Methods for solving authorization tasks in copyright protection systems

Author(s) Collection number Pages Download abstract Download full text
Sabat V. I., Богоніс О. О. № 1 (89) 21-32 Image Image

This paper addresses a pressing issue in the field of copyright protection—namely, the detection of illegal copies of digital information products that fall under the intellectual property rights of their developers and authors. This problem is particularly significant for software developers and publishers of electronic content, whose pro­ducts are often distributed via the global Internet. Unfortunately, effective mechanisms for protecting the rights of electronic product owners or intellectual property holders are scarce, and malicious actors are continuously discovering new ways to circumvent digital protection systems. In many cases, it is even difficult to prove the authorship of a given intellectual product if it has not undergone official licensing or patenting procedures—which, in turn, can also be violated or bypassed by infringers. The challenge of asserting intellectual property rights and initiating legal action against violations can only be addressed by solving the problem of intellectual product authorization. The implementation of copyright protection systems that employ digital watermarking offers a robust method for safeguarding private ownership of intellectual products—both for manufacturers and their original authors. The algorithms proposed in this paper provide a model for detecting unauthorized use of intellectual products through the embedding of digital watermarks. These algorithms enable the identification of pirated electronic publications and the individuals or entities distributing them, thereby enforcing the legitimate copyrights of intellectual property holders. The general algorithm presented herein for the operation of a copyright protection system lays the foundation for the development of information technologies that utilize invisible digital watermarks embedded in electronic documents, along with monitoring systems for tracking their distribution online and in the digital marketplace. Such models are recommended for use in copyright protection systems as effective tools to combat piracy and counterfeit digital content.

Keywords: digital watermark, copyright protection systems, parameters of the digital environment, monitoring models, risk assessment.

doi: 10.32403/0554-4866-2025-1-89-21-32


  • 1. Yaremchuk, Y. Ye., Karpinets, V. V., Zorya, I. S., & Kozak, D. O. (2023). Enhancing the ro­bustness of digital watermarks in streaming video using differential energy embedding (DEW). Herald of VPI, (1), 55–64.
  • 2. Zubko, I., Martovitskyi, V., Punchenko, A., & Karachevtsev, D. (2024). A review of digital watermarking methods for image protection. Control, Navigation and Communication Systems, 3(77), 121–125. https://doi.org/10.26906/SUNZ.2024.3.121.
  • 3. Ruban, I. V., Bologova, N. M., & Martovytskyi, V. O. (2022). Information technology for ownership verification of digital images. Modern Information Systems, 6(1), 118–123.
  • 4. Bodnia, M., Yesina, M., & Ponomar, V. (2024). Research on the use of steganographic and cryptographic algorithms for information hiding. Computer Science and Cybersecurity, (2), 43–57.
  • 5. Megías, D., Mazurczyk, W., & Kuribayashi, M. (2021). Data hiding and its applications: Digital watermarking and steganography. Applied Sciences, 11(10928), 1–6. https://doi.org/ 10.3390/app112210928.
  • 6. Durnyak, B. V., Sabat, V. I., & Muzyka, D. V. (2013). Steganographic methods for document protection (Monograph). Lviv: Ukrainian Academy of Printing.
  • 7. Tarasenko, L. (2022). Copyright in the digital age: Key trends and changes. Bulletin of the Lviv National University. Legal Series, (75), 61–72.
  • 8. Ray, A., & Roy, S. (2020). Recent trends in image watermarking techniques for copyright protection: A survey. International Journal of Multimedia Information Retrieval, 9, 249–270. https://doi.org/10.1007/s13735-020-00197-9.
  • 9. Megías, D., Mazurczyk, W., & Kuribayashi, M. (2021). Data hiding and its applications: Digital watermarking and steganography. Applied Sciences, 11(10928), 1–6. https://doi.org/ 10.3390/app112210928.
  • 10. Regazzoni, F., Palmieri, P., Smailbegovic, F., Cammarota, R., & Polian, I. (2021). Protecting artificial intelligence IPs: A survey of watermarking and fingerprinting for machine learning. CAAI Transactions on Intelligence Technology, 6(2), 180–191.
  • 11. International Telecommunication Union. (2023). Recommendation X.509 (2019), Corrigendum 2 (10/23). https://www.itu.int/rec/T-REC-X.509-202310-I!Cor2/en.
  • 12. Subramanya, S. R. (2006). Digital signatures. IEEE Potentials, 25(2), 5–8. https://doi.org/10.1109/MP.2006.1649003.
  • 13. Sabat, V. I., & Bohonis, O. O. (2025). Development of a mathematical monitoring model for a copyright protection system. Science and Technology Today, (6)47, 1537–1553.