Method for security coding of data received by optical sensors of unmanned aircraft systems


Аuthors

Grigoriev E. K.*, Sergeev A. M.

Saint Petersburg State University of Aerospace Instrumentation, 67, Bolshaya Morskaya str., Saint Petersburg, 190000, Russia

*e-mail: ev.grig95@gmail.com

Abstract

At the current time, unmanned aerial systems (UAS) are widely used in solving problems of real-time monitoring, ecological exploration, inspection of protected areas, as well as in the creation of various media content. One of the main channels for obtaining information is the optical channel.

The article discusses the relevance of the problem of the confidentiality ensuring of visual information received by optical sensors of (UAS). The inference is being made that the main factor hindering the implementation of algorithms data protection received by the civil UAS optical sensors is their computational complexity. In this respect, to searching for and implementing mathematically simple protection techniques seems to be expedient. The authors propose employing matrix masking as an alternative as an alternative to the cryptographic methods for the discussed problem solution. Masking specifics of the full-color images and video stream frames received by the UAS payload are being considered and analyzed. The results of the analysis reveal that masking results in color images reduction to a noise-like form with complete destruction of the contours of the original image, making any visual analytical analysis impossible in the case of equal image sizes and key-matrix sizes. The authors revealed that the full-color images masking has its own specifics in contrast to the halftone images masking, and, as a consequence, ensure better pixels mixing and better contours destruction of the initial image compared to the halftone images masking. Masking with the small-size key matrices thereby becomes possible.

Keywords:

unmanned aircraft systems, masking visual information, quasi-orthogonal matrices, ensuring confidentiality

References

  1. Avdonin I.A., Belyaev S.S., Bud'ko M.B. et al. Informatizatsiya i svyaz', 2018, no. 5, pp. 78-84.

  2. Zhilin S.V., Arkhipenko V.V., Basan E.S. Informatizatsiya i svyaz', 2022, no. 2, pp. 25-29. DOI: 10.34219/2078-8320-2022-13-2-25-29

  3. Ametinskii M.V. Trudy MAI, 2017, no. 94. URL: https://trudymai.ru/eng/published.php?ID=81066

  4. Alawida M., Teh J.S., Alshoura W.H. A New Image Encryption Algorithm Based on DNA State Machine for UAV Data Encryption, Drones, 2023, vol. 7 (38). DOI: 10.3390/drones7010038

  5. Sun X., et al. Physical Layer Security in UAV Systems: Challenges and Opportunities, IEEE Wireless Communications, 2019, vol. 26 (5), pp. 40-47. DOI: 10.1109/MWC.001.1900028

  6. Titov A.G., Neretin E.S., Dudkin S.O., Brusnikin P.M. Trudy MAI, 2019, no. 105. URL: https://trudymai.ru/eng/published.php?ID=104257

  7. Drone Industry Barometer 2022 White Paper. URL: https://droneii.com/project/drone-industry-barometer

  8. Itogi 2022 goda dlya rynka bespilotnoi aviatsii. URL: https://aeronext.aero/press_room/analytics/292234

  9. Drone Manufacturers Ranking 2022. URL: https://droneii.com/product/drone-manufacturers-ranking#download

  10. Scydio. Security Trust Center. URL: https://www.skydio.com/security-trust-center

  11. Parrot. Cybersecurity. URL: https://www.parrot.com/en/drones/anafi-ai/technical-documentation/cybersecurity

  12. DJI Security White Paper. URL: https://security.dji.com/data/resources/

  13. Sentsov A.A., Polyakov V.B., Ivanov S.A., Pomozova T.G. Trudy MAI, 2023, no. 129. URL: https://trudymai.ru/eng/published.php?ID=173033. DOI: 10.34759/trd-2023-129-21

  14. Hooper M. et al. Securing commercial WiFi-based UAVs from common security attacks, IEEE Military Communications Conference, 2016, pp. 1213-1218. DOI: 10.1109/MILCOM.2016.7795496

  15. Vostrikov A.A., Sergeev M.B., Litvinov M.Yu. Informatsionno-upravlyayushchie sistemy, 2015, no. 5 (78), pp. 116-123. DOI: 10.15217/issn1684-8853.2015.5.116

  16. Vostrikov A.A., Mishura O.V., Sergeev A.M., Chernyshev S.A. Fundamental'nye issledovaniya, 2015, no. 2 (ch. 24), pp. 5335–5339.

  17. Sergeev A.M. Izvestiya vysshikh uchebnykh zavedenii. Priborostroenie, 2023, vol. 66, no. 5, pp. 399-408. DOI: 10.17586/0021-3454-2023-66-5-399-408

  18. Balonin Yu.N., Vostrikov A.A., Sergeev M.B. Informatsionno-upravlyayushchie sistemy, 2012, no. 1 (56), pp. 92-93.

  19. Tokarevskiy I.V., Sentsov A.A., Sergeev M.B. Features of Matrix Masking of Digital Radar Images, 2022 Wave Electronics and Its Application in Information and Telecommunication Systems (WECONF), 2022, pp. 488-491. DOI: 10.1109/WECONF55058.2022.9803393

  20. Grigor'ev E.K., Sergeev A.M. Trudy uchebnykh zavedenii svyazi, 2023, vol. 9, no. 3, pp. 6-13. DOI: 10.31854/1813-324X-2023-9-3-6-13

  21. Erosh I.L., Sergeev A.M., Filatov G.P. Informatsionno-upravlyayushchie sistemy, 2007, no. 5 (30), pp. 20-22.

  22. Chernyshev S.A. Razrabotka i issledovanie metoda matrichnogo maskirovaniya videoinformatsii v global'no raspredelennykh sistemakh (Development and research of a method for matrix masking of video information in globally distributed systems), Ph. D. thesis, Saint-Petersburg, SUAI, 2017, 120 p.

  23. The Lenna Story. URL: http://lenna.org/

  24. Aerial images (512x512). URL: https://universe.roboflow.com/alex-shamota-hsa0p/aerial-images-512-512-2

  25. Balonin N.A., Balonin Yu.N., Vostrikov A.A., Sergeev M.B. Vestnik komp'yuternykh i informatsionnykh tekhnologii, 2014, no. 11 (125), pp. 51-56.

  26. Balonin N.A., Sergeev M.B. Informatsionno-upravlyayushchie sistemy, 2023, no. 3 (124), pp. 2-14. DOI: 10.31799/1684-8853-2023-3-2-15

  27. Balonin N.A., Sergeev M.B. Informatsionno-upravlyayushchie sistemy, 2022, no. 1 (116), pp. 2-7. DOI: 10.31799/1684-8853-2022-1-2-7

  28. Balonin N.A., Sergeev M.B., Suzdal' V.S. Trudy SPIIRAN, 2017, no. 5 (54), pp. 224-243. DOI: 10.15622/sp.54.10


Download

mai.ru — informational site MAI

Copyright © 2000-2024 by MAI

Вход