<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>X. Sun, Z. Chen, L. Wang, C. He, A lossless image compression and encryption algorithm combining
jpeg-ls, neural network and hyperchaotic system, Nonlinear Dynamics</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.1109/AIACT.2017.8020096</article-id>
      <title-group>
        <article-title>Method of multilevel spectral processing of infrared images in bit planes</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Ivan Kozhedub Kharkov National University of Air Forces</institution>
          ,
          <addr-line>Sumska, 77/79, Kharkiv, 61023</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Kharkiv National University of Radio Electronics</institution>
          ,
          <addr-line>Nauky Ave., 14 , Kharkiv, 61166</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>V. N. Karazin Kharkiv National University</institution>
          ,
          <addr-line>Svobody Square, 4, Kharkiv, 61022</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2017</year>
      </pub-date>
      <volume>111</volume>
      <issue>2023</issue>
      <fpage>188</fpage>
      <lpage>192</lpage>
      <abstract>
        <p>Improving the eficiency of remote thermal monitoring systems requires the development of image compression methods adapted to the semantic properties of infrared (IR) images. IR images typically have a wide dynamic range, often reaching 16 bits per pixel, which creates significant dificulties for real-time processing and transmission, especially in conditions of limited communication channel bandwidth. Traditional compression standards-such as JPEG, JPEG2000, and H.265-demonstrate low eficiency when working with IR data, mainly due to their failure to account for the specific spectral structure, bit-plane hierarchy, and local temperature variations. To address these limitations, this work proposes a compression method based on the decomposition of IR images into two components: the most significant and least significant bits, with subsequent diferentiated processing of each layer. At the initial stage, the image is divided into 8×8 pixel segments, which, in turn, are divided into 4×4 mini-segments. Within each mini-segment, a transformation into a diferent space is performed, which forms a residual representation. These residual data are processed using a recursive one-dimensional Haar wavelet transform, which is performed until only one low-frequency coeficient remains. This approach ensures efective energy concentration and multilevel spectral decomposition. A group coding method is also proposed. In this method, each mini-segment is encoded using a single code value formed from the high frequencies. Meanwhile, all low-frequency components of the segment are aggregated and encoded separately. As a result, the information of each initial segment can be represented by only five coeficients. This enables a significant reduction in data volume without compromising critical temperature information, thereby preserving the semantic integrity of the scene. Due to its computational simplicity and real-time processing capability, the proposed method is particularly suitable for resource-constrained platforms, such as unmanned aerial vehicles and portable thermal imaging devices.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;infrared images</kwd>
        <kwd>bit layers</kwd>
        <kwd>Haar wavelet transform</kwd>
        <kwd>group coding</kwd>
        <kwd>image compression</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Improving the eficiency of remote thermal monitoring systems requires the development of image
compression methods tailored to the semantic properties of infrared (IR) imagery. IR images typically
have a high dynamic range, often reaching 16 bits per pixel, which poses significant challenges for
realtime processing and transmission, especially under bandwidth-constrained communication channels
[1, 2, 3]. Traditional compression standards such as JPEG, JPEG2000, and H.265 are known to perform
poorly on IR data, primarily due to their inability to account for the specific spectral structure, bit-plane
hierarchy, and localized thermal variations inherent to such imagery [4, 5]. To address these limitations,
this work proposes a compression method based on decomposing IR images into two components:
higher-order and lower-order bits, followed by diferentiated processing of each layer [6, 7, 8, 9].</p>
      <p>Initially, the image is divided into 8x8 pixel segments, which are further partitioned into 4x4
minisegments [10, 11, 12, 13]. Within each mini-segment, a transformation into the residual domain is
applied, creating a residual representation. These residual data are then processed using a recursive
one-dimensional Haar wavelet transform, which is executed until only a single low-frequency coeficient
remains [14, 15, 16, 17]. This approach ensures eficient energy compaction and multilevel spectral
decomposition. A group coding method is also proposed. In this method, each mini-segment is encoded
using a single code value derived from its high-frequency components. Meanwhile, all low-frequency
components from the segment are aggregated and encoded separately [18, 19, 20]. As a result, the
information of each initial segment can be represented by just five coeficients. This significantly
reduces the data volume without losing critical thermal information, thereby preserving the semantic
integrity of the scene [21, 22, 23, 24]. Thanks to its computational simplicity and suitability for real-time
processing, the proposed method is particularly appropriate for resource-constrained platforms such as
unmanned aerial vehicles and portable thermal imaging devices [25, 26, 27, 28]. The growing need for
real-time object monitoring, especially in limited visibility conditions, drives the active implementation
of infrared (IR) cameras in critical areas such as defense, security systems, remote surveillance, and
search-and-rescue operations. IR imaging has an advantage over traditional optical visualization
methods due to its ability to capture the thermal radiation of objects, ensuring independence from
external lighting, smoke, fog, and other obscuring factors. This makes the IR information channel an
indispensable data source for unmanned aerial systems operating in complex and crisis environments
[29, 30, 31].</p>
      <p>At the same time, the processing and transmission of IR images are associated with a number of
challenges. Unlike conventional visual images, infrared frames typically have a bit depth of 12-16 bits
per pixel, which significantly increases their bit volume. Transmitting such data in real-time, especially
under the limited bandwidth of on-board or mobile telecommunication systems, is accompanied by
delays. To reduce them, compression methods focused on eliminating psychovisual redundancy are used.
However, such methods, aimed at human perception, do not take into account the thermal semantics of
the images, which leads to the loss of critically important information and the appearance of distortions
[32, 34, 33].</p>
      <p>Standardized coding algorithms, particularly JPEG, JPEG2000, or H.265/HEVC, are not adapted to the
specifics of infrared data. They do not account for the nature of thermal signatures and cause a loss of
thermal integrity, which is key in many applied tasks. Furthermore, traditional compression methods
do not consider the spectral heterogeneity and non-uniform distribution of information content among
the bit-planes, which are characteristic of IR images. This significantly limits the potential for their
efective use in tasks of thermal analysis, object detection, and identification. In this regard, there is
a relevant scientific and applied problem to increase the eficiency of processing and transmitting IR
images in remote surveillance and search systems by ensuring an enhanced level of data integrity and
transmission speed.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Analysis and problem statement</title>
      <p>Modern image compression methods, including JPEG, JPEG2000, H.264/AVC, and H.265/HEVC, are
widely used to reduce the bit volume of digital images and video. These methods are based on the use of
spatio-frequency transforms (e.g., DCT or DWT), subsequent quantization of coeficients, and entropy
coding. The efectiveness of these standards is based on eliminating the psychovisual redundancy
of information that is barely noticeable or insignificant to human visual perception. However, these
technologies are primarily oriented towards visual (RGB) images and do not consider the specifics of
infrared (IR) data.</p>
      <p>In the case of IR images, especially those with an extended dynamic range, the preservation of thermal
semantics—that is, the precise value of the objects’ thermal signatures—is key. For such images, even a
slight change in pixel values can lead to the loss of important information about the physical state of
the scene. Consequently, traditional compression methods can cause distortions of the temperature
profile, which is critical for detection, identification, and decision-making tasks in security and defense
systems.</p>
      <p>Furthermore, IR images have a number of statistical features that are poorly handled by classical
algorithms. First, the bit-planes of an IR frame exhibit a non-uniform distribution of information: the
most significant bits correspond to global structures and object contours, while the least significant
bits relate to fine details or noise. Second, in the spectral domain, IR images are characterized by a
non-uniform energy distribution, depending on the local characteristics of the scene’s thermal field.
None of the above properties are utilized in typical coding standards.</p>
      <p>A promising approach is one that combines the advantages of spectral image representation with
group coding of bit layers, which allows not only for adaptation to the local features of the frame but
also for minimizing structural redundancy without losing important thermal information. Therefore,
the purpose of this article is to develop a method for spectral-group coding of bit layers of infrared
images.
3. Development of the method of spectral-group coding of bit layers
of infrared images
Infrared images formed by thermal imaging cameras can have a bit depth of 16 bits per pixel. This
leads to a significant increase in data volume. Most traditional coding algorithms are not adapted to
such a depth, which limits their efectiveness both in terms of compression and the preservation of
information content. In particular, failing to account for the bit structure leads to uniform compression
of all components, although their significance difers substantially.</p>
      <p>In this context, it is advisable to represent the initial 16-bit IR image as two separate components: a
most significant bit (MSB) layer and a least significant bit (LSB) layer. Such a decomposition allows for
the diferentiated processing of data depending on their signicfiance. The MSB layer carries the key
semantics of the image—its structure, object shapes, boundaries, and other macroscopic characteristics.
The LSB layer, conversely, reflects subtle temperature fluctuations, high-frequency details, or thermal
noise. This allows for the application of more aggressive compression to the less informative layers
without losing thermal accuracy.</p>
      <p>Let there be an infrared image  ∈ N× , where each pixel value is , ∈ ︀[ 0, 216 − 1 ]︀ . The
value of each pixel can be decomposed as:</p>
      <p>
        15
, = ∑︁ (, ) · 2 ,
=0
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
where (, ) ∈ {0, 1} - is the value of the m-th bit of the pixel at position (x, y). Next, we introduce
a threshold index  ∈ {1, . . . , 15} , that separates the most significant and least significant bits. For
example, for  = 8 , two components are formed:
• most significant bit layer:   (, ) = ∑︀15
      </p>
      <p>= (, ) · 2  ;
• least significant bit layer:  (, ) = ∑︀−1</p>
      <p>=0 (, ) · 2  .</p>
      <p>Thus, from one 16-bit image, two images,  and  of the same size  ×  are formed, which
have diferent informational natures. The image  is responsible for reproducing the macroscopic
structure of the scene, including contours, shapes, and thermal anomalies — elements that are of key
importance for object identification. In turn, the image  is characterized by greater variability,
contains high-frequency components and micro-fluctuations of temperatures, which can be used to
improve detail or as a source of entropy reserve during compression.</p>
      <p>To ensure adaptive local analysis of the infrared image during the spectral-group coding process, a
preliminary spatial-structural segmentation is applied. It allows for the localization of processing within
small areas of the image, which significantly increases the eficiency of subsequent spectral analysis,
reduces structural redundancy, and allows for the adaptation of the compression level to the local level
of information content. At the first stage of segmentation, the image A is divided into non-overlapping
blocks of a fixed size of 8 × 8 , which are subsequently considered as segments. The number of segments
vertically and horizontally is determined by the ratios:
Each segment , is then subjected to a detailed breakdown—mini-segmentation—which allows for
the identification of intra-segment non-uniformities. Specifically, the segment , is divided into four
non-overlapping mini-segments of size 4 × 4 pixels, denoted as - (,) ∈ N4×4 , where  ∈ {1, 2, 3, 4}
corresponds to the position:
︂⌊  ⌋︂</p>
      <p>8
 =
, ℎ =
︂⌊  ⌋︂
8</p>
      <p>,
seg =  ·  ℎ.</p>
      <p>, ∈ N8×8 .
where  — the number of segments vertically, ℎ — horizontally. The total number of segments in
the image is:
The segment located at coordinates (x, y), where 1 ≤  ≤ 
 , 1 ≤  ≤ 
ℎ , is referred to as:
• (1,) - upper left minisegment;
• (2,) - upper right minisegment;
• (3,) - lower left minisegment;
• (4,) - lower right minisegment.</p>
      <p>
        That is, minisegments (,) have the following spatial representation:
, =
[︃ (
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
,
      </p>
      <p>
        (
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
,
      </p>
      <p>
        (
        <xref ref-type="bibr" rid="ref2">2</xref>
        )]︃
,
      </p>
      <p>
        (
        <xref ref-type="bibr" rid="ref4">4</xref>
        )
,
To apply the described segmentation scheme to the formed bit layers  and  we introduce the
following notation system:
•  , - segment of the most significant bit-plane;
•  (,) - mini-segment of the most significant bit-plane;
• , - segment of the least significant bit-plane;
• (,) - mini-segment of the least significant bit-plane.
(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
(
        <xref ref-type="bibr" rid="ref4">4</xref>
        )
(
        <xref ref-type="bibr" rid="ref5">5</xref>
        )
(
        <xref ref-type="bibr" rid="ref6">6</xref>
        )
(
        <xref ref-type="bibr" rid="ref7">7</xref>
        )
      </p>
      <p>Within the framework of constructing an efective method for compressing infrared images, the
preliminary transformation of local blocks into a form that enhances the detection of structural patterns
and helps reduce entropy plays a special role. One such approach is to convert each local mini-segment
into a diferent space. The purpose of this transformation is to eliminate the local constant component
of the signal (background level) and to reduce the mean value and variation of the block elements,
which directly contributes to increasing the eficiency of spectral analysis and subsequent compression.</p>
      <p>Let the pixel values in a mini-segment (,) be denoted as , (, ) , where ,  ∈ {1, 2, 3, 4} . For
()
each mini-segment, its minimum value is determined:</p>
      <p>(,) = min {︁(,)}︁ .</p>
      <p>Next, this minimum value is subtracted from each element of the mini-segment (,) necessary to
subtract the specified minimum value  (,) :
∆ (,)(, ) = (,)(, ) − 
(,),
∀, .</p>
      <p>That is, the diference between any two elements of a mini segment remains unchanged:
∆ (,)(, ) − ∆</p>
      <p>(,)(, ) = (,)(, ) −  (,)(, ),
which means preserving local gradients and structural characteristics of the image.</p>
      <p>As the result represents local deviations relative to the minimum value, the transformation into the
diference space serves to remove the DC component, which carries no useful structural information
but significantly afects the signal’s amplitude.</p>
      <p>An additional advantage is the reduction of the value range within the mini-segment, which is defined
as:</p>
      <p>range(∆ (,)) = max((,)) − min( (,)).</p>
      <p>This reduction in range leads to a decrease in variance and mean, which in turn lowers the block’s
entropy, improves the eficiency of the spectral transform, and reduces the volume of encoded
information. This is especially important in infrared images, where the temperature of the scene varies slightly,
but the relative gradients between neighboring pixels carry important semantic information.</p>
      <p>By applying a diference transform to the minisegments of bit layers  and  we obtain the
following notations:</p>
      <p>v(0) = {v1, v2, . . . , v16} ∈ N1×16
At the first step, pairs of adjacent elements are convolved to construct:
• approximation coeficients: a (1) = v2(0)−1 2+v2(0) ,  = {1, . . . , 8} ;</p>
      <p>
        (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) = v2(0)−1 −v 2(0) ,  = {1, . . . , 8} .
      </p>
      <p>
        • detail coeficients: d  2
Thus, we obtain two vectors:
• a(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) ∈ R8 - low-frequency coeficients;
• d(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) ∈ R8 - high-frequency coeficients.
      </p>
      <p>
        The next step is to recursively apply the same procedure only to the low-frequency vector a(
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) :
•  ∆ (,) - diference minisegment of the upper bit layer   ;
•  (,) - ∆ (,) - diference minisegment of the lower bit layer   .
      </p>
      <p>After converting the mini-segments into the diference space, it is advisable to perform a spectral
transformation, which allows the representation of local temperature gradients in the frequency domain.
Among possible spectral approaches, such as DCT (Discrete Cosine Transform) or DFT (Discrete Fourier
Transform), the use of the discrete wavelet transform based on the Haar basis is proposed. It has the
following advantages:
• computational simplicity - the algorithm has low computational complexity as it is implemented
through simple additions, subtractions, and divisions, which is critical for implementation on
embedded systems or platforms with limited computational resources;
• frequency decomposition - after the wavelet transform, most of the energy is localized in the
low-frequency coeficient, while the high-frequency coeficients tend to have small values, which
opens up the possibility of adaptive, aggressive compression.</p>
      <p>Consider the mini-segment ∆ (,) as a one-dimensional vector:</p>
      <p>
        (
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
a(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) = a2−1

2
      </p>
      <p>
        (
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
+ a2 ,  = {1, . . . , 4};
d(
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) = a2−1 − a (21) ,  = {1, . . . , 4}.
      </p>
      <p>
        (
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
 2
(
        <xref ref-type="bibr" rid="ref8">8</xref>
        )
(
        <xref ref-type="bibr" rid="ref9">9</xref>
        )
(
        <xref ref-type="bibr" rid="ref10">10</xref>
        )
(
        <xref ref-type="bibr" rid="ref11">11</xref>
        )
      </p>
      <p>
        W() = {︁a(
        <xref ref-type="bibr" rid="ref14">14</xref>
        ), d(
        <xref ref-type="bibr" rid="ref14">14</xref>
        ), d(
        <xref ref-type="bibr" rid="ref13">13</xref>
        ), d(23), d(
        <xref ref-type="bibr" rid="ref12">12</xref>
        ), d(
        <xref ref-type="bibr" rid="ref22">22</xref>
        ), . . . , d(42), d(
        <xref ref-type="bibr" rid="ref11">11</xref>
        ), . . . , d(81)}︁ ∈ R1×16 .
• a(
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) - is the single remaining low-frequency coeficient;
      </p>
      <p>1
• all d(ℓ) - are high-frequency coeficients ℓ ∈ {1, 2, 3, 4} , ordered by level of frequency detail
(from coarse to fine) .</p>
      <p>The described transformation into spectral space must be applied to the diference minisegments
from the upper bit layer and the lower bit layer:</p>
      <p>To reduce the bit volume of the generated spectral coeficients they must be encoded using group
coding:</p>
      <p>W(I ∆ (,)); W(I∆ (,)).</p>
      <p>gc = GroupC ({1, . . . , }) ;
Then to:
• {x1, . . . , x} - set of values to be encoded;
• xgc - generated code value.</p>
      <p>
        For each mini-segment (,) we will form a vector of high-frequency coeficients:
d(,) = ︁( d(
        <xref ref-type="bibr" rid="ref14">14</xref>
        ), d(
        <xref ref-type="bibr" rid="ref13">13</xref>
        ), d(23), d(
        <xref ref-type="bibr" rid="ref12">12</xref>
        ), . . . , d(42), d(
        <xref ref-type="bibr" rid="ref11">11</xref>
        ), . . . , d(81))︁
∈ R15.
      </p>
      <p>Apply group coding to d(,) :</p>
      <p>GroupC(,) = GroupC(d(,))</p>
      <p>For each mini-segment (,) a vector of high-frequency coeficients is formed and group coded into
a single value GroupC(,) . Since an , ∈ N8×8 segment consists of four mini-segments, it will have
four high-frequency group codes S(,) at  = {1, . . . , 4} , then it will have 4 high-frequency group
codes, one for each minisegment:</p>
      <p>︁( Group (1,), Group (2,), Group (3,), Group (4,))︁ .</p>
      <p>Thus, instead of operating with 64 pixel values or 64 spectral coeficients, all information is compressed
into 5 scalar codes, achieving a significant reduction in data volume.</p>
      <p>
        By applying group coding to the spectral coeficients formed from the upper bit layer  and the
lower bit layer  , separate code values will be formed for each bit layer:
(
        <xref ref-type="bibr" rid="ref13">13</xref>
        )
(
        <xref ref-type="bibr" rid="ref14">14</xref>
        )
(
        <xref ref-type="bibr" rid="ref15">15</xref>
        )
(
        <xref ref-type="bibr" rid="ref16">16</xref>
        )
(
        <xref ref-type="bibr" rid="ref17">17</xref>
        )
(
        <xref ref-type="bibr" rid="ref18">18</xref>
        )
(
        <xref ref-type="bibr" rid="ref19">19</xref>
        )
(
        <xref ref-type="bibr" rid="ref20">20</xref>
        )
(
        <xref ref-type="bibr" rid="ref21">21</xref>
        )
(
        <xref ref-type="bibr" rid="ref22">22</xref>
        )
• upper bit layer segment group codes A S, :
• upper bit layer segment group codes A S, :
 Group , = {︁ Group (1,),  Group (2,),  Group (3,),  Group (4,)}︁ ; (23)
 Group , = {︁ Group (1,),  Group (2,),  Group (3,),  Group (4,)}︁ . (24)
4. Conclusions
1. An approach to compressing infrared images based on spectral-group processing of bit layers has
been substantiated. The proposed representation of 16-bit IR images in the form of most significant and
least significant bit layers allows for consideration of the specific distribution of information in the bit
structure and adaptation of processing methods to the semantic load of each layer. The expediency of
separating structurally significant components at the bit-plane level has been demonstrated.
      </p>
      <p>2. A procedure for multilevel segmentation has been developed and formalized, involving the division
of the image into 8 × 8 segments and 4 × 4 mini-segments. This approach allows for the localization of
analysis, adaptation to spatial heterogeneity, and reduction of statistical redundancy within each block.</p>
      <p>3. A method for transforming mini-segments into a diferent space through local alignment
relative to the minimum value has been proposed. This transformation eliminates the DC component,
reduces entropy, and increases the eficiency of subsequent spectral processing while preserving local
temperature gradients.</p>
      <p>4. A multilevel one-dimensional Haar wavelet transform for processing mini-segments in a linear
representation has been developed. A recursive implementation of the transform is proposed until
one low-frequency and 15 high-frequency coeficients remain. This approach allows for frequency
decomposition while preserving the order of components and promoting energy concentration in the
approximation.</p>
      <p>5. A functional model of group coding has been proposed, which involves compressing the spectral
coeficients of each mini-segment into a single code value. The high-frequency coeficients of each
mini-segment are processed separately, while the low-frequency coeficients of all mini-segments within
a segment are processed jointly. As a result, each segment is represented by five group codes, which
provide a high degree of compression while preserving the thermal structure of the scene.</p>
    </sec>
    <sec id="sec-3">
      <title>Declaration on Generative AI</title>
      <p>The authors have not employed any Generative AI tools.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Niu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Ni</surname>
          </string-name>
          ,
          <article-title>An enhanced approach for detecting double JPEG compression with the same quantization matrix</article-title>
          ,
          <source>Signal Processing: Image Communication</source>
          <volume>76</volume>
          (
          <year>2019</year>
          )
          <fpage>89</fpage>
          -
          <lpage>96</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>X.</given-names>
            <surname>Gao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Mou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Xiong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Sha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Yan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Cao</surname>
          </string-name>
          ,
          <article-title>A fast and eficient multiple images encryption based on single-channel encryption and chaotic system</article-title>
          ,
          <source>Nonlinear Dynamics</source>
          <volume>108</volume>
          (
          <year>2022</year>
          )
          <fpage>613</fpage>
          -
          <lpage>636</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>D.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <article-title>Steganographic coding technology for hiding information in infocommunication systems of critical infrastructure</article-title>
          ,
          <source>in: 2022 IEEE 4th International Conference on Advanced Trends in Information Theory (ATIT)</source>
          , IEEE, Kyiv, Ukraine,
          <year>2022</year>
          , pp.
          <fpage>88</fpage>
          -
          <lpage>91</lpage>
          . doi:
          <volume>10</volume>
          .1109/ATIT58178.
          <year>2022</year>
          .
          <volume>10024185</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>F.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Qi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , C. Qin,
          <article-title>Progressive histogram modification for jpeg reversible data hiding</article-title>
          ,
          <source>IEEE Transactions on Circuits and Systems for Video Technology</source>
          <volume>34</volume>
          (
          <year>2024</year>
          )
          <fpage>1241</fpage>
          -
          <lpage>1254</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>R. K.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. K.</given-names>
            <surname>Shaw</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. A.</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <article-title>Level by level image compression-encryption algorithm based on quantum chaos map</article-title>
          ,
          <source>Journal of King Saud University - Computer and Information Sciences</source>
          <volume>33</volume>
          (
          <year>2021</year>
          )
          <fpage>844</fpage>
          -
          <lpage>851</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>T.</given-names>
            <surname>Belikova</surname>
          </string-name>
          ,
          <article-title>Decoding method of information-psychological destructions in the phonetic space of information resources</article-title>
          ,
          <source>in: Proceedings of the 2nd IEEE International Conference Advanced Trends in Information Theory (ATIT)</source>
          , IEEE, Kyiv, Ukraine,
          <year>2020</year>
          , pp.
          <fpage>87</fpage>
          -
          <lpage>91</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>X.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Jiang</surname>
          </string-name>
          ,
          <article-title>A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3d dct</article-title>
          ,
          <source>Information Sciences 574</source>
          (
          <year>2021</year>
          )
          <fpage>505</fpage>
          -
          <lpage>527</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>A. J.</surname>
          </string-name>
          ,
          <string-name>
            <surname>S. R.</surname>
          </string-name>
          ,
          <article-title>A secure image outsourcing using privacy-preserved local color layout descriptor in cloud environment</article-title>
          ,
          <source>IEEE Transactions on Services Computing</source>
          <volume>17</volume>
          (
          <year>2024</year>
          )
          <fpage>378</fpage>
          -
          <lpage>391</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>J.</given-names>
            <surname>Anju</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Shreelekshmi</surname>
          </string-name>
          ,
          <article-title>Secure content-based image retrieval using combined features in cloud</article-title>
          ,
          <source>in: Distributed Computing and Internet Technology, Lecture Notes in Computer Science</source>
          , Springer,
          <year>2019</year>
          , pp.
          <fpage>179</fpage>
          -
          <lpage>197</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Hassan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>Secure content based image retrieval for mobile users with deep neural networks in the cloud</article-title>
          ,
          <source>Journal of Systems Architecture</source>
          <volume>116</volume>
          (
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>M.</given-names>
            <surname>Kayani</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. M. Riaz</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Ghafoor</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Khan</surname>
          </string-name>
          ,
          <article-title>Privacy preserving content based image retrieval</article-title>
          ,
          <source>Multimedia Tools and Applications</source>
          <volume>83</volume>
          (
          <year>2023</year>
          )
          <fpage>44955</fpage>
          -
          <lpage>44978</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>J.</given-names>
            <surname>Qin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Xiang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Tan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Pan</surname>
          </string-name>
          , W. Ma,
          <string-name>
            <given-names>N. N.</given-names>
            <surname>Xiong</surname>
          </string-name>
          ,
          <article-title>An encrypted image retrieval method based on harris corner optimization and lsh in cloud computing</article-title>
          ,
          <source>IEEE Access 7</source>
          (
          <year>2019</year>
          )
          <fpage>24626</fpage>
          -
          <lpage>24633</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2019</year>
          .
          <volume>2899861</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>O.</given-names>
            <surname>Kulitsa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Komolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Zhurbynskyy</surname>
          </string-name>
          ,
          <article-title>Selective method for hiding of video information resource in telecommunication systems based on encryption of energy-significant blocks of reference i-frame</article-title>
          ,
          <source>in: Proceedings of the 1st International Conference on Advanced Information and Communication</source>
          Technologies (AICT'
          <year>2015</year>
          ),
          <year>2015</year>
          , pp.
          <fpage>80</fpage>
          -
          <lpage>83</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>X.</given-names>
            <surname>Ye</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Xiao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Yi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Lan</surname>
          </string-name>
          ,
          <article-title>Usability enhanced thumbnail-preserving encryption based on data hiding for jpeg images</article-title>
          ,
          <source>IEEE Signal Processing Letters</source>
          <volume>30</volume>
          (
          <year>2023</year>
          )
          <fpage>793</fpage>
          -
          <lpage>797</lpage>
          . doi:
          <volume>10</volume>
          .1109/ LSP.
          <year>2023</year>
          .
          <volume>3271281</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>V.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Shulgin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <article-title>Method of coding subbands of non-homogeneous spectrum of video segments in uneven diagonal space</article-title>
          ,
          <source>in: 2022 IEEE 4th International Conference on Advanced Trends in Information Theory (ATIT)</source>
          , IEEE, Kyiv, Ukraine,
          <year>2022</year>
          , pp.
          <fpage>72</fpage>
          -
          <lpage>75</lpage>
          . doi:
          <volume>10</volume>
          . 1109/ATIT58178.
          <year>2022</year>
          .
          <volume>10024236</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>A.</given-names>
            <surname>Morales</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Fierrez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Vera-Rodriguez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Tolosana</surname>
          </string-name>
          ,
          <article-title>Sensitivenets: Learning agnostic representations with application to face images</article-title>
          ,
          <source>IEEE Transactions on Pattern Analysis and Machine Intelligence</source>
          <volume>43</volume>
          (
          <year>2021</year>
          )
          <fpage>2158</fpage>
          -
          <lpage>2164</lpage>
          . doi:
          <volume>10</volume>
          .1109/TPAMI.
          <year>2020</year>
          .
          <volume>2973565</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>Q.</given-names>
            <surname>Bammey</surname>
          </string-name>
          , JADE OWL:
          <article-title>JPEG 2000 forensics by wavelet ofset consistency analysis</article-title>
          ,
          <source>in: 2023 8th International Conference on Image, Vision and Computing (ICIVC)</source>
          , IEEE,
          <year>2023</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>A.</given-names>
            <surname>Zemliachenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Ponomarenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Lukin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Egiazarian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Astola</surname>
          </string-name>
          ,
          <article-title>Still image / video frame lossy compression providing a desired visual quality</article-title>
          ,
          <source>Multidimensional Systems and Signal Processing</source>
          (
          <year>2015</year>
          )
          <fpage>22</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>V.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <article-title>Binomial-polyadic binary data encoding by quantity of series of ones</article-title>
          ,
          <source>in: 2020 IEEE 15th International Conference on Advanced Trends in Radioelectronics</source>
          , Telecommunications and Computer Engineering (TCSET), IEEE, Lviv-Slavske, Ukraine,
          <year>2020</year>
          , pp.
          <fpage>775</fpage>
          -
          <lpage>780</lpage>
          . doi:
          <volume>10</volume>
          .1109/TCSET49122.
          <year>2020</year>
          .
          <volume>235540</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>V.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Ryabukha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <article-title>Indirect steganographic embedding method based on modifications of the basis of the polyadic system</article-title>
          ,
          <source>in: 2020 IEEE 15th International Conference on Advanced Trends in Radioelectronics</source>
          , Telecommunications and Computer Engineering (TCSET), IEEE, Lviv-Slavske, Ukraine,
          <year>2020</year>
          , pp.
          <fpage>699</fpage>
          -
          <lpage>702</lpage>
          . doi:
          <volume>10</volume>
          .1109/TCSET49122.
          <year>2020</year>
          .
          <volume>235522</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>V.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Belikova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Gurzhii</surname>
          </string-name>
          ,
          <article-title>The model of threats to information and psychological security, taking into account the hidden information destructive impact on the subconscious of adolescents</article-title>
          ,
          <source>in: 2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT)</source>
          , IEEE, Kyiv, Ukraine,
          <year>2019</year>
          , pp.
          <fpage>267</fpage>
          -
          <lpage>270</lpage>
          . doi:
          <volume>10</volume>
          .1109/ATIT49449.
          <year>2019</year>
          .
          <volume>9030432</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>H.</given-names>
            <surname>He</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yuan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Ye</surname>
          </string-name>
          , H.
          <string-name>
            <surname>-M. Tai</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Chen</surname>
          </string-name>
          ,
          <article-title>Chosen plaintext attack on jpeg image encryption with adaptive key and run consistency</article-title>
          ,
          <source>Journal of Visual Communication and Image Representation</source>
          <volume>90</volume>
          (
          <year>2023</year>
          ). doi:
          <volume>10</volume>
          .1016/j.jvcir.
          <year>2022</year>
          .
          <volume>103778</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>