Method of Efficient Representation and Protection of Dynamic Objects in Video Streams based on the Technology of Their Movement Compensation
Journal: Cybersecurity: Education, Science, Technique (Vol.2, No. 2)Publication Date: 2019-03-03
Authors : Volodymyr V. Barannik Mykola V. Dvorsky Valeriy V. Barannik Anton D. Sorokun;
Page : 90-97
Keywords : videoconferencing; video stream; coding; motion compensation;
Abstract
Recently, special attention at implementation of the necessary level of information security is given to wireless technologies. Their use contributes to the growing demand for video information services. This is accompanied by an increase in the intensity of video streams and an increase in the processing time of video information, resulting in them far beyond the bandwidth of networks. Consequently, there is a contradiction that is caused: on the one hand, the growth of requirements for the quality of video information; on the other hand, difficulties in providing services of the given quality using wireless technologies.The article deals with issues related to the speed of the video stream of video information, depending on the quality of video data required, from spatial resolution and frame rate. The article concludes that with the trend of increasing the amount of video information in the complexes of the Hellenic Republic - it is necessary to improve the coding methods. In order to increase the efficiency of management and operational activities, it is proposed to improve the existing methods of encoding dynamic video streaming object with algorithms for motion compensation for video conferencing in the system of troop control. As a result, the article proposes a six-point algorithm for search, which can increase the efficiency and reduce the processing time of video information between subscribers. This approach, in the future, by improving the existing methods for encoding dynamic video streaming objects with algorithms of motion compensation, will improve the efficiency of using videoconferencing, for example, in the control system of troops.
Other Latest Articles
- Network-Centric Monitoring for Cyber Incidents in Sectors of Critical State Infrastructure
- Model of Investment Strategies of Transport Situational Centers in Cyber Security Systems
- Classification of Cyber Cruise of Informational Resources of Automated Banking Systems
- Comparison of Possible Approaches for the Development of Low-Budget Spectrum Analyzers for Sensor Networks in the Range of 2.4–2.5 GHz
- GERT Models of Technology of Cloudy Anti-Virus Defense
Last modified: 2019-03-03 20:56:45