{"id":1117,"date":"2021-01-15T21:46:32","date_gmt":"2021-01-15T19:46:32","guid":{"rendered":"http:\/\/journals.khnu.km.ua\/vestnik\/?p=1117"},"modified":"2021-03-23T12:03:14","modified_gmt":"2021-03-23T10:03:14","slug":"%d1%96%d1%82%d0%b5%d1%80%d0%b0%d1%86%d1%96%d0%b9%d0%bd%d0%be-%d0%b3%d0%b5%d0%be%d0%bc%d0%b5%d1%82%d1%80%d0%b8%d1%87%d0%bd%d0%b8%d0%b9-%d0%bc%d0%b5%d1%82%d0%be%d0%b4-%d0%b4%d0%bb%d1%8f-c%d1%82%d1%96","status":"publish","type":"post","link":"https:\/\/journals.khnu.km.ua\/vestnik\/?p=1117","title":{"rendered":"\u0406\u0442\u0435\u0440\u0430\u0446\u0456\u0439\u043d\u043e-\u0433\u0435\u043e\u043c\u0435\u0442\u0440\u0438\u0447\u043d\u0438\u0439 \u043c\u0435\u0442\u043e\u0434 \u0434\u043b\u044f c\u0442\u0456\u0439\u043a\u043e\u0433\u043e \u043f\u0435\u0440\u0446\u0435\u043f\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0445\u0435\u0448\u0443\u0432\u0430\u043d\u043d\u044f \u0437\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u043d\u044f"},"content":{"rendered":"<p style=\"text-align: center;\">\u0406\u0422\u0415\u0420\u0410\u0426\u0406\u0419\u041d\u041e-\u0413\u0415\u041e\u041c\u0415\u0422\u0420\u0418\u0427\u041d\u0418\u0419 \u041c\u0415\u0422\u041e\u0414 \u0414\u041b\u042f C\u0422\u0406\u0419\u041a\u041e\u0413\u041e \u041f\u0415\u0420\u0426\u0415\u041f\u0422\u0423\u0410\u041b\u042c\u041d\u041e\u0413\u041e \u0425\u0415\u0428\u0423\u0412\u0410\u041d\u041d\u042f \u0417\u041e\u0411\u0420\u0410\u0416\u0415\u041d\u041d\u042f<\/p>\n<p style=\"text-align: center;\">ITERATION-GEOMETRIC METHOD FOR PERMANENT PERCIPTUAL HASHING OF IMAGE<\/p>\n<p><a href=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/17-3.pdf\"><img src=\"http:\/\/journals.khnu.km.ua\/vestnik\/wp-content\/uploads\/2021\/01\/pdf.png\" \/><\/a> <strong>\u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 94-97. \u041d\u043e\u043c\u0435\u0440: \u21161, 2020 (281)<\/strong><br \/>\n<strong>\u0410\u0432\u0442\u043e\u0440\u0438:<\/strong><br \/>\n\u0412.\u041c. \u0414\u0416\u0423\u041b\u0406\u0419, \u042e.\u041f. \u041a\u041b\u042c\u041e\u0426, \u0406.\u0412. \u041c\u0423\u041b\u042f\u0420, \u0412.\u041c. \u0427\u0415\u0428\u0423\u041d<br \/>\n\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nV.M. DZHULII, Y.P. KLOTS,\u00a0I.V. MULIAR, V.M. CHESHUN<br \/>\nKhmelnytskyi National University<br \/>\n<strong>DOI:<\/strong> <a href=\"https:\/\/www.doi.org\/10.31891\/2307-5732-2020-281-1-94-97\">https:\/\/www.doi.org\/10.31891\/2307-5732-2020-281-1-94-97<\/a><br \/>\n<strong>\u0420\u0435\u0446\u0435\u043d\u0437\u0456\u044f\/Peer review :<\/strong> 03. 01.2020 \u0440.<br \/>\n<strong>\u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430\/Printed :<\/strong> 14.02.2020 \u0440.<\/p>\n<p style=\"text-align: center;\"><strong>\u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e \u043e\u0440\u0438\u0433\u0456\u043d\u0430\u043b\u0443<\/strong><\/p>\n<p>\u0412 \u0440\u043e\u0431\u043e\u0442\u0456 \u0437\u0430\u043f\u0440\u043e\u043f\u043e\u043d\u043e\u0432\u0430\u043d\u043e \u0443\u043d\u0456\u0444\u0456\u043a\u043e\u0432\u0430\u043d\u0443 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443 \u0434\u043b\u044f \u043f\u0435\u0440\u0446\u0435\u043f\u0442\u0438\u0432\u043d\u043e\u0433\u043e \u043c\u0435\u0434\u0456\u0430 \u0445\u0435\u0448\u0443\u0432\u0430\u043d\u043d\u044f. \u0422\u0430\u043a\u043e\u0436 \u0440\u043e\u0437\u0432\u0438\u0432\u0430\u0454\u0442\u044c\u0441\u044f \u0444\u043e\u0440\u043c\u0430\u043b\u044c\u043d\u0438\u0439 (\u043a\u0456\u043b\u044c\u043a\u0456\u0441\u043d\u0438\u0439) \u043e\u043f\u0438\u0441 \u043f\u043e\u0442\u0440\u0456\u0431\u043d\u0438\u0445 \u0432\u043b\u0430\u0441\u0442\u0438\u0432\u043e\u0441\u0442\u0435\u0439 \u043f\u0435\u0440\u0446\u0435\u043f\u0442\u0438\u0432\u043d\u043e\u0433\u043e \u0445\u0435\u0448\u0443\u0432\u0430\u043d\u043d\u044f \u0437\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u043d\u044f. \u0413\u043e\u043b\u043e\u0432\u043d\u0430 \u043c\u0435\u0442\u0430 \u2013 \u0440\u043e\u0437\u0433\u043b\u044f\u043d\u0443\u0442\u0438 \u0444\u0443\u043d\u0434\u0430\u043c\u0435\u043d\u0442\u0430\u043b\u044c\u043d\u0456 \u0456\u0434\u0435\u0457 \u0443 \u043f\u0435\u0440\u0446\u0435\u043f\u0442\u0438\u0432\u043d\u043e\u043c\u0443 \u0445\u0435\u0448\u0443\u0432\u0430\u043d\u043d\u0456 \u0437\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u043d\u044f. \u0414\u043b\u044f \u043f\u0456\u0434\u0432\u0438\u0449\u0435\u043d\u043d\u044f \u0435\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0456 \u043e\u0431\u0440\u043e\u0431\u043a\u0438 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457 \u0432 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0437\u043e\u0432\u0430\u043d\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 \u0443\u043f\u0440\u0430\u0432\u043b\u0456\u043d\u043d\u044f \u0442\u0430 \u043e\u0431\u0440\u043e\u0431\u043a\u0438 \u0437\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u044c \u0432\u0438\u043d\u0438\u043a\u0430\u0454 \u043d\u0435\u043e\u0431\u0445\u0456\u0434\u043d\u0456\u0441\u0442\u044c \u0440\u043e\u0437\u0440\u043e\u0431\u043a\u0438 \u043c\u0435\u0442\u043e\u0434\u0456\u0432 \u043d\u0430\u0434\u0456\u0439\u043d\u043e\u0433\u043e \u0445\u0435\u0448\u0443\u0432\u0430\u043d\u043d\u044f \u0442\u0430 \u0456\u0434\u0435\u043d\u0442\u0438\u0444\u0456\u043a\u0430\u0446\u0456\u0457 \u0433\u0440\u0430\u0444\u0456\u0447\u043d\u0438\u0445 \u0437\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u044c. \u0423 \u0441\u0442\u0430\u0442\u0442\u0456 \u0440\u043e\u0437\u0433\u043b\u044f\u043d\u0443\u0442\u0456 \u043f\u0456\u0434\u0445\u043e\u0434\u0438 \u0434\u043b\u044f \u043e\u0431\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u044f \u0441\u0442\u0430\u0442\u0438\u0441\u0442\u0438\u0447\u043d\u0438\u0445 \u0437\u043d\u0430\u0447\u0435\u043d\u044c \u0433\u0440\u0430\u0444\u0456\u0447\u043d\u0438\u0445 \u0437\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u044c, \u044f\u043a\u0456 \u0437\u0430\u0445\u043e\u043f\u043b\u044f\u0442\u044c \u0433\u043e\u043b\u043e\u0432\u043d\u0456 \u043e\u0441\u043e\u0431\u043b\u0438\u0432\u043e\u0441\u0442\u0456 \u0437\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u043d\u044f \u0456 \u0437\u0430\u043b\u0438\u0448\u0430\u044e\u0442\u044c\u0441\u044f \u043f\u043e \u0441\u0443\u0442\u0456 \u043d\u0435\u0437\u043c\u0456\u043d\u043d\u0438\u043c\u0438 \u0447\u0435\u0440\u0435\u0437 \u043f\u0440\u0438\u0439\u043d\u044f\u0442\u0456 \u043f\u0435\u0440\u0435\u0442\u0432\u043e\u0440\u0435\u043d\u043d\u044f. \u0417\u0430\u043f\u0440\u043e\u043f\u043e\u043d\u043e\u0432\u0430\u043d\u0456 \u043c\u0435\u0442\u043e\u0434\u0438 \u0454 \u0433\u043d\u0443\u0447\u043a\u0438\u043c\u0438 \u0456 \u043c\u043e\u0436\u0443\u0442\u044c \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u043e\u0432\u0443\u0432\u0430\u0442\u0438\u0441\u044f \u0434\u043b\u044f \u0440\u043e\u0437\u0432\u2019\u044f\u0437\u0443\u0432\u0430\u043d\u043d\u044f \u0456\u043d\u0448\u0438\u0445 \u0437\u0430\u0434\u0430\u0447.<br \/>\n<strong>\u041a\u043b\u044e\u0447\u043e\u0432\u0456 \u0441\u043b\u043e\u0432\u0430:<\/strong> \u0445\u0435\u0448\u0443\u0432\u0430\u043d\u043d\u044f \u0437\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u043d\u044f, \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0438, \u0456\u0434\u0435\u043d\u0442\u0438\u0444\u0456\u043a\u0430\u0446\u0456\u044f, \u043c\u0435\u0442\u043e\u0434, \u0445\u0435\u0448 \u0444\u0443\u043d\u043a\u0446\u0456\u044f, \u0456\u0434\u0435\u043d\u0442\u0438\u0444\u0456\u043a\u0430\u0442\u043e\u0440, \u0435\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u0438\u0439 \u043f\u0456\u0434\u043f\u0438\u0441.<\/p>\n<p style=\"text-align: center;\"><strong>\u0420\u043e\u0437\u0448\u0438\u0440\u0435\u043d\u0430 \u0430\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u0430\u043d\u0433\u043b\u0456\u0439\u0441\u044c\u043a\u043e\u044e \u043c\u043e\u0432\u043e\u044e<\/strong><\/p>\n<p>The purpose of the work is to create a unified structure for perceptual media hashing. The main goal is to consider fundamental ideas in perceptual hashing of an image. To increase the efficiency of information processing in automated control systems and image processing, there is a need to develop methods for reliable hashing and identification of graphic images. Improving the efficiency will significantly expand the scope of application software in control systems and information processing. This approach will be useful for identifying images in databases, in which it is possible to make various changes to the image, such as compression and format changes, general signal processing algorithms, scanning, or creating watermarks. Developed basic clustering, allows clusters not to bear any losses. Based on the study, two main goals of perceptual image hashing have been identified: resistance to unintentional or perceptually minor image modifications &#8211; perceptual hash persistence; the ability to withstand deliberate attacks (caused by a malicious opponent) is a hash of security. The hash of the security properties is closely related to the randomization scheme that is used when creating the hash algorithm. Another extremely important question that needs to be answered is what hash length is required to successfully obtain the desired level of stability. The theoretical analysis of randomized media hashing algorithms and the quantitative relation of randomized parameters with hash security has not yet been addressed in the literature. In the article the approaches for calculation of statistical values of graphic representations which will grasp the main features of the image are considered and remain as a matter of fact not changed through comprehensible transformations. The offered methods are flexible and can be used for the decision of other problems.<br \/>\n<strong>Keywords:<\/strong> image hashing, algorithms, identification, method, hash function, ID, electronic signature.<\/p>\n<p style=\"text-align: center;\"><strong>References<\/strong><\/p>\n<ol>\n<li>Babash A.V. Kriptograficheskie metody zashity informacii : uchebnik dlya stud. vuzov \/ A. V. Babash, E. K. Baranova. \u2013 M. : KNORUS, 2016. \u2013 190 s.<\/li>\n<li>Baturin Yu.M. Kompyuternaya prestupnost i kompyuternaya bezopasnost \/ Yu.M. Baturin, A.M. Zhodzinskij. \u2013 M. : Yuridicheskaya literatura, 2006. \u2013 160 s.<\/li>\n<li>Borisov M.A. Osnovy programmno-apparatnoj zashity informacii : ucheb. posobie dlya vuzov \/ M. A. Borisov, I. V. Zavodcev, I.V. \u2013 4-e izd., pererab. i dop. \u2013 M. : LENAND, 2016. \u2013 416 s.<\/li>\n<li>Nesterov S.A. Osnovy informacionnoj bezopasnosti : uchebnik \/ S. A. Nesterov. \u2013 SPb : Lan, 2017. \u2013 423 s.<\/li>\n<li>Shangin V. F. Informacionnaya bezopasnost i zashita informacii \/ V.F. Shangin. \u2013 M. : DMK Press, 2017. \u2013 702 s.<\/li>\n<li>Netravali A. N. Tsyfrovi zobrazhennia: Predstavlennia i kompressiia \/ A. N. Netravali, B.H. Khaskel\u00a0 \u2013 Niu-York, 2002. \u2013 430 s.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>\u0406\u0422\u0415\u0420\u0410\u0426\u0406\u0419\u041d\u041e-\u0413\u0415\u041e\u041c\u0415\u0422\u0420\u0418\u0427\u041d\u0418\u0419 \u041c\u0415\u0422\u041e\u0414 \u0414\u041b\u042f C\u0422\u0406\u0419\u041a\u041e\u0413\u041e \u041f\u0415\u0420\u0426\u0415\u041f\u0422\u0423\u0410\u041b\u042c\u041d\u041e\u0413\u041e \u0425\u0415\u0428\u0423\u0412\u0410\u041d\u041d\u042f \u0417\u041e\u0411\u0420\u0410\u0416\u0415\u041d\u041d\u042f ITERATION-GEOMETRIC METHOD FOR PERMANENT PERCIPTUAL HASHING OF IMAGE \u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 94-97. \u041d\u043e\u043c\u0435\u0440: \u21161, 2020 (281) \u0410\u0432\u0442\u043e\u0440\u0438: \u0412.\u041c. \u0414\u0416\u0423\u041b\u0406\u0419, \u042e.\u041f. \u041a\u041b\u042c\u041e\u0426, \u0406.\u0412. \u041c\u0423\u041b\u042f\u0420, \u0412.\u041c. \u0427\u0415\u0428\u0423\u041d \u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442 V.M. DZHULII, Y.P. KLOTS,\u00a0I.V. MULIAR, V.M. CHESHUN Khmelnytskyi National University DOI: https:\/\/www.doi.org\/10.31891\/2307-5732-2020-281-1-94-97 \u0420\u0435\u0446\u0435\u043d\u0437\u0456\u044f\/Peer review : 03. 01.2020 \u0440. \u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430\/Printed : 14.02.2020 \u0440. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[13],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/1117"}],"collection":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1117"}],"version-history":[{"count":3,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/1117\/revisions"}],"predecessor-version":[{"id":5095,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/1117\/revisions\/5095"}],"wp:attachment":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1117"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1117"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}