The method for scrambling the system of service components in the cryptocompression codograms

Authors

DOI:

https://doi.org/10.18372/2225-5036.27.16001

Keywords:

cryptocompression coding, information protection, scrambling, encryption, encoding, permutation, compression, confidentiality, image

Abstract

Crisis management systems require the confidentiality of transmitted video data while maintaining the
specified quality of information and without reducing its availability. However, there is a problem associated with the
fact that ensuring the confidentiality of video data can be organized either by the availability of video data while maintaining a given quality, or by reducing the amount of useful information to maintain a given availability. The method
for scrambling a system of service components in the cryptocompression codograms, formed under the condition of discarding the least significant bit in the values of pixel brightness in RGB space, has been developed. The difference
between this method and the known ones is that, before performing scrambling transformations, the integration of
service components in a reduced dynamic range into 8-bit combined elements is organized. At the stage of permutation
of the combined 8-bit data, not only the change of the location of the values of the original 7-bit elements of the service
components is organized, but also the change of their values. This improves the cryptographic characteristics of the
known permutation transformations. The developed method provides: increase of availability of video data due to additional reduction of volume of cryptocompression image presentation; increasing cryptographic stability by changing
the values of the elements of the system of service components, breaking the correlation between the elements and
changing the frequency of pixels. Scrambling transformations based on permutation tables applied to the system of
service components in cryptocompression codograms, ensure the stability of the visual image information to errors in
codograms that arise in the communication channel. Moreover, cryptocompression codograms are a compressed representation of the original images.

References

Schneier B. Applied Cryptography: Protocols, Algorithms, and Source Code in C. New York City, United States: Wiley, 2015. – 784 p.

Announcing the ADVANCED ENCRYPTION STANDARD (AES) // Federal Information Processing Standards Publication [Електронний ресурс]. Режим доступу: https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf.

DSTU 7624:2014: Information Technology. Cryptographic protection of information. Symmetric block transformation algorithm. Order of the Ministry of Economic Development of Ukraine № 1484, 2014.

DSTU GOST 28147:2009: Information processing system. Cryptographic protection. Cryptographic transformation algorithm GOST 28147-89, 2008.

Rivest R.L., Shamir A., Adleman L.M. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, Vol. 2, Iss. 21, 1978. - pp. 120–126.

Sharma R., Bollavarapu S. Data Security using Compression and Cryptography Techniques. International Journal of Computer Applications, Vol. 117, No. 14, 2015. - pp. 15-18.

Barannik, D. Stegano-Compression Coding in a Non-Equalible Positional Base // IEEE 2 nd International Conference on Advanced Trends in Information Theory (ATIT 2020), 2020, pp. 83-86.

Barannik V., Barannik D., Fustii V., Parkhomenko M. Evaluation of Effectiveness of Masking Methods of Aerial Photographs // 3rd International Conference on Advanced Information and Communications Technologies (AICT), 2019. - pp. 415-418.

Barannik V., Barannik N., Ryabukha Yu., Barannik D. Indirect Steganographic Embedding Method Based On Modifications of The Basis of the Polyadic System // 15th IEEE International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET’2020), 2020. - pp. 699-702.

Barannik V., Barannik, V.: Binomial-Polyadic Binary Data Encoding by Quantity of Series of Ones // 15th IEEE International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET’2020), 2020. - pp. 775-780.

Barannik V.V., Ryabukha Yu. N., Tverdokhleb V.V., Barannik D.V. Methodological basis for constructing a method for compressing of transformants bit representation, based on non-equilibrium positional encoding // 2nd International Conference on Advanced Information and Communication Technologies (AICT), 2017. - pp.188-192.

Barannik V., Krasnoruckiy A., Hahanova A. The positional structural-weight coding of the binary view of transformants // East-West Design & Test Symposium (EWDTS), 2013. – pp 1-4.

Published

2021-11-04