<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>New Technique for Data Hiding in Cover Images Using Adaptively Generated Pseudorandom Sequences</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>V. N. Karazin Kharkiv National University</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kharkiv</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ukraine kuznetsov@karazin.ua</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>dianakovalhyk@ukr.net</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>kuznetsova.tatiana</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>@gmail.com</string-name>
          <email>dr.smirnovoa@gmail.com</email>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Central Ukrainian National Technical University</institution>
          ,
          <addr-line>Kropivnitskiy</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0003</lpage>
      <abstract>
        <p>The technology of direct spectrum spread is used in radio communication systems with multiple access. It is based on the use of pseudorandom (noise-like) discrete signals (sequences). In this paper steganography techniques based on spectrum spread are studied. Using noise-like signals, it is possible to hide information in cover images. We conduct experimental studies and show that the error rate in the restored informational messages is very high. This is due to the high correlation of discrete sequences and cover images. We offer a new technique when the statistical properties of cover images are taken into account when forming sequences. Our experiments show that the practical use of this approach can significantly reduce the error rate. The distortion of the image does not increase.</p>
      </abstract>
      <kwd-group>
        <kwd>pseudorandom sequence</kwd>
        <kwd>hidden information</kwd>
        <kwd>direct spectrum spread technology</kwd>
        <kwd>steganography</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>The use of direct spectrum spread technology makes it possible to significantly
improve the efficiency of multiple access radio communication systems [1-5]. In
particular, the use of weakly correlated pseudorandom sequences (discrete signals)
provides high noise immunity and mimic resistance of communication systems; to reduce
the cost of communication, etc.</p>
      <p>In [6-15], techniques for hiding data in digital images using direct spectrum
spreading technology were studied. In this case, the cover image is interpreted as
noise in the communication channel. As shown in [16-21], this allows one to hide
informational communications using long pseudorandom sequences. At the same
time, as shown in this paper, certain disadvantages are inherent in known techniques.
In particular, we present the results of experimental studies and show that the bit error
rate (BER) in the extracted messages is very high. This is due to the correlation of the
applied spreading spectrum pseudorandom sequences and the cover image (or its
fragment). In this paper, we propose a new technique for hiding data based on
specially formed pseudorandom sequences. When generating discrete signals, we take into
account the statistical properties of the cover image (we call this method of generation
adaptive). This can significantly reduce the BER in the extracted messages. We also
show that cover images are not distorted significantly, both of the considered
techniques are almost equivalent in this indicator.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Hiding data in images using direct spread spectrum technology</title>
      <p>As a prototype of an improved method of hiding data in cover images, the technique
proposed in the dissertation by L. Marvel was selected, described in detail and studied
in [11, 12, 14, 15]. Let's consider it in more detail.</p>
      <p>The method of concealing data using the direct spread spectrum, proposed in US
patent [15], based on the fact that (on the transmission side after encryption and noise
immunity coding) separate blocks
of data of information message
mi  mi0 , mi1 ,..., mik1  , i  0,..., N 1</p>
      <p>m  m0 , m1,..., mN1 
the blocks are modulated by noise-like discrete signals with the help of appropriate
devices</p>
      <p>i  i0 ,i1 ,...,in1  , i    0 , 1,...,M 1 , k  M ,
with a base B  TF , where T is the duration of the signal element ij , F is the
frequency band of the signal i .</p>
      <p>1
Since F  n</p>
      <p>T
the frequency band of signal i with respect to elementary signals ij and / or mij .</p>
      <p>As a result, a modulated information signal block is generated for each
we have B  n  1 and the signal base sets the frequency spread of
information block
where</p>
      <p>
        k 1  k 1 k 1 k 1 
Ei  j0 m *ij  j   j0 m *ij  j0 , j0 m *ij  j1 ,..., j0 m *ij  jn1  ,
mi
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
m *i j  11,,mmiijj  10;;
which, according to statistical properties, takes the form of a random (noise-like)
sequence, and due to the large base of discrete signals, the frequency spectrum is
spreaded by B  n times.
      </p>
      <p>The resulting modulated message Ei is supplied to an alternationing device on
which the elements of Ei are mixed with the corresponding rule f by means of a
secret key K1 . The obtained data Ei  f (Ei , K1) з using the appropriate device is
added to the data of the image Ci (digital image data in the spatial domain) according
to the rule::</p>
      <p>Si  Ci  Ei  G ,
where G  0 is the gain of the expansion signal, which sets the “power” of the hidden
blocks of information messages.</p>
      <p>The obtained data Si is supplied to the quantization device, which performs a
certain transformation to store the primary dynamic range of the cover image,
resulting in the formation of separate blocks of the steganogram Si and the cover</p>
      <p>S  S0  S1 ...  SN 1 ,
which is transmitted to the receiving side.</p>
      <p>On the receiving side, the resulting steganogram blocks Si after filtration, are,
supplied to a reverse interleaving device, on which the elements of the filtered blocks
of the stegogram Si are mixed by rule f 1 , which is an inverse rule of alternation f
on the transmitting side. The extraction of blocks of information data is carried out
using a correlation receiver, which calculates the value of the correlation coefficient
obtained after the reverse alternation of data</p>
      <p>S *i  f 1(Si , K1)
and corresponding discrete  j , signals identical to those used on transmitting side:
  S *i ,  j  
1 n1
n z0 S *iz  jz  G 
1 n1 1 n1
n z0 Eiz jz  n z0 Ciz jz .</p>
      <p>
        (
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
      </p>
      <p>
        Suppose that the data block of the image block Ci has a random statistical
structure, that is, suppose that the second term on the right side of expression (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) is
close to zero and can be ignored. Then we have::
  S *i ,  j   G 
1 n1
 E 
      </p>
      <p>iz jz  G 
n z0
1 n1  k 1 </p>
      <p>   m *iu uz  jz 
n z0  u0 
k 1 n1 k 1
 G   m *iu uz jz  G   m *iu  u ,  j .</p>
      <p>
        u0 z0 u0
(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
(
        <xref ref-type="bibr" rid="ref4">4</xref>
        )
(
        <xref ref-type="bibr" rid="ref5">5</xref>
        )
      </p>
      <p>Since all sequences of the set  are formed by a pseudorandom sequence
generator initiated by a secret key K2 , the corresponding discrete signals are weakly
correlated, that is, at u  j we have  u ,  j   0 .</p>
      <p>
        According to this, all terms, except case u  j , in the right-hand side of equation
(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) can be ignored. Where do we have:
      </p>
      <p>1 n1 2 G;
  S *i ,  j   G  m *ij  n z0  jz   G  m *ij  G.</p>
      <p>The corresponding value of the seized data is taken with a threshold device
according to the calculated correlation coefficient.</p>
      <p>
        Since G  0 and n  0 of   S *i ,  j  character in (
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) depends only on m *ij ,
from where we have:
1,   Si ,  j   0;
m *ij  sign   S *i ,  j   1,   Si ,  j   0.
      </p>
      <p>
        If   S *i ,  j   0 in (
        <xref ref-type="bibr" rid="ref5">5</xref>
        ) we will assume that the hidden information has been lost
(erased).
      </p>
      <p>Separate blocks of data are formed from the extracted data on the receiving side
mi  mi0 , mi1 ,..., mik1  ,
m  m0 , m1,..., mN1 , where
i  0,..., N 1
of
information
messages
mij  10,, mm**iijj  11;;
of which information messages are generated after noise immunity decoding and
decryption of the extracted data.</p>
      <p>The secret key K2 sets the rule for the formation of pseudorandom sequences
i  i0 ,i1 ,...,in1  , which are formed by the corresponding generator and are used
as noise-like discrete signals i    0 , 1,..., M 1 from the ensemble (set)
 of power M .</p>
      <p>The encryption and decryption rule on the transmitting and receiving side is
initiated by the secret key K3 .</p>
      <p>The use of encryption and alternation devices in the process of hiding and
retrieving data can improve the statistical properties of the modulated message Ei , ie
to bring it closer to a random sequence. The use of noise immunity coding devices
can improve the reliability of the transmission of information messages
m  m0 , m1,..., mN1  during steganographic conversions.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Experimental researches</title>
      <p>The disadvantage of the prototype under consideration is that in the process of
steganographic hiding, the statistical properties of the blocks of the image Ci , are not
taken into account, that is, the digital image data can be correlated with the applied
discrete signals, which will lead to an error when extracting information data on the
receiving side.</p>
      <p>
        So, for example, if the correlation coefficient of the i -th block Ci of the image
will be higher behind the module and opposite in value of sign G  m *ij , that is, when
the second summand in the right part of expression (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) will be higher in module and
opposite in value of sign of the first summand (and the condition of mutual
orthogonality of applied discrete signals will be fulfilled), it is guaranteed that an
error will the result at data extract according to rule (
        <xref ref-type="bibr" rid="ref5">5</xref>
        ). In practice, as our researches
have shown, such cases occur very often. This is due to the fact that the digital data of
real images used to hide information messages do not have a random statistical
structure, that is, the applied assumption in the transition from formula (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) to formula
(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) is not fulfilled in practice and is false. Typically, steganographic hiding uses
realistic images and the corresponding digital data is not a random process, and even
in its statistical properties are not similar to pseudorandom sequences. The
corresponding values of the correlation coefficient
 Сi ,  j  
1 n1
C 
      </p>
      <p>iz jz  0 ,
n z0
and can take large amplitude (  Сi ,  j   1 ) and random values. In this case, it is
possible to increase the reliability of the extracted data only by applying low-speed
noise immunity codes (as in the prototype discussed above [11, 12, 14, 15]), which
leads to a decrease in the relative transmission rate of information, or an increase in
the gain G , which leads to an increase in the introduced errors.</p>
      <p>To confirm this fact, Fig. 1 shows the empirical estimates of BER dependence in
message recovery using the considered prototype method (interrupted line). The
G  4 gain was applied, and the number of bits k , hidden in one block Ci of the
cover image varied from 1 to 255. Fig. 2. shows empirical estimations of dependence
of the average proportion of introduced errors (in relation to the dynamic range of 256
levels) in the cover image with respect to the number of bits embedded in one element
of the cover. From the given dependencies (Fig. 1, 2, interrupted line) it is visible, that
at entering errors in the cover image below a visual threshold of human sensitivity
(23%) it is possible to hide no more than 10 bits of data in one block of the image Ci .
But even with such an insignificant amount of hidden data, BER takes the value
0.05..0.25, which requires the use of low-speed noise immunity codes with the
permission to correct multiple errors.</p>
      <p>Pos h1_ki1</p>
      <p>Pos h2_ki1</p>
      <p>In Fig. 3, 4 show, accordingly, the obtained empirical estimates of the BER
dependence when restoring the messages and the dependence of the average fraction
of the input errors on the G gain values using the considered prototype method
(intermittent lines). At the same time, k  4 bits of information data were embedded
in one block Ci of the cover, and the gain G changed from 1 to 8. From the given
dependencies (Fig. 3, 4, interrupted line) it is visible, that at value of gain G  6
hiding of the information data leads to entering of errors, part of which ( relative to a
dynamic range ) is above a visual threshold of human sensitivity (2-3 %). That is, the
fact of hiding data in the image turns out to be a visual observation and
steganographic hiding with these parameters is not reasonable But at G  6 gain
value, there is a large number of errors when extracting individual data bits from the
spatial area of the image corresponding to BER  0, 2 .</p>
      <p>Empirical estimates of the dependence of the probability of false recovery of
individual bits of data on the average fraction of errors made in the cover image when
changing the number of bits hidden in one element of the cover (from 1 to 255) or
changing the value of the expansion signal gain (from 1 to 8) are shown in accordance
with Fig. 5, 6. In the first case (Fig. 5) the dependencies are built according to the
fixed G  4 , gain value, in the second case (Fig. 6) - according to the fixed
value k  4 .
 Fig. 7.а. – original image (empty cover);
 Fig. 7.b. – image with hidden messages using prototype method (filled cover);
 Fig. 7.c. – image with hidden messages using the proposed method (filled cover).</p>
      <p>Data hiding is done with the following parameters: G  4 , k  4 .</p>
      <p>R a)</p>
      <p>S1 b)
Fig. 7. Examples of coSv2er images c)</p>
    </sec>
    <sec id="sec-4">
      <title>Proposed data hiding technique</title>
      <p>Our task is based on the following: by taking into account the statistical properties of
cover Ci , significantly reduce the BER of hidden data. Indeed, the introduction of
additional constraints on the correlation coefficient of the discrete signals used and
individual fragments of the image can significantly reduce the number of errors when
recovering the message on the receiving side.</p>
      <p>This problem is solved due to the special (we call adaptive) formation of
pseudorandom sequences  j   j0 , j1 ,..., jn1  , taking into account the statistical
properties of these blocks of cover Сi . That is, the value of the correlation coefficient
 Сi ,  j  for all i  0,.., N 1 and for all j  0,.., M 1 by the module should not
exceed some predetermined value  max (value of the set threshold):
 Сi ,  j  
1 n1
C </p>
      <p>iz jz  max .
n z0
(6)</p>
      <p>Thus, the formation of  j    0 , 1,..., M 1 sequences is performed by a
pseudo-random rule, which is initiated by the secret key K2 , and taking into account
conditions (6) for all i  0,.., N 1 and all j  0,.., M 1 .</p>
      <p>
        In this formation of discrete signals, each sequence of the set of
  0 , 1,..., M 1 will not be correlated (up to the set limit) with any block of
the cover image, and, accordingly, the correlation coefficient of the i -th block Ci of
the cover on the module will never be higher than the module and the opposite in sign
 max . In accordance with this (and when the conditions of mutual orthogonality of
the applied discrete signals) the second term in the right part of expression (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) may
exceed in module and be opposite in sign to the first term only when
      </p>
      <p>G  m *ij   max .</p>
      <p>G  m *ij   max</p>
      <p>It is in this case that an error of data extraction will happen, but the probability of
such an event will be much less than in case of an error of data extraction in the
prototype method. If the value of the  max threshold is lower than the G gain value,
i.e. when the unequal is performed
the error will not occur at all, i.e. an unmistakable transfer of secret information will
be achieved.</p>
      <p>To confirm the conclusion in Fig. 1-6, the solid line shows empirical estimates of
the probabilistic properties of steganographic hiding using the proposed method:
 Fig. 1 shows empirical estimates of dependence BER (k);
 Fig. 2 shows empirical estimates of dependence W(k);
 Fig. 3 shows empirical estimates of dependence BER (G);
 Fig. 4 shows empirical estimates of dependence W(G);
 Fig. 5 shows empirical estimates of BER (W) at k  1,..., 255 and at a fixed gain</p>
      <p>G  4 ;
 Fig. 6 shows empirical estimates of BER (W), at G  1,...,8 and k  4 .</p>
      <p>The dependencies shown in Figs. 1-6 (solid line) are obtained using adapted
(statistical properties of the cover) discrete signals formation, the value of the set
threshold is equal to max  3,9 .</p>
      <p>From the above dependencies in Fig. 1, 2 (solid line) shows that when making
errors in the cover image lower than the visual threshold of human sensitivity (2-3%)
manages to embed no more than 10 bits of data in one block of the C coniner (as in
the prototype method). But with so a number of hidden data, the BER value is much
less than 0.1 and several dozen times less than in the prototype method.</p>
      <p>From the given dependencies in the fig. 3, 4 (solid line) can be seen that at the
value of gain hiding information data in the cover image leads to the introduction of
errors whose fate (in relation to the dynamic range) is higher than the visual threshold
of human sensitivity (2-3%) as well as in the method prototype. At G  6 values, the
errors introduced into the cover image are lower than the human visual sensitivity
threshold, i.e. they are invisible. In compared with the method-prototype, there is a
significant reduction in the number of errors when extracting individual data bits from
the spatial area of the image. In addition, at the H gain value, there is a total non
occurrence of errors in remote data, which confirms the above conclusion about the
error-free transmission of hidden information. Indeed, if G  4 then the inequality is
being realized</p>
      <p>G  m *ij   max ,
that is, assuming the validity of the mutual orthogonality of the applied discrete error
signals, no errors occur at all and an error-free transmission of hidden information is
achieved.</p>
      <p>From the given dependencies in the fig. 5, 6 (solid line) shows that in almost all
cases, when hiding data the proposed method is a gain in relation to the
methodprototype (interrupted line). Thus, when the number of k bits hidden in one element
of the cover image increases, as well as in the prototype method, there is an increase
in the probability of false data extracted on the receiving side. However, this increase
is much slower than in the prototype method. As the G gain increases, the probability
of false data extraction decreases, but the proposed method (solid line) has
significantly improved probabilistic properties than the prototype method (interrupted
line).</p>
    </sec>
    <sec id="sec-5">
      <title>Conclusions</title>
      <p>The use of direct spectrum spread technology is an interesting and hugely promising
area of modern steganography. Indeed, if you use advanced mathematical apparatus
and digital communication techniques, in particular pseudorandom (noise-like)
discrete signals, you can get a safe and secure way to hide information messages in
different cover images. We have looked at a number of technologies that are based on
direct spectrum spread technology to hide information in images</p>
      <p>Our research has shown that in addition to the traditional requirements of digital
communication, steganographic applications should also take into account the
specifics of the cover images used. In particular, images interpreted as noise in
communication channels cannot be considered as implementation of random process.
Because there are correlations between individual pixels of the image. Therefore, the use
of pseudorandom sequences (extension signals) without taking into account the
statistical properties of cover images can lead to a significant number of hidden data errors.</p>
      <p>We have introduced a new data hiding technique with the use of direct spectrum
spread technology. In particular, our approach is based on the special formation of
discrete signals, that is, taking into account the statistical properties of cover images.
We call this metod adaptive. Indeed, in this case, the extension signals applied are not
correlate with the image, and the number of hidden data errors can be significantly
reduced.</p>
      <p>Thus, a specific technical result is achieved, namely: by taking into account the
statistical properties of the digital data of the cover images (in the adaptive formation of
pseudorandom sequences) it is possible to significantly reduce the number of errors in
the recovery of information data on the receiving side.</p>
      <p>A promising trend is to study the properties of steganosystems using complex
discrete signals with special correlation properties. For example, we want to use
sequences from our previous work [22-26] to hide information in cover images.</p>
      <p>The results can be used in various computer science applications. In particular, for
modernization of various cryptographic algorithms, optimization of calculations,
modeling and telecommunications [27-33].
6. F.Y. Shin, “Digital Watermarking and Steganography,” Dec. 2017. DOI:10.1201/
9781315219783.
7. N. F. Johnson and S. Jajodia, “Exploring steganography: Seeing the unseen”, in Computer,
vol. 31, no. 2, pp. 26-34, Feb. 1998. DOI: 10.1109/MC.1998.4655281.
8. I.V. S. Manoj, “Cryptography and Steganography,” International Journal of Computer
Applications, vol. 1, no. 12, pp. 63–68, Feb. 2010. DOI:10.5120/257-414.
9. A.Z. Tirkel, C. F. Osborne and R. G. Van Schyndel, “Image watermarking-a spread
spectrum application”, Proceedings of ISSSTA'95 International Symposium on Spread
Spectrum Techniques and Applications, Mainz, Germany, 1996, pp. 785-789 vol.2,
DOI: 10.1109/ISSSTA.1996.563231.
10. J. R. Smith and B. O. Comiskey, “Modulation and information hiding in images,” Lecture</p>
      <p>Notes in Computer Science, pp. 207–226, 1996. doi:10.1007/3-540-61996-8_42.
11. L.M. Marvel, C. G. Boncelet, R. Jr., and Charles T., “Methodology of Spread-Spectrum</p>
      <p>Image Steganography,” Jun. 1998. doi:10.21236/ada349102.
12. L.M. Marvel, C. G. Boncelet and C. T. Retter, “Spread spectrum image steganography”,
in IEEE Transactions on Image Processing, vol. 8, no. 8, pp. 1075-1083, Aug. 1999. doi:
10.1109/83.777088.
13. M. Kutter, “Performance Improvement of Spread Spectrum Based Image Watermarking
Schemes through M-ary Modulation,” Lecture Notes in Computer Science, pp. 237–252,
2000. DOI:10.1007/10719724_17.
14. F.S. Brundick and L. M. Marvel, “Implementation of Spread Spectrum Image
Steganography,” Mar. 2001. DOI:10.21236/ada392155.
15. Patent No.: US 6,557,103 B1, Int.Cl. G06F 11/30. Charles G. Boncelet, Jr., Lisa M.
Marvel, Charles T. Retter. Spread Spectrum Image Steganography. Patent No.: US 6,557,103
B1, Int.Cl. G06F 11/30. – № 09/257,136; Filed Feb. 11, 1999; Date of Patent Apr. 29,
2003.
16. Fan Zhang, Bin Xu and Xinhong Zhang, “Digital image watermarking algorithm based on
CDMA spread spectrum”, 2006 12th International Multi-Media Modelling Conference,
Beijing, 2006, pp. 4, DOI: 10.1109/MMMC.2006.1651359.
17. T. T. Nguyen and D. Taubman, “Optimal linear detector for spread spectrum based
multidimensional signal watermarking”, 2009 16th IEEE International Conference on Image
Processing (ICIP), Cairo, 2009, pp. 113-116. DOI: 10.1109/ICIP.2009.5414121.
18. E. Nezhadarya, Z. J. Wang and R. K. Ward, “Image quality monitoring using spread
spectrum watermarking”, 2009 16th IEEE International Conference on Image Processing
(ICIP), Cairo, 2009, pp. 2233-2236. DOI: 10.1109/ICIP.2009.5413955.
19. S. Ghosh, P. Ray, S. P. Maity and H. Rahaman, “Spread Spectrum Image Watermarking
with Digital Design”, 2009 IEEE International Advance Computing Conference, Patiala,
2009, pp. 868-873. DOI: 10.1109/IADCC.2009.4809129.
20. H.O. Altun, A. Orsdemir, G. Sharma and M. F. Bocko, “Optimal Spread Spectrum
Watermark Embedding via a Multistep Feasibility Formulation”, in IEEE Transactions on
Image Processing, vol. 18, no. 2, pp. 371-387, Feb. 2009. doi: 10.1109/TIP.2008.2008222.
21. A. Samčović and M. Milovanović, “Robust digital image watermarking based on wavelet
transform and spread spectrum techniques”, 2015 23rd Telecommunications Forum Telfor
(TELFOR), Belgrade, 2015, pp. 811-814, DOI: 10.1109/TELFOR.2015.7377589.
22. Yu.V. Stasev, A.A. Kuznetsov, A.M. Nosik. “Formation of pseudorandom sequences with
improved autocorrelation properties” Cybernetics and Systems Analysis, vol. 43, Issue 1,
pp. 1-11, January 2007. DOI: 10.1007/s10559-007-0021-2
23. N.I.Naumenko, Yu.V.Stasev, A.A.Kuznetsov. “Methods of synthesis of signals with
prescribed properties”, Cybernetics and Systems Analysis, vol. 43, Issue 3, pp. 321-326, May
2007. DOI: 10.1007/s10559-007-0052-8
24. O.Karpenko, A.Kuznetsov, V.Sai, Yu.Stasev. “Discrete Signals with Multi-Level
Correlation Function.” Telecommunications and Radio Engineering, vol. 71, 2012 Issue 1. pp
9198. DOI: 10.1615/TelecomRadEng.v71.i1.100
25. A. Kuznetsov, S. Kavun, V. Panchenko, D. Prokopovych-Tkachenko, F. Kurinniy and V.</p>
      <p>Shoiko, “Periodic Properties of Cryptographically Strong Pseudorandom Sequences”,
2018 International Scientific-Practical Conference Problems of Infocommunications.
Science and Technology (PIC S&amp;T), Kharkiv, Ukraine, 2018, pp. 129-134.</p>
      <p>
        DOI: 10.1109/INFOCOMMST.2018.8632021
26. A. Kuznetsov, O. Smirnov, D. Kovalchuk, A. Averchev, M. Pastukhov and K.
Kuznetsova, “Formation of Pseudorandom Sequences with Special Correlation Properties”,
2019 3rd International Conference on Advanced Information and Communications
Technologies (AICT), Lviv, Ukraine, 2019, pp. 395-399. doi: 10.1109/AIACT.2019.8847861
27. Chornei, R., Hans Daduna, V. M., &amp; Knopov, P. (2005). “Controlled markov fields with
finite state space on graphs. Stochastic Models”, 21(
        <xref ref-type="bibr" rid="ref4">4</xref>
        ), 847-874.
      </p>
      <p>
        DOI:10.1080/15326340500294520
28. Runovski, K., &amp; Schmeisser, H. (2004). “On the convergence of fourier means and
interpolation means”. Journal of Computational Analysis and Applications, 6(
        <xref ref-type="bibr" rid="ref3">3</xref>
        ), 211-227.
29. Bondarenko, S., Liliya, B., Oksana, K., &amp; Inna, G. (2019). “Modelling instruments in risk
management. International Journal of Civil Engineering and Technology”, 10(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ),
15611568.
30. S. Gnatyuk, T. Zhmurko, P. Falat, “Efficiency Increasing Method for Quantum Secure
Direct Communication Protocols”, Proceedings of the 2015 IEEE 8th International
Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and
Applications (IDAACS’2015), Warsaw, Poland, September 24-26, Vol. 1, 2015, рр. 468-472.
31. Tkach B. P., &amp; Urmancheva L. B. (2009). “Numerical-analytic method for finding
solutions of systems with distributed parameters and integral condition”. Nonlinear
Oscillations, 12(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ), 113-122. DOI:10.1007/s11072-009-0064-6.
32. S. Gnatyuk, V. Kinzeryavyy, M. Iavich, D. Prysiazhnyi, Kh. Yubuzova,
“HighPerformance Reliable Block Encryption Algorithms Secured against Linear and
Differential Cryptanalytic Attacks”, CEUR Workshop Proceedings, Vol. 2104, pp. 657-668, 2018.
33. Hu Z., Gnatyuk S., Kovtun M., Seilova N. “Method of searching birationally equivalent
Edwards curves over binary fields”, Advances in Intelligent Systems and Computing, Vol.
754, pp. 309-319, 2019.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>V. P.</given-names>
            <surname>Ipatov</surname>
          </string-name>
          , “
          <article-title>Spread Spectrum</article-title>
          and CDMA”,
          <source>Mar</source>
          .
          <year>2005</year>
          . DOI:
          <volume>10</volume>
          .1002/0470091800.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2. “Introduction to CDMA Wireless Communications,”
          <year>2007</year>
          . DOI:
          <volume>10</volume>
          .1016/b978-0
          <source>-7506- 5252-0.x5001-7.</source>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3. “The
          <string-name>
            <surname>Generalized</surname>
            <given-names>CDMA</given-names>
          </string-name>
          ,”
          <source>CDMA: Access and Switching</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>28</lpage>
          . DOI:
          <volume>10</volume>
          .1002/0470841699.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>S.</given-names>
            <surname>Hara</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Prasad</surname>
          </string-name>
          , “
          <article-title>DS-CDMA, MC-CDMA and MT-CDMA for mobile multi-media communications”</article-title>
          ,
          <source>Proceedings of Vehicular Technology Conference - VTC</source>
          , Atlanta,
          <string-name>
            <surname>GA</surname>
          </string-name>
          , USA,
          <year>1996</year>
          , pp.
          <fpage>1106</fpage>
          -
          <lpage>1110</lpage>
          vol.
          <volume>2</volume>
          , DOI: 10.1109/VETEC.
          <year>1996</year>
          .
          <volume>501483</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5. “Digital Watermarking and Steganography”,
          <year>2008</year>
          .
          <source>DOI:10.1016/b978-0-12-372585- 1.x5001-3.</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>