Author(s) | Collection number | Pages | Download abstract | Download full text |
---|---|---|---|---|
Sabat V. I., Богоніс О. О. | № 1 (89) | 21-32 |
![]() |
![]() |
This paper addresses a pressing issue in the field of copyright protection—namely, the detection of illegal copies of digital information products that fall under the intellectual property rights of their developers and authors. This problem is particularly significant for software developers and publishers of electronic content, whose products are often distributed via the global Internet. Unfortunately, effective mechanisms for protecting the rights of electronic product owners or intellectual property holders are scarce, and malicious actors are continuously discovering new ways to circumvent digital protection systems. In many cases, it is even difficult to prove the authorship of a given intellectual product if it has not undergone official licensing or patenting procedures—which, in turn, can also be violated or bypassed by infringers. The challenge of asserting intellectual property rights and initiating legal action against violations can only be addressed by solving the problem of intellectual product authorization. The implementation of copyright protection systems that employ digital watermarking offers a robust method for safeguarding private ownership of intellectual products—both for manufacturers and their original authors. The algorithms proposed in this paper provide a model for detecting unauthorized use of intellectual products through the embedding of digital watermarks. These algorithms enable the identification of pirated electronic publications and the individuals or entities distributing them, thereby enforcing the legitimate copyrights of intellectual property holders. The general algorithm presented herein for the operation of a copyright protection system lays the foundation for the development of information technologies that utilize invisible digital watermarks embedded in electronic documents, along with monitoring systems for tracking their distribution online and in the digital marketplace. Such models are recommended for use in copyright protection systems as effective tools to combat piracy and counterfeit digital content.
Keywords: digital watermark, copyright protection systems, parameters of the digital environment, monitoring models, risk assessment.
doi: 10.32403/0554-4866-2025-1-89-21-32