Devising a conceptual method for generating cryptocompression codograms of images without loss of information quality

Authors

DOI:

https://doi.org/10.15587/1729-4061.2021.237359

Keywords:

cryptocompression, coding, information protection, floating scheme, differentiated basis, service component

Abstract

Along with the widespread use of digital images, an urgent scientific and applied issue arose regarding the need to reduce the volume of video information provided it is confidential and reliable. To resolve this issue, cryptocompression coding methods could be used. However, there is no method that summarizes all processing steps. This paper reports the development of a conceptual method for the cryptocompression coding of images on a differentiated basis without loss of information quality. It involves a three-stage technology for the generation of cryptocompression codograms. The first two cascades provide for the generation of code structures for information components while ensuring their confidentiality and key elements as a service component. On the third cascade of processing, it is proposed to manage the confidentiality of the service component. The code values for the information components of nondeterministic length are derived out on the basis of a non-deterministic number of elements of the source video data in a reduced dynamic range. The generation of service data is proposed to be organized in blocks of initial images with a dimension of 16×16 elements. The method ensures a decrease in the volume of source images during the generation of cryptocompression codograms, by 1.14–1.58 times (12–37 %), depending on the degree of their saturation. This is 12.7‒23.4 % better than TIFF technology and is 9.6‒17.9 % better than PNG technology. The volume of the service component of cryptocompression codograms is 1.563 % of the volume of the source video data or no more than 2.5 % of the total code stream. That reduces the amount of data for encryption by up to 40 times compared to TIFF and PNG technologies. The devised method does not introduce errors into the data in the coding process and refers to methods without loss of information quality.

Author Biographies

Vladimir Barannik, V. N. Karazin Kharkiv National University

Doctor of Technical Sciences, Professor

Department of Artificial Intelligence and Software

Serhii Sidchenko, Ivan Kozhedub Kharkiv National Air Force University

PhD, Senior Researcher

Scientific Department of Organizing

Dmitriy Barannik, Kharkiv National University of Radio Electronics

Postgraduate Student

Department of Design Automation

Sergii Shulgin, University of Radio Electronics

PhD

Department of Information and Network Engineering

Kharkiv National

Valeriy Barannik, Kharkiv National University of Radio Electronics

Department of Design Automation

Anton Datsun, Kharkiv National University of Radio Electronics

Department of Information and Network Engineerin

References

  1. Barannik, V., Sidchenko, S., Barannik, N., Barannik, V. (2021). Development of the method for encoding service data in cryptocompression image representation systems. Eastern-European Journal of Enterprise Technologies, 3 (9 (111)), 103–115. doi: https://doi.org/10.15587/1729-4061.2021.235521
  2. Sharma, R., Bollavarapu, S. (2015). Data Security using Compression and Cryptography Techniques. International Journal of Computer Applications, 117 (14), 15–18. doi: https://doi.org/10.5120/20621-3342
  3. Jasuja, B., Pandya, A. (2015). Crypto-Compression System: An Integrated Approach using Stream Cipher Cryptography and Entropy Encoding. International Journal of Computer Applications, 116 (21), 34–41. doi: https://doi.org/10.5120/20463-2831
  4. Gonzalez, R., Woods, R. (2018). Digital Image Processing. Pearson, 1168.
  5. Announcing the Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197 (2001). NIST, 51. Available at: https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf
  6. Rivest, R. L., Shamir, A., Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21 (2), 120–126. doi: https://doi.org/10.1145/359340.359342
  7. Wallace, G. K. (1991). The JPEG still picture compression standard. Communications of the ACM, 34 (4), 30–44. doi: https://doi.org/10.1145/103085.103089
  8. ISO/IEC 15444-1:2019. Information technology – JPEG 2000 image coding system – Part 1: Core coding system. Available at: https://www.iso.org/standard/78321.html
  9. Ramakrishnan, M. (Ed.) (2019). Cryptographic and Information Security. Approaches for Images and Videos. CRC Press, 986. doi: https://doi.org/10.1201/9780429435461
  10. Kurihara, K., Shiota, S., Kiya, H. (2015). An encryption-then-compression system for JPEG standard. 2015 Picture Coding Symposium (PCS). doi: https://doi.org/10.1109/pcs.2015.7170059
  11. Naor, M., Shamir, A. (1995). Visual cryptography. Lecture Notes in Computer Science, 1–12. doi: https://doi.org/10.1007/bfb0053419
  12. Chen, C.-C., Wu, W.-J. (2014). A secure Boolean-based multi-secret image sharing scheme. Journal of Systems and Software, 92, 107–114. doi: https://doi.org/10.1016/j.jss.2014.01.001
  13. Dufaux, F., Ebrahimi, T. (2006). Toward a secure JPEG. Applications of Digital Image Processing XXIX. doi: https://doi.org/10.1117/12.686963
  14. Yuan, L., Korshunov, P., Ebrahimi, T. (2015). Secure JPEG scrambling enabling privacy in photo sharing. 2015 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG). doi: https://doi.org/10.1109/fg.2015.7285022
  15. ISO/IEC 15444-8:2007. Information technology – JPEG 2000 image coding system: Secure JPEG 2000 – Part 8. Available at: https://www.iso.org/standard/37382.html
  16. Alimpiev, A. N., Barannik, V. V., Sidchenko, S. A. (2017). The method of cryptocompression presentation of videoinformation resources in a generalized structurally positioned space. Telecommunications and Radio Engineering, 76 (6), 521–534. doi: https://doi.org/10.1615/telecomradeng.v76.i6.60
  17. Barannik, V., Sidchenko, S., Barannik, D. (2020). Technology for Protecting Video Information Resources in the Info-Communication Space. 2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT). Kyiv, 29–33. Available at: https://ieeexplore.ieee.org/document/9349324
  18. DSTU 7624:2014. Informatsiyni tekhnolohiyi. Kryptohrafichnyi zakhyst informatsiyi. Alhorytm symetrychnoho blokovoho peretvorennia (2014). Kyiv, 39.
  19. DSTU HOST 28147:2009. Systema obrobky informatsiyi. Zakhyst kryptohrafichnyi. Alhorytm kryptohrafichnoho peretvorennia (HOST 28147-89) (2008). Kyiv, 20.
  20. Barannik, V., Sidchenko, S., Barannik, N., Khimenko, A. (2021). The method of masking overhead compaction in video compression systems. Radioelectronic and computer systems, 2, 51–63. doi: https://doi.org/10.32620/reks.2021.2.05

Downloads

Published

2021-08-31

How to Cite

Barannik, V., Sidchenko, S., Barannik, D., Shulgin, S., Barannik, V., & Datsun, A. (2021). Devising a conceptual method for generating cryptocompression codograms of images without loss of information quality. Eastern-European Journal of Enterprise Technologies, 4(2(112), 6–17. https://doi.org/10.15587/1729-4061.2021.237359