Method of processing video data with the possibility of their protection after quantization
Abstract
Keywords
Full Text:
PDF (Українська)References
JPEG Privacy & Security Abstract and Executive Summary, 2015. Available at: https://jpeg.org/items/20150910_privacy_security_summary.html. (accessed 7.04.2021).
Barannik, V., Sidchenko, S., Barannik, D. Technology for Protecting Video Information Resources in the Info-Communication Space. IEEE 2 nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020), 2020, pp. 29-33. DOI: 10.1109/ATIT50783.2020.9349324.
Barannik, V., Sidchenko S., Barannik N., Barannik V. Development of the method for encoding service data in cryptocompression image representation systems. Eastern-European Journal of Enterprise Technologies, 2017, vol. 3, no. 9 (111), pp. 103-115. DOI: 10.15587/1729-4061.2021.235521.
DSTU 7624:2014: Informatsiini tekhnolohii. Kryptohrafichnyi zakhyst informatsii. Alhorytm symetrychnoho blokovoho peretvorennia [Information Technology. Cryptographic protection of information. Symmetric block transformation algorithm]. Ministry of Economic Development of Ukraine, 2015. 39 p.
Data Encryption Standard (DES), Federal Information Processing Standards Publication 46-3, 1999. 26 p.
DSTU GOST 28147:2009: Systema obrobky informatsii. Zakhyst kryptohrafichnyi. Alhorytm kryptohrafichnoho peretvorennia (HOST 28147-89) [Information processing system. Cryptographic protection. Cryptographic transformation algorithm (GOST 28147-89)], State Committee for Technical Regulation and Consumer Policy (Derzhspozhivstandart) of Ukraine, 2008. 20 p.
Rivest, R. L., Shamir, A., Adleman, L. M. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978, vol. 21, iss. 2, pp. 120-126. DOI: 10.1145/359340.359342.
Barannik, V., Babenko, Yu., Kulitsa, O., Barannik, V., Khimenko, A., Matviichuk-Yudina, O. Significant Microsegment Transformants Encoding Method to Increase the Availability of Video Information Resource. IEEE 2 nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020), 2020, pp. 52-56. DOI: 10.1109/ATIT50783.2020.9349256.
Chen, T.-H., Wu, Ch.-S. Efficient multi-secret image sharing based on Boolean operation. Signal Processing, 2011, vol. 91, iss. 1, pp. 90-97. DOI: 10.1016/j.sigpro.2010.06.012.
Barannik, V., Shulgin, S., Krasnorutsky, A., Slobodyanyuk, O., Gurzhii, P., Korolyova, N. Methodological Fundamentals of Deciphering Coding of Aerophotography Segments on Special Equipment of Unmanned Complex. IEEE 2 nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020), 2020, pp. 38-43. DOI: 10.1109/ATIT50783.2020.9349257.
Li, F., Krivenko, S., Lukin, V. Two-step providing of desired quality in lossy image compression by SPIHT. Radioelektronni i komp'uterni sistemi – Radioelectronic and computer systems, 2020, no. 2 (94), pp. 22-32. DOI: 10.32620/reks.2020.2.02.
Ieremeiev, O., Lukin, V., Okarma, K. Combined visual quality metric of remote sensing images based on neural тetwork. Radioelektronni i komp'uterni sistemi – Radioelectronic and computer systems, 2020, no. 4 (96), pp. 4-15. DOI: 10.32620/reks.2020.4.01.
Barannik, V., Jancarczyk, D., Babenko, Yu., Stepanko, O., Nikodem, J., Zawislak, S. A Model for Representing Significant Segments of a Video Image Based on Locally Positional Coding on a Structural Basis. IEEE 5nd International Symposium on Smart and Wireless Systems within the Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IEEE IDAACS-SWS 2020), 2020, pp. 1-5. DOI: 10.1109/IDAACS-SWS50031.2020.9297068.
Barannik, V., Himenko, V., Babenko, Yu., Hahanova, A., Fustii V. Technology of Composite Code Forming in The Spatial-Spectral Description Significant Microsegments. IEEE 15th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (IEEE TCSET 2020), 2020, pp. 703-706. DOI: 10.1109/TCSET49122.2020.235523.
Wu, Yu., Agaian, S., Noonan, J. Sudoku Associated Two Dimensional Bijections for Image Scrambling. IEEE Transactions on multimedia, 2012. 30 p. Available at: https://arxiv.org/abs/1207.5856v1. (accessed 7.04.2021).
Barannik, V., Kharchenko, N., Othman Shadi, O., Musienko, A. A method to control bit rate while compressing predicted frames. IEEE International Conference on The Experience of Designing and Application of CAD Systems in Microelectronics (IEEE CADSM 2015), 2015, pp. 36-38. DOI: 10.1109/CADSM.2015.7230789.
Vladimir Barannik, Anna Hahanova, Vladimir Krivonos. Coding tangible component of transforms to provide accessibility and integrity of video data. 2013. International Symposium, East-West Design & Test Symposium (EWDTS), 2013, pp. 1-5. DOI: 10.1109/EWDTS.2013.6673179.
Cheng, P., Yang, H., Wei, P., Zhang, W. A fast image encryption algorithm based on chaotic map and lookup table. Nonlinear Dynamics, 2015, vol. 79, iss. 3, pp. 2121-2131. DOI: 10.1007/s11071-014-1798-y.
Guesmi, R., Farah, M.A.B., Kachouri, A., Samet, M. A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2. Nonlinear Dynamics, 2016, vol. 83, iss. 3, pp. 1123-1136. DOI: 10.1007/s11071-015-2392-7.
Barannik, V., Barannik, V. Binomial-Polyadic Binary Data Encoding by Quantity of Series of Ones. 15th IEEE International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET’2020), 2020, pp. 775-780. DOI: 10.1109/TCSET49122.2020.235540.
Kurihara, K., Watanabe O., Kiya, H. An encryption-then-compression system for JPEG XR standard. IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), 2016, pp. 1-5. DOI: 10.1109/BMSB.2016.7521997.
Sharma, R., Bollavarapu, S. Data Security using Compression and Cryptography Techniques. International Journal of Computer Applications, 2015, vol. 117, no. 14, pp. 15-18. DOI: 10.5120/20621-3342..
Zhou, J., Liu, X., Au, O. C., Tang, Y. Y. Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation. IEEE Transactions on Information Forensics and Security, 2014, vol. 9, no. 1, pp. 39-50. DOI: 10.1109/TIFS.2013.2291625.
Barannik, V., Barannik, D., Fustii, V., Parkhomenko, M. Technology for Protecting Video Information Resources in the Info-Communication Space. IEEE 3rd International Conference on Advanced Information and Communications Technologies (IEEE AICT 2019), 2019, pp. 248-250. DOI: 10.1109/AIACT.2019.8847820.
Information technology – JPEG 2000 image coding system: Secure JPEG 2000, International Standard ISO/IEC 15444-8, ITU-T Recommendation T.807, 2007. 108 p.
Barannik, V., Ryabukha, Yu., Podlesnyi, S. Structural slotting with uniform redistribution for enhancing trustworthiness of information streams, Telecommunications and Radio Engineering, 2017, vol. 76, no 7, pp. 607-615. DOI: 10.1615/TelecomRadEng.v76.i7.40.
Farajallah, M. Chaos-based crypto and joint crypto-compression systems for images and videos, 2015. Available at: https://hal.archives-ouvertes.fr/tel-01179610. (accessed 7.06.2021).
Wong, K., Tanaka, K. DCT based scalable scrambling method with reversible data hiding functionality. 4th International Symposium on Communications, Control and Signal Processing (ISCCSP), 2010, pp. 1-4. DOI: 10.1109/ISCCSP.2010.5463307.
Barannik, V., Kharchenko, N., Tverdokhleb, V., Kulitsa, O. The issue of timely delivery of video traffic with controlled loss of quality. In: 2016 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET), 2016, pp. 902-904. doi: 10.1109/TCSET.2016.7452220.
Watanabe, O., Uchida, A., Fukuhara, T., Kiya, H. An Encryption-then-Compression system for JPEG 2000 standard. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015, pp. 1226-1230, DOI: 10.1109/ICASSP.2015.7178165.
Minemura, K., Moayed, Z., Wong, K., Qi, X., Tanaka, K. JPEG image scrambling without expansion in bitstream size. 19 th IEEE International Conference on Image Processing, 2012, pp. 261-264. DOI: 10.1109/ICIP.2012.6466845.
Barannik, V. V., Karpinski, M. P., Tverdokhleb, V. V., Barannik, D. V., Himenko, V. V., Aleksander, M. The technology of the video stream intensity controlling based on the bit-planes recombination. 4th IEEE International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS), 2018, pp. 25-28. DOI: 10.1109/IDAACS-SWS.2018.8525560.
Ji, Sh., Tong, X., Zhang, M. Image encryption schemes for JPEG and GIF formats based on 3D baker with compound chaotic sequence generator, 2012. Available at: https://arxiv.org/abs/1208.0999. (accessed 7.04.2021).
Barannik Valeriy. Fast Coding of Irregular Binary Binomial Numbers with a Set Number of Units Series. IEEE 2nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020), 2020, pp. 29-33. DOI: 10.1109/ATIT50783.2020.9349356.
Barannik, D. Stegano-Compression Coding in a Non-Equalible Positional Base. IEEE 2 nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020), 2020, pp. 83-86. DOI: 10.1109/ATIT50783.2020.9349328.
Barannik, V., Barannik, N., Ryabukha, Yu., Barannik, D. Indirect Steganographic Embedding Method Based On Modifications of The Basis of the Polyadic System. 15 th IEEE International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET’2020), 2020, pp. 699-702. DOI: 10.1109/TCSET49122.2020.235522.
Barannik, V., Belikova, T., Gurzhii, P. The model of threats to information and psychological security, taking into account the hidden information destructive impact on the subconscious of adolescents. 2019. IEEE International Conference on Advanced Trends in Information Theory (ATIT), 2019, pp. 656-661. DOI: 10.1109/ATIT49449.2019.9030432.
Yuan, L., Korshunov, P., Ebrahimi, T. Secure JPEG Scrambling enabling Privacy in Photo Sharing. 11 th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG), 2015, pp. 1-6. DOI: 10.1109/FG.2015.7285022.
Barannik, V., Barannik, V., Havrylov, D., Sorokun, A. Development Second and Third Phase of the Selective Frame Processing Method. 3rd International Conference on Advanced Information and Communications Technologies (AICT), 2019, pp. 54-57. DOI: 10.1109/AIACT.2019.8847897.
Barannik, V., Komolov, D., Musienko, A., Tarnopolov, R. Methodological basis for determining the energy significance of the structural unit of a video frame based on the estimation of low-frequency components of the matrices of the DCT blocks of the luminance component. 13th International Conference on Modern Problems of Radio Engineering on Telecommunications and Computer Science (TCSET), 2016, pp. 739-741. DOI: 10.1109/TCSET.2016.7452168.
Komolov, D., Zhurbynskyy, D., Kulitsa, O. Selective Method For Hiding Of Video Information Resource In Telecommunication Systems Based On Encryption Of Energy-Significant Blocks Of Reference I-Frame. 1st International Conference on Advanced Information and Communication Technologies (AICT'2015), 2015, pp. 80-83.
Wu, Y., Noonan, J. P., Agaian, S. NPCR and UACI Randomness Tests for Image Encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), 2011, vol. 2, pp. 31-38. DOI: 10.4236/jss.2015.33005.
DOI: https://doi.org/10.32620/reks.2021.2.06
Refbacks
- There are currently no refbacks.