Method of processing video data with the possibility of their protection after quantization

Дмитро Сергійович Гаврилов, Сергій Степанович Бучік, Юрій Михайлович Бабенко, Сергій Сергійович Шульгін, Олександр Васильович Слободянюк

Abstract


The subject of research in the article is the video processing processes based on the JPEG platform for data transmission in the information and telecommunication network. The aim is to build a method for processing a video image with the possibility of protecting it at the quantization stage with subsequent arithmetic coding. That will allow, while preserving the structural and statistical regularity, to ensure the necessary level of accessibility, reliability, and confidentiality when transmitting video data. Task: research of known methods of selective video image processing with the subsequent formalization of the video image processing procedure at the quantization stage and statistical coding of significant blocks based on the JPEG platform. The methods used are an algorithm based on the JPEG platform, methods for selecting significant informative blocks, arithmetic coding. The following results were obtained. A method for processing a video image with the possibility of its protection at the stage of quantization with subsequent arithmetic coding has been developed. This method will allow, while preserving the structural and statistical regularity, to fulfill the set requirements for an accessible, reliable, and confidential transmission of video data. Ensuring the required level of availability is associated with a 30% reduction in the video image volume compared to the original volume. Simultaneously, the provision of the required level of confidence is confirmed by an estimate of the peak signal-to-noise ratio for an authorized user, which is dB. Ensuring the required level of confidentiality is confirmed by an estimate of the peak signal-to-noise ratio in case of unauthorized access, which is equal to dB. Conclusions. The scientific novelty of the results obtained is as follows: for the first time, two methods of processing video images at the quantization stage have been proposed. The proposed technologies fulfill the assigned tasks to ensure the required level of confidentiality at a given level of confidence. Simultaneously, the method of using encryption tables has a higher level of cryptographic stability than the method of using the key matrix. It is due to a a more complex mathematical apparatus. Which, in turn, increases the time for processing the tributes. To fulfill the requirement of data availability, it is proposed to use arithmetic coding for info-normative blocks, which should be more efficient compared with the methods of code tables. So, the method of using the scoring tables has greater cryptographic stability, and the method of using the matrix-key has higher performance. Simultaneously, the use of arithmetic coding will satisfy the need for accessibility by reducing the initial volume.

Keywords


quantization; data transfer efficiency; cryptographic protection; quality; data processing

References


JPEG Privacy & Security Abstract and Executive Summary, 2015. Available at: https://jpeg.org/items/20150910_privacy_security_summary.html. (accessed 7.04.2021).

Barannik, V., Sidchenko, S., Barannik, D. Technology for Protecting Video Information Resources in the Info-Communication Space. IEEE 2 nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020), 2020, pp. 29-33. DOI: 10.1109/ATIT50783.2020.9349324.

Barannik, V., Sidchenko S., Barannik N., Barannik V. Development of the method for encoding service data in cryptocompression image representation systems. Eastern-European Journal of Enterprise Technologies, 2017, vol. 3, no. 9 (111), pp. 103-115. DOI: 10.15587/1729-4061.2021.235521.

DSTU 7624:2014: Informatsiini tekhnolohii. Kryptohrafichnyi zakhyst informatsii. Alhorytm symetrychnoho blokovoho peretvorennia [Information Technology. Cryptographic protection of information. Symmetric block transformation algorithm]. Ministry of Economic Development of Ukraine, 2015. 39 p.

Data Encryption Standard (DES), Federal Information Processing Standards Publication 46-3, 1999. 26 p.

DSTU GOST 28147:2009: Systema obrobky informatsii. Zakhyst kryptohrafichnyi. Alhorytm kryptohrafichnoho peretvorennia (HOST 28147-89) [Information processing system. Cryptographic protection. Cryptographic transformation algorithm (GOST 28147-89)], State Committee for Technical Regulation and Consumer Policy (Derzhspozhivstandart) of Ukraine, 2008. 20 p.

Rivest, R. L., Shamir, A., Adleman, L. M. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978, vol. 21, iss. 2, pp. 120-126. DOI: 10.1145/359340.359342.

Barannik, V., Babenko, Yu., Kulitsa, O., Barannik, V., Khimenko, A., Matviichuk-Yudina, O. Significant Microsegment Transformants Encoding Method to Increase the Availability of Video Information Resource. IEEE 2 nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020), 2020, pp. 52-56. DOI: 10.1109/ATIT50783.2020.9349256.

Chen, T.-H., Wu, Ch.-S. Efficient multi-secret image sharing based on Boolean operation. Signal Processing, 2011, vol. 91, iss. 1, pp. 90-97. DOI: 10.1016/j.sigpro.2010.06.012.

Barannik, V., Shulgin, S., Krasnorutsky, A., Slobodyanyuk, O., Gurzhii, P., Korolyova, N. Methodological Fundamentals of Deciphering Coding of Aerophotography Segments on Special Equipment of Unmanned Complex. IEEE 2 nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020), 2020, pp. 38-43. DOI: 10.1109/ATIT50783.2020.9349257.

Li, F., Krivenko, S., Lukin, V. Two-step providing of desired quality in lossy image compression by SPIHT. Radioelektronni i komp'uterni sistemi – Radioelectronic and computer systems, 2020, no. 2 (94), pp. 22-32. DOI: 10.32620/reks.2020.2.02.

Ieremeiev, O., Lukin, V., Okarma, K. Combined visual quality metric of remote sensing images based on neural тetwork. Radioelektronni i komp'uterni sistemi – Radioelectronic and computer systems, 2020, no. 4 (96), pp. 4-15. DOI: 10.32620/reks.2020.4.01.

Barannik, V., Jancarczyk, D., Babenko, Yu., Stepanko, O., Nikodem, J., Zawislak, S. A Model for Representing Significant Segments of a Video Image Based on Locally Positional Coding on a Structural Basis. IEEE 5nd International Symposium on Smart and Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IEEE IDAACS-SWS 2020), 2020, pp. 1-5. DOI: 10.1109/IDAACS-SWS50031.2020.9297068.

Barannik, V., Himenko, V., Babenko, Yu., Hahanova, A., Fustii V. Technology of Composite Code Forming in The Spatial-Spectral Description Significant Microsegments. IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (IEEE TCSET 2020), 2020, pp. 703-706. DOI: 10.1109/TCSET49122.2020.235523.

Wu, Yu., Agaian, S., Noonan, J. Sudoku Associated Two Dimensional Bijections for Image Scrambling. IEEE Transactions on multimedia, 2012. 30 p. Available at: https://arxiv.org/abs/1207.5856v1. (accessed 7.04.2021).

Barannik, V., Kharchenko, N., Othman Shadi, O., Musienko, A. A method to control bit rate while compressing predicted frames. IEEE International Conference on The Experience of Designing and Application of CAD Systems in Microelectronics (IEEE CADSM 2015), 2015, pp. 36-38. DOI: 10.1109/CADSM.2015.7230789.

Vladimir Barannik, Anna Hahanova, Vladimir Krivonos. Coding tangible component of transforms to provide accessibility and integrity of video data. 2013. International Symposium, East-West Design & Test Symposium (EWDTS), 2013, pp. 1-5. DOI: 10.1109/EWDTS.2013.6673179.

Cheng, P., Yang, H., Wei, P., Zhang, W. A fast image encryption algorithm based on chaotic map and lookup table. Nonlinear Dynamics, 2015, vol. 79, iss. 3, pp. 2121-2131. DOI: 10.1007/s11071-014-1798-y.

Guesmi, R., Farah, M.A.B., Kachouri, A., Samet, M. A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2. Nonlinear Dynamics, 2016, vol. 83, iss. 3, pp. 1123-1136. DOI: 10.1007/s11071-015-2392-7.

Barannik, V., Barannik, V. Binomial-Polyadic Binary Data Encoding by Quantity of Series of Ones. 15th IEEE International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET’2020), 2020, pp. 775-780. DOI: 10.1109/TCSET49122.2020.235540.

Kurihara, K., Watanabe O., Kiya, H. An encryption-then-compression system for JPEG XR standard. IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), 2016, pp. 1-5. DOI: 10.1109/BMSB.2016.7521997.

Sharma, R., Bollavarapu, S. Data Security using Compression and Cryptography Techniques. International Journal of Computer Applications, 2015, vol. 117, no. 14, pp. 15-18. DOI: 10.5120/20621-3342..

Zhou, J., Liu, X., Au, O. C., Tang, Y. Y. Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation. IEEE Transactions on Information Forensics and Security, 2014, vol. 9, no. 1, pp. 39-50. DOI: 10.1109/TIFS.2013.2291625.

Barannik, V., Barannik, D., Fustii, V., Parkhomenko, M. Technology for Protecting Video Information Resources in the Info-Communication Space. IEEE 3rd International Conference on Advanced Information and Communications Technologies (IEEE AICT 2019), 2019, pp. 248-250. DOI: 10.1109/AIACT.2019.8847820.

Information technology – JPEG 2000 image coding system: Secure JPEG 2000, International Standard ISO/IEC 15444-8, ITU-T Recommendation T.807, 2007. 108 p.

Barannik, V., Ryabukha, Yu., Podlesnyi, S. Structural slotting with uniform redistribution for enhancing trustworthiness of information streams, Telecommunications and Radio Engineering, 2017, vol. 76, no 7, pp. 607-615. DOI: 10.1615/TelecomRadEng.v76.i7.40.

Farajallah, M. Chaos-based crypto and joint crypto-compression systems for images and videos, 2015. Available at: https://hal.archives-ouvertes.fr/tel-01179610. (accessed 7.06.2021).

Wong, K., Tanaka, K. DCT based scalable scrambling method with reversible data hiding functionality. 4th International Symposium on Communications, Control and Signal Processing (ISCCSP), 2010, pp. 1-4. DOI: 10.1109/ISCCSP.2010.5463307.

Barannik, V., Kharchenko, N., Tverdokhleb, V., Kulitsa, O. The issue of timely delivery of video traffic with controlled loss of quality. In: 2016 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET), 2016, pp. 902-904. doi: 10.1109/TCSET.2016.7452220.

Watanabe, O., Uchida, A., Fukuhara, T., Kiya, H. An Encryption-then-Compression system for JPEG 2000 standard. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015, pp. 1226-1230, DOI: 10.1109/ICASSP.2015.7178165.

Minemura, K., Moayed, Z., Wong, K., Qi, X., Tanaka, K. JPEG image scrambling without expansion in bitstream size. 19 th IEEE International Conference on Image Processing, 2012, pp. 261-264. DOI: 10.1109/ICIP.2012.6466845.

Barannik, V. V., Karpinski, M. P., Tverdokhleb, V. V., Barannik, D. V., Himenko, V. V., Aleksander, M. The technology of the video stream intensity controlling based on the bit-planes recombination. 4th IEEE International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS), 2018, pp. 25-28. DOI: 10.1109/IDAACS-SWS.2018.8525560.

Ji, Sh., Tong, X., Zhang, M. Image encryption schemes for JPEG and GIF formats based on 3D baker with compound chaotic sequence generator, 2012. Available at: https://arxiv.org/abs/1208.0999. (accessed 7.04.2021).

Barannik Valeriy. Fast Coding of Irregular Binary Binomial Numbers with a Set Number of Units Series. IEEE 2nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020), 2020, pp. 29-33. DOI: 10.1109/ATIT50783.2020.9349356.

Barannik, D. Stegano-Compression Coding in a Non-Equalible Positional Base. IEEE 2 nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020), 2020, pp. 83-86. DOI: 10.1109/ATIT50783.2020.9349328.

Barannik, V., Barannik, N., Ryabukha, Yu., Barannik, D. Indirect Steganographic Embedding Method Based On Modifications of The Basis of the Polyadic System. 15 th IEEE International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET’2020), 2020, pp. 699-702. DOI: 10.1109/TCSET49122.2020.235522.

Barannik, V., Belikova, T., Gurzhii, P. The model of threats to information and psychological security, taking into account the hidden information destructive impact on the subconscious of adolescents. 2019. IEEE International Conference on Advanced Trends in Information Theory (ATIT), 2019, pp. 656-661. DOI: 10.1109/ATIT49449.2019.9030432.

Yuan, L., Korshunov, P., Ebrahimi, T. Secure JPEG Scrambling enabling Privacy in Photo Sharing. 11 th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG), 2015, pp. 1-6. DOI: 10.1109/FG.2015.7285022.

Barannik, V., Barannik, V., Havrylov, D., Sorokun, A. Development Second and Third Phase of the Selective Frame Processing Method. 3rd International Conference on Advanced Information and Communications Technologies (AICT), 2019, pp. 54-57. DOI: 10.1109/AIACT.2019.8847897.

Barannik, V., Komolov, D., Musienko, A., Tarnopolov, R. Methodological basis for determining the energy significance of the structural unit of a video frame based on the estimation of low-frequency components of the matrices of the DCT blocks of the luminance component. 13th International Conference on Modern Problems of Radio Engineering on Telecommunications and Computer Science (TCSET), 2016, pp. 739-741. DOI: 10.1109/TCSET.2016.7452168.

Komolov, D., Zhurbynskyy, D., Kulitsa, O. Selective Method For Hiding Of Video Information Resource In Telecommunication Systems Based On Encryption Of Energy-Significant Blocks Of Reference I-Frame. 1st International Conference on Advanced Information and Communication Technologies (AICT'2015), 2015, pp. 80-83.

Wu, Y., Noonan, J. P., Agaian, S. NPCR and UACI Randomness Tests for Image Encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), 2011, vol. 2, pp. 31-38. DOI: 10.4236/jss.2015.33005.




DOI: https://doi.org/10.32620/reks.2021.2.06

Refbacks

  • There are currently no refbacks.