Modes of protection of video data from unauthorized access

Authors

  • Любов Володимирівна Рябова Національ­ний авіаційний університет
  • Євгеній Іванович Подгорний Національ­ний авіаційний університет
  • Карина Андріївна Мацуева Національ­ний авіаційний університет

DOI:

https://doi.org/10.18372/2410-7840.15.4853

Keywords:

video data, the protection of video data, unauthorized access, video encoding, data encryption methods to protect the video data

Abstract

The paper reviews existing methods of protection of vid­eo. A consequence of the mass distribution of video technology has become illegal copying and viewing of video data - a problem of protection of video. In particu­lar, video data can be distributed to copyright infringe­ment (piracy), and these may refer unauthorized competi­tors or hackers to obtain sensitive information (espio­nage). The simplest approach to the protection of video data - is die use of classical encryption schemes open or secret key. Image data file is encrypted and then transmit­ted over the insecure communications channel or record­ed on unprotected media. This method provides a very high degree of protection of video data is achieved by a high resistance used for protection cipher. Often, howev­er, the amount of encrypted data over the text and audio data even considerably more, which requires significant computing resources to such encryption of data. This tends to limit the possibility of using classical encryption in areas such as interactive and cable TV. Users of these services should have a powerful system capable of real­time, without delays decoding, and then decode the re­ceived data. Since the main standard used to encode and compress video data format is MPEG, then most of the methods of protection designed specifically for this for­mat. They use features and coding structure of MPEG to reduce the computational resources to protect the video data. One way to protect the first data in the MPEG algo­rithm was permutation «zigzag». Its essence consists in reading the quantized coefficients of discrete cosine trans­form method is not «zigzag» for subsequent encoding as defined format, randomly. Different methods of protec­tion vidiodannyh applied to telecommunications systems real-time.

Author Biographies

Любов Володимирівна Рябова, Національ­ний авіаційний університет

Assistant Professor, Department of information security of the National Aviation University.

Євгеній Іванович Подгорний, Національ­ний авіаційний університет

Associate Professor, National Aviation University.

Карина Андріївна Мацуева, Національ­ний авіаційний університет

postgraduate, Department of Computerized Control Systems, National Aviation University.

References

Алферов А.А, Зубков А.Ю, Кузьмин А.С. Основы криптографии. — М: Гелиос АРВ, 2001.

Володин А.А. Митько В.Г, Е.Н. Спинько Е.Н. Обработка видео в системах телевизионного на-блюдения // Вопросы защиты информации. — М.: 2002. С. 34-47.

Рябова Л.В, Голембиевская Ю.Г. Базовые операторы для обработки изображений радужной оболочки глаза // Наука і молодь: 36. наук. пр. — К.: НАУ, 2006. - Вип.6 — С. 45-48.

Chung-Ping Wu and С.-С. Jay Kuo. Efficient Multimedia Encryption via Entropy Codec Design. In Proceedings of SPIE, Security and Watermarking of Multimedia Contents III, volume 4314, San Jose, CA, USA, 2001.

C.W. Richardo Identification of three dimensional

using Fourier descriptor objects of the boundary curve. IEEE vol. SMC- 4, Jule 1994.

Alferov A.A., Zubkov A.YU., Kuzmin A.S. Cryptography, M.:Gelios ARB, 2001.

Volodin A.A., Mitko Y.G., Sprnko E.N. Video processing systems, video surveillance, Information security, M.: 2002. pp.3 I 17.

Ryabova L.V., Golembievskaya YU.G. Basic operators for image processing iris, Nauka і molod, K, NAU, 2006, №6. pp. 45-48.

Chung-Ping Wu and C.-C. Jay Kuo. Efficient Multimedia Encryption via Entropy Codec Design. In Proceedings of SPIE, Security and Watermarking of Multimedia Contents III, volume 4314, San Jose, CA, USA, 2001.

C.W. Richardo Identification of three dimensional using Fourier descriptor objects of the boundary curve. IEEE vol. SMC- 4, Jule 1994.

Issue

Section

Articles