<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Justification of video data stream encoding methods for departmental infocommunication networks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Oleksandr Akimov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksandr Kucheriavyi</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Marek Aleksander</string-name>
          <email>marek.aleksander@gmail.com</email>
          <xref ref-type="aff" rid="aff4">4</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mykola Dihtiar</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Pavlo Pertsev</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Valeriy Ralko</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksandr Sukhanov</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Liudmyla Akimova</string-name>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Interregional Academy of Personnel Management</institution>
          ,
          <addr-line>Frometivska Str., 2, Kyiv, 03039</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Ivan Kozhedub Kharkiv National University of Air Forces</institution>
          ,
          <addr-line>Sumska Str., 77/79, Kharkiv, 61023</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Kharkiv National University of Radio Electronics</institution>
          ,
          <addr-line>Nauky Ave., 14, Kharkiv, 61166</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>National University of Water and Environmental Engineering</institution>
          ,
          <addr-line>Sobornaya Str., 11, Rivne, 33000</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>Panstwowa Wyzsza Szkoła Zawodowa w Nowym Saczu</institution>
          ,
          <addr-line>Stanislawa Staszica, 1, Nowy Sacz, 33300</addr-line>
          ,
          <country country="PL">Poland</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>It is shown that recently the development of systems for remote information exchange has been gaining momentum. The article shows that there are several standards for encoding video information streams. At the same time, for real-time applications, which include video conferencing communication, technologies with basic profiles are most often used. However, the disadvantages of this direction of video compression are that it has a relatively low compression ratio relative to full-profile implementations of standardized codes. This is a restriction on the use of these codecs in real-time applications with low bandwidth of the telecommunications segment. Therefore, standardized pipelines for processing video information streams need to be improved in the direction of decom, updating the structure of the overall stream and using new compression methods without loss of image quality.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;departmental management systems</kwd>
        <kwd>video conferencing</kwd>
        <kwd>video information services</kwd>
        <kwd>video data encoding and compression</kwd>
        <kwd>eficiency and integrity of video information delivery</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Recently, the development of remote information exchange systems has been gaining momentum. This is
facilitated by the factors of increasing the productivity of information technologies, telecommunication
networks, and the algorithmic implementation of many applied areas of information processing and
analysis. Including artificial intelligence technologies. However, problematic moments arise here
[
        <xref ref-type="bibr" rid="ref1 ref2 ref3 ref4 ref5">1, 2, 3, 4, 5</xref>
        ]. These include:
1) significant growth of users of remote technologies, including an increase in the number of users
who are simultaneously in the mode of remote information communication [
        <xref ref-type="bibr" rid="ref10 ref11 ref6 ref7 ref8 ref9">6, 7, 8, 9, 10, 11</xref>
        ];
2) use of the remote mode of information exchange for oficial purposes, for example, holding
meetings, conducting objective control, remote consulting. The result is an increase in requirements
for quality characteristics of video information services [
        <xref ref-type="bibr" rid="ref12 ref13 ref14 ref15">12, 13, 14, 15</xref>
        ];
3) increasing the number of applications using wireless telecommunication technologies [
        <xref ref-type="bibr" rid="ref16 ref17 ref18 ref19 ref20">16, 17, 18,
19, 20</xref>
        ];
4) increasing the risks of temporary inoperability of segments of telecommunication networks or
their complete destruction due to malicious actions of the opposing party. It causes a significant
drop in the bandwidth of telecommunication networks [
        <xref ref-type="bibr" rid="ref21 ref22 ref23 ref24 ref25 ref26">21, 22, 23, 24, 25, 26</xref>
        ];
      </p>
      <sec id="sec-1-1">
        <title>5) problems with power supply [27, 28]. This leads to a contradiction between the requirements for quality indicators of video information services and insuficient capabilities of telecommunication networks for data transmission between users [2, 29].</title>
        <p>Therefore, there is a problem regarding the need under modern conditions to ensure the improvement
of the quality characteristics of the provision of video information services in the remote mode using
the limited capacities of the telecommunications sector.</p>
        <p>
          The direction of solving such problem is to increase the efectiveness of methods and algorithms for
processing and analyzing multimedia information flows [
          <xref ref-type="bibr" rid="ref30">30</xref>
          ].
        </p>
        <p>Characteristic here is the improvement of multimedia data compression methods. This allows to
reduce the number of bits that are transmitted per unit of time between users using
telecommunication networks. Therefore, the purpose of the article concerns the research of existing compression
technologies and the justification of the direction for their further improvement.</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2. Study of video data stream coding standards for departmental information and telecommunication networks</title>
      <p>There are several standards for encoding video data and video information streams in particular. At the
same time, for real-time applications, which include video conferencing, technologies with basic profiles
are most often used. In this case, coding is carried out for individual frames taking into account their
classification according to three types: I, P, B. A typical configuration of codecs for individual frames is
similar to algorithms in a JPEG pipeline. Frames after pre-processing according to the classification
requirements in the frames group are processed independently of each other. This mechanism provides
high-speed access to arbitrary frames both in the forward and reverse order of processing. Accordingly,
smooth "rewinding" in both directions, audiovisual synchronization are easily realized. Opportunities
for editing are also created. Common JPEG operations are now supported at the hardware level by most
graphics cards. Independent processing of individual frames allows to apply diferent efects without
fear that the mutual influence of adjacent frames will introduce additional distortions into the overall
video content. The advantages of this coding approach are that it: provides fast arbitrary access; easily
edits the stream of video information; has a relatively simple hardware implementation; is based on a
set of transformations that are implemented on the hardware and software scheme.</p>
      <p>The disadvantage of this direction of video data compression is that it has a relatively low degree of
compression compared to full-profile implementations of standardized codes. Therefore, there is a need
to improve the components of standardized codecs.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Justification of the basic set of profiles within the scope of standardized implementations</title>
      <p>As a basic standardized configuration, it is proposed to use MPEG-4, H264 and H265 concept
implementations. Let’s consider the algorithm for processing three-dimensional streaming video information.
The MPEG code structure consists of several hierarchical levels. This allows an increase the quality
characteristics of the coding and compression process and reduces the complexity of the video stream
analysis process. So there are the following levels (fig. 1).</p>
      <p>The first level is its own stream of video information. The third layer of data flow is a layer of
individual frames of diferent types. The fourth level is sectional. A section (its usual width is equal to
the width of the frame) consists of a certain list of macroblocks with a size of 16 x 16 pixels.</p>
      <p>The decoder as a component part includes a block of visualization of three-dimensional objects
Animation Framework extension - AFX - what is called data for three-dimensional movement. Here, the
background and fragments containing objects are processed separately. Accordingly, the implementation
of slice processing is used to take into account static areas in the sequence of frames. Such flexible
work with three-dimensional objects allows significantly increase the degree of compression with
significantly better image quality.</p>
      <p>But such advantages are accompanied by a significant increase in the complexity of the algorithmic
implementation and construction of the computational process. This leads to significant delays in the
process of compressing video information streams. Accordingly, this is a limitation on the use of the
specified codecs in real-time applications with low throughput capabilities of the telecommunications
segment.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Justification of the processing direction of the video information flow within the scope of the standardized processing pipeline</title>
      <p>Let’s consider the study of ways to improve the components of the standardized pipeline for processing
video information streams.</p>
      <p>The method of coding the information flow without loss is a method in which there is no loss of quality
of the information flow compared to the original. An unencoded information stream is mathematically
identical to its original. Lossless data stream processing usually provides lower intensity reduction
factors than lossy intensity reduction.</p>
      <p>Lossy stream encoding methods are methods that sacrifice some quality of the stream in exchange
for a reduction in data size. The amount of degradation depends on the coding algorithm used and
the quality factor set by the user. These methods are based on eliminating the redundancy of the
information flow in accordance with the properties of the human visual system. When applying these
methods, the decoded information stream difers from the original information stream. That is, there is
a distortion of the information flow and, accordingly, there is a loss of information.</p>
      <p>Motion compensation is one of the most important components of standard codecs (fig. 2).</p>
      <p>The method of compensatory motion prediction allows to significantly reduce the time redundancy
of the video stream. If the next frame contains shifted parts of the previous frame, then in this case it is
beneficial to transmit not the entire frame, but only information about the movement and change of the
shifted pixel. Given the high spatial correlation, it is enough to transmit one common motion vector
for a 16 x 16 pixel macroblock. For each block of the first frame, a search is made for the most similar
block in the second and a movement vector is calculated, which indicates the direction of movement of
the block from the first frame to the second. The search area must be large enough so that the moving
macroblock of the first frame image does not go out of the search area of the second frame.</p>
      <p>Most often, the size of the search zone is set 4 times larger than the size of a separate macroblock
(64x64). After which they can be localized. For example, during the formation of the P frame, it
is necessary to determine the coordinates of the movement in the forward forecast. For this, the
macroblock of the current P frame is taken and its new position is searched for in the search area of the
previous I or P frame, then the point diferences between the frames are calculated. The position of the
macroblock, at which the total value of the modules between the frame diferences of the macroblock
is the smallest, is taken as its real movement, after which the coordinates of the motion vector are
calculated as the vertical and horizontal displacement of the macroblock relative to its initial position.</p>
      <p>For the correct restoration of the video stream, the sequence of frame decoding must difer from the
sequence of their transmission. Since within a group of frames, which usually consists of 12 frames,
each B frame is restored by the surrounding P frames (at the beginning and end of the group - by I and
P), and in turn, each P frame - by the previous P (or I) frame, I frames can be restored independently
of the others, they are the reference for all P and B frames of the group.Accordingly, I frames have
the lowest degree of compression, and B - the highest. In terms of size, a typical P frame is 1/3 of I,
and B - 1/8. Two consecutive B-frames generated by the same algorithm and using the same reference
frames are not the same, since they represent diferent moments of video display time. Additional
element-by-element encoding of series lengths. It should be taken into account that the lengths of the
series carry the basic information about the shapes and sizes of the image objects, which is decisive for
the correct recognition of the images. Even small distortions in the series length values lead to partial or
complete destruction of the image of objects. Therefore, it is not recommended to use existing methods
based on the reduction of psychovisual redundancy to compress the lengths of series.</p>
      <p>Based on the analysis, it can be concluded that: analysis of existing coding methods without loss of
quality of the information flow showed that they do not provide processing and transmission of video
data in real time, and also do not provide a given level of immunity to errors in the communication
channel. At the same time, the redundancy of the compressed information flow with respect to the
theoretical limit reaches 90% ; the analysis of the structural properties of arrays of series lengths revealed
the possibility of an additional increase in the degree of coding of the information flow due to the use
of statistical coding methods.</p>
      <p>Therefore, the methods of encoding information streams by eliminating statistical redundancy in
arrays of series lengths are of interest for research on compliance with the requirements for video
information processing, transmission and display subsystems in ITS, namely, processing video data in
real time while preserving the original quality of the information stream. The structural diagram of
compression in standardized implementations is presented in Fig. 3. Three main subsystems of the coder
can be distinguished: the subsystem for eliminating spatial redundancy; subsystem for eliminating time
redundancy; flow rate control subsystem. Redundancy is a consequence of certain correlations. The
presence of correlation means that a certain element of the information flow is in a certain dependence
on neighboring elements in space and time. Redundancy in perception (psychovisual) is related to the
peculiarities of human vision. For example, the color sensitivity of human vision is below luminance, and
this feature is taken into account in all standard analog color coding systems. For the first subsystem,
the block of color space conversion and subsampling (reduction of the expansion of chrominance
components) is intended for primary elimination of psychovisual redundancy of the frame.</p>
      <p>The block for changing the order of frame processing is necessary for the operation of the motion
compensation system. Block of discrete cosine transformation - for obtaining spectral coeficients and
eliminating spatial correlation of pixels. Quantization block - to eliminate secondary psychovisual
redundancy. Block of conversion of the matrix of DCT coeficients into a vector by zigzag scanning - to
increase the eficiency of the Hufman code.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusions</title>
      <p>In the process of analyzing the characteristics of the existing video information flow encoding methods,
it was found that the intensity of the video flow of standardized implementations largely depends on
the quality of the image that is restored on the receiving side. It is substantiated that the intensity of
the information flow of the means of data transmission in the intelligence information collection and
processing systems is up to 10 Mbit/s, and the coding standard of the video information flow transmits
the necessary information flow at speeds from 15 Mbit/s, therefore the imbalance of the intensity of
the transmission of information flows is 30%. Therefore, standardized pipelines for processing video
information streams need improvement in the direction of decomposing the structure of the general
stream and using new compression methods without loss of image quality.</p>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <sec id="sec-6-1">
        <title>The authors have not employed any Generative AI tools.</title>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Niu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Ni</surname>
          </string-name>
          ,
          <article-title>An enhanced approach for detecting double jpeg compression with the same quantization matrix</article-title>
          ,
          <source>Signal Processing: Image Communication</source>
          <volume>76</volume>
          (
          <year>2019</year>
          )
          <fpage>89</fpage>
          -
          <lpage>96</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.image.
          <year>2019</year>
          .
          <volume>04</volume>
          .016.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>X.</given-names>
            <surname>Gao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Mou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Xiong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Sha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Yan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Cao</surname>
          </string-name>
          ,
          <article-title>A fast and eficient multiple images encryption based on single-channel encryption and chaotic system</article-title>
          ,
          <source>Nonlinear Dynamics</source>
          <volume>108</volume>
          (
          <year>2022</year>
          )
          <fpage>613</fpage>
          -
          <lpage>636</lpage>
          . doi:
          <volume>10</volume>
          .1007/s11071-021-07192-7.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>V.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Yudin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Boiko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Ziubina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Vyshnevska</surname>
          </string-name>
          ,
          <article-title>Video data compression methods in the decision support systems</article-title>
          , in: Z.
          <string-name>
            <surname>Hu</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Petoukhov</surname>
          </string-name>
          , I. Dychka, M. He (Eds.),
          <article-title>Advances in Computer Science for Engineering and Education</article-title>
          .
          <source>ICCSEEA</source>
          <year>2018</year>
          , volume
          <volume>754</volume>
          <source>of Advances in Intelligent Systems and Computing</source>
          , Springer, Cham,
          <year>2019</year>
          , pp.
          <fpage>289</fpage>
          -
          <lpage>298</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -91008-6_
          <fpage>30</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>F.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Qi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , C. Qin,
          <article-title>Progressive histogram modification for jpeg reversible data hiding</article-title>
          ,
          <source>IEEE Transactions on Circuits and Systems for Video Technology</source>
          <volume>34</volume>
          (
          <year>2024</year>
          )
          <fpage>1241</fpage>
          -
          <lpage>1254</lpage>
          . doi:
          <volume>10</volume>
          . 1109/TCSVT.
          <year>2023</year>
          .
          <volume>3288038</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>O. C.</given-names>
            <surname>Okoro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Zaliskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Dmytriiev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Solomentsev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Sribna</surname>
          </string-name>
          ,
          <article-title>Optimization of maintenance task interval of aircraft systems</article-title>
          ,
          <source>International Journal of Computer Network and Information Security</source>
          <volume>14</volume>
          (
          <year>2022</year>
          )
          <fpage>77</fpage>
          -
          <lpage>89</lpage>
          . doi:
          <volume>10</volume>
          .5815/ijcnis.
          <year>2022</year>
          .
          <volume>02</volume>
          .07.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>R. K.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Kumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. K.</given-names>
            <surname>Shaw</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. A.</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <article-title>Level by level image compression-encryption algorithm based on quantum chaos map</article-title>
          ,
          <source>Journal of King Saud University - Computer and Information Sciences</source>
          <volume>33</volume>
          (
          <year>2021</year>
          )
          <fpage>844</fpage>
          -
          <lpage>851</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.jksuci.
          <year>2018</year>
          .
          <volume>05</volume>
          .012.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>X.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Jiang</surname>
          </string-name>
          ,
          <article-title>A novel triple-image encryption and hiding algorithm based on chaos, compressive sensing and 3d dct</article-title>
          ,
          <source>Information Sciences 574</source>
          (
          <year>2021</year>
          )
          <fpage>505</fpage>
          -
          <lpage>527</lpage>
          . doi:
          <volume>10</volume>
          .1016/j.ins.
          <year>2021</year>
          .
          <volume>06</volume>
          .032.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>M.</given-names>
            <surname>Kayani</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. M. Riaz</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Ghafoor</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Khan</surname>
          </string-name>
          ,
          <article-title>Privacy preserving content based image retrieval</article-title>
          ,
          <source>Multimedia Tools and Applications</source>
          <volume>83</volume>
          (
          <year>2023</year>
          )
          <fpage>44955</fpage>
          -
          <lpage>44978</lpage>
          . doi:
          <volume>10</volume>
          .1007/s11042-023-17168-x.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>J.</given-names>
            <surname>Qin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Xiang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Tan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Pan</surname>
          </string-name>
          , W. Ma,
          <string-name>
            <given-names>N. N.</given-names>
            <surname>Xiong</surname>
          </string-name>
          ,
          <article-title>An encrypted image retrieval method based on harris corner optimization and lsh in cloud computing</article-title>
          ,
          <source>IEEE Access 7</source>
          (
          <year>2019</year>
          )
          <fpage>24626</fpage>
          -
          <lpage>24633</lpage>
          . doi:
          <volume>10</volume>
          .1109/ACCESS.
          <year>2019</year>
          .
          <volume>2894673</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Guo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Luo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Xu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Qin</surname>
          </string-name>
          ,
          <article-title>Unified learning-based lossy and lossless jpeg recompression</article-title>
          ,
          <source>in: 2023 IEEE International Conference on Image Processing (ICIP)</source>
          , IEEE,
          <year>2023</year>
          . doi:
          <volume>10</volume>
          .1109/ICIP49359.
          <year>2023</year>
          .
          <volume>10222354</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>X.</given-names>
            <surname>Ye</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Xiao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Yi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Lan</surname>
          </string-name>
          ,
          <article-title>Usability enhanced thumbnail-preserving encryption based on data hiding for jpeg images</article-title>
          ,
          <source>IEEE Signal Processing Letters</source>
          <volume>30</volume>
          (
          <year>2023</year>
          )
          <fpage>793</fpage>
          -
          <lpage>797</lpage>
          . doi:
          <volume>10</volume>
          .1109/ LSP.
          <year>2023</year>
          .
          <volume>3290836</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>V.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bekirov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Lekakh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <article-title>A steganographic method based on the modification of regions of the image with diferent saturation</article-title>
          ,
          <source>in: 2018 14th International Conference on Advanced Trends in Radioelectronics</source>
          , Telecommunications and Computer Engineering (TCSET), IEEE, Lviv-Slavske, Ukraine,
          <year>2018</year>
          , pp.
          <fpage>542</fpage>
          -
          <lpage>545</lpage>
          . doi:
          <volume>10</volume>
          .1109/TCSET.
          <year>2018</year>
          .
          <volume>8336260</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>A.</given-names>
            <surname>Morales</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Fierrez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Vera-Rodriguez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Tolosana</surname>
          </string-name>
          ,
          <article-title>Sensitivenets: Learning agnostic representations with application to face images</article-title>
          ,
          <source>IEEE Transactions on Pattern Analysis and Machine Intelligence</source>
          <volume>43</volume>
          (
          <year>2021</year>
          )
          <fpage>2158</fpage>
          -
          <lpage>2164</lpage>
          . doi:
          <volume>10</volume>
          .1109/TPAMI.
          <year>2020</year>
          .
          <volume>3015420</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>Q.</given-names>
            <surname>Bammey</surname>
          </string-name>
          , Jade owl:
          <article-title>Jpeg 2000 forensics by wavelet ofset consistency analysis</article-title>
          ,
          <source>in: 2023 8th International Conference on Image, Vision and Computing (ICIVC)</source>
          , IEEE,
          <year>2023</year>
          . doi:
          <volume>10</volume>
          .1109/ ICIVC58118.
          <year>2023</year>
          .
          <volume>10270699</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Pan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Ni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Su</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <article-title>Eficient jpeg image steganography using pairwise conditional random field model</article-title>
          ,
          <source>Signal Processing 221</source>
          (
          <year>2024</year>
          )
          <article-title>109493</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.sigpro.
          <year>2024</year>
          .
          <volume>109493</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>A.</given-names>
            <surname>Alimpiev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Podlesny</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Suprun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bekirov</surname>
          </string-name>
          ,
          <article-title>The video information resources integrity concept by using binomial slots</article-title>
          , in: 2017 XIIIth International Conference on Perspective Technologies and
          <article-title>Methods in MEMS Design (MEMSTECH), IEEE</article-title>
          , Lviv, Ukraine,
          <year>2017</year>
          , pp.
          <fpage>193</fpage>
          -
          <lpage>196</lpage>
          . doi:
          <volume>10</volume>
          .1109/MEMSTECH.
          <year>2017</year>
          .
          <volume>7937564</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>V.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. S.</given-names>
            <surname>Shulgin</surname>
          </string-name>
          ,
          <article-title>The method of increasing accessibility of the dynamic video information resource</article-title>
          , in: 2016 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET), IEEE, Lviv, Ukraine,
          <year>2016</year>
          , pp.
          <fpage>621</fpage>
          -
          <lpage>623</lpage>
          . doi:
          <volume>10</volume>
          .1109/TCSET.
          <year>2016</year>
          .
          <volume>7452133</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>V.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Podlesny</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Krasnorutskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Musienko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Himenko</surname>
          </string-name>
          ,
          <article-title>The ensuring the integrity of information streams under the cyberattacks action</article-title>
          , in: 2016
          <string-name>
            <given-names>IEEE</given-names>
            <surname>East-West</surname>
          </string-name>
          <string-name>
            <given-names>Design</given-names>
            &amp; Test
            <surname>Symposium</surname>
          </string-name>
          (EWDTS), IEEE, Yerevan, Armenia,
          <year>2016</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          . doi:
          <volume>10</volume>
          .1109/EWDTS.
          <year>2016</year>
          .
          <volume>7807752</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>H.</given-names>
            <surname>He</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Yuan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Ye</surname>
          </string-name>
          , H.
          <string-name>
            <surname>-M. Tai</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Chen</surname>
          </string-name>
          ,
          <article-title>Chosen plaintext attack on jpeg image encryption with adaptive key and run consistency</article-title>
          ,
          <source>Journal of Visual Communication and Image Representation</source>
          <volume>90</volume>
          (
          <year>2023</year>
          )
          <article-title>103733</article-title>
          . doi:
          <volume>10</volume>
          .1016/j.jvcir.
          <year>2022</year>
          .
          <volume>103733</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Hahanova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. N.</given-names>
            <surname>Krivonos</surname>
          </string-name>
          ,
          <article-title>Coding tangible component of transforms to provide accessibility and integrity of video data</article-title>
          ,
          <source>in: East-West Design &amp; Test Symposium (EWDTS</source>
          <year>2013</year>
          ), IEEE, Rostov on Don, Russia,
          <year>2013</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          . doi:
          <volume>10</volume>
          .1109/EWDTS.
          <year>2013</year>
          .
          <volume>6673179</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>D.</given-names>
            <surname>Lazzarotto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Testolina</surname>
          </string-name>
          ,
          <string-name>
            <surname>T. Ebrahimi,</surname>
          </string-name>
          <article-title>Subjective performance evaluation of bitrate allocation strategies for mpeg and jpeg pleno point cloud compression</article-title>
          ,
          <source>arXiv preprint arXiv:2402.04760v2</source>
          ,
          <year>2024</year>
          . doi:
          <volume>10</volume>
          .48550/arXiv.2402.04760, https://arxiv.org/abs/2402.04760v2.
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>V.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Krasnoruckiy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Hahanova</surname>
          </string-name>
          ,
          <article-title>The positional structural-weight coding of the binary view of transformants</article-title>
          , in:
          <string-name>
            <surname>East-West</surname>
            <given-names>Design</given-names>
          </string-name>
          &amp; Test
          <string-name>
            <surname>Symposium</surname>
          </string-name>
          (EWDTS
          <year>2013</year>
          ), IEEE, Rostov on Don, Russia,
          <year>2013</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . doi:
          <volume>10</volume>
          .1109/EWDTS.
          <year>2013</year>
          .
          <volume>6673178</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>X.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>He</surname>
          </string-name>
          ,
          <article-title>A lossless image compression and encryption algorithm combining jpeg-ls, neural network and hyperchaotic system</article-title>
          ,
          <source>Nonlinear Dynamics</source>
          <volume>111</volume>
          (
          <year>2023</year>
          )
          <fpage>15445</fpage>
          -
          <lpage>15475</lpage>
          . doi:
          <volume>10</volume>
          .1007/s11071-023-08622-4.
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>V.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Tarasenko</surname>
          </string-name>
          ,
          <article-title>Method coding eficiency segments for information technology processing video</article-title>
          , in: 2017 4th
          <string-name>
            <given-names>International</given-names>
            <surname>Scientific-Practical Conference</surname>
          </string-name>
          Problems of Infocommunications. Science and
          <string-name>
            <surname>Technology (PIC S&amp;T)</surname>
          </string-name>
          , IEEE, Kharkov, Ukraine,
          <year>2017</year>
          , pp.
          <fpage>551</fpage>
          -
          <lpage>555</lpage>
          . doi:
          <volume>10</volume>
          .1109/INFOCOMMST.
          <year>2017</year>
          .
          <volume>8246460</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. N.</given-names>
            <surname>Ryabukha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. S.</given-names>
            <surname>Kulitsa</surname>
          </string-name>
          ,
          <article-title>The method for improving security of the remote video information resource on the basis of intellectual processing of video frames in the telecommunication systems</article-title>
          ,
          <source>Telecommunications and Radio Engineering</source>
          <volume>76</volume>
          (
          <year>2017</year>
          )
          <fpage>785</fpage>
          -
          <lpage>797</lpage>
          . doi:
          <volume>10</volume>
          .1615/TelecomRadEng.v76.
          <year>i9</year>
          .
          <fpage>40</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>V.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Ryabukha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Podlesnyi</surname>
          </string-name>
          ,
          <article-title>Structural slotting with uniform redistribution for enhancing trustworthiness of information streams</article-title>
          ,
          <source>Telecommunications and Radio Engineering</source>
          <volume>76</volume>
          (
          <year>2017</year>
          )
          <fpage>607</fpage>
          -
          <lpage>615</lpage>
          . doi:
          <volume>10</volume>
          .1615/TelecomRadEng.v76.
          <year>i7</year>
          .
          <fpage>40</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>V.</given-names>
            <surname>Larin</surname>
          </string-name>
          , et al.,
          <article-title>Prediction of the final discharge of the UAV battery based on fuzzy logic estimation of information and influencing parameters</article-title>
          ,
          <source>in: IEEE 3rd KhPI Week on Advanced Technology</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . doi:
          <volume>10</volume>
          .1109/KhPIWeek57572.
          <year>2022</year>
          .
          <volume>9916490</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>V.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Podlesny</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Yalivets</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bekirov</surname>
          </string-name>
          ,
          <article-title>The analysis of the use of technologies of error resilient coding at influence of an error in the codeword</article-title>
          , in: 2016 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET), IEEE, Lviv, Ukraine,
          <year>2016</year>
          , pp.
          <fpage>52</fpage>
          -
          <lpage>54</lpage>
          . doi:
          <volume>10</volume>
          .1109/TCSET.
          <year>2016</year>
          .
          <volume>7451965</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>J. S.</given-names>
            <surname>Al-Azzeh</surname>
          </string-name>
          , et al.,
          <article-title>Analysis of self-similar trafic models in computer networks</article-title>
          ,
          <source>International Review on Modelling and Simulations</source>
          <volume>10</volume>
          (
          <year>2017</year>
          )
          <fpage>328</fpage>
          -
          <lpage>336</lpage>
          . doi:
          <volume>10</volume>
          .15866/iremos.v10i5.
          <fpage>12009</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>A. N.</given-names>
            <surname>Alimpiev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Barannik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Sidchenko</surname>
          </string-name>
          ,
          <article-title>The method of cryptocompression presentation of videoinformation resources in a generalized structurally positioned space</article-title>
          ,
          <source>Telecommunications and Radio Engineering</source>
          <volume>76</volume>
          (
          <year>2017</year>
          )
          <fpage>521</fpage>
          -
          <lpage>534</lpage>
          . doi:
          <volume>10</volume>
          .1615/TelecomRadEng.v76.
          <year>i6</year>
          .
          <fpage>60</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>