Abstract

To meet the reliability requirements the visual information transmitted over the radio lines over noisy background must be protected using cryptographic protection methods. That is why an agreed application of processing and protection of visual information has been proposed, which consists in maintaining natural redundancy of visual information in the process of compression and in the subsequent use for protection against the mistakes arising in the radio line. The conceptually new approach to consideration of cryptographic information security subsystem not as a part of the information processing closed system, which is isolated and indifferent with respect to above and below levels, but rather as an element of a complex processing and information security system is suggested. A combination of the image blocks permutation and a cipher gamma superimposing is considered as a mechanism of cryptographic protection of visual information. Such combination of classical cryptographic algorithms does not multiply the errors, while the distortions of the separate bits arising by the influence of interference in the radio line are eliminated due to natural redundancy of visual information and noise-immune coding. A software tool has been developed to carry out a correlation analysis of the combined cryptoprotection method stability and the qualitative assessment of its use. A block diagram of the algorithm for synthesizing the parameter of noise-immune encoding and a software tool performing a complete enumeration of the algorithm parameters are developed. A distinctive feature of the software is the ability to obtain statistical data for solving optimization problems to increase the efficiency of the passage of visual information and therefore to increase its reliability. As an example, the parameter values of the optimal noise-immune code for an image frame of 200 KB are provided.

Highlights

  • Element of a complex processing and information security system is suggested

  • A combination of the image blocks permutation and a cipher gamma superimposing is considered as a mechanism of cryptographic protection of visual information

  • Such combination of classical cryptographic algorithms does not multiply the errors, while the distortions of the separate bits arising by the influence of interference in the radio line are eliminated due to natural redundancy of visual information and noiseimmune coding

Read more

Summary

Получатель информации

Основным механизмом обеспечения достоверности видовой информации по критерию минимизации вероятности необнаруживаемой ошибки Pнеоб.ош является применение циклических кодов, обнаруживающих ошибки, и решающей обратной связи для повтора искаженных пакетов. Результирующее качество изображения определяется эффективностью методов обработки и защиты информации и может оцениваться показателями: СКО, PSNR, Pпр. Рассмотренная типовая модель системы обработки и защиты видовой информации в комплексах БЛА отражает следующие противоречия:. Между необходимостью обеспечения криптозащиты видовой информации, с одной стороны, и «чувствительностью» криптоалгоритмов к ошибкам, возникающим в канале связи с помехами, с другой. 1. Модель системы обработки и защиты видовой информации Целью статьи является разработка согласованных методов (способов) обработки и защиты видовой информации с целью нахождения баланса между ее качеством и временем обработки, криптозащиты и передачи. Функционально-временная последовательность этапов обработки и защиты видовой информации представлена на рис. Функционально-временная последовательность этапов обработки и защиты видовой информации представлена на рис. 2

Помехоустойчивое кодирование
Ci n
Изменение значений параметров

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.