scholarly journals Development of the method for encoding service data in cryptocompression image representation systems

2021 ◽  
Vol 3 (9(111)) ◽  
pp. 103-115
Author(s):  
Vladimir Barannik ◽  
Serhii Sidchenko ◽  
Natalia Barannik ◽  
Valeriy Barannik

The demand for image confidentiality is constantly growing. At the same time, ensuring the confidentiality of video information must be organized subject to ensuring its reliability with a given time delay in processing and transmission. Methods of cryptocompression representation of images can be used to solve this problem. They are designed to simultaneously provide compression and protection of video information. The service component is used as the key of the cryptocompression transformation. However, it has a significant volume. It is 25 % of the original video data volume. A method for coding systems of service components in a differentiated basis on the second cascade of cryptocompression representation of images has been developed. The method is based on the developed scheme of data linearization from three-dimensional coordinates of representation in a two-dimensional matrix into a one-dimensional coordinate for one-to-one representation of this element in a vector. Linearization is organized horizontally line by line. On the basis of the developed method, a non-deterministic number of code values of information components is formed. They have non-deterministic lengths and are formed on a non-deterministic number of elements. The uncertainty of positioning of cryptocompression codograms in the general code stream is provided, which virtually eliminates the possibility of their unauthorized decryption. The method provides a reduction in the volume of the service component of the cryptocompression codogram. The service data volume is 6.25 % of the original video data volume. The method provides an additional reduction in the volume of cryptocompression representation of images without loss of information quality relative to the original video data on average from 1.08 to 1.54 times, depending on the degree of their saturation

2021 ◽  
Vol 4 (2(112)) ◽  
pp. 6-17
Author(s):  
Vladimir Barannik ◽  
Serhii Sidchenko ◽  
Dmitriy Barannik ◽  
Sergii Shulgin ◽  
Valeriy Barannik ◽  
...  

Along with the widespread use of digital images, an urgent scientific and applied issue arose regarding the need to reduce the volume of video information provided it is confidential and reliable. To resolve this issue, cryptocompression coding methods could be used. However, there is no method that summarizes all processing steps. This paper reports the development of a conceptual method for the cryptocompression coding of images on a differentiated basis without loss of information quality. It involves a three-stage technology for the generation of cryptocompression codograms. The first two cascades provide for the generation of code structures for information components while ensuring their confidentiality and key elements as a service component. On the third cascade of processing, it is proposed to manage the confidentiality of the service component. The code values for the information components of nondeterministic length are derived out on the basis of a non-deterministic number of elements of the source video data in a reduced dynamic range. The generation of service data is proposed to be organized in blocks of initial images with a dimension of 16×16 elements. The method ensures a decrease in the volume of source images during the generation of cryptocompression codograms, by 1.14–1.58 times (12–37 %), depending on the degree of their saturation. This is 12.7‒23.4 % better than TIFF technology and is 9.6‒17.9 % better than PNG technology. The volume of the service component of cryptocompression codograms is 1.563 % of the volume of the source video data or no more than 2.5 % of the total code stream. That reduces the amount of data for encryption by up to 40 times compared to TIFF and PNG technologies. The devised method does not introduce errors into the data in the coding process and refers to methods without loss of information quality.


Author(s):  
Володимир Вікторович Бараннік ◽  
Сергій Олександрович Сідченко ◽  
Наталія Вячеславівна Бараннік ◽  
Андрій Михайлович Хіменко

The demand for video privacy is constantly increasing. Simultaneously, it is necessary to solve an urgent scientific and applied problem, which consists in increasing the confidentiality of video information under conditions of a given time delay for its processing and delivery, while ensuring its reliability. The crypto compression transformations can be used to solve it. A service component is used as a conversion key, which is directly formed in the conversion process and contains information about the identified structural characteristics of the video data. Therefore, such information requires confidentiality. The existing methods of cryptography are designed to process a universal data stream and do not consider the structure and features of service components. It leads to the formation of redundant data, the use of an excessive number of operations, and an increase in processing time in the process of protecting service information using universal cryptography methods. Therefore, the article aims to develop a method for masking service data compression to ensure their confidentiality, considering the peculiarities of their formation by crypto compression methods. In modes with controlled loss of information quality, the elements of the service component are formed in a reduced dynamic range. Their length is 7 bits. To ensure the confidentiality of such elements, it is necessary to develop a method for masking overhead compression in video compression systems. On the one hand, overhead blocks should not contain redundant information. On the other hand, they must be formed from bit positions from different elements of the service components. On the other hand, they should be formed from bit positions from different elements of the service components. For that, it is proposed to organize the assembly of the elements of the service components. It is organized by combining 7-bit elements of service components into 8-bit complete sequences. Encryption blocks are formed from 8-bit sequences. The assembly of service components ensures the mixing of service data and reducing their quantity. To violate the structure of the representation of service components, it is proposed to additionally organize the permutation of 8-bit completed sequences. It provides a significant dispersion of the bit positions of the 7-bit overhead elements and the destruction of the correlation between the overhead elements. The correlation coefficients of the original and reconstructed images using encrypted service components are in the region of 0. The number of changing pixels is above the theoretical threshold value of 99.5341%.


Author(s):  
Ш.С. Фахми ◽  
Ю.Е. Крылов ◽  
Я.А.А. Хасан ◽  
Е.В. Костикова

В работе представлен видеокодек с адаптивным способом сканирования спектральных трансформант, основанный на применении трехмерных (3D) дискретных косинусных преобразований. Кодек имеет низкую вычислительную сложность и высокую устойчивость к ошибкам передачи по каналу связи и предназначен для мобильных устройств. Кодек представляет собой устройство, которое последовательно выполняет дискретное косинусное преобразование для устранения пространственной избыточности в пределах кадра и временной межкадровой избыточности в последовательности кадров с учетом скорости движения объектов на изображениях морских сюжетов. Приведены результаты моделирования алгоритмов кодирования и декодирования видеоинформации для различных видеопотоков, полученных из камер наблюдения. Получены результаты тестирования алгоритмов кодирования и декодирования изображений в виде графиков зависимости точности восстановления от скорости передачи сжатых видеоданных и зависимости точности от сложности устройств сжатия изображений. This paper presents a video codec with an adaptive method for scanning spectral transformants based on the use of three-dimensional (3D) discrete cosine transformations. The codec has a low computational complexity and high resistance to transmission errors over the communication channel and is designed for mobile devices. A codec is a device that sequentially performs a discrete cosine transformation to eliminate spatial redundancy within a frame and temporal inter-frame redundancy in a sequence of frames, taking into account the speed of movement of objects in images of marine subjects. The results of modeling algorithms for encoding and decoding video information for various video streams obtained from surveillance cameras are presented. The results of testing algorithms for encoding and decoding images in the form of graphs of the dependence of the recovery accuracy on the speed of transmission of compressed video data and the dependence of accuracy on the complexity of image compression devices are obtained.


2021 ◽  
Author(s):  
Genjiu Wang ◽  
Dandan Hu ◽  
Qianyao Li

Abstract It is generally believed that Cretaceous bioclastic limestone in Mesopotamia basin in central and southern Iraq is a typical porous reservoir with weak fracture development. Therefore, previous studies on the fracture of this kind of reservoir are rare. As a common seepage channel in carbonate rock, fracture has an important influence on single well productivity and waterflooding development of carbonate reservoir. Based on seismic, core and production data, this study analyzes the development characteristics of fractures from various aspects, and discusses the influence of fractures on water injection development of reservoirs. Through special processing of seismic data, it is found that there are a lot of micro fractures in Cretaceous bioclastic limestone reservoir. Most of these micro fractures are filled fractures without conductivity under the original reservoir conditions. However, with the further development of the reservoir, the reservoir pressure, oil-water movement, water injection and other conditions have changed, resulting in the original reservoir conditions of micro fractures with conductivity. The water cut of many production wells in the high part of reservoir rises sharply. In order to describe the three-dimensional spatial distribution of fractures, the core data is used to verify the seismic fracture distribution data volume. After the verification effect is satisfied, the three-dimensional fracture data volume is transformed into the geological model to establish the permeability field including fracture characteristics. The results of numerical simulation show that water mainly flows into the reservoir through high angle micro fractures. Fractures are identified by seismic and fracture model is established to effectively recognize the influence of micro fractures on water injection development in reservoir development process, which provides important guidance for oilfield development of Cretaceous bioclastic limestone reservoir in the central and southern Iraq fields.


Connectivity ◽  
2020 ◽  
Vol 148 (6) ◽  
Author(s):  
Yu. I. Katkov ◽  
◽  
O. S. Zvenigorodsky ◽  
O. V. Zinchenko ◽  
V. V. Onyshchenko ◽  
...  

The article is devoted to the topical issue of finding new effective and improving existing widespread compression methods in order to reduce computational complexity and improve the quality of image-renewable image compression images, is important for the introduction of cloud technologies. The article presents a problem To increase the efficiency of cloud storage, it is necessary to determine methods for reducing the information redundancy of digital images by fractal compression of video content, to make recommendations on the possibilities of applying these methods to solve various practical problems. The necessity of storing high-quality video information in new HDTV formats 2k, 4k, 8k in cloud storage to meet the existing needs of users has been substantiated. It is shown that when processing and transmitting high quality video information there is a problem of reducing the redundancy of video data (image compression) provided that the desired image quality is preserved, restored by the user. It has been shown that in cloud storage the emergence of such a problem is historically due to the contradiction between consumer requirements for image quality and the necessary volumes and ways to reduce redundancy of video data, which are transmitted over communication channels and processed in data center servers. The solution to this problem is traditionally rooted in the search for effective technologies for compressing, archiving and compressing video information. An analysis of video compression methods and digital video compression technology has been performed, which reduces the amount of data used to represent the video stream. Approaches to image compression in cloud storage under conditions of preservation or a slight reduction in the amount of data that provide the user with the specified quality of the restored image are shown. Classification of special compression methods without loss and with information loss is provided. Based on the analysis, it is concluded that it is advisable to use special methods of compression with loss of information to store high quality video information in the new formats HDTV 2k, 4k, 8k in cloud storage. The application of video image processing and their encoding and compression on the basis of fractal image compression is substantiated. Recommendations for the implementation of these methods are given.


2004 ◽  
Vol 60 (4) ◽  
pp. 491-499 ◽  
Author(s):  
KEIICHI MATSUMOTO ◽  
YASUHIRO WADA ◽  
HAJIME MATSUURA ◽  
TORU FUJITA ◽  
MICHIO SENDA

2021 ◽  
Vol 18 (6) ◽  
pp. 9410-9429
Author(s):  
Qing Ye ◽  
◽  
Qiaojia Zhang ◽  
Sijie Liu ◽  
Kaiqiang Chen ◽  
...  

<abstract> <p>Video information is currently widely used in various fields. Compared with image and text data, video data has the characteristics of large data volume, strong data relevance, and large data redundancy, which makes traditional cryptographic systems no longer suitable for video encryption systems. The paper proposes a new chaotic system based on coupled map lattice (CML) and applies it to high efficiency video coding (HEVC) video encryption. The chaotic system logistic-iterative chaotic map with infinite collapses-coupled map lattice (L-ICMIC-CML), which is improved on the basis of the ICMIC system and combined with CML, generates stream ciphers and encrypts some syntax elements of HEVC. The experimental results show that the stream cipher generated by the L-ICMIC-CML system passes the SP800-22 Revla test and has strong randomness. Applying the stream cipher to the proposed HEVC encryption scheme, through the analysis of the encryption scheme's security, encryption time and encryption efficiency, it is better than other chaotic system encryption schemes. The video encryption system proposed in this paper is both safe and efficient.</p> </abstract>


2021 ◽  
Vol 26 (2) ◽  
pp. 172-183
Author(s):  
E.S. Yanakova ◽  
◽  
G.T. Macharadze ◽  
L.G. Gagarina ◽  
A.A. Shvachko ◽  
...  

A turn from homogeneous to heterogeneous architectures permits to achieve the advantages of the efficiency, size, weight and power consumption, which is especially important for the built-in solutions. However, the development of the parallel software for heterogeneous computer systems is rather complex task due to the requirements of high efficiency, easy programming and the process of scaling. In the paper the efficiency of parallel-pipelined processing of video information in multiprocessor heterogeneous systems on a chip (SoC) such as DSP, GPU, ISP, VDP, VPU and others, has been investigated. A typical scheme of parallel-pipelined processing of video data using various accelerators has been presented. The scheme of the parallel-pipelined video data on heterogeneous SoC 1892VM248 has been developed. The methods of efficient parallel-pipelined processing of video data in heterogeneous computers (SoC), consisting of the operating system level, programming technologies level and the application level, have been proposed. A comparative analysis of the most common programming technologies, such as OpenCL, OpenMP, MPI, OpenAMP, has been performed. The analysis has shown that depend-ing on the device finite purpose two programming paradigms should be applied: based on OpenCL technology (for built-in system) and MPI technology (for inter-cell and inter processor interaction). The results obtained of the parallel-pipelined processing within the framework of the face recognition have confirmed the effectiveness of the chosen solutions.


2021 ◽  
Author(s):  
Hongdan Deng ◽  
Ken McClay

&lt;div&gt;Basement fault reactivation, and the growth, interaction, and linkage with new fault segments are fundamentally three-dimensional and critical for understanding the evolution of fault network development in sedimentary basins. This paper analyses the evolution of a complex, basement-involved extensional fault network on the Enderby Terrace on the eastern margin of the Dampier sub-basin, NW Shelf of Australia. A high-resolution, depth-converted, 3D seismic reflection data volume is used to show that multiphase, oblique extensional reactivation of basement-involved faults controlled the development of the fault network in the overlying strata. Oblique reactivation of the pre-existing faults initially led to the formation of overlying, en &amp;#233;chelon Late Triassic &amp;#8211; Middle Jurassic fault segments that, as WNW&amp;#8211;directed rifting progressed on the margin, linked by breaching of relay ramp to form two intersecting fault systems (F1 and F2-F4). Further reactivation in the Latest Jurassic &amp;#8211; Early Cretaceous (NNW&amp;#8211;SSE extension) produced an additional set of en &amp;#233;chelon fault arrays in the cover strata. The final fault network consists of main or principal faults and subordinate or splay faults, together with branch lines that link the various components. Our study shows that breaching of relay ramps and/or vertical linkages produces vertical and horizontal branch lines giving complex final fault geometries. We find that repeated activity of the basement-involved faults tends to form continuous and planar fault architectures that favor displacement transfer between the main constituent segments along strike and with depth.&lt;/div&gt;


Sign in / Sign up

Export Citation Format

Share Document