<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Methods of Crypto Protection of Color Image Pixels in Different Code Systems</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Nataliia</forename><surname>Vozna</surname></persName>
							<email>nvozna@ukr.net</email>
							<affiliation key="aff0">
								<orgName type="department">Department of Specialized Computer Systems</orgName>
								<orgName type="institution" key="instit1">Ternopil National Economic University</orgName>
								<orgName type="institution" key="instit2">UKRAINE</orgName>
								<address>
									<settlement>Ternopil</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Yaroslav</forename><surname>Nykolaichuk</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Department of Specialized Computer Systems</orgName>
								<orgName type="institution" key="instit1">Ternopil National Economic University</orgName>
								<orgName type="institution" key="instit2">UKRAINE</orgName>
								<address>
									<settlement>Ternopil</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Orest</forename><surname>Volynskyi</surname></persName>
							<email>orestsks@ukr.net</email>
							<affiliation key="aff2">
								<orgName type="department">Department of Cyber Security</orgName>
								<orgName type="institution" key="instit1">Ternopil National Economic University</orgName>
								<orgName type="institution" key="instit2">UKRAINE</orgName>
								<address>
									<settlement>Ternopil</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Petro</forename><surname>Humennyi</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Department of Specialized Computer Systems</orgName>
								<orgName type="institution" key="instit1">Ternopil National Economic University</orgName>
								<orgName type="institution" key="instit2">UKRAINE</orgName>
								<address>
									<settlement>Ternopil</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Andrij</forename><surname>Sydor</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Department of Specialized Computer Systems</orgName>
								<orgName type="institution" key="instit1">Ternopil National Economic University</orgName>
								<orgName type="institution" key="instit2">UKRAINE</orgName>
								<address>
									<settlement>Ternopil</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff1">
								<orgName type="department">Chekhova</orgName>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff3">
								<orgName type="department">Chekhova</orgName>
							</affiliation>
						</author>
						<title level="a" type="main">Methods of Crypto Protection of Color Image Pixels in Different Code Systems</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">0B7A12700967DC0E195AEE2346F04643</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T02:21+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>crypto protection</term>
					<term>color image pixels</term>
					<term>Rademacher and Krestenson Systems</term>
					<term>Residue Number System</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The relevance of the development of theoretical foundations, methods and algorithms for encoding color image pixels by the problem-oriented multifunctional data structuring and the representation of color image code pixels in Rademacher (R), Krestenson (K), Rademacher-Krestenson (RK), Haar-Krestenson (HK) and Galois (G) Systems is substantiated in this article. The purpose of the research is to increase the efficiency of the algorithms for digital image transforms, processing and recognition using modular arithmetic of extended Galois fields on the basis of mathematics of arithmetic operations of a non-positional residue number system.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>I. INTRODUCTION</head><p>Successful development of modern computer technology, microelectronics and telecommunication systems promotes designing and mass production of color TV displays as well as personal computers, mobile devices, camcorders, tablet PC screens, industrial and large format color displays.</p><p>The large-scale application of various types of video equipment in all branches of industry and their wide-spread personal use determines a high level of importance of the solutions to theoretical and applied problems of increasing and optimizing the efficiency of video image structuring during the processes of creation, encoding, transformation, crypto protection, transmission, archiving and access receiving to color images as well as their use.</p><p>The examples of setting and successful solving the problems referring to this issue on the basis of the mathematical foundations development, the implementation of the algorithms and hardware and software tools for image processing and recognition were thoroughly highlighted in the works of scientific researches <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref><ref type="bibr" target="#b3">[4]</ref><ref type="bibr" target="#b4">[5]</ref>.</p><p>Considerable attention is paid to solving research problems in this field and creating algorithms of the image structural properties and features.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>II. METHODS OF MULTIFUNCTIONAL STRUCTURING OF COLOR IMAGE PIXELS IN THE SYSTEM OF EXTENDED GALOIS FIELDS</head><p>The analysis of the mathematical foundations of the existing algorithms for color image processing and recognition was carried out by segmentation methods on the basis of histogram thresholding and cumulative histograms. It is analysis of the statistic estimates of the mean value, dispersion, asymmetry and the degree of contrast of the intensity histograms homogeneity taking into account the dispersion of pixels coordinates of image fragments and silhouettes, as well as image clustering methods <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref><ref type="bibr" target="#b3">[4]</ref><ref type="bibr" target="#b4">[5]</ref>.</p><p>As a result, it was found that the main components of the algorithms of the above-mentioned methods for image processing are the following arithmetic operations:</p><formula xml:id="formula_0">summarizing ( ∑ i x ), division ( 0 / ) ( n n i P i =</formula><p>), absolute difference (</p><formula xml:id="formula_1">j i x x − ), square ( 2 i x ), multiplication ( j i x x × ), square difference ( [ ] 2 j i x x − ), sum of multiplication ( ∑ j i x x</formula><p>), which are commonly performed due to the lowspeed arithmetic of the binary number system.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>III. THE METHOD FOR ENCODING RGB PIXELS IN THE RADEMACHER AND KRESTENSON SYSTEMS</head><p>According to the international RGB color model, colors are presented as a combination of three main colors: red (R), green (G) and blue (B) <ref type="bibr" target="#b3">[4]</ref>.</p><p>In this case in the computer RGB system, the main color has 256 gradations. Thus, the color code of the RGB system is made up of three bytes, that is, 24 bits in the Rademacher system.</p><p>The colors of the Hamming distance pixels on a monitor, given in Cartesian coordinates, can be coded in the Residue Number System (K). This is implemented by introducing three relatively simple modules ( ), which allow encoding each pixel of the RGB system in the binary system by forward integer transform of the residue number system (RNS) according to the expression <ref type="bibr" target="#b5">[6]</ref>:</p><formula xml:id="formula_2">∑ = ⋅ = 3 1 0 ) (mod i i i k P B b res N (<label>1</label></formula><formula xml:id="formula_3">)</formula><p>where i B -the orthogonal bases of RNS, which are calculated according to diophantine equations: ) (mod 1 </p><formula xml:id="formula_4">P E K = , ] [ ˆ• E -integer function with</formula><p>rounding to a larger integer. RGB pixels encoding in the Rademacher-Krestenson system is provided by selecting the following values of the encoding range of i b remainders in the Rademacher system:</p><formula xml:id="formula_5">R b b = 1 ; 255 0 ≤ ≤ R b ; ( 11111111 00000000 ÷ ); G b b = 2 ; 255 0 ≤ ≤ G b ; ( 11111111 00000000 ÷ ); B b b = 3 ; 255 0 ≤ ≤ B b ; ( 11111111 00000000 ÷</formula><p>). In addition, taking into account the coefficients 0 .  . That is, the condition for creating a 24-bit pixel code in the Rademacher-Krestenson System is satisfied.</p><p>In binary system module codes are represented as: </p><formula xml:id="formula_6">255 1 = m , 16711425 1 = B ; 128 2 = m , 8421376 2 = B ; 129 3 = m , 8421120 3 = B</formula><p>The verification of the calculation accuracy of the RNS transform is performed according to the equation: 1 ) (mod </p><formula xml:id="formula_7">) ( 0 3 2 1 = ⋅ ⋅ + ⋅ + ⋅ = P B b B b B b N B G R k when 1 = R b , 1 = G b , 1 = B b . That is, 1 ) (mod ) 8421120 1 8421376 1 16711425 1 ( 0 = ⋅ ⋅ + ⋅ + ⋅ = P N k . For example, 10 = R , 200 = G , 100 = B .</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>IV. THE METHOD FOR COLOR IMAGE PIXELS ENCODING IN THE RADEMACHER-KRESTENSON AND THE HAAR-KRESTENSON SYSTEMS</head><p>The encoding of color image pixels according to the RGB color model is carried out by the 24-bit binary code, when the intensity of each of the colors is represented by the 8-bit binary code of the Rademacher System:  </p><formula xml:id="formula_8">         − 0 1 8 ... ... r r r R i ;          − 0 1 8 ... ... g g g G i ;          − 0 1 8 ... ... b b b B i 255 0 ≤ ≤ i r ; 255 0 ≤ ≤ i g 255 0 ≤ ≤ i b .</formula><formula xml:id="formula_9">     ∨ ∨ 0 1 2 a a a B G R ;      0 1 2 c c c      0 1 2 d d</formula><formula xml:id="formula_10">i i = .</formula><p>For a given set of modules, the inverse elements i m and the basic numbers i B are determined according to the Diophantine equations solutions (2-4): 2.</p><formula xml:id="formula_11">1 1 = m , 56 1 = B , 3 2 = m , 120 2 = B , 3 3 = m , 105 3 = B .</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Accuracy of the obtained</head><formula xml:id="formula_12">9 3 3 3 )] 1 (log [ 3 1 2 = + + = − = ∑ − − i i C R P E K bits in</formula><p>the Rademacher-Krestenson system (R-K).</p><p>3.</p><formula xml:id="formula_13">∑ = − = + + = = n i i C H P K 1 20 8 7 5</formula><p>bits in the Haar-Krestenson System (H-K).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>V. STRUCTURE DEVELOPMENT AND EXPERIMENTAL STUDIES OF STRUCTURAL, TIME AND HARDWARE COMPLEXITY OF ADC WITH THE R AND H-K OUTPUT CODES.</head><p>It is expedient to make multifunctional encoding of RGB pixels in the R-K and H-K systems at the level of analog-todigital conversion of the analog signals intensity of the RGB sensors. Such a principle of multifunctional data structuring in color formation is implemented by parallel ADC, the structure of which is shown in Fig <ref type="figure" target="#fig_4">1</ref>. ADC consists of 1 -input analogue bus; 2 -paraphase comparators; 3 -input reference bus; 4-exemplary resistors; 5 -the first logic elements "AND-NOT"; 6 -the second logic elements "AND-NOT", 7 -output ADC bus.</p><p>ADC efficiency is determined according to the expression: When calculating the time complexity of the ADC components, it is taken into account that the switching time of the paraphase comparator is 2.5 times less in comparison with the single-phase comparator due to positive trigger feedback between the direct and inverse outputs.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>VI. THE METHOD OF CRYPTO PROTECTION OF</head><p>COLOR IMAGE RGB PIXELS.</p><p>Crypto protection of the RGB image pixels is performed in order to restrict unauthorized access to color images that are generated in real time. It's encoded in different number systems, transmitted via communication channels, recorded in database storage, and displayed on the user monitors. There are different methods for encrypting files containing color image data and data arrays, which include a certain amount of color images. In this case, information systems use standard algorithms for data arrays protection from unauthorized access on the basis of hashing, symmetric and asymmetric RSA algorithms, elliptic curves, etc. <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b7">8]</ref>.</p><p>The method for encryption of color images RGB pixels, which are represented by R, R-K and H-K codes of the described methods, is proposed. In this case, structured R-K and H-K codes are problem-oriented to increasing the efficiency of the image transform, processing and recognition in accordance with the modular arithmetic of the Residue Number System.</p><p>It is expedient to apply an effective method based on hashing of certain code positions and logic combination of bits of generated Galois sequences <ref type="bibr" target="#b8">[9]</ref> according to the following graphs as the main method of crypto protection of RGB pixel codes:</p><p>, where i a -bits of R-K or H-K pixel codes; 1 -hashing procedure (</p><formula xml:id="formula_14">n i j i b b j i , 0 , , : ∈ ≠ = ), n i P i , 0 , ∈ -created</formula><p>code of crypto protected pixel PX . Bits of Galois { } i G codes are generated according to secret keys.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>VII. CONCLUSIONS</head><p>The relevance of the development of the theory, methods and algorithms for encoding color image pixels and their representation in different systems has been substantiated. This allows to increase the efficiency of algorithms for digital image transform, processing and recognition on the basis of the mathematics of arithmetic operations of the non-positional Residue Number System.</p><p>The analysis of the mathematical foundations of existing algorithms for color image processing and recognition was carried out by segmentation methods on the basis of histogram thresholding and cumulative histograms, statistic estimates of the mean value, dispersion, asymmetry and the degree of contrast of the intensity of histograms. This is exemple homogeneity taking into account the dispersion of pixels coordinates of image fragments and silhouettes, as well as image clustering methods.</p><p>It is proposed to carry out structured encoding of color image pixels by the codes of non-positional number systems of R-K, H-K and G. This allows to increase the efficiency of algorithms for image processing by 2-3 orders.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head></head><label></label><figDesc>to the inverse RNS transform, the remainder of k N (G -color features) will be presented without decoding it by eight low orders of k N , which is in the Rademacher system.According to the Diophantine equations solution (2-4), the following values of the inverse elements i m and basic numbers i B are received:</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head></head><label></label><figDesc>For example, the following values of color intensity of the RGB-pixel are set as: RGB pixel code for each i r , i g and i b intensity value in the Haar-Krestenson System is made according to the structure: different systems leads, correspondingly, to different code length according to the expressions:</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Fig. 1 .</head><label>1</label><figDesc>Fig.1. The structure of a multi-purpose parallel ADC with output codes in the Haar-Krestenson System.</figDesc><graphic coords="3,155.65,352.20,284.15,292.55" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head></head><label></label><figDesc>LE-switching time for two-input logic element "AND-NOT"; for multi-input logic element (LE) "AND-NOT";That is, the efficiency of ADC is determined by the total delay of signals:</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head></head><label></label><figDesc>Encoding of the color image RGB pixels in the Rademacher-Krestenson (RK) and Haar-Krestenson (HK) Systems is carried out by selecting relatively simple modules system (</figDesc><table><row><cell></cell><cell>1 P</cell><cell>,</cell><cell cols="2">2 P</cell><cell>,</cell><cell>3 P</cell><cell cols="7">), whose product exceeds the range of</cell></row><row><cell cols="14">quantization of the brightness values (</cell><cell>i r</cell><cell>,</cell><cell>g</cell><cell>i</cell><cell>,</cell><cell>i b</cell><cell>).</cell></row><row><cell cols="14">Such a condition can be satisfied by a different set of the</cell></row><row><cell>RNS</cell><cell cols="6">discrete</cell><cell></cell><cell></cell><cell></cell><cell cols="4">transformer</cell><cell>modules,</cell><cell>for</cell></row><row><cell>example,</cell><cell>1 P</cell><cell cols="2">=</cell><cell cols="2">, 5</cell><cell>2 P</cell><cell>=</cell><cell>, 7</cell><cell cols="2">3 P</cell><cell>=</cell><cell>8</cell><cell>, which provide encoding of i r ,</cell></row><row><cell cols="10">i g and i b brightness in</cell><cell cols="2">0 P</cell><cell>=</cell><cell>5</cell><cell>*</cell><cell>7</cell><cell>*</cell><cell>8</cell><cell>=</cell><cell>280</cell><cell>&gt;</cell><cell>255</cell><cell>range. The</cell></row><row><cell cols="14">following code structure is created in the R-K System, which</cell></row><row><cell cols="14">unambiguously represents the corresponding RGB-pixel</cell></row><row><cell>code:</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row></table></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" xml:id="foot_0">ACIT 2018, June 1-3, 2018, Ceske Budejovice, Czech Republic</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">A threshold selection method from grey level histograms</title>
		<author>
			<persName><forename type="first">N</forename><surname>Otsu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Trans. Systems Man Cybernet</title>
		<imprint>
			<biblScope unit="issue">9</biblScope>
			<biblScope unit="page" from="62" to="66" />
			<date type="published" when="1979">1979</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Fast Document Image Binarization Based on an Improved Adaptive Otsu`s Method and Destination Word Accumulation</title>
		<author>
			<persName><forename type="first">Zhang</forename><surname>Yudong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Wu</forename><surname>Lenan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Jornal of Computational Information Systems</title>
		<imprint>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="1886" to="1892" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">An Iterative Procedure for the Polygonal Approximation of Plane Curves</title>
		<author>
			<persName><forename type="first">U</forename><surname>Ramer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computer Graphics Image Processing</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="244" to="256" />
			<date type="published" when="1972">1972</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title level="m" type="main">Algorithms and methods for image processing: Teaching manual</title>
		<author>
			<persName><forename type="first">R</forename><surname>Melnyk</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2017">2017</date>
			<publisher>Lviv Politechnika Publishing House</publisher>
			<biblScope unit="volume">220</biblScope>
			<pubPlace>Lviv</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<author>
			<persName><forename type="first">N</forename><surname>Lotoshynska</surname></persName>
		</author>
		<title level="m">Theory of color and color formation: Teaching manual</title>
				<meeting><address><addrLine>Lviv</addrLine></address></meeting>
		<imprint>
			<publisher>Lviv Politechnika Publishing House</publisher>
			<date type="published" when="2014">204p. 2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Method of formation of structured data of quasistationary objects on the basis of the Residue Number System of the Krestenson basis</title>
		<author>
			<persName><forename type="first">N</forename><surname>Vozna</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Nykolaichuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Shyrmovska</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Scientific and Technical Journal &quot;Exploration and Development of Oil and Gas Fields</title>
		<imprint>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="62" to="65" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Theoretical Foundations for the Analytical Computation of Coefficients of Basic Numbers of Krestenson&apos;s Transformation</title>
		<author>
			<persName><surname>Ya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Nykolaychuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Kasianchuk</surname></persName>
		</author>
		<author>
			<persName><surname>Yakymenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cybernetics and Systems Analysis</title>
		<imprint>
			<biblScope unit="volume">50</biblScope>
			<biblScope unit="issue">5</biblScope>
			<biblScope unit="page" from="649" to="654" />
			<date type="published" when="2014-09">September, 2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Theoretical Foundations of the Modified Perfect form of Residue Number System</title>
		<author>
			<persName><surname>Ya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Nykolaychuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Kasianchuk</surname></persName>
		</author>
		<author>
			<persName><surname>Yakymenko</surname></persName>
		</author>
		<idno type="DOI">10.1007/s10559-016-9817-2</idno>
	</analytic>
	<monogr>
		<title level="j">Cybernetics and Systems Analysis</title>
		<imprint>
			<biblScope unit="volume">52</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="219" to="223" />
			<date type="published" when="2016-03">March, 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<author>
			<persName><forename type="first">Y</forename><surname>Nykolaichuk</surname></persName>
		</author>
		<title level="m">Galois Field Codes: Theory and Application</title>
				<meeting><address><addrLine>Ternopil</addrLine></address></meeting>
		<imprint>
			<publisher>Terno-graf</publisher>
			<date type="published" when="2012">2012</date>
			<biblScope unit="volume">576</biblScope>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
