Methodological base of cryptocompression presentation of videoinfor-mation resources
DOI:
https://doi.org/10.18372/2410-7840.15.4773Keywords:
cryptocompression presentation, defence of the videoinformation, compact presentation, videoinformation resource, methodological baseAbstract
Development of the technologies presentation of the videoinformation providing and its integration in the different spheres of activity of the society requires the increase of efficiency of defence the videodate, leading of which is need in real time. Existent technologies of defence of the videoinformation from unauthorized division are based on step-by-step implementation of the operations compression and encipherement or schemes of the so called selective encipherement, uses the features of encoding and structure of stream of MPEG for reduction of calculable resources for defence of videoinformation. The lack of successive scheme appear is requirement in considerable calculable resources or dwells at treatment and transmissions, but by the lack of selective encipherement is more low defend of information. Potential possibilities of defence of operative videoinformation are considered in the direction of construction proof to unauthorized decoding (recognitions) of images on the base of the systems of compact presentation, i.e. providing of secrecy of videoinformation at the level of coding its sources. Sets out the principal components of the methodological base development of the cryptocompression presentation videoinformation resources. Basic definitions cryptocompression presentation are provides, also is introduce a new scientific and practical direction – “Theory of cryptocompression”. The main directions of scientific-applied research are conducted in this field of knowledge. The methodological base of the cryptocompression building of the videodata components is formed.
References
Баранник В.В. Метод криптосемантического представления изображений на основе комбинированного подхода / В.В. Баранник, С.А. Сидченко, В.В. Ларин // Сучасна спеціальна техніка. – К., 2010. – № 3(22). – С. 33-38.
Баранник В.В. Метод дешифрируемо-стойкого представления изображений / В.В. Баранник, С.А. Сидченко, В.В. Ларин // Сучасна спеціальна техніка. – К., 2011. – № 1(24). – С. 22-28.
Бараннік В.В. Методологічні основи криптосемантичного представлення відеозображень в інформаційних комунікаціях / В.В. Бараннік, С.О. Сідченко, В.В. Ларін // Наукоємні технології. – К., 2012. – № 3(15). – С. 78-82.
Нагорных И.М. Способы защиты видеоданных от несанкционированного доступа / И.М. Нагорных // Спецтехника и связь // http://www.st-s.su/index.htm.
Uhl A. Image and Video Encryption From Digital Rights Management to Secured Personal Communication / A. Uhl, A. Pommer. – Springer 2005, ISBN: 978-0-387-23402-1.
Barannik V.V., Sidchenko S.A., Larin V.V. Method of cryptosemantic presentation of images on the basis of the combined approach, Modern special technique, 2010, № 3(22), pp. 33–38.
Barannik V.V., Sidchenko S.A., Larin V.V. Method of the combined decoded-firm presentation of images, Modern special technique, 2011, № 1(24), pp. 22-28.
Barannik V.V., Sidchenko S.A., Larin V.V. Methodological bases of cryptosemantic presentation of video-images in the informative communications, Science-Based Technologies, 2012, № 3(15), pp. 78-82.
Nagornyh I.M. Methods of defense of videoinformation from the unauthorized division, Specialtechnique and connection, http:www.st-s.su/index.htm.
Uhl A., Pommer A. Image and Video Encryption From Digital Rights Management to Secured Personal Communication, Springer 2005, ISBN: 978-0-387-23402-1.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).