Method of recurrent truncated-positional coding video segments in uneven diagonal space
Abstract
Keywords
Full Text:
PDFReferences
JPEG Privacy & Security Abstract and Executive Summary, 2015. Available at: https://jpeg.org/items/20150910_privacy_security_summary.html. (accessed 7.06.2021).
Sharma, R. & Bollavarapu, S. Data Security using Compression and Cryptography Techniques. International Journal of Computer Applications, 2015, vol. 117, no. 14, pp. 15-18. DOI: 10.5120/20621-3342.
Issa, O. & Shanableh, T. Static Video Summarization Using Video Coding Features with Frame-Level Temporal Subsampling and Deep Learning. Appl. Sci., 2023, vol. 13, iss. 10, article 6065. DOI: 10.3390/app13106065.
Rivest, R. L., Shamir, A. & Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978, vol. 21, iss. 2, pp. 120-126. DOI: 10.1145/359340.359342.
Barannik, V., Barannik, N., Ignatyev, O. & Himenko, V. Metod nepryamoho prykhovuvannya informatsiyi v protsesi stysnennya videozobrazhenʹ [Method of indirect information hiding in the process of video compression]. Radioelektronni i komp'uterni sistemi – Radioelectronic and computer systems, 2021, vol. 4, pp. 119–131. DOI: 10.32620/reks.2021.4.10.
Cao, X., Huang, Y., Wu, H.-T. & Cheung, Y.-m. Content and Privacy Protection in JPEG Images by Reversible Visual Transformation. Applied Sciences, MDPI, 2020, vol. 10, iss. 19, article no. 6776, pp. 1-12. DOI: 10.3390/app10196776.
Chen, T.-H. & Wu, Ch.-S. Efficient multi-secret image sharing based on Boolean operation. Signal Processing, 2011, vol. 91, iss. 1, pp. 90-97. DOI: 10.1016/j.sigpro.2010.06.012.
Ieremeiev, O. I., Lukin, V. V. & Okarma, K. Kombinovana metryka vizualʹnoyi yakosti zobrazhenʹ dystantsiynoho zonduvannya na osnovi neyronnoyi merezhi [Combined visual quality metric of remote sensing images based on neural metwork]. Radioelektronni i komp'uterni sistemi – Radioelectronic and computer systems, 2020, vol. 4, pp. 4-15. DOI: 10.32620/reks.2020.4.01.
Belikova, T. Decoding Method of Information-Psychological Destructions in the Phonetic Space of Information Resources. IEEE 2nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020), 2020, pp. 87-91. DOI: 10.1109/ATIT50783.2020.9349300.
Latif, A. & Mehrnahad, Z. A Novel Image Encryption Scheme Based on Reversible Cellular Automata. Journal of Electronic & Information Systems, 2019, vol. 1, iss. 1, pp. 18-25. DOI: 10.30564/jeisr.v1i1.1078.
Rasheed, M. H., Salih, O. M. & Siddeq, M. M. Joint image encryption and compression schemes based on hexa-coding. Periodicals of Engineering and Natural Sciences, 2021, vol. 9, no 2, pp. 569-580. DOI: 10.21533/pen.v9i2.1839.
Cheng, P., Yang, H., Wei, P. & Zhang, W. A fast image encryption algorithm based on chaotic map and lookup table. Nonlinear Dynamics, 2015, vol. 79, iss. 3, pp. 2121-2131. DOI: 10.1007/s11071-014-1798-y.
Kurihara, K., Watanabe O. & Kiya, H. An encryption-then-compression system for JPEG XR standard. IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), 2016, pp. 1-5. DOI: 10.1109/BMSB.2016.7521997.
Watanabe, O., Uchida, A., Fukuhara, T. & Kiya, H. An Encryption-then-Compression system for JPEG 2000 standard. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015, pp. 1226-1230. DOI: 10.1109/ICASSP.2015.7178165.
Zhou, J., Liu, X., Au, O. C. & Tang, Y. Y. Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation. IEEE Transactions on Information Forensics and Security, 2014, vol. 9, no. 1, pp. 39-50. DOI: 10.1109/TIFS.2013.2291625.
Issa, O. & Shanableh, T. Video-Based Recognition of Human Activity Using Novel Feature Extraction Techniques. Appl. Sci., 2023, vol. 13, iss. 11, article no. 6856. DOI: 10.3390/app13116856.
Information technology – JPEG 2000 image coding system: Secure JPEG 2000, International Standard ISO/IEC 15444-8, ITU-T Recommendation T.807, 2007. 108 p.
Yuan, L., Korshunov, P. & Ebrahimi, T. Secure JPEG Scrambling enabling Privacy in Photo Sharing. 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG), 2015, pp. 1-6. DOI: 10.1109/FG.2015.7285022.
Kobayashi, H. & Kiya, H. Bitstream-Based JPEG Image Encryption with File-Size Preserving. IEEE 7 th Global Conference on Consumer Electronics (GCCE), 2018, pp. 384-387. DOI: 10.1109/gcce.2018.8574605.
Minemura, K., Moayed, Z., Wong, K., Qi, X. & Tanaka, K. JPEG image scrambling without expansion in bitstream size. 19 th IEEE International Conference on Image Processing, 2012, pp. 261-264. DOI: 10.1109/ICIP.2012.6466845.
Ji, Sh., Tong, X. & Zhang, M. Image encryption schemes for JPEG and GIF formats based on 3D baker with compound chaotic sequence generator. arXiv, 2012. DOI: 10.48550/arXiv.1208.0999
Chen, C. & Zhuo, Y. A research on anti-jamming method based on compressive sensing for OFDM analogous system. IEEE 17th International Conference on Communication Technology (ICCT), 2017, pp. 655-659. DOI: 10.1109/ICCT.2017.8359718.
Wang, S., Kim, S., Yin, Z. & He, T. Encode when necessary: Correlated network coding under unreliable wireless links. ACM Transactions on Sensor Networks, 2017, vol. 13, no. 1, article no. 7, pp. 1-22. DOI: 10.1145/3023953.
Phatak, A. A Non-format Compliant Scalable RSA-based JPEG Encryption Algorithm. International Journal of Image. Graphics and Signal Processing (IJIGSP), 2016, vol. 8, no. 6, pp. 64-71. DOI: 10.5815/ijigsp.2016.06.08.
Ruchaud, N. & Dugelay, J.-L. JPEG-based scalable privacy protection and image data utility preservation. IET Signal Processing, 2018, vol. 12, iss. 7, pp. 881-887. DOI: 10.1049/iet-spr.2017.0413.
Komolov, D., Zhurbynskyy, D. & Kulitsa, O. Selective method for hiding of video information resource in telecommunication systems based on encryption of energy-significant blocks of reference I-Frame. 1st International Conference on Advanced Information and Communication Technologies (AICT'2015), 2015, pp. 80-83.
Wu, Y., Noonan, J. P. & Agaian, S. NPCR and UACI Randomness Tests for Image Encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), 2011, vol. 2, pp. 31-38. Available at: http://www.cyberjournals.com/Papers/Apr2011/05.pdf. (accessed Jan 12, 2023).
Bаrаnnіk, V., Babenko, Y., Kulitsa, O., Barannik, V., Khimenko, A. & Matviichuk-Yudina, O. Sіgnіfіcаnt Mіcrоsеgmеnt Trаnsfоrmаnts Еncоdіng Mеthоd tо Іncrеаsе thе Аvаіlаbіlіtу оf Vіdео Іnfоrmаtіоn Rеsоurcе. 2nd Іntеrnаtіоnаl Cоnfеrеncе оn Аdvаncеd Trеnds іn Іnfоrmаtіоn Thеоrу (АTІT), 2020, рр. 52-56. DОІ: 10.1109/ATIT50783.2020.9349256.
Barannik, V., Sidchenko, S., Barannik, D., Shulgin, S., Barannik, V. & Datsun, A. Devising a conceptual method for generating cryptocompression codograms of images without loss of information quality. Eastern-European Journal of Enterprise Technologies, 2021, vol. 4, no. 2(112), pp. 6-17. DOI: 10.15587/1729-4061.2021.237359.
Barannik, V., Krasnorutsky, A., Ryabukha, Yu., Onyshchenko, R., Shulgin, S. & Slobodyanyuk, O. Marker Information Coding for Structural Clustering of Spectral Space. 3nd Іntеrnаtіоnаl Cоnfеrеncе оn Аdvаncеd Trеnds іn Іnfоrmаtіоn Thеоrу (АTІT), 2021, pp. 46-51. DOI: 10.1109/ATIT54053.2021.9678538.
Bаrаnnіk, V., Shulgіn, S., Krasnorutsky, A., Slobodyanyuk, O., Gurzhii, P. & Korolyova, N. Mеthоdоlоgіcаl Fundаmеntаls оf Dеcірhеrіng Cоdіng оf Аеrорhоtоgrарhу Sеgmеnts оn Sреcіаl Еquірmеnt оf Unmаnnеd Cоmрlеx. 2nd Іntеrnаtіоnаl Cоnfеrеncе оn Аdvаncеd Trеnds іn Іnfоrmаtіоn Thеоrу (АTІT), 2020, рр. 38-43. DОІ: 10.1109/АTІT50783.2020.9349257.
DOI: https://doi.org/10.32620/reks.2023.2.11
Refbacks
- There are currently no refbacks.