User authentication model using zero watermarking based on RGB images

The subject of the research is the methods and schemes of user authentication in information and communication networks. The aim of the work is to develop a user authentication model in information and communication systems using the zero-watermarking method based on RGB images. Objectives: to exami...

Full description

Saved in:
Bibliographic Details
Published inSučasnij stan naukovih doslìdženʹ ta tehnologìj v promislovostì (Online) no. 3(33); pp. 102 - 110
Main Authors Poddubnyi, Vadym, Sievierinov, Oleksandr
Format Journal Article
LanguageEnglish
Published 25.09.2025
Online AccessGet full text
ISSN2522-9818
2524-2296
2524-2296
DOI10.30837/2522-9818.2025.3.102

Cover

More Information
Summary:The subject of the research is the methods and schemes of user authentication in information and communication networks. The aim of the work is to develop a user authentication model in information and communication systems using the zero-watermarking method based on RGB images. Objectives: to examine the main issues arising during the integration of access control systems; to develop a user authentication model using zero-watermarking; to study potential characteristics and put forward proposals/recommendations for its application in authentication; to construct graphical schemes that illustrate processes and procedures. Methods used: modeling methods and formal description methods. Results achieved: an improved user authentication model based on the zero-watermarking algorithm has been proposed as an alternative to existing authentication schemes in information and communication systems; its potential characteristics have been studied, confirming the prospects of the development; graphical representations of processes and procedures have been constructed. Conclusions: in the course of the work, the main problems faced by owners of information and communication systems during the integration of authentication systems were briefly reviewed; an improved authentication model using zero-watermarking was proposed. The zero-watermarking method is based on RGB images employing K-means clustering and DWT, while a password is used as the second factor. Three operating modes are presented: registration, authentication, and modification of key authentication data. This model serves as an alternative to existing schemes and can potentially reduce the cost of authentication, lower Type I and Type II error rates compared to similar authentication schemes, and improve the convenience of authentication in information and communication systems. It also expands the range of authentication schemes available to system owners during integration.
ISSN:2522-9818
2524-2296
2524-2296
DOI:10.30837/2522-9818.2025.3.102