CN107172429A - Scalable video stream encryption method based on network code - Google Patents
Scalable video stream encryption method based on network code Download PDFInfo
- Publication number
- CN107172429A CN107172429A CN201710346573.3A CN201710346573A CN107172429A CN 107172429 A CN107172429 A CN 107172429A CN 201710346573 A CN201710346573 A CN 201710346573A CN 107172429 A CN107172429 A CN 107172429A
- Authority
- CN
- China
- Prior art keywords
- layer
- data
- gop
- successively
- packet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/30—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using hierarchical techniques, e.g. scalability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/30—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using hierarchical techniques, e.g. scalability
- H04N19/34—Scalability techniques involving progressive bit-plane based encoding of the enhancement layer, e.g. fine granular scalability [FGS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/46—Embedding additional information in the video signal during the compression process
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/63—Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
- H04N21/633—Control signals issued by server directed to the network components or client
- H04N21/6332—Control signals issued by server directed to the network components or client directed to client
- H04N21/6334—Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key
- H04N21/63345—Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key by transmitting keys
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The invention discloses a kind of scalable video stream encryption method based on network code, specifically implement according to following steps:Precoding is carried out to video stream data first, image sets sequence is generated;Then incomplete randomization is carried out to each layer data block in the clear-text message in each picture group;Then linear random is individually carried out to top (minimum transmission priority layer) data, conversion is successively iterated according to the order to basal layer since secondary top (secondary minimum transmission priority layer), performing identical stochastic linear simultaneously to each data Layer and its adjacent low priority layer corresponding data combines;According to video quality subscription level, each receiving terminal is decoded using the method for successively inverse iteration.The quantization property of degree of safety when the present invention not only realizes video flowing safe incremental encoding, and the flexibility of data confidentiality degree and transmission of video coding and decoding in the application of different demands for security is realized, computation complexity is small, and encryption efficiency is high.
Description
Technical field
The invention belongs to technical field of data security, and in particular to a kind of scalable video stream encryption based on network code
Method.
Background technology
Gradable video encoding can be effectively applicable to the video flowing high efficiency of transmission business in current heterogeneous network, and it can be very big
Ground meets the different real-time traffic demands of a variety of heterogeneous terminals users.Priority encoding transmission PET (Priority Encoding
Transmission) it is a kind of very important technology for realizing scalable video streaming.In this kind of technology, based on network
The PET of coding has been considered to a kind of more effective rateless codes mode.Different from traditional PET, network code allows
Combined transformation linearly or nonlinearly can be carried out in network before each intermediate node transmission to the information received, and compiled based on network
The PET of code can significantly improve the overall video quality transmitted in erasure channel.
Although the PET based on network code can effectively strengthen transmission robustness and reliability, good channel can be provided
A potential scalability problem in its safety applications is not solved in adaptive service, but application instantly:According to end
The different subscription levels of end subscriber, the video data of different quality is provided for it.The solution of this problem has clearly a need for exploitation tool
There is the multi-layer secure encryption scheme of low complex degree characteristic to ensure the data safety of different subscription levels.
Currently, video data scalability Confidentiality protection is realized by traditional cipher mode, but when number
When being significantly increased according to flow, the expansion efficiency of the security of this mode will be very low.Specifically, these solutions are all
It is to reduce the complexity of encoding and decoding by hiding key video sequence data (such as spatial domain, DCT coefficient).However, this method is adding
In the case of close algorithms selection is inappropriate, the computing cost suitable with encrypting completely can be still brought to security system.It is basic former
Because being that the security intensity that this kind of scheme is realized is difficult to quantify, security performance autgmentability is poor.Currently, it is enterprising in network abstract layer
Row layered encryption mode is considered as effectively in legacy network, but it is not appropriate for the PET based on network code.It is based on
The safety issue of the scalable video streaming of network code is a still unsolved key issue in current application.
The content of the invention
It is an object of the invention to provide a kind of scalable video stream encryption method based on network code, solve it is existing can
The problem of scalable video stream security is poor.
The technical solution adopted in the present invention is:Scalable video stream encryption method based on network code, specifically according to
Following steps are implemented:
Step 1:Information source is that each data Layer configures different protection keys, and to the booking reader of c layer video qualities
Receiving terminal distributes the 1st layer to c layers of protection key k1,k2,…,kc, wherein 1≤c≤L, wherein L are total number of plies of data Layer;
Step 2:Information source video data is divided and is encoded to an image sets GOP sequence, and each GOP is divided into many numbers
According to layer, spare bits fill corresponding redundancy zero data blocks in every layer;
Step 3:For each GOP, information source utilizes the protection key in step 1 to generate each layer coding information, respectively to every
Each layer carries out safe coding in individual GOP;
Step 4:The method transmitted using network code of GOP packets after information source encodes step 3 is sent to receiving terminal;
Step 5:According to the video quality grade of service of subscription, receiving terminal decodes rule to receiving using network code
GOP packets enter row decoding, encapsulated in continuously recovering steps 4 as many as possible from basal layer to quality layer data is subscribed to, enter
And perform successively inverse iteration and layer randomization inverse operation to complete the decryption of different user subscription data layer.
The features of the present invention is also resided in:
In step 2:
Layer based on each GOP is encoded as L layer, the 1st layer, remaining L-1 layers be enhancement layer;From the 1st layer to L layers, respectively
The transmission priority of layer data is successively reduced;
Jth layer video data volume is by r in each GOPjRepresent, jth layer video data are divided into ljBlock, then every piece includes nj
=rj/qljIndividual encoding domain FqOn character, except ljOutside individual data block, jth layer spare bits need to fill lL-ljIndividual redundancy zero is counted
According to block, wherein, j=1,2 ..., L;
Each layer data block quantity meets l in each GOP1< l2< ... < lLAnd l1> 1;
Each layer data will be arranged according to priority in transmission from the 1st layer to top L layers by row descending, and composition is initial to be compiled
Code data structure.
Step 3 is specially:
Step 3.1:Layer block incomplete randomization:For i-th layer, i takes 1,2 successively ..., L, i-th layer of information source message character
It is divided and is encoded into liIndividual data block, these data chunks are into encoding domain FqUpper dimension is li×niMatrix Mi, to the number of this layer
It is as follows according to block portion point randomisation process:
Step 3.1.1:Utilize i-th layer of protection key kiWith random number generator G1Produce ti×niIndividual domain FqOn it is random
Number, wherein ti< li, construction dimension is ti×niRandom matrix HiIt is l with dimensioni×niMatrix Ni, wherein NiPreceding tiOK
It is derived from matrix Hi, rear li-tiRow element is zero;
Step 3.1.2:Calculate randomizing data result Di=Mi+Ni;
Step 3.2:Successively iteration is encoded:From top to basal layer, conversion is iterated in reverse order, successively to adjacent
Two layers carry out domain FqOn linear random combination, be specially:
Step 3.2.1:To top, L layers of protection key k are utilizedLWith random number generator G2Produce lL 2Individual domain FqOn
Non-zero random number, array structure lLRank non-singular matrix RL, then calculate CL=RL·DL;
Step 3.2.2:To i-th layer, wherein, i takes L-1, L-2 ..., 1 successively, and information source utilizes i-th layer of protection key kiWith
Random number generator G2ProduceIndividual domain FqOn non-zero random number, array structure liRank non-singular matrix Ri, then calculateWhereinRepresent video data carrying Matrix Ci+1Preceding liOK, and
Step 4 is specially:
Step 4.1:Each row data encoded in step 3 are added header packet information by information source respectively, and are packaged into GOP numbers
According to bag;
Step 4.2:Row data in GOP after encapsulation are added header packet information by information source, and the packet after encapsulation is sent
Into communication channel;The packet received is stored in order caching by each intermediate transmission node in network;When a hair
Send time slot interim, then result is forwarded to next node, directly by the bag that intermediate node will be stored in random combine buffer area
It is sent to these packets to receiving terminal.
For have subscribed c layer video qualities and receive the recipient of τ Line independent packet in step 5, its data
Bag decoding and decryption situation are as follows:
A, τ < l1
Packet in current GOP, which can not carry out instant network decoding or the GOP, to be skipped, unless data cached
The packet for having the basal layer comprising fresh information before time-out enters buffer area;
b、lk-1≤ τ < lk
①2≤k≤c:The 1st layer of data message to -1 layer of kth can be decoded, and then can perform successively inverse iteration and layer
The inverse operation of randomization completes decryption;
2. c < k≤L:The 1st layer of packet to -1 layer of kth can be decoded by network, but because user subscribes to the limit of authority
System, only the 1st layer to c layers of data message can perform successively inverse iteration and layer randomization inverse operation, so as to correct
Decryption.
The beneficial effects of the invention are as follows:Scalable video stream encryption method of the invention based on network code is first original
Stochastic variable is introduced in message, linear random conversion is secondly implemented again, the randomization for completing origination message is encrypted safely
Function, rationally and effectively can be measured or be quantified to the security intensity that safe coding is realized;The present invention is based on network code
Scalable video stream encryption method realize scalable coding and decoding function of both security and hierarchical transmission.This is not only protected
The high safety intensity and prioritised transmission of high priority layer have been demonstrate,proved, and has realized the scalability incremental compilation to low priority layer
Code;Scalable video stream encryption method of the invention based on network code, realizes data in the application of different demands for security and protects
The flexibility of density and transmission of video coding and decoding, computation complexity is small, and encryption efficiency is high.
Brief description of the drawings
Fig. 1 is the flow chart of scalable video stream encryption method of the present invention;
Fig. 2 is the initial GOP units construction exemplary plot of information source in scalable video stream encryption method of the present invention;
Fig. 3 is scalable video stream encryption method middle level of the present invention block incomplete randomization and successively iteration encoding operation is illustrated
Figure;
Fig. 4 is for different GOP sizes and legacy packets encryption method in scalable video stream encryption method of the present invention
Between cryptographic calculation amount compare diagram.
Embodiment
The present invention is described in detail with reference to the accompanying drawings and detailed description.
Scalable video stream encryption method of the invention based on network code, as shown in figure 1, specific real according to following steps
Apply:
Step 1:Information source is that each data Layer configures different protection keys, and to the booking reader of c layer video qualities
Receiving terminal distributes the 1st layer to c layers of protection key k1,k2,…,kc, wherein 1≤c≤L, wherein L are total number of plies of data Layer;
Step 2:As shown in Fig. 2 information source video data, which is divided, is encoded to an image sets GOP (Group of
Pictures, image sets) sequence, each GOP, which is divided into multiple data Layers, every layer spare bits and fills corresponding redundancy zero, to be counted
According to block;With l in Fig. 2d-ld-1Exemplified by=1, wherein d=2,3 ..., L;
Layer based on each GOP is encoded as L layer, the 1st layer, remaining L-1 layers be enhancement layer;From the 1st layer to L layers, respectively
The transmission priority of layer data is successively reduced;
Jth layer video data volume is by r in each GOPjRepresent, jth layer video data are divided into ljBlock, then every piece includes nj
=rj/qljIndividual encoding domain FqOn character, except ljOutside individual data block, jth layer spare bits need to fill lL-ljIndividual redundancy zero is counted
According to block, wherein, j=1,2 ..., L;
Each layer data block quantity meets l in each GOP1< l2< ... < lLAnd l1> 1;
Each layer data will be arranged according to priority in transmission from the 1st layer to top L layers by row descending, and composition is initial to be compiled
Code data structure.
Step 3:As shown in figure 3, for each GOP, information source utilizes the protection key in step 1 to generate each layer coding letter
Breath, carries out safe coding to each layer in each GOP respectively, is specially:
Step 3.1:Layer block incomplete randomization:For i-th layer, i takes 1,2 successively ..., L, i-th layer of information source message character
It is divided and is encoded into liIndividual data block, these data chunks are into encoding domain FqUpper dimension is li×niMatrix Mi, to the number of this layer
It is as follows according to block portion point randomisation process:
Step 3.1.1:Utilize i-th layer of protection key kiWith random number generator G1Produce ti×niIndividual domain FqOn it is random
Number, wherein ti< li, construction dimension is ti×niRandom matrix HiIt is l with dimensioni×niMatrix Ni, wherein NiPreceding tiOK
It is derived from matrix Hi, rear li-tiRow element is zero;
Step 3.1.2:Calculate randomizing data result Di=Mi+Ni;
Step 3.2:Successively iteration is encoded:From top to basal layer, conversion is iterated in reverse order, successively to adjacent
Two layers carry out domain FqOn linear random combination, be specially:
Step 3.2.1:To top, L layers of protection key k are utilizedLWith random number generator G2ProduceIndividual domain FqOn
Non-zero random number, array structure lLRank non-singular matrix RL, then calculates CL=RL·DL;
Step 3.2.2:To i-th layer, wherein, i takes L-1, L-2 ..., 1 successively, and information source utilizes i-th layer of protection key kiWith
Random number generator G2ProduceIndividual domain FqOn non-zero random number, array structure liRank non-singular matrix Ri, then calculateWhereinRepresent video data carrying Matrix Ci+1Preceding liOK, and
Step 4:As shown in Fig. 2 the GOP packets after information source encodes step 3 are sent out using the method for network code transmission
Receiving terminal is sent to, is specially:
Step 4.1:As shown in Fig. 2 each row data encoded in step 3 are added header packet information by information source respectively, and
It is packaged into GOP packets;
Step 4.2:Row data in GOP after encapsulation are added header packet information by information source, and the packet after encapsulation is sent
Into communication channel;The packet received is stored in order caching by each intermediate transmission node in network;When a hair
Send time slot interim, then result is forwarded to next node, directly by the bag that intermediate node will be stored in random combine buffer area
It is sent to these packets to receiving terminal.
Step 5:According to the video quality grade of service of subscription, receiving terminal decodes rule to receiving using network code
GOP packets enter row decoding, encapsulated in continuously recovering steps 4.1 as many as possible from basal layer to subscribing to quality layer data,
And then perform successively inverse iteration and layer randomization inverse operation to complete the decryption of different user subscription data layer.
For have subscribed c layer video qualities and receive the recipient of τ Line independent packet in step 5, its data
Bag decoding and decryption situation are as follows:
A, τ < l1
Packet in current GOP, which can not carry out instant network decoding or the GOP, to be skipped, unless data cached
The packet for having the basal layer comprising fresh information before time-out enters buffer area;
b、lk-1≤ τ < lk
①2≤k≤c:The 1st layer of data message to -1 layer of kth can be decoded, and then can perform successively inverse iteration and layer
The inverse operation of randomization completes decryption;
2. c < k≤L:The 1st layer of packet to -1 layer of kth can be decoded by network, but because user subscribes to the limit of authority
System, only the 1st layer to c layers of data message can perform successively inverse iteration and layer randomization inverse operation, so as to correct
Decryption.
The actual performance of the present invention can be compared by following experiment to be further illustrated:
The data block of each layer of experiment regulation has identical size, and lk+1-lk=5 (k=1,2 ..., L-1).For
Different GOP sizes, the cryptographic calculation amount between the present invention and legacy packets encryption method are compared, as shown in Figure 4.Knot
Fruit shows that present invention considerably reduces the data volume that encryption is needed in GOP.When GOP sequence scales gradually increase, present invention tool
There is significant performance advantage.
Claims (5)
1. the scalable video stream encryption method based on network code, it is characterised in that specifically implement according to following steps:
Step 1:Information source is that each data Layer configures different protection keys, and is received to the booking reader of c layer video qualities
The protection key k of the 1st layer to c layers of end distribution1,k2,…,kc, wherein 1≤c≤L, wherein L are total number of plies of data Layer;
Step 2:Information source video data is divided and is encoded to an image sets GOP sequence, and each GOP is divided into multiple data
Layer, spare bits fill corresponding redundancy zero data blocks in every layer;
Step 3:For each GOP, information source utilizes the protection key in step 1 to generate each layer coding information, respectively to each GOP
In each layer carry out safe coding;
Step 4:The method transmitted using network code of GOP packets after information source encodes step 3 is sent to receiving terminal;
Step 5:According to the video quality grade of service of subscription, receiving terminal decodes the regular GOP numbers to receiving using network code
According to wrapping into row decoding, encapsulated in continuously recovering steps 4 as many as possible from basal layer to subscribing to quality layer data, and then perform
Successively inverse iteration and layer randomization inverse operation complete the decryption of different user subscription data layer.
2. the scalable video stream encryption method according to claim 1 based on network code, it is characterised in that the step
In rapid 2:
Layer based on each GOP is encoded as L layer, the 1st layer, remaining L-1 layers be enhancement layer;From the 1st layer to L layers, each number of plies
According to transmission priority successively reduce;
Jth layer video data volume is by r in each GOPjRepresent, jth layer video data are divided into ljBlock, then every piece includes nj=rj/
qljIndividual encoding domain FqOn character, except ljOutside individual data block, jth layer spare bits need to fill lL-ljIndividual redundancy zero data blocks,
Wherein, j=1,2 ..., L;
Each layer data block quantity meets l in each GOP1< l2< ... < lLAnd l1> 1;
Each layer data will be arranged according to priority in transmission from the 1st layer to top L layers by row descending, constitute initial code number
According to structure.
3. the scalable video stream encryption method according to claim 1 based on network code, it is characterised in that the step
Rapid 3 are specially:
Step 3.1:Layer block incomplete randomization:For i-th layer, i takes 1,2 successively ..., L, and i-th layer of information source message character is divided
Cut and be encoded into liIndividual data block, these data chunks are into encoding domain FqUpper dimension is li×niMatrix Mi, to the data block of this layer
Incomplete randomization process is as follows:
Step 3.1.1:Utilize i-th layer of protection key kiWith random number generator G1Produce ti×niIndividual domain FqOn random number, its
Middle ti< li, construction dimension is ti×niRandom matrix HiIt is l with dimensioni×niMatrix Ni, wherein NiPreceding tiRow is derived from square
Battle array Hi, rear li-tiRow element is zero;
Step 3.1.2:Calculate randomizing data result Di=Mi+Ni;
Step 3.2:Successively iteration is encoded:Conversion is iterated in reverse order to basal layer from top, successively to adjacent two
Layer carries out domain FqOn linear random combination, be specially:
Step 3.2.1:To top, L layers of protection key k are utilizedLWith random number generator G2ProduceIndividual domain FqOn non-zero
Random number, array structure lLRank non-singular matrix RL, then calculate CL=RL·DL;
Step 3.2.2:To i-th layer, wherein, i takes L-1, L-2 ..., 1 successively, and information source utilizes i-th layer of protection key kiAnd random number
Maker G2ProduceIndividual domain FqOn non-zero random number, array structure liRank non-singular matrix Ri, then calculateWhereinRepresent video data carrying Matrix Ci+1Preceding liOK, and
4. the scalable video stream encryption method according to claim 3 based on network code, it is characterised in that the step
Rapid 4 are specially:
Step 4.1:Each row data encoded in step 3 are added header packet information by information source respectively, and are packaged into GOP data
Bag;
Step 4.2:Row data in GOP after encapsulation are added header packet information by information source, the packet after encapsulation are sent to logical
Believe in channel;The packet received is stored in order caching by each intermediate transmission node in network;When sending for one
Gap comes interim, and then result is forwarded to next node by the bag that intermediate node will be stored in random combine buffer area, until this
A little packets are sent to receiving terminal.
5. the scalable video stream encryption method according to claim 3 based on network code, it is characterised in that the step
For have subscribed c layer video qualities and receive the recipient of τ Line independent packet in rapid 5, the decoding of its packet is conciliate
Close situation is as follows:
A, τ < l1
Packet in current GOP, which can not carry out instant network decoding or the GOP, to be skipped, unless in data cached time-out
Before have the basal layer comprising fresh information packet enter buffer area;
b、lk-1≤ τ < lk
①2≤k≤c:The 1st layer of data message to -1 layer of kth can be decoded, and then can perform successively inverse iteration and layer is random
The inverse operation of change completes decryption;
2. c < k≤L:The 1st layer of packet to -1 layer of kth can be decoded by network, but because user subscribes to the limitation of authority,
Only the 1st layer to c layers of data message can perform successively inverse iteration and layer randomization inverse operation, so as to correctly be solved
It is close.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710346573.3A CN107172429B (en) | 2017-05-17 | 2017-05-17 | Scalable video stream encryption method based on network code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710346573.3A CN107172429B (en) | 2017-05-17 | 2017-05-17 | Scalable video stream encryption method based on network code |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107172429A true CN107172429A (en) | 2017-09-15 |
CN107172429B CN107172429B (en) | 2019-10-11 |
Family
ID=59815031
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710346573.3A Active CN107172429B (en) | 2017-05-17 | 2017-05-17 | Scalable video stream encryption method based on network code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107172429B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114390317A (en) * | 2022-01-18 | 2022-04-22 | 山东点盾云网络科技有限公司 | Encryption method and system for streaming video |
WO2023206389A1 (en) * | 2022-04-29 | 2023-11-02 | 京东方科技集团股份有限公司 | Video transmission method and apparatus, electronic device, and readable medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1881873A (en) * | 2005-06-17 | 2006-12-20 | 捷讯研究有限公司 | Encoding messages for use in a communication system based on security classification status |
CN101098478A (en) * | 2006-06-29 | 2008-01-02 | 三星电子株式会社 | Device and method for providing video stream with integrity |
JP2008048447A (en) * | 2007-09-26 | 2008-02-28 | Dolby Lab Licensing Corp | Time and resolution layer structure to apply encryption and watermark processing thereto in next generation television |
CN101495030A (en) * | 2006-07-28 | 2009-07-29 | 皇家飞利浦电子股份有限公司 | Automatic transfer and identification of monitored data with hierarchical key management infrastructure |
CN101610391A (en) * | 2008-06-20 | 2009-12-23 | 韩国放送公社 | Be used to protect the method and apparatus of scalable video coding contents |
US20130064285A1 (en) * | 2011-09-14 | 2013-03-14 | Mobitv, Inc. | Distributed scalable encoder resources for live streams |
CN103546750A (en) * | 2013-10-22 | 2014-01-29 | 中国人民解放军重庆通信学院 | H.264 video encryption method based on region of interest |
CN103716637A (en) * | 2014-01-15 | 2014-04-09 | 北京工业大学 | H.264 compressed domain layered video encryption method based on content analysis |
-
2017
- 2017-05-17 CN CN201710346573.3A patent/CN107172429B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1881873A (en) * | 2005-06-17 | 2006-12-20 | 捷讯研究有限公司 | Encoding messages for use in a communication system based on security classification status |
CN101098478A (en) * | 2006-06-29 | 2008-01-02 | 三星电子株式会社 | Device and method for providing video stream with integrity |
CN101495030A (en) * | 2006-07-28 | 2009-07-29 | 皇家飞利浦电子股份有限公司 | Automatic transfer and identification of monitored data with hierarchical key management infrastructure |
JP2008048447A (en) * | 2007-09-26 | 2008-02-28 | Dolby Lab Licensing Corp | Time and resolution layer structure to apply encryption and watermark processing thereto in next generation television |
CN101610391A (en) * | 2008-06-20 | 2009-12-23 | 韩国放送公社 | Be used to protect the method and apparatus of scalable video coding contents |
US20130064285A1 (en) * | 2011-09-14 | 2013-03-14 | Mobitv, Inc. | Distributed scalable encoder resources for live streams |
CN103546750A (en) * | 2013-10-22 | 2014-01-29 | 中国人民解放军重庆通信学院 | H.264 video encryption method based on region of interest |
CN103716637A (en) * | 2014-01-15 | 2014-04-09 | 北京工业大学 | H.264 compressed domain layered video encryption method based on content analysis |
Non-Patent Citations (1)
Title |
---|
刘光军: ""安全网络编码及其应用"", 《中国博士学位论文全文数据库信息科技辑》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114390317A (en) * | 2022-01-18 | 2022-04-22 | 山东点盾云网络科技有限公司 | Encryption method and system for streaming video |
CN114390317B (en) * | 2022-01-18 | 2024-03-19 | 山东点盾云网络科技有限公司 | Encryption method and system for streaming video |
WO2023206389A1 (en) * | 2022-04-29 | 2023-11-02 | 京东方科技集团股份有限公司 | Video transmission method and apparatus, electronic device, and readable medium |
Also Published As
Publication number | Publication date |
---|---|
CN107172429B (en) | 2019-10-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102891999B (en) | Combined image compression/encryption method based on compressed sensing | |
CN1852088B (en) | Enciphering-deciphering method for flow medium transmission code flow and module | |
TWI445323B (en) | Hybrid codec apparatus and method for data transferring | |
CN103414686B (en) | A kind of view data secure transmission system supporting transparent transcoding | |
CN110299987B (en) | Mega-rich-root problem solving method based on homomorphic encryption | |
Khan et al. | An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box | |
CN108989287A (en) | encryption method, device, terminal device and storage medium | |
CN108197484B (en) | Method for realizing node data security in distributed storage environment | |
KR20130140938A (en) | Apparatus and method for transmitting and receiving packet in broadcasting and communication system | |
CN116722977B (en) | Conditional proxy re-encryption method based on SM9 cryptographic key | |
Taghouti et al. | Reduction of padding overhead for RLNC media distribution with variable size packets | |
CN107172429B (en) | Scalable video stream encryption method based on network code | |
CN106850182A (en) | Video chaotic encryption method based on quantum cellular neural | |
Tang et al. | A format compliant framework for HEVC selective encryption after encoding | |
CN114793167A (en) | Network coding method, system and equipment based on block encryption and threshold sharing | |
CN101710964B (en) | Method for enciphering and deciphering MPEG2 transport stream packets | |
CN109819438B (en) | Fountain coding wireless data secure transmission method based on AES encryption | |
CN107222284A (en) | A kind of fountain coding anti-eavesdropping transmission method in Internet of Things based on channel feedback | |
CN109245863A (en) | The device and method for being used for transmission and receiving forward error correction packet | |
CN107845055B (en) | Image encryption method for resisting Facebook compression | |
CN102065289A (en) | Reliable video transmission method and device based on network coding | |
Mohamadi et al. | A versatile chaotic cryptosystem with a novel substitution-permutation scheme for internet-of-drones photography | |
Jiang et al. | An intra prediction mode-based video encryption algorithm in H. 264 | |
Zhou et al. | Chaos-based delay-constrained green security communications for fog-enabled information-centric multimedia network | |
CN108768923A (en) | A kind of real-time encrypted method of chat of the Encryption Algorithm based on Quantum Reversible Logic circuit |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |