The demand for video privacy is constantly increasing. Simultaneously, it is necessary to solve an urgent scientific and applied problem, which consists in increasing the confidentiality of video information under conditions of a given time delay for its processing and delivery, while ensuring its reliability. The crypto compression transformations can be used to solve it. A service component is used as a conversion key, which is directly formed in the conversion process and contains information about the identified structural characteristics of the video data. Therefore, such information requires confidentiality. The existing methods of cryptography are designed to process a universal data stream and do not consider the structure and features of service components. It leads to the formation of redundant data, the use of an excessive number of operations, and an increase in processing time in the process of protecting service information using universal cryptography methods. Therefore, the article aims to develop a method for masking service data compression to ensure their confidentiality, considering the peculiarities of their formation by crypto compression methods. In modes with controlled loss of information quality, the elements of the service component are formed in a reduced dynamic range. Their length is 7 bits. To ensure the confidentiality of such elements, it is necessary to develop a method for masking overhead compression in video compression systems. On the one hand, overhead blocks should not contain redundant information. On the other hand, they must be formed from bit positions from different elements of the service components. On the other hand, they should be formed from bit positions from different elements of the service components. For that, it is proposed to organize the assembly of the elements of the service components. It is organized by combining 7-bit elements of service components into 8-bit complete sequences. Encryption blocks are formed from 8-bit sequences. The assembly of service components ensures the mixing of service data and reducing their quantity. To violate the structure of the representation of service components, it is proposed to additionally organize the permutation of 8-bit completed sequences. It provides a significant dispersion of the bit positions of the 7-bit overhead elements and the destruction of the correlation between the overhead elements. The correlation coefficients of the original and reconstructed images using encrypted service components are in the region of 0. The number of changing pixels is above the theoretical threshold value of 99.5341%.
It is substantiated that steganographic systems should be used to ensure the protection of special information resources in conditions of its prompt delivery. Here, steganographic technologies are an integral part of complex information protection systems. Simultaneously, for steganographic systems, there is a contradiction between the density of embedded data and level of information compaction of video container (level of reduction of volume bit volume of compact presented video image concerning bit volume of an initial video image). It leads to the fact that under the conditions of the required quality (reliability) of digital video information, the bit rate level of the covert channel is insufficient. Consequently, the scientific-applied problem concerns the necessity to increase the integrity (the level of correspondence of the hidden information before its embedding in a video container and after its extraction) and bit rate of the hidden channel of special information transmission. It is relevant. The solution of the described problem in the field of application of steganographic transformations can be realized based on the application of two different approaches. The first approach is based on methods of direct message embedding. But this approach is characterized by introducing distortions in the video images used as a container. Therefore, changes in structural and statistical patterns in the syntactic description of the video container happen. It reduces the potential for video container compaction. The second approach to creating steganographic transformation methods is based on information hiding using indirect embedding technique. Here, the embedding process exploits the functional dependency between the elements of the video container and the elements of the embedded message. Setting a specific dependency between the elements in the video container corresponds to the embedded element with a value of "0" or "1". However, the existing indirect steganographic transformation methods have a disadvantage. It consists of an insufficient value of embedded data density. To eliminate these disadvantages, it is proposed to develop an approach that allows using not only psychovisual but also structural redundancy of video container for concealment. Therefore, the research objective of this paper is to develop a method for indirect information withholding in the video container compression process to increase the bit rate of the hidden message channel. In the process of research, a steganographic multiagent system is constructed, which allows embedding hidden message elements without loss of information based on the indirect approach by modifying the active bases of the multiagent basis considering their uncertainty. To select transformants (data sets) as containers for information embedding, the requirement of the existence of a base system with all active bases is taken into account. The number of embedded bits of the hidden message is equal to the number of active bases in the base system of the multiadic space. Because of the made experiments, the following results have been received: in the process of embedding messages based on the created method distortions in a video container is not brought; for the created method the additional increase in the hidden channel bit rate in average 5 … 7 times are reached.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.