<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Methods for Decoding Informational Codes of Crypto- compression Codegrams to Improve Information Security</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Vladimir Barannik</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Serhii Sidchenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Natalia Barannik</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dmitriy Barannik</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Cybersecurity Providing in Information and Telecommunication Systems</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Ivan Kozhedub Kharkiv National Air Force University</institution>
          ,
          <addr-line>77/79 Sumskaya str., Kharkiv, 61023</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Kharkiv National University of Radio Electronics</institution>
          ,
          <addr-line>14 Nauky ave., Kharkiv, 61166</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>V. N. Karazin Kharkiv National University</institution>
          ,
          <addr-line>4 Svobody sq., Kharkiv, 61022</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>143</fpage>
      <lpage>152</lpage>
      <abstract>
        <p>The analysis of the main threats (risks) to information security in video surveillance and video conferencing systems. Ensuring information security of video data (static and dynamic) resources should be organized with the preservation of the specified quality while maintaining the specified availability. The article develops methods for decoding information codegrams of images formed on the basis of floating coding schemes with a decrease in the original volume of video data. Decoding methods have six main steps. At the first stage, the restoration of the service components of cryptocompression codegrams, presented in encrypted form, is carried out. In the second step, the number of elements that will be reconstructed from the corresponding information code is determined. At the third stage, the information code is extracted from the general code stream of the information component. At the fourth stage, the decoding of the information component code is organized. Then the third and fourth stages are repeated until all codes of the information component are completely decoded. At the fifth and sixth stages, the restoration of image segments and the reconstruction of the image based on them are organized. Without knowing the correct base system, the attacker cannot correctly establish a correspondence between the generated codegrams and the number of elements involved in their formation, and also cannot correctly position uneven codegrams in the general code stream. As a result, the attacker cannot decode the image correctly. Due to the additional use of uncertainty, an increase in the level of cryptographic resistance of the generated codegrams is achieved. Images are reconstructed without loss of quality, that is, bit by bit. In the process of cryptocompression coding, in addition to ensuring information security, a decrease in the volume of cryptocompression image representation is achieved, which ensures an increase in their availability.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Cryptocompression image representation, information security, information
security,
encryption, encoding, image compression, confidentiality, floating circuits, differentiated</p>
    </sec>
    <sec id="sec-2">
      <title>1. Introduction</title>
      <p>Threats (risks) associated with the compromise of video surveillance and video conferencing
systems, from the point of view of reflexive control, enable an attacker (the opposing side) to be one
rank of reflection higher. The main threats to security breaches include:</p>
      <p>1. intercepting a signal from CCTV cameras or obtaining the possibility of direct information
retrieval from them by an attacker, which will enable him to conduct reconnaissance without using his
means.</p>
      <p>2021 Copyright for this paper by its authors.
2. Substitution of a true signal from CCTV cameras for a false one, which can contribute to the
introduction of inaccurate information, misleading the decision-maker, and making an erroneous
decision.</p>
      <p>3. Unauthorized activation (gaining access) of video conferencing facilities, which will enable the
enemy to use them for intelligence purposes.</p>
      <p>4. Intercepting a video signal in a video conferencing system or gaining access to equipment, which
contributes to the disclosure of the confidentiality of negotiations, and due to the fact that the
information circulating in crisis management systems, in aggregate, can take the characteristics of
information with limited access, this can lead to leakage critical information.</p>
      <p>5. Suppression of signals from video surveillance systems and video conferencing, which can lead
to a complete or partial loss of video information and/or delays in its transmission.</p>
      <p>Illegal disclosure (interception) of video information transmitted through transmission channels or
stored in video recording equipment and databases can lead to a large number of threats to the security
of an object (person, enterprise, structure, system, state, etc.), including:
 Violation of individual rights and freedoms.
 Disclosure of personal data, including medical secrets.
 Disclosure of bank secrets and commercial secrets of the enterprise.</p>
      <p> Disclosure of the secrets of the investigation and legal proceedings, as well as the results of
operational-search activities.</p>
      <p> Opening the patrol system and/or the location at a given time of patrol detachments (on foot
and by road) of the National Police and the National Guard of Ukraine, which is critical in crises and,
especially, in the areas of the operation of the combined forces (anti-terrorist operation).</p>
      <p> The transfer of the commission of offenses to other places not equipped with open video
cameras, and, therefore, efforts aimed at reducing the level of offenses will lead to a change in the place,
method, and time of the offense.</p>
      <p> Opening of routes (system) of movement and/or location at a given time of mobile
(operationalsearch) groups, as well as columns and individual samples of weapons, special and military equipment.</p>
      <p> Disclosure of information about cargo transportation (including their location at a given time)
by road, sea (river), rail, and air transport for the needs of the security and defense sector of the state,
as well as critical (important) infrastructure of the state (region).</p>
      <p> Opening the security system of the critical (important) infrastructure of the state (region) and
protected objects of different property rights, as well as opening the state of the protected object at a
given moment in time.</p>
      <p> Opening of border and customs control systems, their weak points, and state at the current time.
 Opening the grouping of their troops, elements of the battle order, the system of protection and
defense of checkpoints (positions, areas, borders), as well as the composition of forces and means
allocated for these events and/or located in places of permanent deployment.</p>
      <p> Compromise (disclosure, interception by the enemy) of intelligence received by means of
special reconnaissance and video surveillance, which can contribute to a change in the deployment of
enemy forces, the substitution of false targets and demonstration of false intentions, as well as a change
in their designs and plans.</p>
      <p> Compromising the work of monitoring missions and disclosing information to the opposing
side (group), etc.</p>
      <p>
        There are various approaches to ensuring information security of images, which are organized both
for the original (pre-compressed) images and images presented in the compressed form [
        <xref ref-type="bibr" rid="ref1 ref10 ref11 ref12 ref13 ref14 ref15 ref16 ref17 ref18 ref19 ref2 ref20 ref21 ref3 ref4 ref5 ref6 ref7 ref8 ref9">1–42</xref>
        ]. They
include:
 Cryptographic protection methods are based on data encryption [
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5 ref6 ref7">1–16</xref>
        ].
      </p>
      <p>
         Cryptographic methods of protection are based on scrambling for reversible distortion of
images or their critical areas [
        <xref ref-type="bibr" rid="ref1 ref5 ref6 ref7">1, 5–9, 17–24</xref>
        ].
      </p>
      <p>
         Methods of steganography image processing to ensure the safety of both embedded data and
video data itself [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref14 ref15 ref16 ref17 ref8 ref9">25–36</xref>
        ].
      </p>
      <p>
         Secret sharing technology to ensure the security of one or more images [
        <xref ref-type="bibr" rid="ref1 ref18 ref19 ref20 ref21">1, 37–41</xref>
        ].
 Methods that implement access rights management and privacy policies [
        <xref ref-type="bibr" rid="ref1">1, 8</xref>
        ].
      </p>
      <p>
        Transformations that remove critical areas in images [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>Geometrically reversible image distortion [42].</p>
      <p>They are characterized by the following problematic disadvantages:
significant decrease in its availability.</p>
      <p>





coding schemes.</p>
    </sec>
    <sec id="sec-3">
      <title>2. Main Part</title>
      <p>Ensuring the confidentiality of images using compression technologies after and/or between
the stages of the data compression process is based on the separation of the encryption and compression
functionality. This also leads to a decrease in the availability of video data.</p>
      <p>In the process of ensuring the information security of video data, it is necessary to solve a significant
problem related to the fact that it must be organized with the preservation of given image quality while
maintaining a given availability.</p>
      <p>To solve this problem in [43, 44], approaches to cryptocompression coding of images are presented,
which ensure the integration of compression and encryption technologies, which allow solving the
identified problem. However, the processes of decoding the codegrams of the cryptocompression
representation of images are not considered.</p>
      <p>Therefore, the purpose of the article is to develop methods for error-free decoding of information
components of the cryptocompression representation of images generated on the basis of floating
Ensuring the confidentiality of video data without using compression technologies leads to a</p>
      <p>=  ( ;  );
The codegram of the cryptocompression representation of the image consists of two components:
Information component, which consists of code sequences 
variable length and formed as a
result of convolution of values of a variable number of elements of the original image А and service
data systems  rule-based  (⋅):</p>
      <p>A set of service components that depend on the selected coding scheme. Thus, the scheme of
cryptocompression coding in the basis along the upper bounds as service data assumes the presence of
the base system  ( ) = {  } requires a system of lowering dynamic range values  ( ) = {  }.
the base system  ( ) = {  }. Scheme of cryptocompression coding in a differentiated basis except for</p>
      <p>The service data system in the cryptocompression representation is encrypted   and requires
preliminary decryption using a cryptographic transformation  (⋅) on the key of transformation  :</p>
      <p>=   (  ),
where</p>
      <p>is decoded representation of the radix system.</p>
      <p>If to perform direct  (⋅) and vice versa  (⋅) the cryptographic conversion used an authentic
conversion key</p>
      <p>(the same session key for symmetric systems or a secret and corresponding public
conversion key for asymmetric encryption systems), as well as encrypted data   have not been
deliberately or erroneously modified, then the decrypted data 
will be identical to the original
cryptocompression representation service components  bit to bit, i.e. 
=  :
 =   (  ), i.e.  =   (  ( )).</p>
      <p>The generalized scheme for decoding the floating scheme of the cryptocompression image
representation is shown in Fig. 1. The decoding process of the information component of the
cryptocompression representation is organized in the reverse order with respect to the encoding process
and has its characteristics depending on the selected scheme.</p>
      <sec id="sec-3-1">
        <title>Service component s</title>
      </sec>
      <sec id="sec-3-2">
        <title>Encryption key</title>
      </sec>
      <sec id="sec-3-3">
        <title>Decryption service systems</title>
      </sec>
      <sec id="sec-3-4">
        <title>Structuring the service component depending on the selected coding scheme</title>
        <p>f o rm</p>
      </sec>
      <sec id="sec-3-5">
        <title>Determination of the length of the code sequence of the information component</title>
        <p>.
.. ...
...</p>
      </sec>
      <sec id="sec-3-6">
        <title>Pixel decoding using a selected floating cryptocompression coding scheme</title>
        <p>N =...
...</p>
      </sec>
      <sec id="sec-3-7">
        <title>Cryptocompression representation codogram Information components</title>
        <p>max
min
m
m</p>
        <p>A m
rec</p>
      </sec>
      <sec id="sec-3-8">
        <title>Formation</title>
      </sec>
      <sec id="sec-3-9">
        <title>Images</title>
      </sec>
      <sec id="sec-3-10">
        <title>Reconstructed image</title>
        <p>Let us consider the features of the process of decoding the information component of the
cryptocompression representation for floating coding schemes in the basis along with the upper bounds
and the differentiated basis.</p>
        <p>The process of decoding the information component of the cryptocompression representation of
images based on a floating coding scheme in the basis along the upper boundaries is organized on the
basis of performing the following steps.</p>
        <p>Stage 1. Expansion of the service component of the cryptocompression representation  ( ) = {  },
 = 1,  , up to the power of the original image fragment in a one-dimensional vector form  ( × ) =
{  } based on the formula:
where  is the linear coordinate of the element; 
is the number of lines in the image segment into
which the original image was split during the encoding process;  is the number of columns in the
image segment; [</p>
        <p>] is the whole part.</p>
        <p>Stage 2. From the analysis of the service component of the cryptocompression representation  =
{  } the number of elements is determined  form, on the basis of which the code values, were generated
 information component of the cryptocompression representation. To do this, use the formula:
 form = argmax(∏   ) = argmax(∏ 

 =1


 =1
on the basis of service component elements  = {  } taking into account the number of elements  form
  = [log2(∏ =fo1rm   )] + 1 = [log2(∏ =fo1rm 
 − [  −1])] + 1.</p>
        <p>Reading the code sequence from the information component of the cryptocompression
representation  length   bit.</p>
        <p>Stage 4. Formation of the vector of weight coefficients 
whose elements   ( = 1,  пр) are
defined as the product of the elements of the service component of the cryptocompression representation
 = {  } that are in positions following the position  , based on the formula:
  = {  = +1   = ∏ form
∏ form
 = +1   − [  −1] ,  &lt;  formmn;
given that
by the formula:
the form:


(2)
(3)
 ( ;  )</p>
        <p>Stages 4 and 5 can be combined and, taking into account formulas (1) and (2), formula (3) will take
Stage 5. Reconstruction of the elements of the code number  ( ;  )
( ;  ) } in vector form
from the code sequence  the information component of the cryptocompression representation is given
= [∏ form</p>
        <p>= +1  − [
  −1]</p>
        <p>] − [∏ form 
 = +1  − [


 −1]  − [
 −1]
] ×   =
] × 
the basis of vector transformation  ( ;  )</p>
        <p>( ;  ) } into a two-dimensional form based on the ratios:</p>
        <p>( ;  ) is  th element  th column ( ;  )th recovered segment  ( ;  ) images.</p>
        <p>Step 7. Merging the reconstructed segments  ( ;  ) into the image 
. If the codegrams of the
cryptocompression representation of the image have not been subjected to deliberate or unintentional
modification, then the image is reconstructed accurately bit by bit, i.e.</p>
        <p>from the information component of the cryptocompression</p>
        <p>is carried out taking into account the decrease in dynamic ranges, provided that the
service component of the cryptocompression representation consists of a system of bases (maximum
values of the dynamic range)  ( ) = {  } and the system of reducing (minimum) values of the dynamic
range  ( ) = {  }. Decoding of the information component of the cryptocompression representation is
,
,</p>
        <p>Expansion of the service component of the cryptocompression representation  ( ) = {  } and
 ( ) = {  },  = 1,  , up to the power of the original image segment in a one-dimensional vector form
 − [ −1]},  = 1,mn;
Lowering the dynamic range of elements of the extended base system  ( × ) = {  } based on
  =   −   ,  = 1,mn,
where   is an element of the base system in a low dynamic range.</p>
        <p>Stage 2. From the analysis of the base system, taking into account the decrease in the dynamic range
component of the cryptocompression representation was formed, using the formula:
 = {  }, the number of elements is determined  form, on the basis of which the informational

 =1</p>
        <p>form = argmax(∏   ) = argmax(∏(  −   ))</p>
        <p>∏ =1   = ∏ =1(  −   ) ≤ 2 − 1.</p>
        <p>Stage 3. Determination of the length of the code sequence  the information component is carried
  = [log2(∏ =fo1rm   )] + 1==[log2(∏ =fo1rm(  −   ))] + 1.</p>
        <p>Reading the code sequence from the information component of the cryptocompression
representation  length   bit.
representation image in a differentiated basis is given by the formula:</p>
        <p>Stage 4. Decoding of the code of the information component of the cryptocompression
taking into account the formation of the elements of the vector of weight coefficients   based on the
= [∏ form</p>
        <p>= +1
= 
 − [ −1] + [∏ =fo r+m1(
Основной
Основной
Основной
PNG formats.
decryption.</p>
        <p>∏ form
1,</p>
        <p>∏ form
  = {  = +1   =
 = +1(  −   ) ,  &lt;  прmn;
 =  прmn.
( ;  ) } images in vector form from the information component of the cryptocompression
determinisntoict deterministic TIFF
PNG</p>
        <sec id="sec-3-10-1">
          <title>Weakly saturated</title>
        </sec>
        <sec id="sec-3-10-2">
          <title>Medium saturated</title>
          <p>From the analysis of the data in Fig. 6 that the best result in terms of the degree of image compression
was shown by the method of cryptocompression coding of images on a differentiated basis based on
non-deterministic code generation when processing video data of different degrees of saturation. The
average value of the compression ratio for it is at the level of 1.08 for highly saturated images, 1.22 for
moderately saturated, and 1.54 for weakly saturated images. This is on average 4–5.2% better compared
to the deterministic approach, 3–20% better than the TIFF data format, and 4 * 15% better than the
PNG format. Although the use of additional overhead in the method of cryptocompression image coding
on a differential basis can reduce the gain by 2–3% in relation to the presentation of data in TIFF and
Formation of code structures of non-deterministic length:
</p>
          <p>From the standpoint of ensuring confidentiality—provides uncertainty in the positioning of
uneven codegrams in the general code stream, which eliminates the possibility of their unauthorized</p>
          <p>( ;  ) } into a two-dimensional form based on formulas (4)–(6).</p>
          <p>Stage 6. Merging the reconstructed segments  ( ;  ) into the image 
the developed in [43, 44], the method of cryptocompression coding of images in a differentiated basis
based on deterministic and non-deterministic code formation are shown in Fig. 2. The comparison was
carried out with the most commonly used image compression technologies without loss of information
quality, which are implemented in the TIFF and PNG data presentation formats, which implement
various combinations of RLE series length coding algorithms, LZ77 sliding window code, and LZW
and Huffman prefix codes.
(11)
 From the standpoint of ensuring accessibility—provides a decrease in the volume of
cryptocompression representation of images relative to the original video data on average from 1.08 to
1.54 times, depending on the degree of their saturation.</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>3. Conclusion</title>
      <p>Methods for decoding information components of cryptocompression representation of images
generated on the basis of floating coding schemes have been developed, namely:
 Floating coding scheme based on the upper bounds.
 Floating coding scheme in a differential basis.</p>
      <p>There are six main steps in decoding methods:
1. Restoration of service components of cryptocompression codegrams presented in encrypted form;
2. Determining the number of elements that will be reconstructed from the corresponding
information code;
3. The selection of the information code from the general code stream of the information component;
4. Decoding the code of the information component of the cryptocompression representation;
5. Restoration of image segments;
6. The formation of a reconstructed image.</p>
      <p>Methods for decompression of cryptocompression codegrams developed in this work allow:
 To reconstruct images from cryptocompression codegrams obtained on the basis of floating
coding schemes. That is, the code constructions are formed on a non-deterministic number of elements
of the original image and the base system. Formed non-deterministic length of code structures. Without
knowing the correct base system, an attacker cannot correctly establish a correspondence between the
generated codegrams and the number of elements involved in their formation, and he also cannot
correctly position uneven codegrams in the general code stream. As a result, the attacker cannot decode
the image correctly. Due to the additional use of uncertainty, an increase in the level of cryptographic
resistance of the generated codegrams is achieved.</p>
      <p> To reconstruct the original images without losing their quality, that is bit by bit. The volume of
cryptocompression representation of images relative to the original video data was, on average, reduced
from 1.08 to 1.54 times, depending on the degree of their saturation. In the process of
cryptocompression coding, in addition to ensuring information security, a decrease in the volume of the
cryptocompression representation of the image is achieved, which ensures an increase in their
availability.</p>
    </sec>
    <sec id="sec-5">
      <title>4. References</title>
      <p>[8] Information technology—JPEG 2000 image coding system: Secure JPEG 2000. International</p>
      <p>Standard ISO/IEC 15444-8; ITU-T Recommendation T.807, 2007.
[9] Sh. Ji, X. Tong, M. Zhang, Image encryption schemes for JPEG and GIF formats based on 3D
baker with compound chaotic sequence generator, 2012. URL: https://arxiv.org/abs/1208.0999.
[10] JPEG Privacy &amp; Security Abstract and Executive Summary, 2015. URL:
https://jpeg.org/items/ 20150910_privacy_security_summary.html.
[11] R. L. Rivest, A. Shamir, L. M. Adleman, A method for obtaining digital signatures and
public-key cryptosystems, Communications of the ACM 21 (1978) 120–126, doi:
10.1145/359340.359342.
[12] R. Sharma, S. Bollavarapu, Data Security using Compression and Cryptography Techniques.</p>
      <p>International Journal of Computer Applications 117(14) (2015) 15-18, doi:
10.5120/206213342.
[13] V. B. Vasiliev, et al., Video data compression and protection in UAV information exchange
radio channels, in: Scientific and practical conference on Prospects for the development and
use of complexes with unmanned aerial vehicles, 924 State Center for Unmanned Aviation of
the Ministry of Defense of the Russian Federation, 2016, pp. 202–204.
[14] K. Wong, K. Tanaka, DCT based scalable scrambling method with reversible data hiding
functionality, in: 4th International Symposium on Communications, Control and Signal
Processing (ISCCSP), 2010, pp. 1-4, doi: 10.1109/ISCCSP.2010.5463307.
[15] L. Yuan, P. Korshunov, T. Ebrahimi, Secure JPEG Scrambling enabling Privacy in Photo
Sharing, in: 11th IEEE International Conference and Workshops on Automatic Face and Gesture
Recognition (FG), 2015, pp. 1-6, doi: 10.1109/FG.2015.7285022.
[16] K. M. Faraoun, A parallel block-based encryption schema for digital images using reversible
cellular automata, Engineering Science and Technology 17 (2014) 85–94, doi:
10.1016/j.jestch.2014.04.001.
[17] S. Auer, et al., Bitstream-based JPEG Encryption in Real-time, in: International Journal of</p>
      <p>Digital Crime and Forensics (2013), doi: 10.4018/jdcf.2013070101.
[18] H. Kobayashi, H. Kiya, Bitstream-Based JPEG Image Encryption with File-Size Preserving,
in: IEEE 7th Global Conference on Consumer Electronics (GCCE), 2018, pp. 1-4, doi:
10.1109/gcce.2018.8574605.
[19] K. Minemura, et al., JPEG image scrambling without expansion in bitstream size, in: 19th
IEEE International Conference on Image Processing, 2012, pp. 261-264, doi:
10.1109/ICIP.2012.6466845.
[20] A. Phatak, A Non-format Compliant Scalable RSA-based JPEG Encryption Algorithm.</p>
      <p>International Journal of Image, Graphics and Signal Processing 8(6) (2016) 64-71, doi:
10.5815/ijigsp.2016.06.08.
[21] Ch.-L. Tsai, Ch.-J. Chen, W.-L. Hsu, Multi-morphological image data hiding based on the
application of Rubik's cubic algorithm, in: IEEE International Carnahan Conference on
Security Technology (ICCST), 2012, pp. 135-139, doi: 10.1109/CCST.2012.6393548.
[22] K.-W. Wong, Image encryption using chaotic maps, Intelligent Computing Based on Chaos .</p>
      <p>184 (2009) 333–354. doi: 10.1007/978-3-540-95972-4_16.
[23] Yu. Wu, S. Agaian, J. Noonan, Sudoku Associated Two Dimensional Bijections for Image
Scrambling, in: IEEE Transactions on multimedia, 2012. URL: https://arxiv.org/abs/
1207.5856v1.
[24] Y. Yang, et al., Efficient and Syntax-Compliant JPEG 2000 Encryption Preserving Original
Fine Granularity of Scalability. EURASIP Journal on Information Security 2007 (2008), doi:
10.1155/2007/56365.
[25] V. Barannik, et al., Indirect Steganographic Embedding Method Based On Modifications of
The Basis of the Polyadic System, in: 15th IEEE International Conference on Modern Problems
of Radio Engineering, Telecommunications and Computer Science, TCSET, 2020, pp.
699702, doi: 10.1109/TCSET49122.2020.235522.
[26] V. Barannik, V. Barannik, Binomial-Polyadic Binary Data Encoding by Quantity of Series of
Ones, in: 15th IEEE International Conference on Modern Problems of Radio Engineering,
Telecommunications and Computer Science, TCSET, 2020, pp. 775-780, doi:
10.1109/TCSET49122.2020.235540.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>S.</given-names>
            <surname>Ramakrishnan</surname>
          </string-name>
          , et al.,
          <article-title>Cryptographic and Information Security Approaches for Images and Videos</article-title>
          . CRC Press,
          <year>2018</year>
          , doi: 10.1201/9780429435461.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <article-title>[2] Announcing the Advanced Encryption Standard (AES)</article-title>
          .
          <source>Federal Information Processing Standards Publication</source>
          ,
          <volume>197</volume>
          ,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <source>[3] DSTU</source>
          <volume>7624</volume>
          :
          <year>2014</year>
          :
          <string-name>
            <given-names>Information</given-names>
            <surname>Technology</surname>
          </string-name>
          .
          <article-title>Cryptographic protection of information. Symmetric block transformation algorithm</article-title>
          .
          <source>Order of the Ministry of Economic Development of Ukraine № 1484</source>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>DSTU</given-names>
            <surname>GOST</surname>
          </string-name>
          <article-title>28147:2009: Information processing system</article-title>
          .
          <source>Cryptographic protection. Cryptographic transformation algorithm GOST 28147-89</source>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>F.</given-names>
            <surname>Dufaux</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Ebrahimi</surname>
          </string-name>
          ,
          <article-title>Toward a Secure JPEG</article-title>
          ,
          <source>in: Applications of Digital Image Processing XXIX 6312</source>
          ,
          <year>2006</year>
          , doi: 10.1117/12.686963.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M.</given-names>
            <surname>Farajallah</surname>
          </string-name>
          ,
          <article-title>Chaos-based crypto and joint crypto-compression systems for images and videos, 2015</article-title>
          . URL: https://hal.archives-ouvertes.fr/tel-01179610.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>T.</given-names>
            <surname>Honda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Murakami</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yanagihara</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Kumaki</surname>
          </string-name>
          , T. Fujino,
          <article-title>Hierarchical image-scrambling method with scramble-level controllability for privacy protection</article-title>
          ,
          <source>in: IEEE 56th International Midwest Symposium on Circuits and Systems (MWSCAS)</source>
          ,
          <year>2013</year>
          , pp.
          <fpage>1371</fpage>
          -
          <lpage>1374</lpage>
          . doi:
          <volume>10</volume>
          .1109/MWSCAS.
          <year>2013</year>
          .
          <volume>6674911</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>V.</given-names>
            <surname>Barannik</surname>
          </string-name>
          , et al.,
          <source>Development Second and Third Phase of the Selective Frame Processing Method, in: 2019 3rd International Conference on Advanced Information and Communications Technologies (AICT)</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>54</fpage>
          -
          <lpage>57</lpage>
          , doi: 10.1109/AIACT.
          <year>2019</year>
          .
          <volume>8847897</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>V.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Belikova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Gurzhii</surname>
          </string-name>
          ,
          <article-title>The model of threats to information and psychological security, taking into account the hidden information destructive impact on the subconscious of adolescents</article-title>
          ,
          <source>in: 2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT)</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>656</fpage>
          -
          <lpage>661</lpage>
          , doi: 10.1109/ATIT49449.
          <year>2019</year>
          .
          <volume>9030432</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Barannik</surname>
          </string-name>
          , et al.,
          <article-title>The technology of the video stream intensity controlling based on the bit-planes recombination</article-title>
          ,
          <source>in: 2018 IEEE 4th International Symposium on Wireless Systems within the International Conferences on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS-SWS)</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>25</fpage>
          -
          <lpage>28</lpage>
          , doi: 10.1109/IDAACS-SWS.
          <year>2018</year>
          .
          <volume>8525560</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Yu. N.</given-names>
            <surname>Ryabukha</surname>
          </string-name>
          , О. S. Kulitsa,
          <article-title>The method for improving security of the remote video information resource on the basis of intellectual processing of video frames in the telecommunication systems</article-title>
          ,
          <source>Telecommunications and Radio Engineering</source>
          <volume>76</volume>
          (
          <issue>9</issue>
          ) (
          <year>2017</year>
          )
          <fpage>785</fpage>
          -
          <lpage>797</lpage>
          , doi: 10.1615/TelecomRadEng.v76.
          <year>i9</year>
          .
          <fpage>40</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>V.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Shulgin</surname>
          </string-name>
          ,
          <article-title>The method of increasing accessibility of the dynamic video information resource</article-title>
          ,
          <source>in: 2016 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET)</source>
          ,
          <year>2016</year>
          , pp.
          <fpage>621</fpage>
          -
          <lpage>623</lpage>
          . doi:
          <volume>10</volume>
          .1109/TCSET.
          <year>2016</year>
          .
          <volume>7452133</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>V.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Tarasenko</surname>
          </string-name>
          ,
          <article-title>Method coding efficiency segments for information technology processing video</article-title>
          , in: 2017 4th
          <string-name>
            <given-names>International</given-names>
            <surname>Scientific-Practical Conference</surname>
          </string-name>
          Problems of Infocommunications,
          <year>2017</year>
          , pp.
          <fpage>551</fpage>
          -
          <lpage>555</lpage>
          . doi:
          <volume>10</volume>
          .1109/INFOCOMMST.
          <year>2017</year>
          .
          <volume>8246460</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [33]
          <string-name>
            <surname>Ch</surname>
          </string-name>
          .-Ch. Chen,
          <string-name>
            <surname>W.-J. Wu</surname>
          </string-name>
          ,
          <article-title>A secure Boolean-based multi-secret image sharing scheme</article-title>
          ,
          <source>Journal of Systems and Software</source>
          <volume>92</volume>
          (
          <year>2014</year>
          )
          <fpage>107</fpage>
          -
          <lpage>114</lpage>
          , doi: 10.1016/j.jss.
          <year>2014</year>
          .
          <volume>01</volume>
          .001.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [34]
          <string-name>
            <surname>T.-H. Chen</surname>
          </string-name>
          ,
          <string-name>
            <surname>Ch</surname>
          </string-name>
          .-S. Wu,
          <article-title>Efficient multi-secret image sharing based on Boolean operation</article-title>
          ,
          <source>Signal Processing</source>
          <volume>91</volume>
          (
          <issue>1</issue>
          ) (
          <year>2011</year>
          )
          <fpage>90</fpage>
          -
          <lpage>97</lpage>
          , doi: 10.1016/j.sigpro.
          <year>2010</year>
          .
          <volume>06</volume>
          .012.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>M.</given-names>
            <surname>Deshmukh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Nain</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ahmed</surname>
          </string-name>
          ,
          <article-title>An (n, n)-Multi Secret Image Sharing Scheme Using Boolean XOR and Modular Arithmetic</article-title>
          ,
          <source>in: IEEE 30th International Conference on Advanced Information Networking and Applications (AINA)</source>
          ,
          <year>2016</year>
          , pp.
          <fpage>690</fpage>
          -
          <lpage>697</lpage>
          , doi: 10.1109/aina.
          <year>2016</year>
          .
          <volume>56</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>M.</given-names>
            <surname>Naor</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Shamir</surname>
          </string-name>
          , Visual Cryptography,
          <source>in: Proceedings of the Advances in Cryptology - EUROCRYPT'94. Lecture Notes in Computer Science</source>
          <volume>950</volume>
          ,
          <year>1995</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>12</lpage>
          , doi: 10.1007/bfb0053419.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [37]
          <string-name>
            <surname>Ch</surname>
            <given-names>.-N.</given-names>
          </string-name>
          <string-name>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <surname>Ch.-H. Chen</surname>
            ,
            <given-names>S.-R.</given-names>
          </string-name>
          <string-name>
            <surname>Cai</surname>
          </string-name>
          ,
          <article-title>Enhanced Boolean-based multi secret image sharing scheme</article-title>
          .
          <source>Journal of Systems and Softwar 116</source>
          ,
          <year>2016</year>
          , pp.
          <fpage>22</fpage>
          -
          <lpage>34</lpage>
          , doi: 10.1016/j.jss.
          <year>2015</year>
          .
          <volume>01</volume>
          .031.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [38]
          <string-name>
            <given-names>P.</given-names>
            <surname>Korshunov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Ebrahimi</surname>
          </string-name>
          ,
          <article-title>Using warping for privacy protection in video surveillance</article-title>
          ,
          <source>in: 18th International Conference on Digital Signal Processing (DSP)</source>
          ,
          <year>2015</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          , doi: 10.1109/ICDSP.
          <year>2013</year>
          .
          <volume>6622791</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [39]
          <string-name>
            <given-names>A. N.</given-names>
            <surname>Alimpiev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Sidchenko</surname>
          </string-name>
          ,
          <article-title>The method of cryptocompression presentation of videoinformation resources in a generalized structurally positioned space</article-title>
          ,
          <source>Telecommunications and Radio Engineering</source>
          <volume>76</volume>
          (
          <issue>6</issue>
          ) (
          <year>2017</year>
          )
          <fpage>521</fpage>
          -
          <lpage>534</lpage>
          , doi: 10.1615/TelecomRadEng.v76.
          <year>i6</year>
          .
          <fpage>60</fpage>
          .(
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [40]
          <string-name>
            <given-names>S.O.</given-names>
            <surname>Sidchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.V.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <article-title>The method of cryptosemantic representation of an image based on a floating scheme of polyadic coding system in a differential basis</article-title>
          ,
          <source>Science-baised technologies 1</source>
          (
          <issue>33</issue>
          ) (
          <year>2017</year>
          )
          <fpage>46</fpage>
          -
          <lpage>53</lpage>
          , doi: 10.18372/
          <fpage>2310</fpage>
          -
          <lpage>5461</lpage>
          .
          <fpage>33</fpage>
          .11558.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>