METHOD OF PROTECTING VIDEO INFORMATION IN AEROSPACE MONITORING SYSTEMS BASED ON STEGANOGRAPHIC TRANSFORMATIONS
DOI:
https://doi.org/10.18372/2310-5461.69.20950Keywords:
aerospace monitoring, information and communication systems, containers of visual origin, redundancy, structural dependencies, positional basisAbstract
The article shows that there are contradictions in the process of ensuring information security. They arise when ensuring the categories of confidentiality, integrity and availability in the case of processing and transmitting video information resources in the aerospace monitoring system. They are based on the criticality of time delays for the delivery of video information of a significant bit volume using information and communication means limited in transmission speed. In the above circumstances (conditions), interest arises in information protection technologies in the process of using bit volume reduction systems. The article substantiates that one of the options for implementing such an approach is the use of steganographic methods of hiding information in containers of visual origin (CVO). The basic shortcomings of information embedding methods based on direct steganographic transformations are established. The direction of further development may be the construction of combined approaches to the organization of steganographic systems in the compression basis. In this case, as an additional component, it is proposed to use technologies that, according to the functional condition, use the indirect embedding method. At the same time, they are characterized by low values of steganographic capacity. This means that it is necessary to develop an approach to designing a steganographic system that takes into account not only psychovisual regularities in the CVP, but also structural dependencies between the elements of its syntactic description. A method has been created for lossless embedding of information in an indirect way with the detection of structural dependencies by means of controlled correction of the unevenly weighted positional (NWP) basis under the conditions of: the presence of pre-embedded information; elimination of digital traces of the presence of hidden information. A method has been developed for extracting information in a steganographic-corrected NWP basis. The differences of the method are that: information extraction is carried out with the exclusion of losses by comparing the real and control values of the bases of the NRVP basis under the conditions of eliminating the influence on the stegano-substrate of the previous stage of stegano-transformations in the quantized-spectral space of the KVP. This allows to increase the level of steganographic capacity under the conditions of excluding losses of hidden information and syntactic description of the VKP.
References
Barannik, V., Yudin, O., Boiko, Y., Ziubina, R., Vyshnevska, N. (2019). Video Data Compression Methods in the Decision Support Systems. In: Hu, Z., Petoukhov, S., Dychka, I., He, M. (eds) Advances in Computer Science for Engineering and Education. ICCSEEA 2018. Advances in Intelligent Systems and Computing, vol 754. Springer, Cham. DOI: 10.1007/978-3-319-91008-6_30.
V. Barannik, D. Barannik, V. Fustii, M. Parkhomenko. Evaluation of Effectiveness of Masking Methods of Aerial Photographs. 2019 3rd International Conference on Advanced Information and Communications Technologies (AICT), Lviv, Ukraine, 2019, pp. 415-418, DOI: 10.1109/AIACT.2019.8847820.
Баранник В.В. Основы теории структурно-комбинаторного стеганографического кодирования: монография / В.В. Баранник, Д.В. Баранник, А.Е. Бекиров. Х.: Издательство «Лидер», 2017. 256 с.
Kim-Hui Yap, Wenyang Liu, Yi Wang, Lap-Pui Chau. Bitstream-Corrupted JPEG Images Are Restorable: Two-Stage Compensation and Alignment Framework for Image Restoration. Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2023, PP. 9979-9988.
A. Alimpiev, V. Barannik, S. Podlesny, O. Suprun, A. Bekirov. The video information resources integrity concept by using binomial slots. 2017. XIIIth International Conference on Perspective Technologies and Methods in MEMS Design (MEMSTECH), Lviv, Ukraine, 2017, pp. 193-196, DOI: 10.1109/MEMSTECH.2017.7937564.
V. V. Barannik, A. V. Hahanova and V. N. Krivonos, "Coding tangible component of transforms to provide accessibility and integrity of video data," East-West Design & Test Symposium (EWDTS 2013), Rostov on Don, Russia, 2013, pp. 1-5, DOI: 10.1109/EWDTS.2013.6673179.
Songyang Zhang, Yuan Liu, Jiacheng Chen, Zhaohui Yu, Kai Chen, Dahua Lin. Improving Pixel-based MIM by Reducing Wasted Modeling Capability. 2023 IEEE/CVF International Conference on Computer Vision (ICCV). 2023. pp. 5338-5349. DOI: 10.1109/ICCV51070.2023.00494.
Rivest R. L., Shamir A., Adleman L. M. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM. 1978. Vol. 21. Iss. 2. P. 120–126. DOI: 10.1145/359340.359342.
V. Barannik and A. Shiryaev, "Quadrature compression of images in polyadic space," Proceedings of International Conference on Modern Problem of Radio Engineering, Telecommunications and Computer Science, 2012, pp. 422-422. INSPEC Accession Number: 12713484.
Belikova T. Decoding Method of Information-Psychological Destructions in the Phonetic Space of Information Resources. Advanced Trends in Information Theory (ATIT): proceedings of the 2nd IEEE International Conference, 2020. P. 87–91. https://ieeexplore.ieee.org/document/9349300.
Barannik, V. et al. (2023). A Method of Scrambling for the System of Cryptocompression of Codograms Service Components. In: Klymash, M., Luntovskyy, A., Beshley, M., Melnyk, I., Schill, A. (eds) Emerging Networking in the Digital Transformation Age. TCSET 2022. Lecture Notes in Electrical Engineering, vol 965. Springer, Cham. DOI: 10.1007/978-3-031-24963-1_26.
Zhuxian Liu, Yingkai Huang, Qiwen Wu, Xiaolong Liu. Robust image steganography against JPEG compression based on DCT residual modulation. Signal Processing. Vol. 219. 2024. DOI: 10.1016/j.sigpro.2024.109431.
Zhou J., X., Au O. C. , Liu Tang Y. Y. Designing an Efficient Image Encryption-Then-Compression System via Prediction Error Clustering and Random Permutation. IEEE Transactions on Information Forensics and Security. 2014. Vol. 9, No. 1. P. 39–50. DOI: 10.1109/TIFS.2013.2291625.
A. Krasnorutsky, R. Onyshchenko, D. Barannik and V. Barannik, "The Methods of Intellectual Processing of Video Frames in Coding Systems in Progress Aeromonitor to Increase Efficiency and Semantic Integrity," 2022 IEEE 4th International Conference on Advanced Trends in Information Theory (ATIT), Kyiv, Ukraine, 2022, pp. 53-56, DOI: 10.1109/ATIT58178.2022.10024208.
Guojun Fan, Zhibin Pan, Quan Zhou, Jing Dong, Xiaoran Zhang. Pixel type classification based reversible data hiding for hyperspectral images. Knowledge-Based Systems. – vol. 254. – 2022. DOI: 10.1016/j.knosys.2022.109606.
V. Barannik, S. Shulgin, N. Barannik and V. Barannik, "Method of Coding Subbands of Non-Homogeneous Spectrum of Video Segments in Uneven Diagonal Space," 2022 IEEE 4th International Conference on Advanced Trends in Information Theory (ATIT), Kyiv, Ukraine, 2022, pp. 72-75, DOI: 10.1109/ATIT58178.2022.10024236.
Tong Qiao, Shuai Wang, Xiangyang Luo, Zhiqiang Zhu. Robust steganography resisting JPEG compression by improving selection of cover element. Signal Processing. vol.183. 2021. DOI: 10.1016/j.sigpro.2021.108048.
Bo Liu, Xiuli Bi, Wuqing Yan, Bin Xiao, Weisheng Li, Xinbo Gao. Self-Supervised Image Local Forgery Detection by JPEG Compression Trace. - The Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI-23). vol. 37 (No. 1). pp. 232 – 240. DOI: 10.1609/aaai.v37i1.25095.
Shoko Imaizumi, Genki Hamano, Hitoshi Kiya. Effects of JPEG Compression on Vision Transformer Image Classification for Encryption-then-Compression Images. Sensors. vol.23. pp.1-19. 2023. DOI: 10.3390/s23073400.
Конахович Г.Ф Оценка эффективности методов стеганографического встраивания информации в спектральную область изображений / Г.Ф. Конахович // АСУ та прилади автоматики. 2014. Вип.168. С. 23 29.
Конахович Г. Ф., Пузиренко А. Ю. Компьютерна стеганографія. Теорія та практика [Текст]. Київ: МК-Пресс, 2016. 288 с.
Barannik V. et al. The method of masking overhead compaction in video compression systems, Radioelectronic and Computer Systems, 2(2021), 2021, 51 – 63. DOI: 10.32620/reks.2021.2.05.
Wong K. W. Image encryption using chaotic maps. Intelligent Computing Based on Chaos. 2009. Vol. 184. P. 333–354. DOI: 10.1007/978-3-540-95972-4_16.
Barannik V., Krasnorutsky A., Kolesnyk V., Barannik V., Pchelnikov S., Zeleny P. Method of compression and ensuring the fidelity of video images in infocommunication networks. Radioelectronic and computer systems, 2022, vol. 4, pp. 129-142. DOI: 10.32620/reks.2022.4.10.
Kiya, H., Aprilpyone, M., Kinoshita, Y., Imaizumi, S., Shiota, S. An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications. APSIPA Trans. Signal Inf. Process. 2022, 11, e11. DOI: 10.1561/116.00000048.
Aprilpyone, M.; Kiya, H. Privacy-Preserving Image Classification Using an Isotropic Network. IEEE Multimed. 2022. 29. pp. 23–33. DOI: 10.1109/MMUL.2022.3168441.
Задирака В.К.Статистический анализ систем с цифровыми водяными знаками / В.К. Задирака, Н.В. Кошкина, Л.Л. Никитенко // Штучный інтелект. 2008. №3. С. 315-324.
João Ascenso, Elena Alshina, Touradj Ebrahimi. The JPEG AI Standard: Providing Efficient Human and Machine Visual Data Consumption. IEEE MultiMedia. vol 30 (Issue 1). 2023. DOI: 10.1109/MMUL.2023.3245919.
Бараннік Д.В. Технологія приховування інформативного контенту в динамічному потоці відеосегментів // Наукоємні технології. 2023. №4. С. 408-415. DOI: 10.18372/2310-5461.60.18270.
Barannik V., Lytvinenko M., Okladnoy D., Suprun O. Description of the OFDM symbol with the help of mathematical laws. Analysis of technologies that were used in this case. 2017. 2nd International Conference on Advanced Information and Communication Technologies, AICT 2017 - Proceedings, art. no. 8020095, pp. 183-187. DOI: 10.1109/AIACT.2017.8020095.
Nikolay Ponomarenko, Lina Jin, Oleg Ieremeiev, Vladimir Lukin, Karen Egiazarian, Jaakko Astola, Benoit Vozel, Kacem Chehdi, Marco Carli, Federica Battisti, C-C Jay Kuo. Signal processing: Image communication, 2015, no. 30, pp. 57 – 77.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 В Бараннік

This work is licensed under a Creative Commons Attribution 4.0 International License.
The scientific journal adheres to the principles of Open Access and provides free, immediate, and permanent access to all published materials without financial, technical, or legal barriers for readers.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.




