<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3.dtd">
<article article-type="research-article" dtd-version="1.3" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="ru"><front><journal-meta><journal-id journal-id-type="publisher-id">tuzsut</journal-id><journal-title-group><journal-title xml:lang="ru">Труды учебных заведений связи</journal-title><trans-title-group xml:lang="en"><trans-title>Proceedings of Telecommunication Universities</trans-title></trans-title-group></journal-title-group><issn pub-type="ppub">1813-324X</issn><issn pub-type="epub">2712-8830</issn><publisher><publisher-name>СПбГУТ</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="doi">10.31854/1813-324X-2019-5-3-75-85</article-id><article-id custom-type="elpub" pub-id-type="custom">tuzsut-89</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research Article</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="ru"><subject>ИНФОРМАТИКА, ВЫЧИСЛИТЕЛЬНАЯ ТЕХНИКА И УПРАВЛЕНИЕ</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="en"><subject>INFORMATICS, COMPUTER ENGINEERING AND MANAGEMENT</subject></subj-group></article-categories><title-group><article-title>Система цифровых водяных знаков с возможностью их извлечения из бумажных копий цифровых документов</article-title><trans-title-group xml:lang="en"><trans-title></trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Коржик</surname><given-names>В. И.</given-names></name><name name-style="western" xml:lang="en"><surname>Korzhik</surname><given-names>V. ..</given-names></name></name-alternatives><email xlink:type="simple">val-korzhik@yandex.ru</email><xref ref-type="aff" rid="aff-1"/></contrib><contrib contrib-type="author" corresp="yes"><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Флаксман</surname><given-names>Д. А.</given-names></name><name name-style="western" xml:lang="en"><surname>Flaksman</surname><given-names>D. ..</given-names></name></name-alternatives><email xlink:type="simple">noemail@neicon.ru</email><xref ref-type="aff" rid="aff-1"/></contrib></contrib-group><aff-alternatives id="aff-1"><aff xml:lang="ru">Санкт-Петербургский государственный университет телекоммуникаций им. проф. М.А. Бонч-Бруевича<country>Россия</country></aff><aff xml:lang="en">The Bonch-Bruevich Saint-Petersburg State University of Telecommunications<country>Russian Federation</country></aff></aff-alternatives><pub-date pub-type="collection"><year>2019</year></pub-date><pub-date pub-type="epub"><day>13</day><month>04</month><year>2021</year></pub-date><volume>5</volume><issue>3</issue><fpage>75</fpage><lpage>85</lpage><permissions><copyright-statement>Copyright &amp;#x00A9; Коржик В.И., Флаксман Д.А., 2021</copyright-statement><copyright-year>2021</copyright-year><copyright-holder xml:lang="ru">Коржик В.И., Флаксман Д.А.</copyright-holder><copyright-holder xml:lang="en">Korzhik V..., Flaksman D...</copyright-holder><license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/" xlink:type="simple"><license-p>This work is licensed under a Creative Commons Attribution 4.0 License.</license-p></license></permissions><self-uri xlink:href="https://tuzs.sut.ru/jour/article/view/89">https://tuzs.sut.ru/jour/article/view/89</self-uri><abstract><p>В работе предлагается система ЦВЗ для цветных изображений, главной особенностью которой является возможность их извлечения даже после печати и последующего сканирования изображения со скрытым вложением. Дается описание алгоритмов вложения и извлечения дополнительной информации, основанных на использовании широкополосных сигналов в частотной области. Описаны алгоритмы коррекции искажений, возникающих при печати и последующем сканировании бумажных копий цифровых документов. Приводятся результаты экспериментального исследования предложенной системы по объему вложения и достоверности извлечения вложенных данных.</p></abstract><trans-abstract xml:lang="en"><p>In this paper it is presented Digital Watermark System for color images. The main feature of this system is an ability to extract digital watermarks even after printing and following scanning of watermarked images. There is a description of algorithms for embedding and extracting of additional information. These methods are based on the usage of spread-spectrum signals in the frequency domain. Furthermore, there is described algorithms of distortion correction after printing out and following scanning the paper copies of digital data. The results of the experimental research on evaluation of a possible embedding volume and the reliability after extraction of the embedded data are also presented.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>цифровые водяные знаки</kwd><kwd>широкополосные сигналы</kwd><kwd>геометрические преобразования</kwd><kwd>коррекция перспективных искажений</kwd></kwd-group><kwd-group xml:lang="en"><kwd>digital watermarking</kwd><kwd>spread spectrum signals</kwd><kwd>perspective distortion correction</kwd></kwd-group></article-meta></front><back><ref-list><title>References</title><ref id="cit1"><label>1</label><citation-alternatives><mixed-citation xml:lang="ru">Коржик В.И., Небаева К.А., Герлинг Е.Ю., Догиль П.С., Федянин И.А. Цифровая стеганография и цифровые водяные знаки. Часть 1. Цифровая Стеганография. СПб.: СПбГУТ, 2016. 226.c.</mixed-citation><mixed-citation xml:lang="en">Коржик В.И., Небаева К.А., Герлинг Е.Ю., Догиль П.С., Федянин И.А. Цифровая стеганография и цифровые водяные знаки. Часть 1. Цифровая Стеганография. СПб.: СПбГУТ, 2016. 226.c.</mixed-citation></citation-alternatives></ref><ref id="cit2"><label>2</label><citation-alternatives><mixed-citation xml:lang="ru">Анфиногенов С.О. Разработка и исследование методов построения нульбитовой системы цифровых «водяных» знаков устойчивой к случайным и преднамеренным преобразованиям: дис. … канд. тех. наук. СПб.: СПбГУТ, 2014.</mixed-citation><mixed-citation xml:lang="en">Анфиногенов С.О. Разработка и исследование методов построения нульбитовой системы цифровых «водяных» знаков устойчивой к случайным и преднамеренным преобразованиям: дис. … канд. тех. наук. СПб.: СПбГУТ, 2014.</mixed-citation></citation-alternatives></ref><ref id="cit3"><label>3</label><citation-alternatives><mixed-citation xml:lang="ru">Tkachenko I. Generation and analysis of graphical codes using textured patterns for printed document authentication. D.Sc Thesis. Montpellier: Université de Montpellier, 2015.</mixed-citation><mixed-citation xml:lang="en">Tkachenko I. Generation and analysis of graphical codes using textured patterns for printed document authentication. D.Sc Thesis. Montpellier: Université de Montpellier, 2015.</mixed-citation></citation-alternatives></ref><ref id="cit4"><label>4</label><citation-alternatives><mixed-citation xml:lang="ru">Ho A.T.S., Shu F. A print-and-scan resilient digital watermark for card authentication // Proceedings of the 4th International Conference on Information, Communications and Signal. Formal Methods and Security (ICICS-PCM, Singapore, Singapore,15-18 December 2003). Piscataway, NJ: IEEE, 2003. DOI:10.1109/ICICS.2003.1292640</mixed-citation><mixed-citation xml:lang="en">Ho A.T.S., Shu F. A print-and-scan resilient digital watermark for card authentication // Proceedings of the 4th International Conference on Information, Communications and Signal. Formal Methods and Security (ICICS-PCM, Singapore, Singapore,15-18 December 2003). Piscataway, NJ: IEEE, 2003. DOI:10.1109/ICICS.2003.1292640</mixed-citation></citation-alternatives></ref><ref id="cit5"><label>5</label><citation-alternatives><mixed-citation xml:lang="ru">Monga V., Evans B.L. Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs // IEEE Transactions on Image Processing. 2006. Vol. 15. Iss. 11. PP. 3452-3465. DOI:10.1109/TIP.2006.881948</mixed-citation><mixed-citation xml:lang="en">Monga V., Evans B.L. Perceptual Image Hashing Via Feature Points: Performance Evaluation and Tradeoffs // IEEE Transactions on Image Processing. 2006. Vol. 15. Iss. 11. PP. 3452-3465. DOI:10.1109/TIP.2006.881948</mixed-citation></citation-alternatives></ref><ref id="cit6"><label>6</label><citation-alternatives><mixed-citation xml:lang="ru">Кочкарев А.И. Решение проблемы извлечения информации для каскадной системы ЦВЗ при атаке вырезанием фрагментов изображения // Телекоммуникации. 2016. № 10. С. 27-38.</mixed-citation><mixed-citation xml:lang="en">Кочкарев А.И. Решение проблемы извлечения информации для каскадной системы ЦВЗ при атаке вырезанием фрагментов изображения // Телекоммуникации. 2016. № 10. С. 27-38.</mixed-citation></citation-alternatives></ref><ref id="cit7"><label>7</label><citation-alternatives><mixed-citation xml:lang="ru">Dong P., Brankov J.G., Galatsanos N.P., Yang Y., Davoine F. Digital Watermarking Robust to Geometric Distortions // IEEE Transactions on Image Processing. 2006. Vol. 14. Iss. 12. PP. 2140-2150. DOI:10.1109/TIP.2005.857263</mixed-citation><mixed-citation xml:lang="en">Dong P., Brankov J.G., Galatsanos N.P., Yang Y., Davoine F. Digital Watermarking Robust to Geometric Distortions // IEEE Transactions on Image Processing. 2006. Vol. 14. Iss. 12. PP. 2140-2150. DOI:10.1109/TIP.2005.857263</mixed-citation></citation-alternatives></ref><ref id="cit8"><label>8</label><citation-alternatives><mixed-citation xml:lang="ru">Bruckstein A.M., Richardson T.J. A Holographic Transform Domain Image Watermarking Method // Circuits, Systems, and Signal Processing. 1998. Vol. 17. Iss. 3. PP. 361-389. DOI:10.1007/BF01202298</mixed-citation><mixed-citation xml:lang="en">Bruckstein A.M., Richardson T.J. A Holographic Transform Domain Image Watermarking Method // Circuits, Systems, and Signal Processing. 1998. Vol. 17. Iss. 3. PP. 361-389. DOI:10.1007/BF01202298</mixed-citation></citation-alternatives></ref><ref id="cit9"><label>9</label><citation-alternatives><mixed-citation xml:lang="ru">Коржик В.И., Яковлев В.И. Основы криптографии: учебное пособие. СПб.: ИЦ «Интермедиа», 2016. 312 с.</mixed-citation><mixed-citation xml:lang="en">Коржик В.И., Яковлев В.И. Основы криптографии: учебное пособие. СПб.: ИЦ «Интермедиа», 2016. 312 с.</mixed-citation></citation-alternatives></ref><ref id="cit10"><label>10</label><citation-alternatives><mixed-citation xml:lang="ru">Bay H., Tuytelaars T., Van Gool L. SURF: Speeded Up Robust Features // Proceedings of the 9th European Conference on Computer Vision (ECCV, Graz, Austria, 7-13 May 2006). Lecture Notes in Computer Science. Part 1. 2006. Vol. 3951. PP. 404- 417. DOI:10.1007/11744023_32</mixed-citation><mixed-citation xml:lang="en">Bay H., Tuytelaars T., Van Gool L. SURF: Speeded Up Robust Features // Proceedings of the 9th European Conference on Computer Vision (ECCV, Graz, Austria, 7-13 May 2006). Lecture Notes in Computer Science. Part 1. 2006. Vol. 3951. PP. 404- 417. DOI:10.1007/11744023_32</mixed-citation></citation-alternatives></ref><ref id="cit11"><label>11</label><citation-alternatives><mixed-citation xml:lang="ru">Harris C., Stephens M. A Combined Corner and Edge Detector // Proceedings of the 4th Alvey Vision Conference (AVC, Manchester, UK, 31st Augusyt - 2nd September 1988). Manchester: University of Manchester Publ., 1988. PP. 23.1-23.6. DOI:10.5244/C.2.23</mixed-citation><mixed-citation xml:lang="en">Harris C., Stephens M. A Combined Corner and Edge Detector // Proceedings of the 4th Alvey Vision Conference (AVC, Manchester, UK, 31st Augusyt - 2nd September 1988). Manchester: University of Manchester Publ., 1988. PP. 23.1-23.6. DOI:10.5244/C.2.23</mixed-citation></citation-alternatives></ref><ref id="cit12"><label>12</label><citation-alternatives><mixed-citation xml:lang="ru">Muja M., Lowe D.G. Fast Approximate Nearest Neighbors with Automatic Algorithm Configuration // Proceedings of the International Conference on Computer Vision Theory and Applications (VISAPP, Lisboa, Portugal, 5-8 February 2009). Setubal: INSTICC Press, 2009. Vol. 1. PP. 331-340. DOI:10.5220/0001787803310340</mixed-citation><mixed-citation xml:lang="en">Muja M., Lowe D.G. Fast Approximate Nearest Neighbors with Automatic Algorithm Configuration // Proceedings of the International Conference on Computer Vision Theory and Applications (VISAPP, Lisboa, Portugal, 5-8 February 2009). Setubal: INSTICC Press, 2009. Vol. 1. PP. 331-340. DOI:10.5220/0001787803310340</mixed-citation></citation-alternatives></ref><ref id="cit13"><label>13</label><citation-alternatives><mixed-citation xml:lang="ru">Fischler M.A., Bolles R.C. Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography // Communications of the ACM. 1981. Vol. 24. Iss. 6. PP. 381-395. DOI:10.1145/358669.358692</mixed-citation><mixed-citation xml:lang="en">Fischler M.A., Bolles R.C. Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography // Communications of the ACM. 1981. Vol. 24. Iss. 6. PP. 381-395. DOI:10.1145/358669.358692</mixed-citation></citation-alternatives></ref></ref-list><fn-group><fn fn-type="conflict"><p>The authors declare that there are no conflicts of interest present.</p></fn></fn-group></back></article>
