Method of compression and ensuring the fidelity of video images in infocommunication networks

Vladimir Barannik, Andrii Krasnorutsky, Vitalii Kolesnyk, Valeriy Barannik, Sergii Pchelnikov, Pavlo Zeleny

Abstract


Subject research in the article is the methods of compressing video images under conditions of ensuring the desired level of their fidelity in the delivery process using infocommunication networks. The goal is to develop methods of encoding video images for increasing the level of their compression in the conditions of ensuring required reliability. Task: to substantiate the approach regarding the structural clusterization of transformed video segments in the conditions of preserving their reliability; to develop a method of structural and statistical coding of transformants in the spectral-cluster space; conduct a comparative evaluation of the effectiveness of various methods of encoding video segments. The methods used: mathematical models for estimating the amount of statistical and structural redundancy in the clustered spectral space of video segments; methods of statistical coding. The following results have been obtained. The potential effectiveness of representing a transformant in clustered space by the number of series of units in binary description of their components has been substantiated. A method of structural-statistical coding in the spectral-cluster space has been created. The basic component of this technological approach is the evaluation of the estimates regarding the potential ability to eliminate various types of redundancy in the current cluster. Here, the amount of redundancy is reduced considering the statistical and structural features of the cluster. The comparative evaluation revealed the advantages of the created method over coding methods in standardized platforms. The advantage is achieved in terms of the peak signal-to-noise ratio by at least 30%. and in terms of a compression ratio by an average of 12 %. Conclusions. The scientific novelty of the obtained results is as follows: for the first time, a method of structural-statistical coding of video segments in spectral space based on their clusterization has been created. The differences of the method lie in the fact that the component of the transformant is simultaneously interpreted as an element of the statistical and combinatorial cluster space; the potential capabilities of eliminating various types of redundancy in the clustered transformant are considered. This provides an increase in the level of compression of video images for a given level of reliability.

Keywords


aerial photographs; video data compression; information reliability; structural clustering; coding in spectral-cluster space; structural-statistical redundancy

Full Text:

PDF

References


JPEG Privacy & Security Abstract and Executive Summary, 2015. Available at: https://jpeg.org/items/20150910_privacy_security_summary.html. (accessed 7.06.2021).

Sharma, R., Bollavarapu, S. Data Security using Compression and Cryptography Techniques. International Journal of Computer Applications, 2015, vol. 117, no. 14, pp. 15-18. DOI: 10.5120/20621-3342.

Data Encryption Standard (DES), Federal Information Processing Standards Publication 46-3, 1999. 26 p.

Rivest, R. L., Shamir, A., Adleman, L. M. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978, vol. 21, iss. 2, pp. 120-126. DOI: 10.1145/359340.359342.

Barannik, V., Barannik, N., Ignatyev, O., Khimenko, V. Metod nepryamogo prihovuvannya informacii v procesi stusnennya videozobrazhen [Method of indirect information hiding in the process of video compression]. Radioelektronni i komp'uterni sistemi – Radioelectronic and computer systems, 2021, vol. 4, pp. 119–131. DOI: 10.32620/reks.2021.4.10.

Naor, M., Shamir, A. Visual Cryptography. Proceedings of the Advances in Cryptology – EUROCRYPT’94. Lecture Notes in Computer Science, 1995, vol. 950, pp. 1-12. DOI: 10.1007/bfb0053419.

Chen, T.-H., Wu, Ch.-S. Efficient multi-secret image sharing based on Boolean operation. Signal Processing, 2011, vol. 91, iss. 1, pp. 90-97. DOI: 10.1016/j.sigpro.2010.06.012.

Ieremeiev, O. I., Lukin, V. V., Okarma, K. Kombinovana metryka vizualʹnoyi yakosti zobrazhenʹ dystantsiynoho zonduvannya na osnovi neyronnoyi merezhi [Combined visual quality metric of remote sensing images based on neural metwork]. Radioelektronni i komp'uterni sistemi – Radioelectronic and computer systems, 2020, vol. 4, pp. 4-15. DOI: 10.32620/reks.2020.4.01.

Belikova, T. Decoding Method of Information-Psychological Destructions in the Phonetic Space of Information Resources. IEEE 2nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020), 2020, pp. 87-91. DOI: 10.1109/ATIT50783.2020.9349300.

Wu, Yu., Agaian, S., Noonan, J. Sudoku Associated Two Dimensional Bijections for Image Scrambling. IEEE Transactions on multimedia, 2012. 30 p. Available at: https://arxiv.org/abs/1207.5856v1. (accessed 7.06.2021).

Wong, K.-W. Image encryption using chaotic maps. Intelligent Computing Based on Chaos, 2009, vol. 184, pp. 333–354. DOI: 10.1007/978-3-540-95972-4_16.

Cheng, P., Yang, H., Wei, P., Zhang, W. A fast image encryption algorithm based on chaotic map and lookup table. Nonlinear Dynamics, 2015, vol. 79, iss. 3, pp. 2121-2131. DOI: 10.1007/s11071-014-1798-y.

Kurihara, K., Watanabe O., Kiya, H. An encryption-then-compression system for JPEG XR standard. IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), 2016, pp. 1-5. DOI: 10.1109/BMSB.2016.7521997.

Watanabe, O., Uchida, A., Fukuhara, T., Kiya, H. An Encryption-then-Compression system for JPEG 2000 standard. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015, pp. 1226-1230. DOI: 10.1109/ICASSP.2015.7178165.

Zhou, J., Liu, X., Au, O. C., Tang, Y. Y. Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation. IEEE Transactions on Information Forensics and Security, 2014, vol. 9, no. 1, pp. 39-50. DOI: 10.1109/TIFS.2013.2291625.

Dufaux, F., Ebrahimi, T. Toward a Secure JPEG. Applications of Digital Image Processing XXIX, 2006, vol. 6312, pp. 1-8. DOI: 10.1117/12.686963.

Information technology – JPEG 2000 image coding system: Secure JPEG 2000, International Standard ISO/IEC 15444-8, ITU-T Recommendation T.807, 2007. 108 p.

Yuan, L., Korshunov, P., Ebrahimi, T. Secure JPEG Scrambling enabling Privacy in Photo Sharing. 11 th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG), 2015, pp. 1-6. DOI: 10.1109/FG.2015.7285022.

Kobayashi, H., Kiya, H. Bitstream-Based JPEG Image Encryption with File-Size Preserving. IEEE 7 th Global Conference on Consumer Electronics (GCCE), 2018, pp. 1-4. DOI: 10.1109/gcce.2018.8574605.

Minemura, K., Moayed, Z., Wong, K., Qi, X., Tanaka, K. JPEG image scrambling without expansion in bitstream size. 19 th IEEE International Conference on Image Processing, 2012, pp. 261-264. DOI: 10.1109/ICIP.2012.6466845.

Ji, Sh., Tong, X., Zhang, M. Image encryption schemes for JPEG and GIF formats based on 3D baker with compound chaotic sequence generator, 2012. Available at: https://arxiv.org/abs/1208.0999. (accessed 7.06.2021).

Chen, C., Zhuo, Y. A research on anti-jamming method based on compressive sensing for OFDM analogous system. IEEE 17th International Conference on Communication Technology (ICCT), 2017, pp. 655-659. DOI: 10.1109/ICCT.2017.8359718.

Wang, S., Kim, S., Yin, Z., He, T. Encode when necessary: Correlated network coding under unreliable wireless links. ACM Transactions on Sensor Networks, 2017, vol. 13, no. 1, pp. 24-29, DOI: 10.1145/ 3023953.

Phatak, A. A Non-format Compliant Scalable RSA-based JPEG Encryption Algorithm. International Journal of Image. Graphics and Signal Processing, 2016, vol. 8, no. 6, pp. 64-71. DOI: 10.5815/ijigsp.2016.06.08.

Yang, Y., Zhu, B. B., Li, S., Yu1, N. Efficient and Syntax-Compliant JPEG 2000 Encryption Preserving Original Fine Granularity of Scalability. EURASIP Journal on Information Security, 2008, vol. 2007, Article No. 056365. 13 p. DOI: 10.1155/2007/56365.

Komolov, D., Zhurbynskyy, D., Kulitsa, O. Selective method for hiding of video information resource in telecommunication systems based on encryption of energy-significant blocks of reference I-Frame. 1st International Conference on Advanced Information and Communication Technologies (AICT'2015), 2015, pp. 80-83.

Wu, Y., Noonan, J. P., Agaian, S. NPCR and UACI Randomness Tests for Image Encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), 2011, vol. 2, pp. 31-38. DOI: 10.4236/jss.2015.33005.

Barannik, V., Tarasenko, D. Method coding efficiency segments for information technology processing video. 4 th International Scientific-Practical Conference on Problems of Infocommunications. Science and Technology (PIC S&T), 2017, pp. 551-555. DOI: 10.1109/INFOCOMMST.2017.8246460.

Barannik, V. V., Hahanova, A. V. Ocenka informativnosti dvoichnih massivov na osnove kombinatornogo padhodu maskuvalʹnoho ushchilʹnennya [Evaluation information content of binary arrays based on the combinatorial approach]. Information processing systems, 2021, vol. 6, рр. 11–13.

Barannik, V., Krasnorutsky, A., Onyshchenko, R., Shulgin, S., Slobodyanyuk, O. Marker Information Coding for Structural Clustering of Spectral Space. 3nd Іntеrnаtіоnаl Cоnfеrеncе оn Аdvаncеd Trеnds іn Іnfоrmаtіоn Thеоrу (АTІT), 2021, pp. 46-51. DOI: 10.1109/ATIT54053.2021.9678538.

Barannik, V., Krasnorutsky, А., Pasynchuk, K, Babenko, Yu., Stepanko, O., Tupisa, I. Metod restrukturizacii videodannuh v sistemah kompresiinogo koduvannya dlay pidvishennya dostovirnosti [A Method for Restructuring Video Data in Compressed Coding Systems to Increase Reliability]. Visnyk NTUU KPI Seriia - Radiotekhnika Radioaparatobuduvannia, 2022, vol. 88, pp. 50 59. DOI: 10.20535/RADAP.2022.88.50-59.




DOI: https://doi.org/10.32620/reks.2022.4.10

Refbacks

  • There are currently no refbacks.