Video images compression method based on floating positional coding with an unequal codograms length
Abstract
Keywords
Full Text:
PDFReferences
FIPS 197. Announcing the ADVANCED ENCRYPTION STANDARD (AES), Federal Information Processing Standards Publication, 2001. 51 p.
DSTU GOST 28147:2009: Systema obrobky informatsii. Zakhyst kryptohrafichnyi. Alhorytm kryptohrafichnoho peretvorennia (HOST 28147-89) [Information processing system. Cryptographic protection. Cryptographic transformation algorithm (GOST 28147-89)], State Committee for Technical Regulation and Consumer Policy (Derzhspozhivstandart) of Ukraine, 2008. 20 p. (In Ukrainian).
DSTU 7624:2014: Informatsiini tekhnolohii. Kryptohrafichnyi zakhyst informatsii. Alhorytm symetrychnoho blokovoho peretvorennia [Information Technology. Cryptographic protection of information. Symmetric block transformation algorithm]. Ministry of Economic Development of Ukraine, 2015. 39 p. (In Ukrainian).
Rivest, R. L., Shamir, A., Adleman, L. M. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978, vol. 21, iss. 2, pp. 120-126. DOI: 10.1145/359340.359342.
Latif, A., Mehrnahad, Z. A Novel Image Encryption Scheme Based on Reversible Cellular Automata. Journal of Electronic & Information Systems, 2019, vol. 1, iss. 1, pp. 18-25. DOI: 10.30564/jeisr.v1i1.1078.
Sharma, R., Bollavarapu, S. Data Security using Compression and Cryptography Techniques. International Journal of Computer Applications, 2015, vol. 117, no. 14, pp. 15-18. DOI: 10.5120/20621-3342.
Rasheed, M. H., Salih, O. M., Siddeq, M. M. Joint image encryption and compression schemes based on hexa-coding. Periodicals of Engineering and Natural Sciences, 2021, vol. 9, no 2, pp. 569-580. DOI: 10.21533/pen.v9i2.1839.
Ramakrishnan, S. et al. Cryptographic and Information Security Approaches for Images and Videos. CRC Press Publ., 2018. 986 p. DOI: 10.1201/9780429435461.
Farajallah, M. Chaos-based crypto and joint crypto-compression systems for images and videos, 2015, 211 p. Available at: https://hal.archives-ouvertes.fr/tel-01179610. (accessed 11 January 2022).
Zia, U., McCartney, M., Scotney, B. et al. Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains. International Journal of Information Security, 2022, vol. 21, pp. 917–935. DOI: 10.1007/s10207-022-00588-5.
Wu, Yu., Zhou, Y., Agaian, S., Noonan, J. 2D Sudoku associated bijections for image scrambling. Information Sciences, 2016, vol. 327, pp. 91–109. DOI: 10.1016/j.ins.2015.08.013.
Patanwadia, R., Mangrulkar, R. Divide and Scramble - A Recursive Image Scrambling algorithm utilizing Rubik's Cube. Proc. Int. Conf. "Recent Trends on Electronics, Information, Communication & Technology" (RTEICT). Bangalore, India, 2021, pp. 859-863, DOI: 10.1109/RTEICT52294.2021.9573949.
Information technology – JPEG 2000 image coding system: Secure JPEG 2000, International Standard ISO/IEC 15444-8, ITU-T Recommendation T.807, 2007. 108 p.
Fawaz, Z., Noura, H., Mostefaoui, A. Securing JPEG-2000 images in constrained environments: a dynamic approach. Multimedia Systems, 2018, vol. 24, iss. 6, pp. 669–694. DOI: 10.1007/s00530-018-0591-z.
JPEG Privacy & Security Abstract and Executive Summary, 2015. Available at: https://jpeg.org/items/20150910_privacy_security_summary.html. (accessed 11 January 2022).
Temmermans, F., Ebrahimi, T., Foessel, S. et al. JPEG Privacy and Security framework for social networking and GLAM services. EURASIP Journal on Image and Video Processing, 2017, vol. 68, pp. 1-9. DOI: 10.1186/s13640-017-0216-z.
Cao, X., Huang, Y., Wu, H.-T., Cheung, Y.-m. Content and Privacy Protection in JPEG Images by Reversible Visual Transformation. Applied Sciences, MDPI, 2020, vol. 10, iss. 19, article id: 6776, pp. 1-12. DOI: 10.3390/app10196776.
Yuan, L., Korshunov, P., Ebrahimi, T. Secure JPEG Scrambling enabling Privacy in Photo Sharing. Proc. 11 th IEEE Int. Conf. and Workshops "Automatic Face and Gesture Recognition" (FG). Ljubljana, Slovenia, 2015, pp. 1-6. DOI: 10.1109/FG.2015.7285022.
Ruchaud, N., Dugelay, J.-L. JPEG-based scalable privacy protection and image data utility preservation. IET Signal Processing, 2018, vol. 12, iss. 7, pp. 881-887. DOI: 10.1049/iet-spr.2017.0413.
Minemura, K., Moayed, Z., Wong, K., Qi, X., Tanaka, K. JPEG image scrambling without expansion in bitstream size. Proc. 19 th IEEE Int. Conf. "Image Processing". Orlando, FL, USA, 2012, pp. 261-264. DOI: 10.1109/ICIP.2012.6466845.
Auer, S., Bliem, A., Engel, D., Uhl, A., Unterweger, A. Bitstream-based JPEG Encryption in Real-time. Int. Journal of Digital Crime and Forensics, 2013, vol. 5, iss. 3, pp. 1-14. DOI: 10.4018/jdcf.2013070101.
Kobayashi, H., Kiya, H. Bitstream-Based JPEG Image Encryption with File-Size Preserving. Proc. 7 th IEEE Global Conf. "Consumer Electronics" (GCCE). Nara, Japan, 2018, pp. 1-4. DOI: 10.1109/gcce.2018.8574605.
Phatak, A. A Non-format Compliant Scalable RSA-based JPEG Encryption Algorithm. International Journal of Image, Graphics and Signal Processing, 2016, vol. 8, no. 6, pp. 64-71. DOI: 10.5815/ijigsp.2016.06.08.
Ji, Sh., Tong, X., Zhang, M. Image encryption schemes for JPEG and GIF formats based on 3D baker with compound chaotic sequence generator, 2012. Available at: https://arxiv.org/abs/1208.0999. (accessed 11 January 2022).
Barannik, V., Barannik, N., Khimenko, V. Metod nepriamoho prykhovuvannia informatsii v protsesi stysnennia videozobrazhen [Method of indirect information hiding in the process of video compression]. Radioelectronic and Computer Systems, 2021, no. 4, pp. 119–131. DOI: 10.32620/reks.2021.4. (In Ukrainian).
Belikova, T. Decoding Method of Information-Psychological Destructions in the Phonetic Space of Information Resources. Proc. 2nd IEEE Int. Conf. "Advanced Trends in Information Theory" (IEEE ATIT 2020), 2020, pp. 87–91. DOI: 10.1109/ATIT50783.2020.9349300.
Barannik, V. V., Barannik, D., Podlesny, S., Tarasenko, D., Kulitsa, O. The video stream encoding method in infocommunication systems. Proc. 14th Int. Conf. "Advanced Trends in Radioelecrtronics, Telecommunications and Computer Engineering" (TCSET), 2018, pp. 538-541. DOI: 10.1109/TCSET.2018.8336259.
Naor, M., Shamir, A. Visual Cryptography. Proceedings of the Advances in Cryptology – EUROCRYPT’94. Lecture Notes in Computer Science, 1995, vol. 950, pp. 1-12. DOI: 10.1007/bfb0053419.
Bisht, K., Deshmukh, M. A novel approach for multilevel multi-secret image sharing scheme. The Journal of Supercomputing, 2021, vol. 77, pp. 12157-12191. DOI: 10.1007/s11227-021-03747-y.
Kabirirad, S., Eslami, Z. Improvement of (n, n)-multi-secret image sharing schemes based on Boolean operations. Journal of Information Security and Applications, 2019, vol. 47, pp. 16-27. DOI: 10.1016/j.jisa.2019.03.018.
Huang, S.-Y., Lo, A.-h., Juan, J.S.-T. XOR-Based Meaningful (n, n) Visual Multi-Secrets Sharing Schemes. Applied Sciences, MDPI, 2022, vol. 12, iss. 20, article id: 10368, pp. 1-22. DOI: 10.3390/app122010368.
Liu, L., Lu, Yu., Yan, X. A novel (k1,k2,n)-threshold two-in-one secret image sharing scheme for multiple secrets. Journal of Visual Communication and Image Representation, 2021, vol. 74, article id: 102971. DOI: 10.1016/j.jvcir.2020.102971.
Erdelyi, A., Barat, T., Valet, P., Winkler, T., Rinner, B. Adaptive cartooning for privacy protection in camera networks. Proc. 11th IEEE Int. Conf. "Advanced Video and Signal Based Surveillance" (AVSS). Seoul, Korea, 2014, pp. 44–49. DOI: 10.1109/AVSS.2014.6918642.
Hassan, E. T., Hasan, R., Shaffer P., Crandall, D., Kapadia, A. Cartooning for Enhanced Privacy in Lifelogging and Streaming Videos. Proc. IEEE Conf. "Computer Vision and Pattern Recognition Workshops" (CVPRW). Honolulu, USA, 2017, pp. 1333–1342. DOI: 10.1109/CVPRW.2017.175.
Korshunov, P., Ebrahimi, T. Using warping for privacy protection in video surveillance. Proc. 18th IEEE Int. Conf. "Digital Signal Processing" (DSP). Fira, Greece, 2013, pp. 1-6. DOI: 10.1109/ICDSP.2013.6622791.
Korshunov, P., Ebrahimi, T. Using face morphing to protect privacy. Proc. 10th IEEE Int. Conf "Advanced Video and Signal Based Surveillance". Krakow, Poland, 2013, pp. 208–213. DOI: 10.1109/AVSS.2013.6636641.
Alimpiev, A. N., Barannik, V. V., Sidchenko, S. A. The method of cryptocompression presentation of videoinformation resources in a generalized structurally positioned space. Telecommunications and Radio Engineering, 2017, vol. 76, no. 6, pp. 521-534. DOI: 10.1615/TelecomRadEng.v76.i6.60.
Barannik, V., Sidchenko, S., Barannik, N., Barannik, V. Development of the method for encoding service data in cryptocompression image representation systems. Eastern-European Journal of Enterprise Technologies, 2021, vol. 3, no. 9(111), pp. 103-115. DOI: 10.15587/1729-4061.2021.235521.
Barannik, V., Sidchenko, S., Barannik, D., Shulgin, S., Barannik, V., Datsun, A. Devising a conceptual method for generating cryptocompression codograms of images without loss of information quality. Eastern-European Journal of Enterprise Technologies, 2021, vol. 4, no. 2(112), pp. 6-17. DOI: 10.15587/1729-4061.2021.237359.
Barannik, V., Sidchenko, S., Barannik, N., Barannik, D., Shulgin, S. Methods for Decoding Informational Codes of Cryptocompression Codegrams to Improve Information Security. CEUR Workshop Proceedings (CEUR-WS.org), 2021, vol. 2923. pp. 143-152. Available at: CEUR-WS.org/Vol-2923/paper16.pdf. (accessed 11 January 2022).
Barannik, V., Sidchenko, S., Barannik, D. Technology for Protecting Video Information Resources in the Info-Communication Space. Proc. IEEE 2 nd Int. Conf. "Advanced Trends in Information Theory" (IEEE ATIT 2020). Kyiv, Ukraine, 2020, pp. 29-33. DOI: 10.1109/ATIT50783.2020.9349324.
Barannik, V., Sidchenko, S., Barannik, D., Barannik, V., Hurzhii, I., Babenko, Y. Evaluating of the resistance of crypto-compression image codograms to errors in the data transmission channel. Proc. IEEE 3 rd Int. Conf. "Advanced Trends in Information Theory" (IEEE ATIT 2021). Kyiv, Ukraine, 2021, pp. 52-56. DOI: 10.1109/ATIT54053.2021.9678774.
Barannik, V. V., Sidchenko, S. O., Barannik, N. V., Khimenko, A. M. Metod maskuvalnoho ushchilnennia sluzhbovykh danykh v systemakh kompresii videozobrazhen [The Method of Masking Overhead Compaction in Video Compression Systems]. Radioelectronic and Computer Systems, 2021, № 2, pp. 51-63. DOI: 10.32620/reks.2021.2.05. (In Ukrainian).
Li, F., Krivenko, S., Lukin, V. Two-step providing of desired quality in lossy image compression by SPIHT. Radioelectronic and computer systems, 2020, no. 2, pp. 22-32. DOI: 10.32620/reks.2020.2.02.
Ieremeiev, O., Lukin, V., Okarma, K. Combined visual quality metric of remote sensing images based on neural network. Radioelectronic and computer systems, 2020, no. 4, pp. 4-15. DOI: 10.32620/reks.2020.4.01.
DOI: https://doi.org/10.32620/reks.2023.1.11
Refbacks
- There are currently no refbacks.