The method of masking overhead compaction in video compression systems

Володимир Вікторович Бараннік, Сергій Олександрович Сідченко, Наталія Вячеславівна Бараннік, Андрій Михайлович Хіменко

Abstract


The demand for video privacy is constantly increasing. Simultaneously, it is necessary to solve an urgent scientific and applied problem, which consists in increasing the confidentiality of video information under conditions of a given time delay for its processing and delivery, while ensuring its reliability. The crypto compression transformations can be used to solve it. A service component is used as a conversion key, which is directly formed in the conversion process and contains information about the identified structural characteristics of the video data. Therefore, such information requires confidentiality. The existing methods of cryptography are designed to process a universal data stream and do not consider the structure and features of service components. It leads to the formation of redundant data, the use of an excessive number of operations, and an increase in processing time in the process of protecting service information using universal cryptography methods. Therefore, the article aims to develop a method for masking service data compression to ensure their confidentiality, considering the peculiarities of their formation by crypto compression methods. In modes with controlled loss of information quality, the elements of the service component are formed in a reduced dynamic range. Their length is 7 bits. To ensure the confidentiality of such elements, it is necessary to develop a method for masking overhead compression in video compression systems. On the one hand, overhead blocks should not contain redundant information. On the other hand, they must be formed from bit positions from different elements of the service components. On the other hand, they should be formed from bit positions from different elements of the service components. For that, it is proposed to organize the assembly of the elements of the service components. It is organized by combining 7-bit elements of service components into 8-bit complete sequences. Encryption blocks are formed from 8-bit sequences. The assembly of service components ensures the mixing of service data and reducing their quantity. To violate the structure of the representation of service components, it is proposed to additionally organize the permutation of 8-bit completed sequences. It provides a significant dispersion of the bit positions of the 7-bit overhead elements and the destruction of the correlation between the overhead elements. The correlation coefficients of the original and reconstructed images using encrypted service components are in the region of 0. The number of changing pixels is above the theoretical threshold value of 99.5341%.

Keywords


compression image presentation; service component; information protection; confidentiality; encryption; scrambling; encoding; compression; image; the least significant bit

References


JPEG Privacy & Security Abstract and Executive Summary, 2015. Available at: https://jpeg.org/items/20150910_privacy_security_summary.html. (accessed 7.04.2021).

Sharma, R., Bollavarapu, S. Data Security using Compression and Cryptography Techniques. International Journal of Computer Applications, 2015, vol. 117, no. 14, pp. 15-18. DOI: 10.5120/20621-3342.

Announcing the ADVANCED ENCRYPTION STANDARD (AES), Federal Information Processing Standards Publication 197, 2001, 51 p.

DSTU 7624:2014: Informatsiini tekhnolohii. Kryptohrafichnyi zakhyst informatsii. Alhorytm symetrychnoho blokovoho peretvorennia [Information Technology. Cryptographic protection of information. Symmetric block transformation algorithm]. Ministry of Economic Development of Ukraine, 2015, 39 p.

Data Encryption Standard (DES), Federal Information Processing Standards Publication 46-3, 1999, 26 p.

DSTU GOST 28147:2009: Systema obrobky informatsii. Zakhyst kryptohrafichnyi. Alhorytm kryptohrafichnoho peretvorennia (HOST 28147-89) [Information processing system. Cryptographic protection. Cryptographic transformation algorithm (GOST 28147-89)], State Committee for Technical Regulation and Consumer Policy (Derzhspozhivstandart) of Ukraine, 2008, 20 p.

Rivest, R. L., Shamir, A., Adleman, L. M. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978, vol. 21, iss. 2, pp. 120-126. DOI: 10.1145/359340.359342.

Naor, M., Shamir, A. Visual Cryptography. Proceedings of the Advances in Cryptology – EUROCRYPT’94. Lecture Notes in Computer Science, 1995, vol. 950, pp. 1-12. DOI: 10.1007/bfb0053419.

Chen, T.-H., Wu, Ch.-S. Efficient multi-secret image sharing based on Boolean operation. Signal Processing, 2011, vol. 91, iss. 1, pp. 90-97. DOI: 10.1016/j.sigpro.2010.06.012.

Deshmukh, M., Nain, N., Ahmed, M. An (n, n)-Multi Secret Image Sharing Scheme Using Boolean XOR and Modular Arithmetic. IEEE 30 th International Conference on Advanced Information Networking and Applications (AINA), 2016, pp. 690-697. DOI: 10.1109/aina.2016.56.

Yang, Ch.-N., Chen, Ch.-H., Cai, S.-R. Enhanced Boolean-based multi secret image sharing scheme. Journal of Systems and Software, 2016, vol. 116, pp. 22-34. DOI: 10.1016/j.jss.2015.01.031.

Farajallah, M. Chaos-based crypto and joint crypto-compression systems for images and videos, 2015. Available at: https://hal.archives-ouvertes.fr/tel-01179610. (accessed 7.04.2021).

Wu, Yu., Agaian, S., Noonan, J. Sudoku Associated Two Dimensional Bijections for Image Scrambling. IEEE Transactions on multimedia, 2012, 30 p. Available at: https://arxiv.org/abs/1207.5856v1. (accessed 7.04.2021).

Wong, K.-W. Image encryption using chaotic maps. Intelligent Computing Based on Chaos, 2009, vol. 184, pp. 333–354. DOI: 10.1007/978-3-540-95972-4_16.

Ramakrishnan, S. et al. Cryptographic and Information Security Approaches for Images and Videos, CRC Press, 2018. 962 p. DOI: 10.1201/9780429435461.

Cheng, P., Yang, H., Wei, P., Zhang, W. A fast image encryption algorithm based on chaotic map and lookup table. Nonlinear Dynamics, 2015, vol. 79, iss. 3, pp. 2121-2131. DOI: 10.1007/s11071-014-1798-y.

Guesmi, R., Farah, M.A.B., Kachouri, A., Samet, M. A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2. Nonlinear Dynamics, 2016, vol. 83, iss. 3, pp. 1123-1136. DOI: 10.1007/s11071-015-2392-7.

Barannik, V., Barannik, V. Binomial-Polyadic Binary Data Encoding by Quantity of Series of Ones. 15th IEEE International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET’2020), 2020, pp. 775-780. DOI: 10.1109/TCSET49122.2020.235540.

Kurihara, K., Watanabe O., Kiya, H. An encryption-then-compression system for JPEG XR standard. IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), 2016, pp. 1-5. DOI: 10.1109/BMSB.2016.7521997.

Watanabe, O., Uchida, A., Fukuhara, T., Kiya, H. An Encryption-then-Compression system for JPEG 2000 standard. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015, pp. 1226-1230, DOI: 10.1109/ICASSP.2015.7178165.

Zhou, J., Liu, X., Au, O. C., Tang, Y. Y. Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation. IEEE Transactions on Information Forensics and Security, 2014, vol. 9, no. 1, pp. 39-50. DOI: 10.1109/TIFS.2013.2291625.

Dufaux, F., Ebrahimi, T. Toward a Secure JPEG. Applications of Digital Image Processing XXIX, 2006, vol. 6312, pp. 1-8. DOI: 10.1117/12.686963.

Information technology – JPEG 2000 image coding system: Secure JPEG 2000, International Standard ISO/IEC 15444-8, ITU-T Recommendation T.807, 2007, 108 p.

Honda, T., Murakami, Y., Yanagihara, Y., Kumaki, T., Fujino, T. Hierarchical image-scrambling method with scramble-level controllability for privacy protection. IEEE 56th International Midwest Symposium on Circuits and Systems (MWSCAS), 2013, pp. 1371-1374. DOI: 10.1109/MWSCAS.2013.6674911.

Yuan, L., Korshunov, P., Ebrahimi, T. Secure JPEG Scrambling enabling Privacy in Photo Sharing. 11 th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG), 2015, pp. 1-6. DOI: 10.1109/FG.2015.7285022.

Wong, K., Tanaka, K. DCT based scalable scrambling method with reversible data hiding functionality. 4th International Symposium on Communications, Control and Signal Processing (ISCCSP), 2010, pp. 1-4. DOI: 10.1109/ISCCSP.2010.5463307.

Auer, S., Bliem, A., Engel, D., Uhl, A., Unterweger, A. Bitstream-based JPEG Encryption in Real-time. International Journal of Digital Crime and Forensics, 2013, vol. 5, iss. 3, pp. 1-14. DOI: 10.4018/jdcf.2013070101.

Kobayashi, H., Kiya, H. Bitstream-Based JPEG Image Encryption with File-Size Preserving. IEEE 7 th Global Conference on Consumer Electronics (GCCE), 2018, pp. 1-4. DOI: 10.1109/gcce.2018.8574605.

Minemura, K., Moayed, Z., Wong, K., Qi, X., Tanaka, K. JPEG image scrambling without expansion in bitstream size. 19 th IEEE International Conference on Image Processing, 2012, pp. 261-264. DOI: 10.1109/ICIP.2012.6466845.

Barannik, V. V., Karpinski, M. P., Tverdokhleb, V. V., Barannik, D. V., Himenko, V. V., Aleksander, M. The technology of the video stream intensity controlling based on the bit-planes recombination. 4th IEEE International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS), 2018, pp. 25-28. DOI: 10.1109/IDAACS-SWS.2018.8525560.

Ji, Sh., Tong, X., Zhang, M. Image encryption schemes for JPEG and GIF formats based on 3D baker with compound chaotic sequence generator, 2012. Available at: https://arxiv.org/abs/1208.0999. (accessed 7.04.2021).

Phatak, A. A Non-format Compliant Scalable RSA-based JPEG Encryption Algorithm. International Journal of Image. Graphics and Signal Processing, 2016, vol. 8, no. 6, pp 64-71. DOI: 10.5815/ijigsp.2016.06.08.

Yang, Y., Zhu, B. B., Li, S., Yu1, N. Efficient and Syntax-Compliant JPEG 2000 Encryption Preserving Original Fine Granularity of Scalability. EURASIP Journal on Information Security, Vol. 2007, 2008, Article ID 56365, 13 p. DOI: 10.1155/2007/56365.

Barannik, V., Barannik, N., Ryabukha, Yu., Barannik, D. Indirect Steganographic Embedding Method Based On Modifications of The Basis of the Polyadic System. 15 th IEEE International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET’2020), 2020, pp. 699-702. DOI: 10.1109/TCSET49122.2020.235522.

Barannik, V. V., Ryabukha, Yu. N., Kulitsa, О. S. The method for improving security of the remote video information resource on the basis of intellectual processing of video frames in the telecommunication systems. Telecommunications and Radio Engineering, 2017, vol. 76, no. 9, pp. 785-797. DOI: 10.1615/TelecomRadEng.v76.i9.40.

Barannik, V., Barannik, V., Havrylov, D., Sorokun, A. Development Second and Third Phase of the Selective Frame Processing Method. 3rd International Conference on Advanced Information and Communications Technologies (AICT), 2019, pp. 54-57. DOI: 10.1109/AIACT.2019.8847897.

Alimpiev, A. N., Barannik, V. V., Sidchenko, S. A. The method of cryptocompression presentation of videoinformation resources in a generalized structurally positioned space. Telecommunications and Radio Engineering, 2017, vol. 76, no. 6, pp. 521-534. DOI: 10.1615/TelecomRadEng.v76.i6.60.

Barannik, V., Sidchenko, S., Barannik, D. Technology for Protecting Video Information Resources in the Info-Communication Space. IEEE 2 nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020), 2020, pp. 29-33. DOI: 10.1109/ATIT50783.2020.9349324.

Barannik, V., Sidchenko, S., Barannik, N., Barannik, V. Development of the method for encoding service data in cryptocompression image representation systems. Eastern-European Journal of Enterprise Technologies, 2021, vol. 3, no. 9(111), pp. 103–115. DOI: 10.15587/1729-4061.2021.235521.

Li, F., Krivenko, S., Lukin, V. Two-step providing of desired quality in lossy image compression by SPIHT. Radioelectronic and computer systems, 2020, no. 2, pp. 22-32. DOI: 10.32620/reks.2020.2.02.

Ieremeiev, O., Lukin, V., Okarma, K. Combined visual quality metric of remote sensing images based on neural network. Radioelectronic and computer systems, 2020, no. 4, pp. 4-15. DOI: 10.32620/reks.2020.4.01.

Wu, Y., Noonan, J. P., Agaian, S. NPCR and UACI Randomness Tests for Image Encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), 2011, vol. 2, pp. 31-38. DOI: 10.4236/jss.2015.33005.




DOI: https://doi.org/10.32620/reks.2021.2.05

Refbacks

  • There are currently no refbacks.