Method of recurrent truncated-positional coding video segments in uneven diagonal space

Vladimir Barannik, Sergii Shulgin, Valerii Kozlovskyi, Roman Onyshchenko, Tatyana Belikova, Oleksandr Ihnatiev, Viacheslav Khlopiachyi

Abstract


The subject of research in this article is methods of encoding transformed video segments to reduce their bit volume without loss of information integrity.  The goal is to develop a technology for coding uneven diagonal sequences under the conditions of their arbitrary positioning in the transformant. Task: to justify the approach of creating new methods of encoding video segments, considering the features of the combinatorial configuration of transformants; to create a method of formatting the coordinate system of spectral components in an uneven diagonal direction; to develop a method of encoding non-uniform diagonal sequences in a two-dimensional spectral space; to build a technology for recurrent realization of the process of sliding truncated-positional coding of uneven-diagonal sequences. The methods used are: mathematical models for estimating the number of structural-combinatorial and psychovisual-combinatorial redundancies in an uneven-diagonal spectral space; methods of positional coding. The following results were obtained. Potential advantages of considering the combinatorial configuration of the transformant based on its reformatting according to the non-uniform diagonal structure are substantiated. The technology of recurrent truncated positional coding of video segments in non-uniform diagonal space has been developed. It is based on two technological components. These include: the first component - a pyramidal system of positioning diagonals and their component in the transformant is created. The second component - a method of recurrent implementation of truncated-positional coding of uneven-diagonal sequences, is constructed. Such coding is organized regardless of the positioning of the diagonals in the two-dimensional spectral space of the transformant. Comparative evaluation revealed the advantages of the created method over standardized transformant coding methods. The advantage is achieved by the level of bit volume reduction and reaches an average of 15-30 %. Conclusions. For the first time, a method for establishing the coordinates of the components in the diagonals was developed. It is based on considering the features of the structural configuration of the transformant. This creates conditions for reducing time delays for processing video segments. For the first time, a method for recurrent coding of diagonals based on truncated-positional systems was created. This makes it possible to avoid the cases of the violation of the conditions of mutually unambiguous code conversion.

Keywords


video information services; video segments; bit volume reduction; transformants; uneven diagonals; truncated-positional coding; combinatorial configurations

Full Text:

PDF

References


JPEG Privacy & Security Abstract and Executive Summary, 2015. Available at: https://jpeg.org/items/20150910_privacy_security_summary.html. (accessed 7.06.2021).

Sharma, R. & Bollavarapu, S. Data Security using Compression and Cryptography Techniques. International Journal of Computer Applications, 2015, vol. 117, no. 14, pp. 15-18. DOI: 10.5120/20621-3342.

Issa, O. & Shanableh, T. Static Video Summarization Using Video Coding Features with Frame-Level Temporal Subsampling and Deep Learning. Appl. Sci., 2023, vol. 13, iss. 10, article 6065. DOI: 10.3390/app13106065.

Rivest, R. L., Shamir, A. & Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978, vol. 21, iss. 2, pp. 120-126. DOI: 10.1145/359340.359342.

Barannik, V., Barannik, N., Ignatyev, O. & Himenko, V. Metod nepryamoho prykhovuvannya informatsiyi v protsesi stysnennya videozobrazhenʹ [Method of indirect information hiding in the process of video compression]. Radioelektronni i komp'uterni sistemi – Radioelectronic and computer systems, 2021, vol. 4, pp. 119–131. DOI: 10.32620/reks.2021.4.10.

Cao, X., Huang, Y., Wu, H.-T. & Cheung, Y.-m. Content and Privacy Protection in JPEG Images by Reversible Visual Transformation. Applied Sciences, MDPI, 2020, vol. 10, iss. 19, article no. 6776, pp. 1-12. DOI: 10.3390/app10196776.

Chen, T.-H. & Wu, Ch.-S. Efficient multi-secret image sharing based on Boolean operation. Signal Processing, 2011, vol. 91, iss. 1, pp. 90-97. DOI: 10.1016/j.sigpro.2010.06.012.

Ieremeiev, O. I., Lukin, V. V. & Okarma, K. Kombinovana metryka vizualʹnoyi yakosti zobrazhenʹ dystantsiynoho zonduvannya na osnovi neyronnoyi merezhi [Combined visual quality metric of remote sensing images based on neural metwork]. Radioelektronni i komp'uterni sistemi – Radioelectronic and computer systems, 2020, vol. 4, pp. 4-15. DOI: 10.32620/reks.2020.4.01.

Belikova, T. Decoding Method of Information-Psychological Destructions in the Phonetic Space of Information Resources. IEEE 2nd International Conference on Advanced Trends in Information Theory (IEEE ATIT 2020), 2020, pp. 87-91. DOI: 10.1109/ATIT50783.2020.9349300.

Latif, A. & Mehrnahad, Z. A Novel Image Encryption Scheme Based on Reversible Cellular Automata. Journal of Electronic & Information Systems, 2019, vol. 1, iss. 1, pp. 18-25. DOI: 10.30564/jeisr.v1i1.1078.

Rasheed, M. H., Salih, O. M. & Siddeq, M. M. Joint image encryption and compression schemes based on hexa-coding. Periodicals of Engineering and Natural Sciences, 2021, vol. 9, no 2, pp. 569-580. DOI: 10.21533/pen.v9i2.1839.

Cheng, P., Yang, H., Wei, P. & Zhang, W. A fast image encryption algorithm based on chaotic map and lookup table. Nonlinear Dynamics, 2015, vol. 79, iss. 3, pp. 2121-2131. DOI: 10.1007/s11071-014-1798-y.

Kurihara, K., Watanabe O. & Kiya, H. An encryption-then-compression system for JPEG XR standard. IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB), 2016, pp. 1-5. DOI: 10.1109/BMSB.2016.7521997.

Watanabe, O., Uchida, A., Fukuhara, T. & Kiya, H. An Encryption-then-Compression system for JPEG 2000 standard. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015, pp. 1226-1230. DOI: 10.1109/ICASSP.2015.7178165.

Zhou, J., Liu, X., Au, O. C. & Tang, Y. Y. Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation. IEEE Transactions on Information Forensics and Security, 2014, vol. 9, no. 1, pp. 39-50. DOI: 10.1109/TIFS.2013.2291625.

Issa, O. & Shanableh, T. Video-Based Recognition of Human Activity Using Novel Feature Extraction Techniques. Appl. Sci., 2023, vol. 13, iss. 11, article no. 6856. DOI: 10.3390/app13116856.

Information technology – JPEG 2000 image coding system: Secure JPEG 2000, International Standard ISO/IEC 15444-8, ITU-T Recommendation T.807, 2007. 108 p.

Yuan, L., Korshunov, P. & Ebrahimi, T. Secure JPEG Scrambling enabling Privacy in Photo Sharing. 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG), 2015, pp. 1-6. DOI: 10.1109/FG.2015.7285022.

Kobayashi, H. & Kiya, H. Bitstream-Based JPEG Image Encryption with File-Size Preserving. IEEE 7 th Global Conference on Consumer Electronics (GCCE), 2018, pp. 384-387. DOI: 10.1109/gcce.2018.8574605.

Minemura, K., Moayed, Z., Wong, K., Qi, X. & Tanaka, K. JPEG image scrambling without expansion in bitstream size. 19 th IEEE International Conference on Image Processing, 2012, pp. 261-264. DOI: 10.1109/ICIP.2012.6466845.

Ji, Sh., Tong, X. & Zhang, M. Image encryption schemes for JPEG and GIF formats based on 3D baker with compound chaotic sequence generator. arXiv, 2012. DOI: 10.48550/arXiv.1208.0999

Chen, C. & Zhuo, Y. A research on anti-jamming method based on compressive sensing for OFDM analogous system. IEEE 17th International Conference on Communication Technology (ICCT), 2017, pp. 655-659. DOI: 10.1109/ICCT.2017.8359718.

Wang, S., Kim, S., Yin, Z. & He, T. Encode when necessary: Correlated network coding under unreliable wireless links. ACM Transactions on Sensor Networks, 2017, vol. 13, no. 1, article no. 7, pp. 1-22. DOI: 10.1145/3023953.

Phatak, A. A Non-format Compliant Scalable RSA-based JPEG Encryption Algorithm. International Journal of Image. Graphics and Signal Processing (IJIGSP), 2016, vol. 8, no. 6, pp. 64-71. DOI: 10.5815/ijigsp.2016.06.08.

Ruchaud, N. & Dugelay, J.-L. JPEG-based scalable privacy protection and image data utility preservation. IET Signal Processing, 2018, vol. 12, iss. 7, pp. 881-887. DOI: 10.1049/iet-spr.2017.0413.

Komolov, D., Zhurbynskyy, D. & Kulitsa, O. Selective method for hiding of video information resource in telecommunication systems based on encryption of energy-significant blocks of reference I-Frame. 1st International Conference on Advanced Information and Communication Technologies (AICT'2015), 2015, pp. 80-83.

Wu, Y., Noonan, J. P. & Agaian, S. NPCR and UACI Randomness Tests for Image Encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), 2011, vol. 2, pp. 31-38. Available at: http://www.cyberjournals.com/Papers/Apr2011/05.pdf. (accessed Jan 12, 2023).

Bаrаnnіk, V., Babenko, Y., Kulitsa, O., Barannik, V., Khimenko, A. & Matviichuk-Yudina, O. Sіgnіfіcаnt Mіcrоsеgmеnt Trаnsfоrmаnts Еncоdіng Mеthоd tо Іncrеаsе thе Аvаіlаbіlіtу оf Vіdео Іnfоrmаtіоn Rеsоurcе. 2nd Іntеrnаtіоnаl Cоnfеrеncе оn Аdvаncеd Trеnds іn Іnfоrmаtіоn Thеоrу (АTІT), 2020, рр. 52-56. DОІ: 10.1109/ATIT50783.2020.9349256.

Barannik, V., Sidchenko, S., Barannik, D., Shulgin, S., Barannik, V. & Datsun, A. Devising a conceptual method for generating cryptocompression codograms of images without loss of information quality. Eastern-European Journal of Enterprise Technologies, 2021, vol. 4, no. 2(112), pp. 6-17. DOI: 10.15587/1729-4061.2021.237359.

Barannik, V., Krasnorutsky, A., Ryabukha, Yu., Onyshchenko, R., Shulgin, S. & Slobodyanyuk, O. Marker Information Coding for Structural Clustering of Spectral Space. 3nd Іntеrnаtіоnаl Cоnfеrеncе оn Аdvаncеd Trеnds іn Іnfоrmаtіоn Thеоrу (АTІT), 2021, pp. 46-51. DOI: 10.1109/ATIT54053.2021.9678538.

Bаrаnnіk, V., Shulgіn, S., Krasnorutsky, A., Slobodyanyuk, O., Gurzhii, P. & Korolyova, N. Mеthоdоlоgіcаl Fundаmеntаls оf Dеcірhеrіng Cоdіng оf Аеrорhоtоgrарhу Sеgmеnts оn Sреcіаl Еquірmеnt оf Unmаnnеd Cоmрlеx. 2nd Іntеrnаtіоnаl Cоnfеrеncе оn Аdvаncеd Trеnds іn Іnfоrmаtіоn Thеоrу (АTІT), 2020, рр. 38-43. DОІ: 10.1109/АTІT50783.2020.9349257.




DOI: https://doi.org/10.32620/reks.2023.2.11

Refbacks

  • There are currently no refbacks.