Skip to main content

Information Protection Based on the Theory of Ateb-Functions

  • Conference paper
  • 967 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 160))

Abstract

The authors developed a new data protection method, which is based on the theory of Ateb functions. This method can be employed for protecting financial documents such as banknotes and securities in general. The protection method creates hidden messages or images, which become visible on counterfeited documents.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kyrychok, P.O.: Protection securities. In: Kyrychok, P.O., Korostil, Y.M., Shevchuk, A.V. NTUU KPI (2008) (in Ukrainian)

    Google Scholar 

  2. Field, G.G: Color and It’s Reproduction. Graphic Arts Technical Foundation Reprinted 1992, ch. 2, 3 (1992)

    Google Scholar 

  3. Konshyn, A.A.: Protection printing documents. Synus (1999) (in Russian)

    Google Scholar 

  4. Phillips, G.K.: New Digital Anti-Copy/Scan and Verification Technologies Verify First Technologies. P.O. Box 7001, Paso Robles, CA 93447 USA

    Google Scholar 

  5. Phillips, G.K.: Document Security System Having Thermo Activated Pantograph and Validation Mark. Patents 5,873,604 and 6,665,406

    Google Scholar 

  6. Rosenberg, R.: The Ateb-functions and their proporties. Quart. Appt. Math. 21, 1 (1963)

    Google Scholar 

  7. Senyk, P.M.: About Ateb-functions. Dopovidi AN URSR no 1, pp. 23–26 (1968) (in Ukrainian)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dronjuk, I., Nazarkevych, M., Myroniuk, O. (2011). Information Protection Based on the Theory of Ateb-Functions. In: Kwiecień, A., Gaj, P., Stera, P. (eds) Computer Networks. CN 2011. Communications in Computer and Information Science, vol 160. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21771-5_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21771-5_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21770-8

  • Online ISBN: 978-3-642-21771-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics