<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Method for Encoding Video Frame Fragments Based on Non-Equilibrium Codes with Minimization of Service Data</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Kharkiv National Air Force University</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kharkiv</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ukraine vvbar.off@gmail.com</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Cherkasy State Technological University</institution>
          ,
          <addr-line>Cherkasy</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Kharkiv National University of Radio Electronics</institution>
          ,
          <addr-line>Kharkiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>National University of Civil Defence of Ukraine</institution>
          ,
          <addr-line>Cherkasy</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>State Scientific and Research Institute of Cybersecurity Technologies and Information Protection</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff5">
          <label>5</label>
          <institution>Yessenov University</institution>
          ,
          <addr-line>Aktau</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2046</year>
      </pub-date>
      <fpage>0000</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>The principle of constructing a method for encoding a video stream, aimed at reducing the structural redundancy of fragments of video frames, is considered. Moreover, the developed method allows us to consider fragments of a video frame in the form of separate code structures</p>
      </abstract>
      <kwd-group>
        <kwd>structural redundancy</kwd>
        <kwd>video processing</kwd>
        <kwd>telecommunication systems</kwd>
        <kwd>data protection</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Modern information and communication networks are characterized by a constant
increase in the intensity of the transmitted traffic as well as its constant complication.</p>
      <p>The largest part of this traffic is video service data, regarding which there is a
constant increase in quality requirements.</p>
      <p>Simultaneously with the growth of traffic volumes, its complication is observed,
caused by the development of existing and the emergence of new types of network
services.</p>
      <p>These include the development of video communications services, virtual reality.
New types of services include concepts such as Smart City, Safe City, holographic
video communication systems, and UHD television.</p>
      <p>It is clear that in addition to increasing the volume of traffic both video and other
types, its complication arises due to the next reasons:
1. High dynamic range of packet sizes to be processed on network nodes;
2. A large number of packages of small length generated within the Smart City or
the Safe City by sources such as:
- sensors (data collection from various systems);
- robotic systems (remote control commands).</p>
      <p>3. Using firewalls and cyber protection modules at the level of network nodes,
which creates an additional delay.</p>
      <p>4. Using hidden information transmission systems (in particular, based on
steganographic algorithms), which increases the load on the nodes and creates an
additional transmission delay due to the need for additional traffic analysis.
5. Using intelligent video traffic processing and analysis systems.</p>
      <p>At the same time, the increase in network bandwidth lags behind the growth in the
volume of transmitted traffic. Consequently, there is a contradiction, as shown
in Fig. 1.</p>
      <p>Network bandwidth
increase</p>
      <p>Contradiction
Network congestion</p>
      <p>(Data loss,
increasing
transmission delay)</p>
      <p>The growth of service
quality requirements</p>
      <p>Traffic increase
Increast traffic
complexity</p>
      <p>Under these conditions, traditional encoding methods partially provide efficient
transmission of video data in terms of intensity/quality.</p>
      <p>
        At the same time, their applicability is limited, on the one hand, by the fact that a
further increase in the compression ratio leads to a decrease in the quality of the
reconstructed video data [
        <xref ref-type="bibr" rid="ref1 ref2 ref3">1-3</xref>
        ].
      </p>
      <p>On the other hand, on the basis of traditional methods, it is not possible to construct
effective mechanisms for matching video intensity with network bandwidth. In this
regard, an approach focused on eliminating the structural redundancy of bit
description of fragments of a frame is of interest.</p>
      <p>In this case, it is necessary to take into account that video traffic has a pulsating
nature, as a result of the influence of a number of factors. This dependence is
expressed in the fact that the intensity R(t) of the video stream over time will be
variable, as shown by the next expression:</p>
      <p>R(t)  (1, 2, 3, 4 ),</p>
      <p>R(t)  В(t) ,
(1)
(2)
(3)
where  is the functional, describing the relationship between the frame bit intensity
and the factors affecting its value;
1 are sets of patterns, respectively, defining statistical, semantic and psycho-visual
features of the frame;
2 is a parameter, that determines whether the frame belongs to P, I, or B type, i.e.
technological aspect, followed by processing in the MPEG scheme;
3 is a set of technological concepts and architectures embedded in the codec. For
example, the presence of motion compensation technology, the presence of
technology to mask the contours of objects, the presence of technologies of M-dimensional
orthogonal transformation;
4 is a plurality of controlled codec parameters.</p>
      <p>In turn, the dynamics of network bandwidth В(t) formed as a result of the
influence of a number of other external factors, which is given by the next expression:</p>
      <p>B(t)  (1, 2, 3, 4, 5, 6 ),
where 1 is a nominal network bandwidth;
2 is a network load factor;
3 is an interference exposure factor;
4 are the topological features of the network;
5 an indicator of traffic intensity depending on the time of day;
6 an indicator of traffic complexity.</p>
      <p>Thus, the formation of values В(t) and R(t) occurs independently of each other.
In this regard, it is possible to consider effective the transmission of video traffic at
which the video stream intensity is consistent with the current bandwidth, i.e.:
at the same time, the level of introduced error should be minimal.</p>
      <p>From this, in the general case, we can conclude that the most effective methods are
those that allow, at the level of the video source, to carry out a flexible change in the
intensity of the video stream depending on the current level of bandwidht.</p>
      <p>Therefore, the method should simultaneously provide both a decrease in
information intensity and the ability to control its level in accordance with expression (3).</p>
      <p>Rationale for controlling the intensity of the video at the
source
In general, the quality Q of the video data received at the receiving side depends on
such indicators as:</p>
      <p> tarnaninsmdiicsastioornodfeplaaycksetlto.ss  ;
In turn, one of the reasons for the occurrence of data loss is due to the presence of a
delay exceeding the permissible value, i.e.:</p>
      <p>Q  f (, t) ,
t  tpf  tnt  trs  tnp ,
where f is a functional determining the method of processing video at the source
level.</p>
      <p>In turn, the delay in transmitting packets on a network section from a source to a
data recipient is generally described by the next expression:
where t pf is the time of packet formation on the transmitting side, which includes all
stages of processing at the source level, including buffering and channel coding;
t nt is the packet transit time on the network;
trs is the packet delay at the receiving side, taking into account the time of buffering
and decoding data;
t np - processing time on network nodes.</p>
      <p>In turn, time is the sum of the delay values introduced at each of the network nodes
in the area from the source to the recipient, i.e.:
(4)
(5)</p>
      <p>I
tnp   t(nip) ,
i1
(6)
where t(nip) is the processing time on the i  th network node;
I is the number of network nodes in the path of traffic from the source to the
recipient.</p>
      <p>At the same time, the delay introduced at the network node can be described by the
next expression:
(7)
t(nip)  (perf ; R; R pack ;und ) ,
where</p>
      <p> perf is an indicator of the performance of node switching equipment;
R is a total intensity of the load arriving at the i  th network node;
R pack is an average packet size arriving at the i  th network node;
und is an indicator of traffic heterogeneity.</p>
      <p>Performance indicator  perf value is limited. Therefore, you can reduce the delay
by:
 reduce the intensity of the incoming load on the node;
 traffic management at the level of network nodes.</p>
      <p>At the same time, traffic control at the node level can be ineffective as a result of
such reasons:</p>
      <p> when redistributing traffic using prioritization and processing of smart queues,
data reduction is not ensured;</p>
      <p> in the conditions of the presence of many packets of minimum length,
uncertainty arises when one or another part of high priority packets may not be serviced during
processing.</p>
      <p>In such conditions, the most appropriate is to reduce the total load R entering the
node.</p>
      <p>In other words, it is necessary to reduce the intensity of video data entering the
network from each of the sources
3</p>
      <p>General principles of construction and method
requirements
Based on the fact that most of the existing video coding technologies (in particular,
the MPEG family) use DCT transformation, the DCT transformant will be selected as
the structural unit of video data with respect to which the elementary code structure
will be built.</p>
      <p>In order for the developed method to allow further manipulation of the number of
bits to describe the frame of the video stream, it is necessary that there is the
possibility of changing the bit volume to represent the DCT transform.</p>
      <p>Then it is advisable to carry out the coding of the transform in the bit, and not the
component region.</p>
      <p>In other words, the code description of the transformant will be considered as a
union of the code constructs of transformants of individual bit planes.</p>
      <p>
        At the same time, in order not to have a significant additional computational load,
the method should have the following characteristics:
 be simple and trivial to implement [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ];
 not require large amounts of service data [
        <xref ref-type="bibr" rid="ref5 ref6 ref7 ref8 ref9">5-9</xref>
        ];
 use existing informative features to identify structural features of the processed
fragments [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref14">10-14</xref>
        ].
4
      </p>
    </sec>
    <sec id="sec-2">
      <title>Method realization</title>
      <p>
        Each coefficient y(p)k of the k,  -th component description of the p-th transformant

is a set of bits (kn) 2n1 , i.e. y(p)k  (kn) 2n1 , where  is a number of a
bitn1
planes and (kn) is a weight coefficient, determines the bit belonging to a specific bit
plane [
        <xref ref-type="bibr" rid="ref14 ref18 ref19 ref20">14,18-20</xref>
        ]. Such a way of describing transformants allows identifying chains of
binary elements {(k1),...,(),...,(k )} within each bit plane.
      </p>
      <p>k</p>
      <p>The detected lengths of binary elements can be used as a simple informative
feature that describes the structural features of the bit plane. This meets the requirements
of the method.</p>
      <p>In terms of the possibilities of increasing the lengths of binary series, it seems more
appropriate to process the bit representation of transformants in the direction of
horizontal planes.</p>
      <p>This approach is explained by the fact that the unit elements of the higher order bit
planes corresponding to the high-frequency components will mainly be absent.</p>
      <p>Also, processing the bit transformant representations in the direction of horizontal
planes will be appropriate if necessary to ensure the restoration of images according
to the hierarchical principle.</p>
      <p>As a rule, the regions of high-frequency components of the transform correspond
to the region of zero elements within the bit plane. In this regard, in order to increase
the lengths of detected binary series, it is proposed to bypass the bit plane in the
following manner:
- in the direction of the diagonal bypass (Fig. 2);
- every time, starting again from an element of the bit plane (BP) at the position
with coordinates.</p>
      <p>In this case, the lengths of binary series form an array M by size of    , each
line of which contains the corresponding length of the binary series as they are
identified.</p>
      <p>In this case, a code description of the column of the array M as a nonequilibrium
positional number can be obtained, namely:</p>
      <p>E(q)()  (,1)

 (b  1)  ...  (,)
2

 (b  1)  ...  (,) 
1</p>
      <p>b  b ((,),1,..., (,), ) ,
where bm is a functional determining the size of the base b , depending on the
lengths of the binary series;
 is the number of BS lengths for which a common base b is formed.</p>
      <p>u
bp
(8)
.
.
.
(9)</p>
      <p>The basements {b} system of non-equilibrium positional numbers is here the
main service information, using which decoding can be performed.</p>
      <p>At the same time, in accordance with the advanced requirements for the
construction of the method, the amount of overhead data should be minimal.</p>
      <p>With this in mind, the base of a nonequilibrium positional number will be
calculated for several lengths of binary series, namely, by the value of the maximum series
length in an array row M , namely:
b(q)()  max{ ,1  ,2 ...  , ...  ,}1 , 1, .
(10)
1, j1   1 ,  i  s .
complete and    , and   .</p>
      <p>The procedure for creating an array M taking into account that the number of
columns  is not known in advance (since the array is filled as binary series are
detected), and one column of the M array can include both a sequence of binary series
lengths generated for one bit-plane and a sequence of binary series lengths obtained
for total bit transfornant representation, is to implement the following steps:
 for 1 and  1, forms element 1,1 equal to 1,1  1 , where 1 is the
length of the first binary series obtained for the bit transformant representation;
 if (; ) -th element value step  , equal to the value  ,    where   - is
the length of  -th binary series, then ( 1)    Ф , i.e. not all formed binary
series lengths distributed over the array M , the relation  ,   1 ,     or
In the opposite case, for the ( 1)    Ф calculation process is considered</p>
      <p>With this in mind, the number of bits W(E(q)() ) to represent the code
value of the nonequilibrium positional number will be determined as follows:
 
 [og2  h  1]  1,     ;

W(E(q)() )   (11)
1

 [og2  h  1]  1,    .</p>
      <p> 1</p>
      <p>Thus, the code description E(q)() of the bit plane of the DCT transform will be a
combination of individual code values of non-equilibrium positional numbers, as
shown by the following expression:

E(q)()   E(q, )(m)</p>
      <p>Similarly, the code description of the transform will be formed by a set of separate
independent code constructions of bit planes, i.e.:
(5)
E(q)  E(q)()</p>
      <p></p>
      <p>In the general case, based on expression (5), an algorithm for controlling the
intensity of a video stream can be implemented.</p>
      <p>The main control parameter is the number of bit planes that will be used to
describe the transform.</p>
      <p>
        It should be borne in mind that in order to decide which bit planes will be excluded
from consideration, it is necessary to first evaluate the contribution of each of the bit
planes to the description error of the reconstructed transform. This need is due to the
fact that the distribution of individual elements to describe the component will be
random [
        <xref ref-type="bibr" rid="ref15 ref16 ref17 ref21">15-17, 21</xref>
        ].
      </p>
      <p>
        Therefore, for a real transform, the dependence of the introduced error on the
position of the excluded bit plane will not be described by the classical curve
bitrate/distortion [
        <xref ref-type="bibr" rid="ref22 ref23 ref24 ref25 ref26">22-26</xref>
        ].
      </p>
    </sec>
    <sec id="sec-3">
      <title>Conclusions</title>
      <p>A method for the code description of fragments of a video frame, which are used as
DCT transformants, is developed.</p>
      <p>In this case, the code description of the transform is formed by separate and
independent code structures of bit planes, each of which is obtained by combining the
code values of nonequilibrium positional numbers.</p>
      <p>This approach makes it possible, in addition to reducing the information intensity
of the video stream through the use of nonequilibrium position coding, to control the
intensity of the video data on the source side.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1. Recommendations of the International Telecommunication
          <string-name>
            <surname>Union ITU-T G</surname>
          </string-name>
          .
          <article-title>1010 “EndUser multimedia QoS categories”</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Barannik</surname>
            <given-names>V.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Podlesny</surname>
            <given-names>S.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yalivets</surname>
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bekirov</surname>
            <given-names>A. E.</given-names>
          </string-name>
          <article-title>The analysis of the use of technologies of error resilient coding at influence of an error in the codeword</article-title>
          .
          <source>Modern Problems of Radio Engineering. Telecommunications and Computer Science (TCSET)</source>
          ,
          <year>2016</year>
          13th International Conference,
          <year>2016</year>
          . pp.
          <fpage>52</fpage>
          -
          <lpage>54</lpage>
          . DOI:
          <volume>10</volume>
          .1109/TCSET.
          <year>2016</year>
          .
          <volume>7451965</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Barannik</surname>
            <given-names>V.V.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Ryabukha</given-names>
            <surname>Yu</surname>
          </string-name>
          .N.,
          <string-name>
            <surname>Tverdokhleb</surname>
            <given-names>V.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barannik</surname>
            <given-names>D.V.</given-names>
          </string-name>
          “
          <article-title>Methodological basis for constructing a method for compressing of transformants bit representation, based on non-equilibrium positional encoding”</article-title>
          .
          <source>2nd IEEE International Conference on Advanced Information and Communication Technologies</source>
          ,
          <string-name>
            <surname>AICT</surname>
          </string-name>
          <year>2017</year>
          , Proceedings, Lviv,
          <year>2017</year>
          , pp.
          <fpage>188</fpage>
          . DOI:
          <volume>10</volume>
          .1109/AIACT.
          <year>2017</year>
          .
          <volume>8020096</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Barannik</surname>
            <given-names>V.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Podlesny</surname>
            <given-names>S.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Krasnorutskyi</surname>
            <given-names>A.O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Musienko</surname>
            <given-names>A.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Himenko</surname>
            <given-names>V.V.</given-names>
          </string-name>
          <article-title>The ensuring the integrity of information streams under the cyberattacks action</article-title>
          .
          <source>East-West Design &amp; Test Symposium (EWDTS)</source>
          ,
          <year>2016</year>
          IEEE,
          <year>2016</year>
          . pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          . DOI:
          <volume>10</volume>
          .1109/EWDTS.
          <year>2016</year>
          .
          <volume>7807752</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Christophe</surname>
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lager</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mailhes</surname>
            <given-names>C</given-names>
          </string-name>
          .
          <article-title>Quality criteria benchmark for hiperspectral imagery</article-title>
          .
          <source>IEEE Transactions on Geoscience and Remote Sensing. Sept 2005</source>
          . Vol.
          <volume>43</volume>
          . No 9. P.
          <volume>2103</volume>
          -
          <fpage>2114</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>R.C.</given-names>
            <surname>Gonzales</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.E.</given-names>
            <surname>Woods</surname>
          </string-name>
          , “Digital image processing,” in Prentice Hall,
          <article-title>New Jersey, edition</article-title>
          . II,
          <year>2002</year>
          . - 1072 p.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>Ian</given-names>
            <surname>Richardson</surname>
          </string-name>
          ,
          <string-name>
            <surname>H.</surname>
          </string-name>
          <article-title>264 and MPEG-4 Video Compression: Video Coding for NextGeneration Multimedia</article-title>
          / Ian Richardson, pp.
          <fpage>368</fpage>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Negahdaripour</surname>
          </string-name>
          and
          <string-name>
            <given-names>Q.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <article-title>"Error-resilient coding for underwater video transmission," OCEANS 2016 MTS/</article-title>
          IEEE Monterey, CA,
          <year>2016</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Tanenbaum</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Van Steen</surname>
            <given-names>M.</given-names>
          </string-name>
          <article-title>Distributed systems</article-title>
          . Pearson Prentice Hall,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10. H.
          <string-name>
            <surname>Baccouch</surname>
            ,
            <given-names>P. L.</given-names>
          </string-name>
          <string-name>
            <surname>Ageneau</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Tizon</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Boukhatem</surname>
          </string-name>
          ,
          <article-title>"Prioritized network coding scheme for multilayer video streaming"</article-title>
          ,
          <year>2017</year>
          14th
          <string-name>
            <given-names>IEEE</given-names>
            <surname>Annual Consumer</surname>
          </string-name>
          <string-name>
            <given-names>Communications</given-names>
            &amp; Networking
            <surname>Conference</surname>
          </string-name>
          (CCNC), pp.
          <fpage>802</fpage>
          -
          <lpage>809</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11. W. J.
          <string-name>
            <surname>Tsai</surname>
            ,
            <given-names>Y. C.</given-names>
          </string-name>
          <string-name>
            <surname>Sun</surname>
          </string-name>
          ,
          <article-title>"Error-resilient video coding using multiple reference frames"</article-title>
          ,
          <source>2013 IEEE International Conference on Image Processing</source>
          , pp.
          <fpage>1875</fpage>
          -
          <lpage>1879</lpage>
          ,
          <year>2013</year>
          .
          <source>o transmission"</source>
          ,
          <year>2016</year>
          8th
          <string-name>
            <given-names>IEEE</given-names>
            <surname>Intern</surname>
          </string-name>
          .
          <source>Conf. on Commun. Software and Networks (ICCSN)</source>
          , pp.
          <fpage>561</fpage>
          -
          <lpage>564</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <given-names>A.</given-names>
            <surname>Chigorin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Krivovyaz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Velizhev</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.</surname>
          </string-name>
          <article-title>Konushin “A method for traffic sign detection in an image with learning from synthetic dat” 14th</article-title>
          <source>International Conference Digital Signal Processing and its Applications</source>
          ,
          <year>2012</year>
          , pp.
          <fpage>316</fpage>
          -
          <lpage>335</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <given-names>D.</given-names>
            <surname>Salomon</surname>
          </string-name>
          .
          <article-title>“Data Compression: The Complete Reference"</article-title>
          .
          <source>Fourth Edition. SpringerVerlag London Limited</source>
          ,
          <year>2007</year>
          . - 899 p.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Vatolin</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ratushnyak</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Smirnov</surname>
            <given-names>M.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Yukin</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <article-title>Methods of data compression. The device archiver, compression of images and videos</article-title>
          . M.:
          <string-name>
            <surname>DIALOG</surname>
            <given-names>MIFI</given-names>
          </string-name>
          ,
          <year>2013</year>
          , 384 p.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Lee</surname>
            <given-names>S.. Yoon J</given-names>
          </string-name>
          .
          <article-title>Temporally coherent video matting</article-title>
          .
          <source>Graphical Models 72</source>
          .
          <year>2010</year>
          . P.
          <volume>25</volume>
          -
          <fpage>33</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Barannik</surname>
            <given-names>V.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Alimpiev</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bekirov</surname>
            <given-names>A.E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barannik</surname>
            <given-names>D.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barannik</surname>
            <given-names>N.</given-names>
          </string-name>
          <article-title>Detections of sustainable areas for steganographic embedding</article-title>
          .
          <source>East-West Design &amp; Test Symposium (EWDTS)</source>
          ,
          <year>2017</year>
          IEEE,
          <year>2017</year>
          . P. 1-
          <fpage>4</fpage>
          . DOI:
          <volume>10</volume>
          .1109/EWDTS.
          <year>2017</year>
          .
          <volume>8110028</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17. Ding
          <string-name>
            <given-names>Z.</given-names>
            ,
            <surname>Chen</surname>
          </string-name>
          <string-name>
            <given-names>H.</given-names>
            ,
            <surname>Gua</surname>
          </string-name>
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Peng</surname>
          </string-name>
          <string-name>
            <surname>Q.</surname>
          </string-name>
          <article-title>GPU accelerated interactive space-time video matting</article-title>
          . In Computer Graphics International P 163-
          <fpage>168</fpage>
          .
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Ablamejko</surname>
            <given-names>S.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lagunovskij D.M.</surname>
          </string-name>
          <article-title>Obrabotka izobrazhenij: teh-nologija, metody</article-title>
          , primenenie. - Minsk: Amalfeja,
          <year>2000</year>
          . - 303 p.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>K. R. Rao</surname>
            and
            <given-names>J. J.</given-names>
          </string-name>
          <string-name>
            <surname>Hwang</surname>
          </string-name>
          ,
          <article-title>Techniques and Standards for Image, Video and Audio Coding</article-title>
          . EnglewoodCliffs, NJ: Prentice-Hall,
          <year>1996</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Shi</surname>
          </string-name>
          ,
          <article-title>Yun Q. Image and video compression for multimedia engineering: fundamentals, algorithms</article-title>
          , and standards / Yun Q Shi, Huifang Sun,
          <string-name>
            <surname>NY</surname>
          </string-name>
          , CRC Press,
          <year>2008</year>
          , 576 p.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Bai</surname>
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            <given-names>J</given-names>
          </string-name>
          .
          <article-title>Towards temporally-coherent video matting</article-title>
          .
          <source>Proceedings of the 5th international conference on Computer vision/computer graphics collaboration techniques</source>
          .
          <source>MIRAGE'11</source>
          , Springer-Verlag.
          <year>2011</year>
          . P.
          <volume>63</volume>
          -
          <fpage>74</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>M. Al Hadidi</surname>
            ,
            <given-names>J. S.</given-names>
          </string-name>
          <string-name>
            <surname>Al-Azzeh</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Odarchenko</surname>
          </string-name>
          et al,
          <article-title>Adaptive Regulation of Radiated Power Radio Transmitting Devices in Modern Cellular Network Depending on Climatic Conditions, Contemporary Engineering Sciences</article-title>
          , Vol.
          <volume>9</volume>
          , № 10, рр.
          <fpage>473</fpage>
          -
          <lpage>485</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <article-title>JPEG 2000 image coding system: Core coding system, itu-t recommendationt</article-title>
          .
          <source>t. 800 and iso/iec 15444-1. ITU-T and ISO/IEC JTC 1</source>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Al-Azzeh</surname>
            <given-names>J.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Al Hadidi</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Odarchenko</surname>
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gnatyuk</surname>
            <given-names>S.</given-names>
          </string-name>
          , Shevchuk
          <string-name>
            <surname>Z.</surname>
          </string-name>
          , Hu
          <string-name>
            <surname>Z.</surname>
          </string-name>
          <article-title>Analysis of self-similar traffic models in computer networks</article-title>
          ,
          <source>International Review on Modelling and Simulations</source>
          , №
          <volume>10</volume>
          (
          <issue>5</issue>
          ), pp.
          <fpage>328</fpage>
          -
          <lpage>336</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25. In J.,
          <string-name>
            <surname>Shirani</surname>
            <given-names>S.</given-names>
          </string-name>
          , Kossentini F.
          <article-title>Jpeg compliant efficient progressive image coding</article-title>
          .Department of Electrical and Computer Engineering,University of British Сolumbia, Vancouver BC V6T 1Z4, Canada.
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <given-names>R.</given-names>
            <surname>Odarchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Abakumova</surname>
          </string-name>
          ,
          <article-title>Security Key Indicators Assessment for Modern Cellular Networks</article-title>
          ,
          <source>Proc. of the 2018 IEEE First Intern. Conf. on System Analysis &amp; Intelligent Computing (SAIC)</source>
          , Kyiv, Ukraine,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>