies A., Retraint F., Nguyen D.H., Pic M., Morain-Nicolier F. A watermarking technique to secure printed QR codes using a statistical test. Proceedings of the IEEE Global Conference on Signal and Information Processing, GlobalSIP, 14‒16 November 2017, Montreal, Canada. IEEE; 2017. p.288‒292. DOI:10.1109/GlobalSIP.2017.8308650</mixed-citation></citation-alternatives></ref><ref id="cit4"><label>4</label><citation-alternatives><mixed-citation xml:lang="ru">Chen C., Li M., Ferreira A., Huang J., Cai R. A Copy-Proof Scheme Based on the Spectral and Spatial Barcoding Chan-nel Models // IEEE Transactions on Information Forensics and Security. 2019. Vol. 15. PP. 1056‒1071. DOI:10.1109/TIFS.2019.2934861</mixed-citation><mixed-citation xml:lang="en">Chen C., Li M., Ferreira A., Huang J., Cai R. A Copy-Proof Scheme Based on the Spectral and Spatial Barcoding Channel Models. IEEE Transactions on Information Forensics and Security. 2019;15:1056‒1071. DOI:10.1109/TIFS.2019.2934861</mixed-citation></citation-alternatives></ref><ref id="cit5"><label>5</label><citation-alternatives><mixed-citation xml:lang="ru">Taran O., Bonev S., Voloshynovskiy S. Clonability of Anti-counterfeiting Printable Graphical Codes: A Machine Learning Approach // Proceedings of the ICASSP 2019 ‒ 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP, Brighton, UK, 12‒17 May 2019). 2019. PP. 2482‒2486. DOI:10.1109/ICASSP.2019.8682967</mixed-citation><mixed-citation xml:lang="en">Taran O., Bonev S., Voloshynovskiy S. Clonability of Anti-counterfeiting Printable Graphical Codes: A Machine Learn-ing Approach. Proceedings of the ICASSP 2019 ‒ 2019 IEEE International Conference on Acoustics, Speech and Signal Pro-cessing, UK, 12‒17 May 2019). IEEE; 2019. p.2482‒2486. DOI:10.1109/ICASSP.2019.8682967</mixed-citation></citation-alternatives></ref><ref id="cit6"><label>6</label><citation-alternatives><mixed-citation xml:lang="ru">Коржик В.И., Старостин В.С., Флаксман Д.А. Разработка метода использования цифровых водяных знаков для защиты от атаки клонирования бумажных сертификатов // Труды учебных заведений связи. 2021. Т. 7. № 2. С. 79‒84. DOI:10.31854/1813-324X-2021-7-2-79-84</mixed-citation><mixed-citation xml:lang="en">Korzhik V., Starostin V., Flaksman D. Elaboration of Digital Watermarking Method for a Protection of Cloning Attack on Paper Certificates. Proceedings of Telecommun. Univ. 2021;7(2):79‒84. DOI:10.31854/1813-324X-2021-7-2-79-84</mixed-citation></citation-alternatives></ref><ref id="cit7"><label>7</label><citation-alternatives><mixed-citation xml:lang="ru">Korzhik V., Starostin V., Yakovlev V., Flaksman D., Bukshin I., Izotov B. Digital Watermarking System for Hard Cover Objects Against Cloning Attacks // Proceedings of the XXth Conference of Open Innovations Association FRUCT (Oulu, Finland, . 27‒29 October 2021). IEEE, 2021. PP. 79‒85. DOI:10.23919/FRUCT53335.2021.9599967</mixed-citation><mixed-citation xml:lang="en">Korzhik V., Starostin V., Yakovlev V., Flaksman D., Bukshin I., Izotov B. Digital Watermarking System for Hard Cover Objects Against Cloning Attacks. Proceedings of the XXth Conference of Open Innovations Association FRUCT. IEEE; 2021. p 79‒85. DOI:10.23919/FRUCT53335.2021.9599967</mixed-citation></citation-alternatives></ref><ref id="cit8"><label>8</label><citation-alternatives><mixed-citation xml:lang="ru">Solomon C., Breckin T. Fundamentals of digital signal processing. Wiley, 2011.</mixed-citation><mixed-citation xml:lang="en">Solomon C., Breckin T. Fundamentals of digital signal processing. Wiley, 2011.</mixed-citation></citation-alternatives></ref><ref id="cit9"><label>9</label><citation-alternatives><mixed-citation xml:lang="ru">Korzhik V., Starostin V., Yakovlev V., Flaksman D. Digital Watermark System with an Ability of its Extraction from Hard Copies of Data // Труды учебных заведений связи. 2019. Т. 5. № 3. С. 75‒85. DOI:10.31854/1813-324X-2019-5-3-75</mixed-citation><mixed-citation xml:lang="en">Korzhik V., Flaksman D. Digital Watermark System with an Ability of its Extraction from Hard Copies of Data. Proceedings of Telecommun. Univ. 2019;5(3):75‒85. 2019. DOI:10.31854/1813-324X-2019-5-3-75</mixed-citation></citation-alternatives></ref></ref-list><fn-group><fn fn-type="conflict"><p>The authors declare that there are no conflicts of interest present.</p></fn></fn-group></back></article>
