Method of compression and ensuring the fidelity of video images in infocommunication networks
Abstract
Keywords
Full Text:
PDFReferences
JPEG Privacy & Security Abstract and Executive Summary, 2015. Available at: https://jpeg.org/items/20150910_privacy_security_summary.html. (accessed 7.06.2021).
Sharma, R., Bollavarapu, S. Data Security using Compression and Cryptography Techniques. International Journal of Computer Applications, 2015, vol. 117, no. 14, pp. 15-18. DOI: 10.5120/20621-3342.
Data Encryption Standard (DES), Federal Information Processing Standards Publication 46-3, 1999. 26 p.
Rivest, R. L., Shamir, A., Adleman, L. M. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978, vol. 21, iss. 2, pp. 120-126. DOI: 10.1145/359340.359342.
Barannik, V., Barannik, N., Ignatyev, O., Khimenko, V. Metod nepryamogo prihovuvannya informacii v procesi stusnennya videozobrazhen [Method of indirect information hiding in the process of video compression]. Radioelektronni i komp'uterni sistemi – Radioelectronic and computer systems, 2021, vol. 4, pp. 119–131. DOI: 10.32620/reks.2021.4.10.
Naor, M., Shamir, A. Visual Cryptography. Proceedings of the Advances in Cryptology – EUROCRYPT’94. Lecture Notes in Computer Science, 1995, vol. 950, pp. 1-12. DOI: 10.1007/bfb0053419.
Chen, T.-H., Wu, Ch.-S. Efficient multi-secret image sharing based on Boolean operation. Signal Processing, 2011, vol. 91, iss. 1, pp. 90-97. DOI: 10.1016/j.sigpro.2010.06.012.
Ieremeiev, O. I., Lukin, V. V., Okarma, K. Kombinovana metryka vizualʹnoyi yakosti zobrazhenʹ dystantsiynoho zonduvannya na osnovi neyronnoyi merezhi [Combined visual quality metric of remote sensing images based on neural metwork]. Radioelektronni i komp'uterni sistemi – Radioelectronic and computer systems, 2020, vol. 4, pp. 4-15. DOI: 10.32620/reks.2020.4.01.
Belikova, T. Decoding Method of Information-Psychological Destructions in the Phonetic Space of Information Resources. IEEE 2nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020), 2020, pp. 87-91. DOI: 10.1109/ATIT50783.2020.9349300.
Wu, Yu., Agaian, S., Noonan, J. Sudoku Associated Two Dimensional Bijections for Image Scrambling. IEEE Transactions on multimedia, 2012. 30 p. Available at: https://arxiv.org/abs/1207.5856v1. (accessed 7.06.2021).
Wong, K.-W. Image encryption using chaotic maps. Intelligent Computing Based on Chaos, 2009, vol. 184, pp. 333–354. DOI: 10.1007/978-3-540-95972-4_16.
Cheng, P., Yang, H., Wei, P., Zhang, W. A fast image encryption algorithm based on chaotic map and lookup table. Nonlinear Dynamics, 2015, vol. 79, iss. 3, pp. 2121-2131. DOI: 10.1007/s11071-014-1798-y.
Kurihara, K., Watanabe O., Kiya, H. An encryption-then-compression system for JPEG XR standard. IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), 2016, pp. 1-5. DOI: 10.1109/BMSB.2016.7521997.
Watanabe, O., Uchida, A., Fukuhara, T., Kiya, H. An Encryption-then-Compression system for JPEG 2000 standard. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015, pp. 1226-1230. DOI: 10.1109/ICASSP.2015.7178165.
Zhou, J., Liu, X., Au, O. C., Tang, Y. Y. Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation. IEEE Transactions on Information Forensics and Security, 2014, vol. 9, no. 1, pp. 39-50. DOI: 10.1109/TIFS.2013.2291625.
Dufaux, F., Ebrahimi, T. Toward a Secure JPEG. Applications of Digital Image Processing XXIX, 2006, vol. 6312, pp. 1-8. DOI: 10.1117/12.686963.
Information technology – JPEG 2000 image coding system: Secure JPEG 2000, International Standard ISO/IEC 15444-8, ITU-T Recommendation T.807, 2007. 108 p.
Yuan, L., Korshunov, P., Ebrahimi, T. Secure JPEG Scrambling enabling Privacy in Photo Sharing. 11 th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG), 2015, pp. 1-6. DOI: 10.1109/FG.2015.7285022.
Kobayashi, H., Kiya, H. Bitstream-Based JPEG Image Encryption with File-Size Preserving. IEEE 7 th Global Conference on Consumer Electronics (GCCE), 2018, pp. 1-4. DOI: 10.1109/gcce.2018.8574605.
Minemura, K., Moayed, Z., Wong, K., Qi, X., Tanaka, K. JPEG image scrambling without expansion in bitstream size. 19 th IEEE International Conference on Image Processing, 2012, pp. 261-264. DOI: 10.1109/ICIP.2012.6466845.
Ji, Sh., Tong, X., Zhang, M. Image encryption schemes for JPEG and GIF formats based on 3D baker with compound chaotic sequence generator, 2012. Available at: https://arxiv.org/abs/1208.0999. (accessed 7.06.2021).
Chen, C., Zhuo, Y. A research on anti-jamming method based on compressive sensing for OFDM analogous system. IEEE 17th International Conference on Communication Technology (ICCT), 2017, pp. 655-659. DOI: 10.1109/ICCT.2017.8359718.
Wang, S., Kim, S., Yin, Z., He, T. Encode when necessary: Correlated network coding under unreliable wireless links. ACM Transactions on Sensor Networks, 2017, vol. 13, no. 1, pp. 24-29, DOI: 10.1145/ 3023953.
Phatak, A. A Non-format Compliant Scalable RSA-based JPEG Encryption Algorithm. International Journal of Image. Graphics and Signal Processing, 2016, vol. 8, no. 6, pp. 64-71. DOI: 10.5815/ijigsp.2016.06.08.
Yang, Y., Zhu, B. B., Li, S., Yu1, N. Efficient and Syntax-Compliant JPEG 2000 Encryption Preserving Original Fine Granularity of Scalability. EURASIP Journal on Information Security, 2008, vol. 2007, Article No. 056365. 13 p. DOI: 10.1155/2007/56365.
Komolov, D., Zhurbynskyy, D., Kulitsa, O. Selective method for hiding of video information resource in telecommunication systems based on encryption of energy-significant blocks of reference I-Frame. 1st International Conference on Advanced Information and Communication Technologies (AICT'2015), 2015, pp. 80-83.
Wu, Y., Noonan, J. P., Agaian, S. NPCR and UACI Randomness Tests for Image Encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), 2011, vol. 2, pp. 31-38. DOI: 10.4236/jss.2015.33005.
Barannik, V., Tarasenko, D. Method coding efficiency segments for information technology processing video. 4 th International Scientific-Practical Conference on Problems of Infocommunications. Science and Technology (PIC S&T), 2017, pp. 551-555. DOI: 10.1109/INFOCOMMST.2017.8246460.
Barannik, V. V., Hahanova, A. V. Ocenka informativnosti dvoichnih massivov na osnove kombinatornogo padhodu maskuvalʹnoho ushchilʹnennya [Evaluation information content of binary arrays based on the combinatorial approach]. Information processing systems, 2021, vol. 6, рр. 11–13.
Barannik, V., Krasnorutsky, A., Onyshchenko, R., Shulgin, S., Slobodyanyuk, O. Marker Information Coding for Structural Clustering of Spectral Space. 3nd Іntеrnаtіоnаl Cоnfеrеncе оn Аdvаncеd Trеnds іn Іnfоrmаtіоn Thеоrу (АTІT), 2021, pp. 46-51. DOI: 10.1109/ATIT54053.2021.9678538.
Barannik, V., Krasnorutsky, А., Pasynchuk, K, Babenko, Yu., Stepanko, O., Tupisa, I. Metod restrukturizacii videodannuh v sistemah kompresiinogo koduvannya dlay pidvishennya dostovirnosti [A Method for Restructuring Video Data in Compressed Coding Systems to Increase Reliability]. Visnyk NTUU KPI Seriia - Radiotekhnika Radioaparatobuduvannia, 2022, vol. 88, pp. 50 59. DOI: 10.20535/RADAP.2022.88.50-59.
DOI: https://doi.org/10.32620/reks.2022.4.10
Refbacks
- There are currently no refbacks.