scholarly journals Метод маскувального ущільнення службових даних в системах компресії відеозображень

Author(s):  
Володимир Вікторович Бараннік ◽  
Сергій Олександрович Сідченко ◽  
Наталія Вячеславівна Бараннік ◽  
Андрій Михайлович Хіменко

The demand for video privacy is constantly increasing. Simultaneously, it is necessary to solve an urgent scientific and applied problem, which consists in increasing the confidentiality of video information under conditions of a given time delay for its processing and delivery, while ensuring its reliability. The crypto compression transformations can be used to solve it. A service component is used as a conversion key, which is directly formed in the conversion process and contains information about the identified structural characteristics of the video data. Therefore, such information requires confidentiality. The existing methods of cryptography are designed to process a universal data stream and do not consider the structure and features of service components. It leads to the formation of redundant data, the use of an excessive number of operations, and an increase in processing time in the process of protecting service information using universal cryptography methods. Therefore, the article aims to develop a method for masking service data compression to ensure their confidentiality, considering the peculiarities of their formation by crypto compression methods. In modes with controlled loss of information quality, the elements of the service component are formed in a reduced dynamic range. Their length is 7 bits. To ensure the confidentiality of such elements, it is necessary to develop a method for masking overhead compression in video compression systems. On the one hand, overhead blocks should not contain redundant information. On the other hand, they must be formed from bit positions from different elements of the service components. On the other hand, they should be formed from bit positions from different elements of the service components. For that, it is proposed to organize the assembly of the elements of the service components. It is organized by combining 7-bit elements of service components into 8-bit complete sequences. Encryption blocks are formed from 8-bit sequences. The assembly of service components ensures the mixing of service data and reducing their quantity. To violate the structure of the representation of service components, it is proposed to additionally organize the permutation of 8-bit completed sequences. It provides a significant dispersion of the bit positions of the 7-bit overhead elements and the destruction of the correlation between the overhead elements. The correlation coefficients of the original and reconstructed images using encrypted service components are in the region of 0. The number of changing pixels is above the theoretical threshold value of 99.5341%.

2021 ◽  
Vol 4 (2(112)) ◽  
pp. 6-17
Author(s):  
Vladimir Barannik ◽  
Serhii Sidchenko ◽  
Dmitriy Barannik ◽  
Sergii Shulgin ◽  
Valeriy Barannik ◽  
...  

Along with the widespread use of digital images, an urgent scientific and applied issue arose regarding the need to reduce the volume of video information provided it is confidential and reliable. To resolve this issue, cryptocompression coding methods could be used. However, there is no method that summarizes all processing steps. This paper reports the development of a conceptual method for the cryptocompression coding of images on a differentiated basis without loss of information quality. It involves a three-stage technology for the generation of cryptocompression codograms. The first two cascades provide for the generation of code structures for information components while ensuring their confidentiality and key elements as a service component. On the third cascade of processing, it is proposed to manage the confidentiality of the service component. The code values for the information components of nondeterministic length are derived out on the basis of a non-deterministic number of elements of the source video data in a reduced dynamic range. The generation of service data is proposed to be organized in blocks of initial images with a dimension of 16×16 elements. The method ensures a decrease in the volume of source images during the generation of cryptocompression codograms, by 1.14–1.58 times (12–37 %), depending on the degree of their saturation. This is 12.7‒23.4 % better than TIFF technology and is 9.6‒17.9 % better than PNG technology. The volume of the service component of cryptocompression codograms is 1.563 % of the volume of the source video data or no more than 2.5 % of the total code stream. That reduces the amount of data for encryption by up to 40 times compared to TIFF and PNG technologies. The devised method does not introduce errors into the data in the coding process and refers to methods without loss of information quality.


2021 ◽  
Vol 15 ◽  
Author(s):  
Ilja Arent ◽  
Florian P. Schmidt ◽  
Mario Botsch ◽  
Volker Dürr

Motion capture of unrestrained moving animals is a major analytic tool in neuroethology and behavioral physiology. At present, several motion capture methodologies have been developed, all of which have particular limitations regarding experimental application. Whereas marker-based motion capture systems are very robust and easily adjusted to suit different setups, tracked species, or body parts, they cannot be applied in experimental situations where markers obstruct the natural behavior (e.g., when tracking delicate, elastic, and/or sensitive body structures). On the other hand, marker-less motion capture systems typically require setup- and animal-specific adjustments, for example by means of tailored image processing, decision heuristics, and/or machine learning of specific sample data. Among the latter, deep-learning approaches have become very popular because of their applicability to virtually any sample of video data. Nevertheless, concise evaluation of their training requirements has rarely been done, particularly with regard to the transfer of trained networks from one application to another. To address this issue, the present study uses insect locomotion as a showcase example for systematic evaluation of variation and augmentation of the training data. For that, we use artificially generated video sequences with known combinations of observed, real animal postures and randomized body position, orientation, and size. Moreover, we evaluate the generalization ability of networks that have been pre-trained on synthetic videos to video recordings of real walking insects, and estimate the benefit in terms of reduced requirement for manual annotation. We show that tracking performance is affected only little by scaling factors ranging from 0.5 to 1.5. As expected from convolutional networks, the translation of the animal has no effect. On the other hand, we show that sufficient variation of rotation in the training data is essential for performance, and make concise suggestions about how much variation is required. Our results on transfer from synthetic to real videos show that pre-training reduces the amount of necessary manual annotation by about 50%.


1988 ◽  
Vol 27 (2) ◽  
pp. 125-140 ◽  
Author(s):  
Nancy Morrow-Howell ◽  
Joel Leon

This article presents the results of a path analysis to clarify the life-span determinants of work effort in postretirement years. It was found that personal and structural characteristics are different between a group of retirees who did not work in the three years after retirement and those that worked more than 300 hours annually. Those that participated in the labor force after retirement experienced more successful employment histories before retirement. On the other hand, people with more marginal work histories were less likely to sustain work efforts after retirement, despite lower income.


2019 ◽  
Vol 488 (3) ◽  
pp. 3262-3267
Author(s):  
Miguel A Cagigas ◽  
Manuel P Cagigal ◽  
Pedro J Valle ◽  
Vidal F Canales ◽  
Antonio Fuentes ◽  
...  

ABSTRACT In this paper, we review two different methods to increase image contrast and propose the combination of both to detect faint companions surrounding a host star. Coronagraphy allows us to block light coming from the host star so that the residual star light can be reduced by several orders of magnitude. On the other hand, estimating the Covariance of Lucky Images (COELI) is a proven method to detect faint companions from ground-based telescope images. The dynamic range of the detection camera limits this technique. Hence, the application of COELI to coronagraphic images may increase the magnitude range of the detectable companions. COELI only requires the existence of a reference, which can be obtained using an existing stellar companion or using a coronagraphic mask designed to create a faint image of the host star. We provide an analysis of the combination of the techniques by processing coronagraphic images obtained by the William Herschel Telescope.


2010 ◽  
Vol 104 (3) ◽  
pp. 415-429 ◽  
Author(s):  
STATHIS N. KALYVAS ◽  
LAIA BALCELLS

Because they are chiefly domestic conflicts, civil wars have been studied primarily from a perspective stressing domestic factors. We ask, instead, whether (and how) the international system shapes civil wars; we find that it does shape the way in which they are fought—their “technology of rebellion.” After disaggregating civil wars into irregular wars (or insurgencies), conventional wars, and symmetric nonconventional wars, we report a striking decline of irregular wars following the end of the Cold War, a remarkable transformation of internal conflict. Our analysis brings the international system back into the study of internal conflict. It specifies the connection between system polarity and the Cold War on the one hand and domestic warfare on the other hand. It also demonstrates that irregular war is not the paradigmatic mode of civil war as widely believed, but rather is closely associated with the structural characteristics of the Cold War.


2021 ◽  
Vol 3 (9(111)) ◽  
pp. 103-115
Author(s):  
Vladimir Barannik ◽  
Serhii Sidchenko ◽  
Natalia Barannik ◽  
Valeriy Barannik

The demand for image confidentiality is constantly growing. At the same time, ensuring the confidentiality of video information must be organized subject to ensuring its reliability with a given time delay in processing and transmission. Methods of cryptocompression representation of images can be used to solve this problem. They are designed to simultaneously provide compression and protection of video information. The service component is used as the key of the cryptocompression transformation. However, it has a significant volume. It is 25 % of the original video data volume. A method for coding systems of service components in a differentiated basis on the second cascade of cryptocompression representation of images has been developed. The method is based on the developed scheme of data linearization from three-dimensional coordinates of representation in a two-dimensional matrix into a one-dimensional coordinate for one-to-one representation of this element in a vector. Linearization is organized horizontally line by line. On the basis of the developed method, a non-deterministic number of code values of information components is formed. They have non-deterministic lengths and are formed on a non-deterministic number of elements. The uncertainty of positioning of cryptocompression codograms in the general code stream is provided, which virtually eliminates the possibility of their unauthorized decryption. The method provides a reduction in the volume of the service component of the cryptocompression codogram. The service data volume is 6.25 % of the original video data volume. The method provides an additional reduction in the volume of cryptocompression representation of images without loss of information quality relative to the original video data on average from 1.08 to 1.54 times, depending on the degree of their saturation


1971 ◽  
Vol 11 ◽  
pp. 86-89
Author(s):  
G. A. H. Walker ◽  
J. R. Auman ◽  
V. Buchholz ◽  
B. Goldberg ◽  
B. Isherwood

Astronomical spectra are, with few exceptions, still being recorded on photographic emulsions. These generally have the advantages of better spatial resolution and larger available area than existing photoelectric imaging detectors. On the other hand they do suffer from a small dynamic range (15 or 20: 1), reciprocity failure, and a quantum efficiency of less than 1 per cent. Image intensifiers and image orthocons can be used to improve sensitivity, but where photographs are used for the record the other problems tend to remain. Calibration and extraction of the appropriate astronomical information in digital form involves a considerable amount of time and careful work, as one can appreciate from many of the papers presented at this colloquium.


2012 ◽  
Vol 452-453 ◽  
pp. 1025-1029
Author(s):  
Luigi Barazzetti ◽  
Fabio Remondino ◽  
Marco Scaioni

Tripoding the camera is a standard solution to acquire aligned images useful for High Dynamic Range photography. On the other hand, the chance to use a hand-held digital camera is surely more practical and attractive for photographers. In this paper we propose a registration algorithm that recovers the alignment of several bracketed images using a progressive combination of homographies estimated from a set of image correspondences.


2017 ◽  
Vol 6 (2) ◽  
pp. 101-106
Author(s):  
Ameneh Rasouli Firoozabadi ◽  
Habib Jadidoleslamy

In the Persian poem, the elements constituting the music are: metrical prosody, the rhymes, and homophony of words in the poem that is the result of the artistic repetition of the various phonetic units of the language. Harmony between these elements and poem content can be considered as a footnote of this phonetic phenomenon and Complementary of the musical quality of the lyrics. In the form of “sonnet”, with regard to the structural characteristics, the mentioned musical elements can be divided into two groups: one is related to the sonnet structure (which is constantly in a sonnet) and other is related to the couplet (which in the different couplet of a sonnet may be changed). The Biddle Dehlavī lyrics is described by “roam” adjective, but his sonnet meter is to a large extent “ordinary”, because high frequency meters of the sonnet, which four fifth of sonnets were versified in that format, are according to the lyric tradition of that time period. However, in low frequency meters of his sonnets, there are uncommon meters that distinguishes it from other poets. Most of the readers of Biddle poems and experts in the Biddle poems believe that his sonnets are the most valuable of his poems. In the other hand, because of its history and lyric nature, the sonnet form has a stronger link to the musics and the meter role is more highlighted in his sonnets.


2010 ◽  
Vol 42 (2) ◽  
Author(s):  
Stathis Selimis ◽  
Demetra Katis

Theoretical claims about typologically constrained differences in how speakers habitually describe physical motion are tested through three cross-linguistic developmental studies. Three types of data are analyzed in Greek and English, languages here characterized respectively as Verb- and Satellite-framed in the coding of motion: spontaneous conversations between adults and children aged 1;8–4;6 as well as two types of narratives elicited through pictures and a film from 4-, 7-, 10-year olds and adults. Results show, on the one hand, largely predictable cross-linguistic differences, with overall greater attention paid to manner in English than in Greek and different patterns for coding path. On the other hand, the very appearance as well as intensity of typological effects also depend upon various interacting factors: the precise ways of measuring them, the age of speakers, type, content and communicative exigencies of the discourse as well as the detailed structural characteristics of a language.


Sign in / Sign up

Export Citation Format

Share Document