<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Development Latent Images based on Moiré Effect Oksana Troian 1 [0000-0002-6528-9867] , Mykola Pasyeka 2 [0000-0002-3058-6650]</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Sergii</forename><surname>Babichev</surname></persName>
							<email>sergii.babichev@ujep.cz</email>
							<affiliation key="aff0">
								<orgName type="department">Department of Automated Control Systems</orgName>
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>12 Bandery str</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="department">Department of Automated Systems Software</orgName>
								<orgName type="institution">Ivano-Frankivsk National Technical University of Oil and Gas</orgName>
								<address>
									<addrLine>15 Karpatsʹka str., Ivano-Frankivsk</addrLine>
									<postCode>76000</postCode>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff2">
								<orgName type="institution">Jan Evangelista Purkyne University in Usti nad Labem</orgName>
								<address>
									<settlement>Usti nad Labem</settlement>
									<country key="CZ">Czech Republic</country>
								</address>
							</affiliation>
							<affiliation key="aff3">
								<orgName type="institution">Ukrainian Academy of Printing</orgName>
								<address>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Development Latent Images based on Moiré Effect Oksana Troian 1 [0000-0002-6528-9867] , Mykola Pasyeka 2 [0000-0002-3058-6650]</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">843E45FB1A35E75EB7884FFB72EA97C7</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T03:20+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The paper presents the results of the research concerning development of the latent images identification method, where the filtration process was performed with the use of Moiré effect. The analysis of problems of the current document security state has shown the necessity of development of new current techniques and tools for both the graphic elements visualization and processing and the the creation of effective specialized means of protection on their basis. The identification has been made to prevent violation of integrity and prevent document falsification. The methods and means of forming the latent images for controlling and detecting any distortions in documents have been developed. The construction of fine graphics based on the local distortions of the protective grid lines, changes in the thickness of the lines, contour filling and line separation has been carried out. In order to increase the level of the printed documents security, we have proposed the use of grids created in a vector format. The models of image-based traps on the basis of Moiré effect have been developed. The models become visible when copying by sticking and displacing lines in images which ensures the creation of a high-quality secure document with consideration of conditions at the stage of forming a document for printing. The information technology which includes as the components the methods for the formation of fine graphics on the Moiré effect has been developed. Implementation of this technology allows us to increase the exact of the document originality identification. The technology provides an increase in the identification of document originality. The identification process is performed based on the method of pixel comparisons of an original document and its copies. The obtained methods give the opportunity to predict and identify falsification. The information characteristics of the printed document include optical density, raster point %, uniformity of ink application, compression, trapping, which were measured by special equipment on the originals and copies, and the criterion signs of threshold characteristics were deduced from them. The errors for originals and forged documents have been established based on the measured values. The developed methods provided practical recommendations re-</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>garding the provision of the appropriate level of printed documents identification and, have improved the reliability of the document which based on the analytical dependence of the original and a copy of the spectrophotometer removed by the indicators Keywords: image processing, information technology, thin graphics, latent elements, Moiré, document protection, falsification.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Analysis printed document which based on latent image</head><p>Nowadays, information technologies are used actively in various fields of human life, however their development in the field of document protection is important yet. An important component of this direction is the protective hidden graphic elements that are essential in identifying the originality of documents. Therefore, further development and improvement of the protective properties of these elements requires constant development and improvement. The primary is, of course, visual control, but one cannot cope with the analysis of the complex structure of the latent elements and provide the necessary productivity of processing the differences on the original and the falsified document, so identification is advisable to make using an automated information system <ref type="bibr" target="#b0">[1]</ref>. Existing computerized image analysis systems are largely universal in nature and can perform such functions as image database formation, contrast enhancement, identification of input mismatches, but are not suitable for highly specialized tasks. This leads to the fact that the images hidden in the printed documents, which are characterized by complex structure, rely on the expert. The lack of automation in visual data processing results in low performance, ambiguity, and errors in analysis. Therefore, the urgent task is increasing the security of printed documents by developing information technology for the formation of latent elements and establishing their accuracy <ref type="bibr" target="#b1">[2]</ref>. The hidden image can also appear after scanning or copying the latent image due to the anisotropy of scanning and printing devices. The latent image development efficiency depends on the vector format lines that form the image layers with preset gradient properties <ref type="bibr" target="#b2">[3]</ref>. Therefore, the first group of tasks is focused to the development of a method of protecting printed documents based on the selection of objects in images with complex geometric structure. The formation and detection of images containing hidden information is produced by digital devices. Unlike known analogues, the method of forming latent images on the basis of lines of vector format allows us to form images with layers and to set gradient properties for image protection. Thus, this method allows automatizing the process of forming geometric elements, which provides improved accuracy of metric measurements.</p><p>Latent images have the property of changing the visibility of the elements when changing the conditions of observation, which provides identification of the document due to the protective properties of the image <ref type="bibr" target="#b3">[4]</ref>. This requires the development of technology in order to create and detect the hidden part, which creates requirements for printing accuracy and complexity of reproduction. Development of information technologies that identify document forgery is included in the list of priorities in the field of information and communication technologies.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.1">Algorithms of latent images formation</head><p>Existing methods of forming latent images are divided into two groups: spatial and frequency ones. The essence of spatial methods is consisted in transforming the brightness of the original image or one of its color components. Frequency methods involve changing the original image in such a way that when the frequency decomposition of the resulting latent image, the hidden image appears in the localized frequency domain, as a rule, low-frequency <ref type="bibr" target="#b4">[5]</ref>.</p><p>The latent image creation method assumes forming two superimposed hidden images. Determine the relief elements for each hidden image transmitted by the corresponding linear structures forming the main and auxiliary layers. The elements are built only in places where the linear relief structures of the first and second layers are superimposed. The layer and the hidden image will be reproduced when copied as a permanent gray area. In <ref type="bibr" target="#b5">[6]</ref> the authors developed the information technology for the development of graphical security documents. This technology includes the following: the method of formal description of graphical security, which has allowed determining the basic parameters characterized the security of documents; the mathematical model for both evaluation and investigation of graphical security; quickly change their security level and provide simple and efficient identification of documents. The moiré method is to create thin parallel lines, with a width of 0.25mm and repetition rates that are multiple of the integer frequency of the reproducing device and differ from the copy / scan frequency by a magnitude less than 0.25mm, which is not visually recognizable without the use of special optical devices. The hidden element document contains at least one latent image, which consists of a large number of visible and individually printed elements, which in turn constitute a security object formed from curved lines and fragments.</p><p>When copying a document, the moiré is formed, and it becomes easy to distinguish between the original and the counterfeit by changing the latent image or partial distortion or the loss of certain elements on the copy.</p><p>The basic idea of the method is that for the hidden elements, the displacement of part of the moire lines is half the magnitude of the line step.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Method of forming a latent image with implementation image</head><p>Latent images built using this method are unstable to the destructive processes associated with transmission. However, the advantage of this method is the ability to imple-ment a full-color hidden image <ref type="bibr" target="#b6">[7]</ref>. Implementation of this technique assumes the following steps:</p><p>1. The hidden image S (x, y) is decomposed using several raster structures to obtain the matrix S r (x, y) in total with the matrix S (x, y):</p><formula xml:id="formula_0">S r (х,у)=k 1 S(х,у)+k 2 R i (х,у),</formula><p>where R i (x, y) is a set of raster structures; k 1 , k 2 are positive constants.</p><p>2. The S r (x, y) matrix is combined with an inverted copy of the hidden image S inv (x,y), resulting in the matrix S pre (x, y): </p><formula xml:id="formula_1">S pre (х,у)=k 1 S inv (х,у)+k 2 S r (х,у),</formula><formula xml:id="formula_2">L(х,у)=k 1 I(х,у)+k 2 S adj (х,у),</formula><p>The mathematical model of forming a latent image by this method is represented by the following system of equations:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Analysis of reasons of the printed defects appearing based on Moiré effect</head><p>Copying of printed grids with a low reproduction rate causes a Moiré defect. This phenomenon allows us to create moving images. Moiré is the result of the interference of two or more periodic structures which have different spatial frequencies <ref type="bibr" target="#b7">[8]</ref><ref type="bibr" target="#b8">[9]</ref><ref type="bibr" target="#b9">[10]</ref><ref type="bibr" target="#b10">[11]</ref><ref type="bibr" target="#b11">[12]</ref>. Hidden elements can be displayed with the Moiré effect when copied, thus making the falsification noticeable. Moiré effect occurs when multiple layers are used, namely, when the base layer depicts the surface of a periodic structure in the form of opaque and transparent parallel changing stripes <ref type="bibr" target="#b12">[13]</ref>.</p><p>Let's consider the problems of developing the Moiré-based graphical trap models which allow the elements to be original by changing the lattice periods, tilts, and line thicknesses. The moiré effect occurs when the reading of information is disturbed and the original image is distorted, in particular, resulting in uneven shades and colors. The appearance of such Moiré effects is difficult to predict because it depends on the specifications and regulation used to reproduce the equipment <ref type="bibr" target="#b13">[14,</ref><ref type="bibr" target="#b14">15]</ref>. Considering all the peculiarities of the moiré method <ref type="bibr" target="#b15">[16]</ref>, the classical method of masonry formation was chosen as the basis for dissertation work, since it is suitable for the vast majority of cases of image distortion and is relatively simple. Based on the developed methods, a system of image formation with hidden Moiré, which allows us to detect deformation in the latent image, is proposed. To reduce the number of falsifications and to increase the level of detection of document forgery, more than two grids should be used, provided that the frequency of the second grid is a multiple of the frequency of the first and the frequency of the next grid is the previous one. This achieves a higher level of protection and protects the document from copying, because moiré will show up.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Development of technique of latent image creation</head><p>The mathematical model of the latent image is built by combining different structures based on the creation of positive and negative masks. Assume that there is the main image, where 𝑥, 𝑦, 𝑧 is the color intensity of the current pixels in the RGB system <ref type="bibr" target="#b16">[17]</ref>. Then, there is the hidden image with the inverted mask. Let 𝐿 be the number of layers. The process of forming a latent image consists of creating a hidden image with an inverted copy of the main image:</p><formula xml:id="formula_3">G inv (x,y,z)=(2 L -1)-G(x,y,z).</formula><p>The main image G(x,y,z) is formed with the removal of odd diagonal lines, forming the first low-frequency aperiodic structure :</p><p>where is the raster function of the low-frequency aperiodic structure, 𝑘 is the color component in the RGB system: 𝑘 = 1 is red; 𝑘 = 2 -green; 𝑘 = 3 -blue; 𝑖, 𝑗 are the coordinates of the current pixel; 𝑁, 𝑀 is the limit value of pixels responsible for image width and height.</p><p>The inverted copy of the image is formed by the removal of paired diagonal lines, forming the second low-frequency aperiodic structure :</p><p>The next step consists of creating a mask by combining aperiodic structures and :</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>+</head><p>The latent image is formed by embedding the main image and the inverted copy -an additional layer and mask :</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>L(x,y,z)=G(x,y,z)+G inv (x,y,z)+H(x,y,z).</head><p>The initial image is decomposed, then the raster point is shifted in a certain direction in a step smaller than the period of the raster structure. The latent image creation method is formed by forming two superimposed hidden images. Determine the relief elements for each hidden image transmitted by the corresponding linear structures to form the main and auxiliary layers. The elements are built only in the places where the linear relief structures of the first and second layers are superimposed. The layer and the hidden image will be reproduced when copying the gray area. The scheme of forming a latent image is shown in Figure <ref type="figure" target="#fig_1">1</ref>. The task combines of determining the graphical characteristics of the structural components of images formed by latent elements with the use of technologies for processing, analysis and recognition of thin lines when forming a latent image for printed documents. To solve this problem, the method of creating latent elements has been improved. Implementation of this method at the stage of forming secure documents creates the conditions for the choice of positive and negative lines, which provides visualization of hidden elements during copying and allows to detect distortions in documents. As a result, the methods which are based on image processing technologies and in accordance with regulatory documents have been developed. Based on the method of deformation of the grid lines based on smoothing and the method of deformation of the grid lines on the basis of small perturbations of element forming, the functional possibilities of creating graphic elements for positive execution of lines 40 -80 microns and for negative 60 -100 microns are characterized. decomposition of vector lines into raster dots during copying.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Development of a latent image based on Moiré effect</head><p>Moiré effect is appeared when the readout is disturbed and the original image is distorted, and in particular gets uneven shades of colors and layers. The appearance of a such moiré effects is difficult to predict because it depends on the specifications and the tuning of the equipment that reads the information. Considering all the peculiari-the basic element the main layer extra layer ties of the moiré method, the classical masonry method was chosen as the basis for the tasks, since it is suitable for the vast majority of cases of image distortion and is relatively simple. Based on the developed methods, a system of image formation with hidden moiré, which allows to detect deformation in the latent image, is proposed. The method of constructing graphical traps based on Moiré formation is used to create thin parallel lines, with a width of 0.25 mm and frequencies that are multiples of the integer repetition rate. Moiré effect is the result of the interference of the raster grids of the print and the scanning device when attempting to falsify. The presence of moiré elements distorts the appearance of the document and results in significant changes to the shape or complete loss of the image elements on the copy, making it easier to visually distinguish the fake copy from the original. The base layer contains lines that are evenly spaced with the period and are angled at the beginning of the reference system. The auxiliary layer will have a line repetition period and a slope . The overlay of the base and auxiliary layers creates a Moiré lattice, which is shown by the dotted line. Figure <ref type="figure" target="#fig_2">2</ref> shows that the nodes of the Moiré lattice will have a length l and be at an angle . The projections on the axis of the base and auxiliary layers , are the projections of the Moiré. We calculate the periods , , and by the formulas:</p><p>Hidden elements are formed based on the use of the moiré effect, which is formed by two structures of parallel lines. Even more complex to counterfeit, and therefore more reliable, are the elements formed by combining two parallel line structures with varying angles. The generated hidden elements during tampering become visible and, thus, can be identified fake. The developed method of forming graphical traps on the basis of moiré effect is effective and difficult to fake, in the process of creating a copy of the document moiré effect becomes visible and visually distorts the document. The results can be used to protect printed documents that need effective protection and further identification. The method of Moiré formation consists of both the security elements and the displacement of part of the Moiré lines is halved by half the step size of the line. Another option is to rotate the lines to an angle, as a result, the contour of the image is broken into straight lines. If you change the slope in straight lines, you can observe the Moiré effect in the form of gratings, which will change with the slope angles of 5 0 , 15 0 , 45 0 .</p><p>If the base and auxiliary layers are constructed with the same thickness of lines. The period is equidistant from each other: If we assume that = 0, then = 1. The auxiliary layer has a period of k-times smaller than the period of the base layer. Therefore, there are the periods of the base and auxiliary layers differ in k-times. The moiration period is calculated by the formula: The thickness of the base layer lines is k-times greater than the thickness of the auxiliary layer lines. Formation of Moiré lines which depend on the slope angle α of the base and auxiliary layers: It is proved that the larger the period of the base layer, the more noticeable is the Moiré. Therefore, by increasing the thickness of one of the lines, we increase the visibility of the Moiré. This enhances the security of documents using this method of forming and emitting moiré, forming a latent element in the documents, thereby increasing the level of security.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Conclusions</head><p>The necessity of creating models and methods of forming graphical elements for providing the level of security of the document with the help of graphical elements based on traps using Moiré effect is substantiated.</p><p>For implementation of processes of the hidden images formation we have developed the corresponding algorithms and methods of their formation. The system of forming the hidden images has been developed on the basis of the offered methods allowing us to represent processes from the moment of formation to the certainty of the protected document.</p><p>Considering all the peculiarities of the moiré method, the classical method of masonry formation was chosen as the basis for dissertation work, since it is suitable for the vast majority of cases of image distortion and is relatively simple. Based on the developed methods, we have proposed the system of image formation with hidden moiré, which allows us to detect deformation in the latent image. Printed animated graphic images based on the Moiré phenomenon and optical illusions have been developed too.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>3 .</head><label>3</label><figDesc>The matrix S pre (x, y) is transformed into the matrix S adj (x, y) through the use of the coefficient α:S adj (х,у) = α S pre (х,у)4. A latent image L (x, y) is formed by combining the main image I (x, y) and the image with a modified contrast S adj (x, y):</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Scheme of forming a latent image.</figDesc><graphic coords="6,138.55,255.35,244.95,138.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. Dependence of the period of change of the Moiré lattice on the angle the slope of the lattice base layer and the base layer period</figDesc><graphic coords="8,144.28,304.74,136.31,116.59" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Scheme of the period of change of the Moiré lattice from the angle of inclination of the lattice of the base layer and the period of the base layer</figDesc><graphic coords="9,124.70,153.40,345.70,132.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Fig. 4 .</head><label>4</label><figDesc>Fig. 4. Scheme of the period of change of the Moiré lattice from the angle of inclination of the lattice of the base layer and the period of the base layer when the period of the base layer was 8 times larger than the auxiliary</figDesc><graphic coords="9,136.00,383.40,338.60,140.50" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Fig. 5 .</head><label>5</label><figDesc>Fig. 5. Scheme of the period of change of the Moiré lattice from the angle of inclination of the lattice of the base layer and the period of the base layer</figDesc><graphic coords="10,136.00,147.40,345.80,134.05" type="bitmap" /></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title level="m" type="main">The Theory of the Moiré Phenomenon</title>
		<author>
			<persName><forename type="first">I</forename><surname>Amidror</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2000">2000</date>
			<publisher>Springer</publisher>
			<biblScope unit="page" from="107" to="114" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Glass patterns in the superposition of random line gratings</title>
		<author>
			<persName><forename type="first">I</forename><surname>Amidror</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Optics A: Pure and Applied Optics</title>
		<imprint>
			<biblScope unit="volume">205</biblScope>
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Statistical evaluating of image quality measures</title>
		<author>
			<persName><forename type="first">I</forename><surname>Avcibas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Sankur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Sayood</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Electronic Imaging</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="206" to="223" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<title level="m" type="main">Vision of Design</title>
		<author>
			<persName><forename type="first">I</forename><surname>Orosz</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2007">2007</date>
			<publisher>Hesign</publisher>
			<pubPlace>Berlin-Shanghai</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">The fast fourier transform and its application</title>
		<author>
			<persName><forename type="first">E</forename><surname>Brigham</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">HJ</title>
		<imprint>
			<biblScope unit="page">468</biblScope>
			<date type="published" when="1988">1988</date>
			<publisher>Prentice Hall</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Information technology of forming graphic means of document protection: monograph</title>
		<author>
			<persName><forename type="first">B</forename><surname>Durnyak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Pashkevich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Sabat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Timchenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Ukr. Acad. Printing p</title>
		<imprint>
			<biblScope unit="page">152</biblScope>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">The modified amplitude-modulated screening technology for the high printing quality</title>
		<author>
			<persName><forename type="first">I</forename><surname>Dronjuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Nazarkevych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Troyan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">International Symposium on Computer and Information Sciences</title>
				<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="270" to="276" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<author>
			<persName><forename type="first">J</forename><surname>Fridrich</surname></persName>
		</author>
		<title level="m">Steganography in digital media: principles, algorithms, and applications</title>
				<meeting><address><addrLine>Cambridge</addrLine></address></meeting>
		<imprint>
			<publisher>University Press</publisher>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page">437</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">A new steganographic method for palette-based image</title>
		<author>
			<persName><forename type="first">J</forename><surname>Fridrich</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of ISBT: PISP conference</title>
				<meeting>ISBT: PISP conference<address><addrLine>Savannah</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1989">1989</date>
			<biblScope unit="page" from="285" to="289" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Two models of the latent image formation</title>
		<author>
			<persName><forename type="first">M</forename><surname>Goryaev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Annual Conference</title>
				<meeting><address><addrLine>Savannah</addrLine></address></meeting>
		<imprint>
			<date type="published" when="1999">1999</date>
			<biblScope unit="page" from="11" to="13" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Research of numeral transformations of Ateb-functions in the mathematical design. IV Sympozjum modelowanie i symulacja komputerowa w technice</title>
		<author>
			<persName><forename type="first">M</forename><surname>Nazarkevich</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Wyzsza szkola informatyki</title>
				<meeting><address><addrLine>Lodz</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2005">2005</date>
			<biblScope unit="page" from="161" to="163" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Methods of protection document formed from latent element located by fractals</title>
		<author>
			<persName><forename type="first">M</forename><surname>Medykovskyy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Lipinski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Troyan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Nazarkevych</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">2015 Xth International Scientific and Technical Conference &quot;Computer Sciences and Information Technologies</title>
				<imprint>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="70" to="72" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Detection of regularities in the parameters of the ateb-gabor method for biometric image filtration</title>
		<author>
			<persName><forename type="first">M</forename><surname>Nazarkevych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Riznyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Samotyy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><surname>Dzelendzyak</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Eastern-Еuropean journal of enterprise technologies</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="57" to="65" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Complexity Evaluation of the Ateb-Gabor Filtration Algorithm in Biometric Security Systems</title>
		<author>
			<persName><forename type="first">M</forename><surname>Nazarkevych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Lotoshynska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Klyujnyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Voznyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Forostyna</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Maslanych</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE 2nd Ukraine Conference on Electrical and Computer Engineering (UKRCON)</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="961" to="964" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Investigation the Ateb-Gabor Filter in Biometric Security Systems</title>
		<author>
			<persName><forename type="first">M</forename><surname>Nazarkevych</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Klyujnyk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Nazarkevych</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IEEE Second International Conference on Data Stream Mining &amp; Processing (DSMP )</title>
				<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="580" to="583" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Gabor Filter Based Attack on Printed Documents Protection Methods via Digital Watermarks</title>
		<author>
			<persName><forename type="first">V</forename><surname>Sergeyev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Fedoseev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Mitekin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Intelligent Information Hiding and Multimedia Signal Processing: Eighth International Conference</title>
				<meeting><address><addrLine>Piraeus-Athens</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="265" to="268" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Image Superresolution via Divergence Matrix and Automatic Detection of Crossover</title>
		<author>
			<persName><forename type="first">D</forename><surname>Peleshko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Rak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Izonin</surname></persName>
		</author>
		<idno type="DOI">10.5815/ijisa.2016.12.01</idno>
	</analytic>
	<monogr>
		<title level="j">International Journal of Intelligent Systems and Applications (IJISA)</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="issue">12</biblScope>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
