<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Information Control Systems &amp; Technologies, September</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Serhii Mitsenko</string-name>
          <email>smitsenko@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Serhii Naumenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Inna Rozlomii</string-name>
          <email>inna-roz@ukr.net</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrii Yarmilko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Bohdan Khmelnytsky National University of Cherkasy</institution>
          ,
          <addr-line>81, Shevchenko Blvd., Cherkasy, 18031</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>State University of Trade and Economics</institution>
          ,
          <addr-line>19, Kyoto str., Kyiv, 02156</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2023</year>
      </pub-date>
      <volume>2</volume>
      <fpage>1</fpage>
      <lpage>23</lpage>
      <abstract>
        <p>Among the important tasks faced by users of information systems, one of the main ones is ensuring data security, particularly their integrity, and restoring damaged data. Among the methods of solving these problems, hash function schemes are of the most significant interest. However, the favorable properties of this approach are accompanied by high redundancy, especially when monitoring the integrity of a small-sized message. The article discusses the method of constructing a generalized cryptographic hashing method for integrity control and data recovery with the introduction of minimal redundancy. The proposed solutions for building interference-resistant systems for encoding and decoding digital data use self-controlled and self-adjusted linear block codes. It is suggested to use a hash code system to control data integrity. They are built according to rules similar to the rules for building linear redundant codes. In this case, the rules for constructing Hamming codes are applied. The focus of attention was on the rational selection of the necessary redundant code in order, on the one hand, to ensure the essential reliability of the information and, on the other hand, to avoid burdening the communication channels with a large amount of redundant data. The main advantage of the proposed method is the implementation of information integrity control and defect correction for a given level of security with minimal redundancy and the possibility of localizing integrity violations and correcting a given number of errors. It is shown that the rules for constructing linear codes are similar to those for building linear redundant codes, in particular Hamming codes, which makes it possible to adapt the theory of linear redundant codes to the problems of information protection in systems with limited resource capabilities. The obtained results provide scientific and engineering tools for monitoring and ensuring data integrity with the possibility of checking their authenticity after restoration in the event of an integrity violation. They also provide the conditions for creating promising and improving existing data storage systems. The method has the potential to be implemented in embedded systems, in particular, in IoT systems.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Data integrity control, data recovery, hash function, matrix crypto transformations,</p>
    </sec>
    <sec id="sec-2">
      <title>1. Introduction</title>
      <p>
        Currently, users of many information systems are faced with the task of protecting the data
processed by them. One of the measures to ensure data security in such systems is to protect their
integrity [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Solving the problem of data integrity protection is particularly relevant in functioning
data processing centers that include storage systems. These systems have different construction
      </p>
      <p>2023 Copyright for this paper by its authors.
structures and operating principles that provide for operation in the conditions of random errors and
destructive influences of an intruder (unauthorized modification of data or decommissioning of part of
the medium or individual cells, sectors). In addition to data integrity control, it is also necessary to
ensure the recovery of data whose integrity has been violated.</p>
      <p>
        There are various methods of solving the task of control and ensuring data integrity. Among them,
schemes of hash functions are of the most significant interest. They are successfully used in the
localization of defective blocks, but they are not without drawbacks. The main one is high redundancy
when monitoring the integrity of sequences of small message blocks. Considering the mentioned
shortcoming of the existing solutions, it is urgent to find ways to reduce the redundancy introduced
for a given level of data security in the conditions of random errors and destructive influences of the
attacker. In addition, despite the widespread use of hash functions, they must be more researched.
Practical proposals for their use are mostly reduced to finding ways to increase their crypto resistance
[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Proposals regarding the use of hash functions, which would allow reducing the introduced
redundancy for a given level of data security, are very few (practically non-existent).
      </p>
      <p>The research aims to investigate the efficacy of utilizing Hamming codes in conjunction with a
novel hash technique for information protection and recovery. This involves the development of a
robust and efficient method to encode and store data using Hamming codes while enhancing data
integrity through a unique hash technique. The study will delve into the implementation, performance
evaluation, and comparative analysis of the proposed approach against existing methods for
information protection and recovery. Hamming codes have been widely used for error detection and
correction, and hash techniques play a crucial role in verifying data authenticity. Combining these two
concepts can potentially offer a more comprehensive approach to information protection and
recovery. This research is relevant to various domains, including data storage, network
communication, cybersecurity, and digital forensics, where data integrity and recovery are critical
concerns. The proposed research introduces a novel amalgamation of Hamming codes and hash
techniques, which has not been extensively explored in existing literature. While both Hamming
codes and hash techniques are well-established individually, their synergistic application for
information protection and recovery presents a novel approach. The integration of error-detection and
correction capabilities of Hamming codes with the data verification strengths of hash techniques
brings a unique angle to data integrity and recovery solutions. The research will pioneer the
exploration of this combined method and provide insights into its effectiveness, thereby contributing
to the advancement of information security methodologies.</p>
    </sec>
    <sec id="sec-3">
      <title>2. Related works</title>
      <p>
        In modern society's dependence on information technologies, any failure in operating information
or communication systems can lead to losses. The causes and sources of potential threats to
information security, risk assessment, and their classification have been the object of research for
many years. They have been covered in scientific publications [
        <xref ref-type="bibr" rid="ref3 ref4">3-4</xref>
        ]. The results obtained for the
current period make it possible to reasonably formulate requirements for means of information
protection, in particular, its reliability and integrity control. A proven means of managing the
reliability of information transmission is interference-resistant coding [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. A distinction is made
between error-detecting codes and error-correcting codes. C. Shannon pointed out the theoretical
possibility of using interference-resistant coding to detect and correct errors as early as 1948.
      </p>
      <p>
        The most popular self-monitoring and self-correcting linear block code is the Hamming code [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
Today, Hamming codes are fundamental to building interference-resistant systems for coding and
decoding digital data. The general principles of classical use of Hamming codes for single-bit error
correction are presented in [
        <xref ref-type="bibr" rid="ref7 ref8">7-8</xref>
        ]. Research [
        <xref ref-type="bibr" rid="ref10 ref9">9-10</xref>
        ] in which modifications of Hamming codes and
areas of their practical application are described show the considerable interest of the scientific
community in Hamming codes. In [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], the performance of Hamming codes was evaluated using an
artificial neural network. In work [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], formalization of error-correcting code (ECC) was developed
using SSReflect extension of Coq proof-assistant. In addition to the famous Hamming codes, the
authors investigated modern low-density parity-check codes (LDPC). In particular, in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] the authors
proposed efficient codes with low redundant code that can correct any combination of insertions and
deletions in almost linear time.
      </p>
      <p>
        A significant part of the attention of scientists is focused on the (7,4) Hamming code. In particular,
[
        <xref ref-type="bibr" rid="ref14 ref15">14-15</xref>
        ] describe image hiding methods using the (7,4) Hamming code and corresponding operations
with pixels. In addition, the Hamming code was used to control the integrity of blocks of electronic
documents [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
      <p>
        Available studies and publications provide a sufficient basis for generalizing ideas about the
potential of tamper-resistant coding and hashing methods [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. They confirm that the theory of
interference-resistant coding, particularly of correcting Hamming codes, is adapted to solving data
integrity problems in any application area.
      </p>
    </sec>
    <sec id="sec-4">
      <title>3. Proposed technique</title>
      <p>Furthermore, Hamming codes have a solid mathematical foundation and find wide application in
the theory of error correction and coding, providing additional confidence in their reliability and
effectiveness. They can be successfully utilized in communication clusters of robotic systems and
Industry 4.0 systems, where ensuring data integrity and the ability to detect and correct errors under
resource constraints is crucial. The choice of Hamming codes offers a scientific and engineering
toolset for securing and ensuring the reliability of information systems in the modern digital
environment.
3.1.</p>
    </sec>
    <sec id="sec-5">
      <title>Analysis of existing methods of information integrity controls</title>
      <p>The use of hashing algorithms to ensure the integrity of information has several advantages,
including:
• relatively low redundancy;
• a small number of cryptographic transformations;
• the ability to control the length of the hash code.</p>
      <p>Different methods of checking the integrity of information using hash functions differ in the
composition and sequence of calculations. The generalized scheme of using hash functions is shown
in Figure 1.</p>
      <p>Let us take a closer look at each option for calculating the hash function. For this, we introduce the
notation: h – hash function, Bi – information block, k – total number of blocks, n – number of hash
functions.</p>
      <p>1. Calculating one common hash code H for k blocks of data, represented by binary vectors
Bi (i = 1,2,..., k ) , result h(B1, B2 ,..., Bk ) = H (Figure 2). The checksum is obtained due to the
execution of the hashing algorithm, which fully characterizes the entire set of blocks. Such a
scheme, according to the properties of hash functions, allows you to control the integrity, but at the
same time, there is no possibility of localizing a defective data block, which is represented by a
binary vector Bi .</p>
      <p>
        In the case of k  n – for each data block represented by a binary vector Bi a hash value is
calculated Hi , Figure 3.
A method of applying a fully connected hashing network, in which each hash code Hi is calculated
from the entire set of data, represented by binary vectors Bi :
h(Bi1 || Bi2 || ... || Bik ) ,
(1)
where || – concatenation operation (Figure 4).
In this method, the sequence of data blocks, represented by binary vectors, is of great importance
Bi , and takes part in concatenation. According to Figure 4, firstly the binary vector is concatenated
Bi , the number of which coincides with the number of the hash code being calculated Hi (due to
this, their values will differ).
2. Ways of using hash functions at k  n are of greatest interest because they allow integrity
control and detection of defective data blocks. Methods are presented in [
        <xref ref-type="bibr" rid="ref16 ref17">16-17</xref>
        ] that allow you to
localize errors and repair damaged blocks. The methods are based on cryptographic methods for
calculating the hash function based on matrix crypto transformation operations. Aggregation of
hash function calculation methods based on matrix primitives and linear systems of hash codes
built according to principles similar to the rules for constructing linear redundant Hamming codes.
3.2.
      </p>
    </sec>
    <sec id="sec-6">
      <title>Method development</title>
      <p>The introduction of redundant information into the information transmitted by the network
provides the possibility of detecting and correcting errors on the side of the recipient of the message.
The mathematical theory of building redundant (interference-resistant) codes now has great
achievements. However, there is a big gap between the level of theoretical achievements of the theory
of interference-resistant coding and the level of results of practical use of this theory.</p>
      <p>The introduction of redundancy makes it possible to detect and correct errors in the information
that is transmitted and can be changed during transmission. There are codes that detect errors and
correcting codes that, in addition to detecting an error, correct it. The easiest ways to detect errors are
checksumming and parity checking. However, they are not reliable enough, especially when a large
number of errors occur. Since whole fragments can be falsified in information messages, such
mechanisms cannot fully solve the problem of their forgery. As you know, the history of the
emergence and development of the theory and practice of interference-resistant coding to correct
errors and thereby ensure the reliability of transmitted data begins with the works of Shannon [18].
However, Shannon did not show how to build tamper-resistant codes but only proved their existence.
Not long after, Hamming developed the theory of linear block codes. Hamming introduced and
defined the basic parameters of block codes and developed encoding and decoding devices for his
codes.</p>
      <p>The proposed method of data integrity control uses a system of hash codes. They are built
according to rules similar to the rules for building linear redundant codes. In this case, according to
the rules for constructing Hamming codes. Such a system is a linear hash code system [19]. It is
represented by a set of hash codes obtained using a standard procedure for implementing a hash
function from a set of message blocks in the order determined by a particular block selection
procedure based on the mathematical apparatus of linear algebra. For the standard procedure of
implementing a hash function, in particular, methods of calculating a hash function based on matrix
primitives can be used, presented in [20].</p>
      <p>To control and ensure message integrity B , it must be represented as a set of fixed-length blocks
B = {B1, B2,..., Bn} . Blocks are interpreted as a sequence of n information blocks to which s control
(additional) blocks are added in the amount necessary to protect data integrity. As a result, a code
sequence will be obtained (n, n + s) , Figure 5.</p>
      <p>The addition of control blocks is performed according to the rules for building redundant codes,
depending on the need for corrective properties of the received code (Figure 6).</p>
      <p>To evaluate the correcting ability of codes, Hamming introduced the codename d and minimal
codename d0 distance and showed their dependence on code length, and introduced redundancy [21].
Hamming proved that the minimum code distance characterizes the correcting properties of an
interference-resistant code. It was proved [22] that if two code sequences differ from each other in t
(t  1) positions (bits, characters), and will differ from all other code sequences of this code set in
more than t positions, then to correct t errors it is necessary to ensure the minimum code distance:</p>
      <p>If condition (2) is satisfied, then the fault-tolerant code can be guaranteed to correct the following
number of erroneous characters:
or detect tdet ect  d 0 −1 false binary characters.</p>
      <p>So, to build (n, n+s)-code, let's use formulas (2-3). The resulting (n, n+s)-code will be used to
restore damaged information blocks.</p>
      <p>Let us dwell more on the fact that any G(n, k ) Hamming code can be given in its general form by
the generating matrix:
1 0 0 0 . . . 0 b11 b12 b13 b14 . . . b1r
0 1 0 0 . . . 0 b21 b22 b23 b24 . . . b2r
0 0 1 0 . . . 0 b31 b32 b33 b34 . . . b3r
G(n, k) = 0 0 0 1 . . . 0 b41 b42 b43 b34 . . . b4r</p>
      <p>0 0 0 0 . . . 1 bk1 bk 2 bk3 bk 4 . . . bkr</p>
      <p>To determine the values of the verification elements of the right part of the matrix, it is necessary
to proceed from the main properties of systematic codes.</p>
      <p>Since each row of the unit matrix k  k has only one unit, the weight of each row of the assigned
matrix must not be less than d −1, namely, the mod2 of the two rows must not be less than d − 2
for guaranteed single error correction. In addition, the combinations of the right-hand side of the
matrix must be linearly independent.
(2)
(3)
(4)
Since it is considering problems of integrity violations in message blocks of the communication
      
system, we denote the message as A = (a1, a2, a3,..., an ) , where a1, a2 , a3 ,..., an – set of corresponding
    
binary vectors (blocks of information of arbitrary size). By the set F = ( f1, f2, f3,..., fn ) denote the
values of hash functions of a fixed size, calculated by fi = h(ai ) , where i  1, n.</p>
      <p>
        A set of possible block hashing schemes a1, a2, a3,..., an can be represented in the form of a binary
matrix:
where each row corresponds to a defined hashing scheme. The conditions for forming the matrix rows
are described in [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. Given the properties of the generating matrix, the rules for building linear codes
make it possible to build systems of hash codes. A system of hash codes is a set of hash codes
obtained by implementing any algorithm for calculating a hash function in the order determined by a
particular procedure for selecting records (blocks of information) based on the mathematical
apparatus of linear algebra.
3.3.
      </p>
    </sec>
    <sec id="sec-7">
      <title>Algorithm for building hash codes</title>
      <p>Hashing of the original block of  information can be represented as an expression
(a1 a2 ...an+1 an+l ) → (a1 a2...an+1 an+l fn+l+1 fn+r ) , where → – special multidimensional
noncommutative hashing operation.</p>
      <p>Then, as a result of hashing, the secured block will look like this:
 f11
 f21
F =  ...</p>
      <p>

 fm1
1 0 0 0 . . . 0 b11 b12 b13 b14 . . . b1r
0 1 0 0 . . . 0 b21 b22 b23 b24 . . . b2r
0 0 1 0 . . . 0 b31 b32 b33 b34 . . . b3r
where</p>
      <p>0 0 0 0 . . .1 bk1 bk 2 bk3 bk 4 . . . bkr
   
fn+r = h(b0an || b1an+1 || ... || bl an+l ), bl {1, 0}
or
      
Av  G(n,k) = (a1 a2...an+1 an+l fn+l+1 fn+r ) ,
symbol  – a special multidimensional non-commutative operation of hashing information blocks of
an electronic document. The algorithm for building redundant hash codes is shown in Figure 7.</p>
      <p>The syndrome concept is used to control the integrity of information in the theory of linear codes.
A syndrome in coding theory means a set of signs characteristic of a particular phenomenon. The
syndrome of a vector that can have errors makes it possible to recognize the most likely nature of
these errors.</p>
      <p>     
By an error in the protected block (a1 a2...an+1 an+l fn+l+1 fn+r ) , we will understand the result of the
•
for integrity, a block hashing operation must be performed;
• calculate the syndrome that corresponds to the value of the predicate:
discrepancy of the binary vector with the result obtained as a result of the syndrome check.</p>
      <p>Checking the integrity of data in blocks of information includes the following steps:
     
we have a block of data at the entrance (a*1 a*2...a*n+1 a*n+l f *n+l+1 f *n+r ) , which is checked
 
 1, if fn* = fn; ,
P(an ) =  
0, if fn*  fn.
(7)
● according to the table of syndromes, it is necessary to correct errors in the blocks of
information.</p>
      <p>The block diagram of the integrity check algorithm in blocks of information is shown in Figure 8.</p>
    </sec>
    <sec id="sec-8">
      <title>Data integrity control based on the rules for constructing linear hash</title>
      <p>To construct an interference-resistant code G(9,4) message A = (a1, a2 , a3 , a4 ) we will use the
theory of linearly independent vectors, which is used in vector theory to construct a Hamming code
(9,4):
= (a1, a2 , a3 , a4 , f1, f2 , f3 , f 4 , f5 ) .</p>
      <p>     
The resulting scheme for building an interference-resistant code is presented in Figure 9.
 To control  the integrity  of the protected data block according to (6)
(a *1, a *2 , a*3 , a*4 , f *1, f *2 , f *3 , f *4 , f *5 ) the syndrome is calculated F = ( f1, f 2 , f3 , f 4 , f5 ) , what
corresponds to the predicate (7). Figure 10 shows theresults of integrity violations in a protected data
block determined by syndromes (a1, a2 , a3 , a4 , f1, f 2 , f3 , f 4 , f5 ) .</p>
    </sec>
    <sec id="sec-9">
      <title>4. Discussions</title>
      <p>Developed linear hash codes, built by analogy with Hamming codes, allowing correcting errors in
message blocks. Still, the number of mistakes that can be rectified (corrective property of the code)
depends on the size of the redundant code (control blocks of information). It is necessary to rationally
choose the necessary redundant code to ensure, on the one hand, the required reliability of the
information and, on the other hand, to avoid burdening the communication channels with a large
amount of redundant data. In other words, it is necessary to ensure the integrity of information with a
minimum amount of redundant code.</p>
      <p>The proposed solutions can be applied in traditional information systems and implement intelligent
procedures with hybrid human-machine intelligence. An example is modern concepts of creating
production systems (in particular, Industry 4.0 and Industry 5.0), which focus on using artificial
intelligence as a safe, reliable, and responsible component of a single human-machine functional and
communication space. The intellectualization of human-machine interaction, the cooperative nature of
the activity of intelligent agents, and their interaction in an available open slot, undoubtedly
exacerbate such systems' efficiency, safety, and predictability. The severity of these problems, directly
related to the state of communications, will become more acute in connection with the exit of such
technologies from the category of unique and experimental projects to the variety of mass utilitarian
and applied applications. Since the typical solution for creating cooperative system modules of this
type is their reproduction on the platform of embedded systems, the functioning of security
subsystems will be directly affected by the presence of constrained devices in their composition and
battery life limitations. Therefore, the problem of security in such systems must be solved
comprehensively. Priority is given to methods and algorithms that are appropriate in terms of basic
functionality and economical in terms of the resources of the technical platform. In general, the
practical implementation of proper software tools should increase trust between participants in
communication processes due to the possibility of identifying and restoring damaged fragments of
messages in the information flow. Because of the above, the proposed method of ensuring the
integrity of notes follows the general requirements for such means.</p>
      <p>There are several ways to extend and modify the proposed hashing method based on Hamming
codes for detecting and correcting faulty information blocks exchanged among participants in a
communication cluster of a robotic system. Some of these possibilities include:
1. Using hybrid methods. It is possible to combine Hamming codes with other error detection
and correction methods, such as BCH (Bose-Chaudhuri-Hocquenghem) codes or Reed-Solomon
codes. This will allow the creation of a hybrid system that combines the advantages of different
coding methods and ensures a high level of error correction and error recovery.
2. Using optimized algorithms. It is possible to conduct research and development of optimized
algorithms for computing hash codes based on Hamming codes. This may involve the use of fast
computation methods, memory optimization, and other techniques to enhance the performance of
the hashing method.
3. Expanding the application scope of the method. The hashing method based on Hamming
codes can be extended for use in various domains of communication clusters in robotic systems.
For example, exploring the potential of this method for data protection in unmanned vehicles,
where ensuring reliable transmission and data integrity between the propulsion mechanism and
control systems is crucial, would be worthwhile. Additionally, attention should be given to the
possibility of specializing the method for Industry 4.0 applications, where robotic systems and
other "smart" devices interact in a manufacturing environment. Expanding the application scope of
the method can also include the Internet of Things (IoT), where numerous devices are connected to
the network and exchange data. The optimal utilization of Hamming codes for detecting and
correcting defective data blocks can provide an additional level of protection and reliability in
these domains, facilitating data recovery and preventing the transmission of erroneous information.</p>
    </sec>
    <sec id="sec-10">
      <title>5. Conclusion</title>
      <p>The article proposes a cryptographic hashing method based on Hamming codes for information
protection and recovery. Using the mathematical apparatus of the theory of vector systems, an
algorithm for building linear hash codes was developed to ensure data integrity in information
systems. The rules for building hash codes are affected by the given (or necessary) level of security of
information resources. The redundancy of control information depends on the need for curative
properties.</p>
      <p>It is shown that the rules for constructing linear hash code systems are similar to the rules for
constructing Hamming codes. Thus, the well-developed theory of linear redundant codes can be used
in the new field of constructing linear hash code systems.</p>
      <p>The main advantage of the proposed method is the implementation of information integrity control
and defect correction for a given level of security with minimal redundancy and the possibility of
localizing integrity violations and correcting a given number of errors.</p>
      <p>The obtained results provide a scientific and engineering toolkit for monitoring and ensuring data
integrity with the possibility of checking their authenticity after restoration in case of integrity
violation and provide the conditions for creating promising and improving existing data storage
systems.</p>
    </sec>
    <sec id="sec-11">
      <title>6. References</title>
      <p>[18] J. Zhang, K. Feng, Relative generalized Hamming weights of cyclic codes, Finite Fields and
Their Applications 50 (2018) 338-355.
[19] X. Li, Q. Yue, The Hamming distances of repeated-root cyclic codes of length 5ps, Discrete
Applied Mathematics 284 (2020) 29-41.
[20] I. O. Rozlomii, Methods for calculating the hash function of an electronic document based on
matrix cryptographic transformations, Bulletin of CSTU. Engineering sciences 4 (2016) 88-94.
[21] M. Shi, F. Özbudak, P. Solé, Geometric approach to b-symbol Hamming weights of cyclic
codes, IEEE Transactions on Information Theory, 67 6 (2021) 3735-3751.
[22] W. Rurik, A. Mazumdar, Hamming codes as error-reducing codes, in: IEEE Information
Theory Workshop, ITW, IEEE, 2016, pp. 404-408.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M. E.</given-names>
            <surname>Whitman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. J.</given-names>
            <surname>Mattord</surname>
          </string-name>
          , Principles of information security, 7th. ed.,
          <source>Cengage Learning</source>
          , Boston, MA,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>R.</given-names>
            <surname>Alguliyev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Imamverdiyev</surname>
          </string-name>
          , L. Sukhostat,
          <article-title>Cyber-physical systems and their security issues</article-title>
          ,
          <source>Computers in Industry</source>
          <volume>100</volume>
          (
          <year>2018</year>
          )
          <fpage>212</fpage>
          -
          <lpage>223</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>C. K.</given-names>
            <surname>Yee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. F.</given-names>
            <surname>Zolkipli</surname>
          </string-name>
          ,Review on Confidentiality,
          <article-title>Integrity and Availability in Information Security</article-title>
          ,
          <source>Journal of ICT in Education, 8</source>
          <volume>2</volume>
          (
          <issue>2021</issue>
          )
          <fpage>34</fpage>
          -
          <lpage>42</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Nieles</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Dempsey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. Y.</given-names>
            <surname>Pillitteri</surname>
          </string-name>
          ,
          <article-title>An introduction to information security</article-title>
          ,
          <source>NIST special publication, 800</source>
          <volume>12</volume>
          (
          <year>2017</year>
          )
          <fpage>101</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>J.</given-names>
            <surname>Sima</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Bruck</surname>
          </string-name>
          ,
          <article-title>On optimal k-deletion correcting codes</article-title>
          ,
          <source>IEEE Transactions on Information Theory, 67</source>
          <volume>6</volume>
          (
          <year>2020</year>
          )
          <fpage>3360</fpage>
          -
          <lpage>3375</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>J. Van Wonterghem</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Alloum</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. J.</given-names>
            <surname>Boutros</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Moeneclaey</surname>
          </string-name>
          ,
          <article-title>Performance comparison of short-length error-correcting codes</article-title>
          ,
          <source>in: 2016 Symposium on Communications and Vehicular Technologies</source>
          ,
          <string-name>
            <surname>SCVT</surname>
          </string-name>
          , IEEE,
          <year>2016</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . doi.org/10.1109/scvt.
          <year>2016</year>
          .
          <volume>7797660</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <article-title>Error detection and correction by hamming code</article-title>
          ,
          <source>in: International Conference on Global Trends in Signal Processing, Information Computing and Communication</source>
          ,
          <string-name>
            <surname>ICGTSPICC</surname>
          </string-name>
          , IEEE,
          <year>2016</year>
          , pp.
          <fpage>35</fpage>
          -
          <lpage>37</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>P.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Ahuja</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Chakka</surname>
          </string-name>
          , BCH/hamming/cyclic coding techniques:
          <article-title>Comparison of PAPR-reduction performance in OFDM systems</article-title>
          ,
          <source>in: International Conference on Intelligent Computing and Applications</source>
          , ICICA, Springer,
          <year>2018</year>
          , pp.
          <fpage>557</fpage>
          -
          <lpage>566</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>U.</given-names>
            <surname>Martínez-Peñas</surname>
          </string-name>
          ,
          <article-title>Hamming and simplex codes for the sum-rank metric</article-title>
          ,
          <source>Designs, Codes and Cryptography</source>
          ,
          <volume>88 8</volume>
          (
          <year>2020</year>
          )
          <fpage>1521</fpage>
          -
          <lpage>1539</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>N.</given-names>
            <surname>Sridevi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Jamal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Mannem</surname>
          </string-name>
          ,
          <article-title>Implementation of error correction techniques in memory applications</article-title>
          ,
          <source>in: 5th International Conference on Computing Methodologies and Communication</source>
          ,
          <string-name>
            <surname>ICCMC</surname>
          </string-name>
          , IEEE,
          <year>2021</year>
          , pp.
          <fpage>586</fpage>
          -
          <lpage>595</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A. C.</given-names>
            <surname>Vaz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. G.</given-names>
            <surname>Nayak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Nayak</surname>
          </string-name>
          ,
          <article-title>Hamming code performance evaluation using artificial neural network decoder</article-title>
          ,
          <source>in: 15th International Conference on Engineering of Modern Electric Systems</source>
          , EMES, IEEE,
          <year>2019</year>
          , pp.
          <fpage>37</fpage>
          -
          <lpage>40</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>R.</given-names>
            <surname>Affeldt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Garrigue</surname>
          </string-name>
          ,
          <article-title>Formalization of error-correcting codes: from Hamming to modern coding theory</article-title>
          , in: Interactive Theorem Proving: 6th International Conference, ITP 2015, Nanjing, China,
          <source>August 24-27</source>
          , Springer International Publishing,
          <year>2015</year>
          , pp.
          <fpage>17</fpage>
          -
          <lpage>33</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>J.</given-names>
            <surname>Brakensiek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Guruswami</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Zbarsky</surname>
          </string-name>
          ,
          <article-title>Efficient low-redundancy codes for correcting multiple deletions</article-title>
          ,
          <source>IEEE Transactions on Information Theory, 64</source>
          <volume>5</volume>
          (
          <year>2017</year>
          )
          <fpage>3403</fpage>
          -
          <lpage>3410</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Cao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Yin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Gao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>High capacity data hiding scheme based on (7, 4) Hamming code</article-title>
          ,
          <source>SpringerPlus, 5</source>
          <volume>1</volume>
          (
          <issue>2016</issue>
          )
          <fpage>1</fpage>
          -
          <lpage>13</lpage>
          . doi:
          <volume>10</volume>
          .1186/s40064-016-1818-0.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>B.</given-names>
            <surname>Jana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Giri</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. K.</given-names>
            <surname>Mondal</surname>
          </string-name>
          ,
          <article-title>Partial reversible data hiding scheme using (7, 4) hamming code</article-title>
          ,
          <source>Multimedia Tools and Applications</source>
          ,
          <volume>76</volume>
          (
          <year>2017</year>
          )
          <fpage>21691</fpage>
          -
          <lpage>21706</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>I. A.</given-names>
            <surname>Rozlomii</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. N.</given-names>
            <surname>Rudnitsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. S.</given-names>
            <surname>Alekseeva</surname>
          </string-name>
          ,
          <article-title>Using of hash function to identify counterfeit fragments of electronic document</article-title>
          ,
          <source>Wschodnioeuropejskie Czasopismo Naukowe (East European Scientific Journal)</source>
          ,
          <fpage>3</fpage>
          <lpage>19</lpage>
          (
          <year>2017</year>
          )
          <fpage>68</fpage>
          -
          <lpage>72</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>A.</given-names>
            <surname>Yarmilko</surname>
          </string-name>
          , I. Rozlomii,
          <string-name>
            <given-names>H.</given-names>
            <surname>Kosenyuk</surname>
          </string-name>
          ,
          <article-title>Hash method for information stream's safety in dynamic cooperative production system</article-title>
          , in: S. Shkarlet et al. (Eds):
          <source>Mathematical Modeling and Simulation of Systems, volume 344 of Lecture Notes in Networks and Systems</source>
          , Springer, Cham,
          <year>2022</year>
          , pp.
          <fpage>173</fpage>
          -
          <lpage>183</lpage>
          . doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -89902-8_
          <fpage>14</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>