
TRANSFORMANTS CODING TECHNOLOGY IN THE CONTROL SYSTEM OF VIDEO STREAMS BIT RATE
Author(s) -
Vladimir Barannik,
Yuriy Ryabukha,
Pavlo Hurzhii,
Віталій Вікторович Твердохліб,
Oleh Kulitsa
Publication year - 2020
Publication title -
kìberbezpeka. osvìta, nauka, tehnìka
Language(s) - English
Resource type - Journals
ISSN - 2663-4023
DOI - 10.28925/2663-4023.2020.9.115125
Subject(s) - computer science , jpeg , real time computing , jpeg 2000 , coding (social sciences) , data compression , computer hardware , computer vision , image compression , image processing , mathematics , statistics , image (mathematics)
The presence of an imbalance caused by an insufficient level of performance of modern and promising infocommunication technologies with respect to the information intensity of bit streams is shown. It is substantiated that a decrease in the level of imbalance is organized as a result of an increase in the efficiency of information processing technologies. It is substantiated that at the moment the JPEG platform is the basic concept for building compression technologies. In accordance with this, it is proposed to organize the further development of methods for processing video resources using individual components of the JPEG platform in the direction of increasing the integrity of information while ensuring the required level of its availability. The development of a syntactic representation of a significant microsegment of a video frame in spectral space based on local-positional coding of structural vectors of significant transformant components and lengths of zero components with the subsequent formation of uniform codograms, the positioning of which is determined by the dynamic ranges of the corresponding code values using structural bases, is presented. It is shown that the created video resource encoding methods based on the developed concept of processing significant segments provide a reduction in the delivery time of information under the conditions of the required level of its integrity, i.e. an increase in the level of information security is achieved