Composite coding technology of microsegments to improve the security of video resources in infocommunication systems

Authors

DOI:

https://doi.org/10.18372/2225-5036.26.15154

Keywords:

video information coding, security of information video resource, discrete cosine transform transformant, position-base codogram

Abstract

It is shown that ensuring the security of information resources in the management system of critical
infrastructure facilities in the context of information wars is a topical issue in applied research. The existence of threats
to the loss of security of critical video resources is substantiated, which in the conditions of managing critical infrastructure facilities leads to violations in the system of ensuring the national security of the state. The necessity of
creating technological platforms within the cluster for describing the syntax of video resources for the corresponding reorientation of the balance of efficiency is established. The article proposes an alternative direction for processing video frames at the level of their syntactic description. At the same time, the conditions for compatibility of the developed platform with technological solutions within the framework of the JPEG concept are provided. The development of a method of arrangement coding of a significant microsegment of a video frame at the level of codograms of its syntactic representation in the spectral space by constructing sequences of code constructions of uniform length on the basis of:
differentiated fragmentation of the codogram lengths of chains of zero components of the transformant; filling the
redundant component of the positional-base codogram of the significant components of the transform with fragments
of the positional-complementary codogram of the lengths of the chains of zero components. It is shown that the created video resource encoding methods based on the developed concept of processing significant segments provide an increase in the level of availability under the conditions of the required level of its integrity, i.e. an increase in the level of information security is achieved.

Published

2023-02-24

Issue

Section

Software & Hardware Architecture Security