[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN107172429A - Scalable video stream encryption method based on network code - Google Patents

Scalable video stream encryption method based on network code Download PDF

Info

Publication number
CN107172429A
CN107172429A CN201710346573.3A CN201710346573A CN107172429A CN 107172429 A CN107172429 A CN 107172429A CN 201710346573 A CN201710346573 A CN 201710346573A CN 107172429 A CN107172429 A CN 107172429A
Authority
CN
China
Prior art keywords
layer
data
gop
successively
packet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710346573.3A
Other languages
Chinese (zh)
Other versions
CN107172429B (en
Inventor
刘光军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Unversity of Arts and Science
Xian University
Original Assignee
Xian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian University filed Critical Xian University
Priority to CN201710346573.3A priority Critical patent/CN107172429B/en
Publication of CN107172429A publication Critical patent/CN107172429A/en
Application granted granted Critical
Publication of CN107172429B publication Critical patent/CN107172429B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/30Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using hierarchical techniques, e.g. scalability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/30Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using hierarchical techniques, e.g. scalability
    • H04N19/34Scalability techniques involving progressive bit-plane based encoding of the enhancement layer, e.g. fine granular scalability [FGS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/46Embedding additional information in the video signal during the compression process
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/63Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
    • H04N21/633Control signals issued by server directed to the network components or client
    • H04N21/6332Control signals issued by server directed to the network components or client directed to client
    • H04N21/6334Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key
    • H04N21/63345Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key by transmitting keys

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The invention discloses a kind of scalable video stream encryption method based on network code, specifically implement according to following steps:Precoding is carried out to video stream data first, image sets sequence is generated;Then incomplete randomization is carried out to each layer data block in the clear-text message in each picture group;Then linear random is individually carried out to top (minimum transmission priority layer) data, conversion is successively iterated according to the order to basal layer since secondary top (secondary minimum transmission priority layer), performing identical stochastic linear simultaneously to each data Layer and its adjacent low priority layer corresponding data combines;According to video quality subscription level, each receiving terminal is decoded using the method for successively inverse iteration.The quantization property of degree of safety when the present invention not only realizes video flowing safe incremental encoding, and the flexibility of data confidentiality degree and transmission of video coding and decoding in the application of different demands for security is realized, computation complexity is small, and encryption efficiency is high.

Description

Scalable video stream encryption method based on network code
Technical field
The invention belongs to technical field of data security, and in particular to a kind of scalable video stream encryption based on network code Method.
Background technology
Gradable video encoding can be effectively applicable to the video flowing high efficiency of transmission business in current heterogeneous network, and it can be very big Ground meets the different real-time traffic demands of a variety of heterogeneous terminals users.Priority encoding transmission PET (Priority Encoding Transmission) it is a kind of very important technology for realizing scalable video streaming.In this kind of technology, based on network The PET of coding has been considered to a kind of more effective rateless codes mode.Different from traditional PET, network code allows Combined transformation linearly or nonlinearly can be carried out in network before each intermediate node transmission to the information received, and compiled based on network The PET of code can significantly improve the overall video quality transmitted in erasure channel.
Although the PET based on network code can effectively strengthen transmission robustness and reliability, good channel can be provided A potential scalability problem in its safety applications is not solved in adaptive service, but application instantly:According to end The different subscription levels of end subscriber, the video data of different quality is provided for it.The solution of this problem has clearly a need for exploitation tool There is the multi-layer secure encryption scheme of low complex degree characteristic to ensure the data safety of different subscription levels.
Currently, video data scalability Confidentiality protection is realized by traditional cipher mode, but when number When being significantly increased according to flow, the expansion efficiency of the security of this mode will be very low.Specifically, these solutions are all It is to reduce the complexity of encoding and decoding by hiding key video sequence data (such as spatial domain, DCT coefficient).However, this method is adding In the case of close algorithms selection is inappropriate, the computing cost suitable with encrypting completely can be still brought to security system.It is basic former Because being that the security intensity that this kind of scheme is realized is difficult to quantify, security performance autgmentability is poor.Currently, it is enterprising in network abstract layer Row layered encryption mode is considered as effectively in legacy network, but it is not appropriate for the PET based on network code.It is based on The safety issue of the scalable video streaming of network code is a still unsolved key issue in current application.
The content of the invention
It is an object of the invention to provide a kind of scalable video stream encryption method based on network code, solve it is existing can The problem of scalable video stream security is poor.
The technical solution adopted in the present invention is:Scalable video stream encryption method based on network code, specifically according to Following steps are implemented:
Step 1:Information source is that each data Layer configures different protection keys, and to the booking reader of c layer video qualities Receiving terminal distributes the 1st layer to c layers of protection key k1,k2,…,kc, wherein 1≤c≤L, wherein L are total number of plies of data Layer;
Step 2:Information source video data is divided and is encoded to an image sets GOP sequence, and each GOP is divided into many numbers According to layer, spare bits fill corresponding redundancy zero data blocks in every layer;
Step 3:For each GOP, information source utilizes the protection key in step 1 to generate each layer coding information, respectively to every Each layer carries out safe coding in individual GOP;
Step 4:The method transmitted using network code of GOP packets after information source encodes step 3 is sent to receiving terminal;
Step 5:According to the video quality grade of service of subscription, receiving terminal decodes rule to receiving using network code GOP packets enter row decoding, encapsulated in continuously recovering steps 4 as many as possible from basal layer to quality layer data is subscribed to, enter And perform successively inverse iteration and layer randomization inverse operation to complete the decryption of different user subscription data layer.
The features of the present invention is also resided in:
In step 2:
Layer based on each GOP is encoded as L layer, the 1st layer, remaining L-1 layers be enhancement layer;From the 1st layer to L layers, respectively The transmission priority of layer data is successively reduced;
Jth layer video data volume is by r in each GOPjRepresent, jth layer video data are divided into ljBlock, then every piece includes nj =rj/qljIndividual encoding domain FqOn character, except ljOutside individual data block, jth layer spare bits need to fill lL-ljIndividual redundancy zero is counted According to block, wherein, j=1,2 ..., L;
Each layer data block quantity meets l in each GOP1< l2< ... < lLAnd l1> 1;
Each layer data will be arranged according to priority in transmission from the 1st layer to top L layers by row descending, and composition is initial to be compiled Code data structure.
Step 3 is specially:
Step 3.1:Layer block incomplete randomization:For i-th layer, i takes 1,2 successively ..., L, i-th layer of information source message character It is divided and is encoded into liIndividual data block, these data chunks are into encoding domain FqUpper dimension is li×niMatrix Mi, to the number of this layer It is as follows according to block portion point randomisation process:
Step 3.1.1:Utilize i-th layer of protection key kiWith random number generator G1Produce ti×niIndividual domain FqOn it is random Number, wherein ti< li, construction dimension is ti×niRandom matrix HiIt is l with dimensioni×niMatrix Ni, wherein NiPreceding tiOK It is derived from matrix Hi, rear li-tiRow element is zero;
Step 3.1.2:Calculate randomizing data result Di=Mi+Ni
Step 3.2:Successively iteration is encoded:From top to basal layer, conversion is iterated in reverse order, successively to adjacent Two layers carry out domain FqOn linear random combination, be specially:
Step 3.2.1:To top, L layers of protection key k are utilizedLWith random number generator G2Produce lL 2Individual domain FqOn Non-zero random number, array structure lLRank non-singular matrix RL, then calculate CL=RL·DL
Step 3.2.2:To i-th layer, wherein, i takes L-1, L-2 ..., 1 successively, and information source utilizes i-th layer of protection key kiWith Random number generator G2ProduceIndividual domain FqOn non-zero random number, array structure liRank non-singular matrix Ri, then calculateWhereinRepresent video data carrying Matrix Ci+1Preceding liOK, and
Step 4 is specially:
Step 4.1:Each row data encoded in step 3 are added header packet information by information source respectively, and are packaged into GOP numbers According to bag;
Step 4.2:Row data in GOP after encapsulation are added header packet information by information source, and the packet after encapsulation is sent Into communication channel;The packet received is stored in order caching by each intermediate transmission node in network;When a hair Send time slot interim, then result is forwarded to next node, directly by the bag that intermediate node will be stored in random combine buffer area It is sent to these packets to receiving terminal.
For have subscribed c layer video qualities and receive the recipient of τ Line independent packet in step 5, its data Bag decoding and decryption situation are as follows:
A, τ < l1
Packet in current GOP, which can not carry out instant network decoding or the GOP, to be skipped, unless data cached The packet for having the basal layer comprising fresh information before time-out enters buffer area;
b、lk-1≤ τ < lk
①2≤k≤c:The 1st layer of data message to -1 layer of kth can be decoded, and then can perform successively inverse iteration and layer The inverse operation of randomization completes decryption;
2. c < k≤L:The 1st layer of packet to -1 layer of kth can be decoded by network, but because user subscribes to the limit of authority System, only the 1st layer to c layers of data message can perform successively inverse iteration and layer randomization inverse operation, so as to correct Decryption.
The beneficial effects of the invention are as follows:Scalable video stream encryption method of the invention based on network code is first original Stochastic variable is introduced in message, linear random conversion is secondly implemented again, the randomization for completing origination message is encrypted safely Function, rationally and effectively can be measured or be quantified to the security intensity that safe coding is realized;The present invention is based on network code Scalable video stream encryption method realize scalable coding and decoding function of both security and hierarchical transmission.This is not only protected The high safety intensity and prioritised transmission of high priority layer have been demonstrate,proved, and has realized the scalability incremental compilation to low priority layer Code;Scalable video stream encryption method of the invention based on network code, realizes data in the application of different demands for security and protects The flexibility of density and transmission of video coding and decoding, computation complexity is small, and encryption efficiency is high.
Brief description of the drawings
Fig. 1 is the flow chart of scalable video stream encryption method of the present invention;
Fig. 2 is the initial GOP units construction exemplary plot of information source in scalable video stream encryption method of the present invention;
Fig. 3 is scalable video stream encryption method middle level of the present invention block incomplete randomization and successively iteration encoding operation is illustrated Figure;
Fig. 4 is for different GOP sizes and legacy packets encryption method in scalable video stream encryption method of the present invention Between cryptographic calculation amount compare diagram.
Embodiment
The present invention is described in detail with reference to the accompanying drawings and detailed description.
Scalable video stream encryption method of the invention based on network code, as shown in figure 1, specific real according to following steps Apply:
Step 1:Information source is that each data Layer configures different protection keys, and to the booking reader of c layer video qualities Receiving terminal distributes the 1st layer to c layers of protection key k1,k2,…,kc, wherein 1≤c≤L, wherein L are total number of plies of data Layer;
Step 2:As shown in Fig. 2 information source video data, which is divided, is encoded to an image sets GOP (Group of Pictures, image sets) sequence, each GOP, which is divided into multiple data Layers, every layer spare bits and fills corresponding redundancy zero, to be counted According to block;With l in Fig. 2d-ld-1Exemplified by=1, wherein d=2,3 ..., L;
Layer based on each GOP is encoded as L layer, the 1st layer, remaining L-1 layers be enhancement layer;From the 1st layer to L layers, respectively The transmission priority of layer data is successively reduced;
Jth layer video data volume is by r in each GOPjRepresent, jth layer video data are divided into ljBlock, then every piece includes nj =rj/qljIndividual encoding domain FqOn character, except ljOutside individual data block, jth layer spare bits need to fill lL-ljIndividual redundancy zero is counted According to block, wherein, j=1,2 ..., L;
Each layer data block quantity meets l in each GOP1< l2< ... < lLAnd l1> 1;
Each layer data will be arranged according to priority in transmission from the 1st layer to top L layers by row descending, and composition is initial to be compiled Code data structure.
Step 3:As shown in figure 3, for each GOP, information source utilizes the protection key in step 1 to generate each layer coding letter Breath, carries out safe coding to each layer in each GOP respectively, is specially:
Step 3.1:Layer block incomplete randomization:For i-th layer, i takes 1,2 successively ..., L, i-th layer of information source message character It is divided and is encoded into liIndividual data block, these data chunks are into encoding domain FqUpper dimension is li×niMatrix Mi, to the number of this layer It is as follows according to block portion point randomisation process:
Step 3.1.1:Utilize i-th layer of protection key kiWith random number generator G1Produce ti×niIndividual domain FqOn it is random Number, wherein ti< li, construction dimension is ti×niRandom matrix HiIt is l with dimensioni×niMatrix Ni, wherein NiPreceding tiOK It is derived from matrix Hi, rear li-tiRow element is zero;
Step 3.1.2:Calculate randomizing data result Di=Mi+Ni
Step 3.2:Successively iteration is encoded:From top to basal layer, conversion is iterated in reverse order, successively to adjacent Two layers carry out domain FqOn linear random combination, be specially:
Step 3.2.1:To top, L layers of protection key k are utilizedLWith random number generator G2ProduceIndividual domain FqOn Non-zero random number, array structure lLRank non-singular matrix RL, then calculates CL=RL·DL
Step 3.2.2:To i-th layer, wherein, i takes L-1, L-2 ..., 1 successively, and information source utilizes i-th layer of protection key kiWith Random number generator G2ProduceIndividual domain FqOn non-zero random number, array structure liRank non-singular matrix Ri, then calculateWhereinRepresent video data carrying Matrix Ci+1Preceding liOK, and
Step 4:As shown in Fig. 2 the GOP packets after information source encodes step 3 are sent out using the method for network code transmission Receiving terminal is sent to, is specially:
Step 4.1:As shown in Fig. 2 each row data encoded in step 3 are added header packet information by information source respectively, and It is packaged into GOP packets;
Step 4.2:Row data in GOP after encapsulation are added header packet information by information source, and the packet after encapsulation is sent Into communication channel;The packet received is stored in order caching by each intermediate transmission node in network;When a hair Send time slot interim, then result is forwarded to next node, directly by the bag that intermediate node will be stored in random combine buffer area It is sent to these packets to receiving terminal.
Step 5:According to the video quality grade of service of subscription, receiving terminal decodes rule to receiving using network code GOP packets enter row decoding, encapsulated in continuously recovering steps 4.1 as many as possible from basal layer to subscribing to quality layer data, And then perform successively inverse iteration and layer randomization inverse operation to complete the decryption of different user subscription data layer.
For have subscribed c layer video qualities and receive the recipient of τ Line independent packet in step 5, its data Bag decoding and decryption situation are as follows:
A, τ < l1
Packet in current GOP, which can not carry out instant network decoding or the GOP, to be skipped, unless data cached The packet for having the basal layer comprising fresh information before time-out enters buffer area;
b、lk-1≤ τ < lk
①2≤k≤c:The 1st layer of data message to -1 layer of kth can be decoded, and then can perform successively inverse iteration and layer The inverse operation of randomization completes decryption;
2. c < k≤L:The 1st layer of packet to -1 layer of kth can be decoded by network, but because user subscribes to the limit of authority System, only the 1st layer to c layers of data message can perform successively inverse iteration and layer randomization inverse operation, so as to correct Decryption.
The actual performance of the present invention can be compared by following experiment to be further illustrated:
The data block of each layer of experiment regulation has identical size, and lk+1-lk=5 (k=1,2 ..., L-1).For Different GOP sizes, the cryptographic calculation amount between the present invention and legacy packets encryption method are compared, as shown in Figure 4.Knot Fruit shows that present invention considerably reduces the data volume that encryption is needed in GOP.When GOP sequence scales gradually increase, present invention tool There is significant performance advantage.

Claims (5)

1. the scalable video stream encryption method based on network code, it is characterised in that specifically implement according to following steps:
Step 1:Information source is that each data Layer configures different protection keys, and is received to the booking reader of c layer video qualities The protection key k of the 1st layer to c layers of end distribution1,k2,…,kc, wherein 1≤c≤L, wherein L are total number of plies of data Layer;
Step 2:Information source video data is divided and is encoded to an image sets GOP sequence, and each GOP is divided into multiple data Layer, spare bits fill corresponding redundancy zero data blocks in every layer;
Step 3:For each GOP, information source utilizes the protection key in step 1 to generate each layer coding information, respectively to each GOP In each layer carry out safe coding;
Step 4:The method transmitted using network code of GOP packets after information source encodes step 3 is sent to receiving terminal;
Step 5:According to the video quality grade of service of subscription, receiving terminal decodes the regular GOP numbers to receiving using network code According to wrapping into row decoding, encapsulated in continuously recovering steps 4 as many as possible from basal layer to subscribing to quality layer data, and then perform Successively inverse iteration and layer randomization inverse operation complete the decryption of different user subscription data layer.
2. the scalable video stream encryption method according to claim 1 based on network code, it is characterised in that the step In rapid 2:
Layer based on each GOP is encoded as L layer, the 1st layer, remaining L-1 layers be enhancement layer;From the 1st layer to L layers, each number of plies According to transmission priority successively reduce;
Jth layer video data volume is by r in each GOPjRepresent, jth layer video data are divided into ljBlock, then every piece includes nj=rj/ qljIndividual encoding domain FqOn character, except ljOutside individual data block, jth layer spare bits need to fill lL-ljIndividual redundancy zero data blocks, Wherein, j=1,2 ..., L;
Each layer data block quantity meets l in each GOP1< l2< ... < lLAnd l1> 1;
Each layer data will be arranged according to priority in transmission from the 1st layer to top L layers by row descending, constitute initial code number According to structure.
3. the scalable video stream encryption method according to claim 1 based on network code, it is characterised in that the step Rapid 3 are specially:
Step 3.1:Layer block incomplete randomization:For i-th layer, i takes 1,2 successively ..., L, and i-th layer of information source message character is divided Cut and be encoded into liIndividual data block, these data chunks are into encoding domain FqUpper dimension is li×niMatrix Mi, to the data block of this layer Incomplete randomization process is as follows:
Step 3.1.1:Utilize i-th layer of protection key kiWith random number generator G1Produce ti×niIndividual domain FqOn random number, its Middle ti< li, construction dimension is ti×niRandom matrix HiIt is l with dimensioni×niMatrix Ni, wherein NiPreceding tiRow is derived from square Battle array Hi, rear li-tiRow element is zero;
Step 3.1.2:Calculate randomizing data result Di=Mi+Ni
Step 3.2:Successively iteration is encoded:Conversion is iterated in reverse order to basal layer from top, successively to adjacent two Layer carries out domain FqOn linear random combination, be specially:
Step 3.2.1:To top, L layers of protection key k are utilizedLWith random number generator G2ProduceIndividual domain FqOn non-zero Random number, array structure lLRank non-singular matrix RL, then calculate CL=RL·DL
Step 3.2.2:To i-th layer, wherein, i takes L-1, L-2 ..., 1 successively, and information source utilizes i-th layer of protection key kiAnd random number Maker G2ProduceIndividual domain FqOn non-zero random number, array structure liRank non-singular matrix Ri, then calculateWhereinRepresent video data carrying Matrix Ci+1Preceding liOK, and
4. the scalable video stream encryption method according to claim 3 based on network code, it is characterised in that the step Rapid 4 are specially:
Step 4.1:Each row data encoded in step 3 are added header packet information by information source respectively, and are packaged into GOP data Bag;
Step 4.2:Row data in GOP after encapsulation are added header packet information by information source, the packet after encapsulation are sent to logical Believe in channel;The packet received is stored in order caching by each intermediate transmission node in network;When sending for one Gap comes interim, and then result is forwarded to next node by the bag that intermediate node will be stored in random combine buffer area, until this A little packets are sent to receiving terminal.
5. the scalable video stream encryption method according to claim 3 based on network code, it is characterised in that the step For have subscribed c layer video qualities and receive the recipient of τ Line independent packet in rapid 5, the decoding of its packet is conciliate Close situation is as follows:
A, τ < l1
Packet in current GOP, which can not carry out instant network decoding or the GOP, to be skipped, unless in data cached time-out Before have the basal layer comprising fresh information packet enter buffer area;
b、lk-1≤ τ < lk
①2≤k≤c:The 1st layer of data message to -1 layer of kth can be decoded, and then can perform successively inverse iteration and layer is random The inverse operation of change completes decryption;
2. c < k≤L:The 1st layer of packet to -1 layer of kth can be decoded by network, but because user subscribes to the limitation of authority, Only the 1st layer to c layers of data message can perform successively inverse iteration and layer randomization inverse operation, so as to correctly be solved It is close.
CN201710346573.3A 2017-05-17 2017-05-17 Scalable video stream encryption method based on network code Active CN107172429B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710346573.3A CN107172429B (en) 2017-05-17 2017-05-17 Scalable video stream encryption method based on network code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710346573.3A CN107172429B (en) 2017-05-17 2017-05-17 Scalable video stream encryption method based on network code

Publications (2)

Publication Number Publication Date
CN107172429A true CN107172429A (en) 2017-09-15
CN107172429B CN107172429B (en) 2019-10-11

Family

ID=59815031

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710346573.3A Active CN107172429B (en) 2017-05-17 2017-05-17 Scalable video stream encryption method based on network code

Country Status (1)

Country Link
CN (1) CN107172429B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114390317A (en) * 2022-01-18 2022-04-22 山东点盾云网络科技有限公司 Encryption method and system for streaming video
WO2023206389A1 (en) * 2022-04-29 2023-11-02 京东方科技集团股份有限公司 Video transmission method and apparatus, electronic device, and readable medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1881873A (en) * 2005-06-17 2006-12-20 捷讯研究有限公司 Encoding messages for use in a communication system based on security classification status
CN101098478A (en) * 2006-06-29 2008-01-02 三星电子株式会社 Device and method for providing video stream with integrity
JP2008048447A (en) * 2007-09-26 2008-02-28 Dolby Lab Licensing Corp Time and resolution layer structure to apply encryption and watermark processing thereto in next generation television
CN101495030A (en) * 2006-07-28 2009-07-29 皇家飞利浦电子股份有限公司 Automatic transfer and identification of monitored data with hierarchical key management infrastructure
CN101610391A (en) * 2008-06-20 2009-12-23 韩国放送公社 Be used to protect the method and apparatus of scalable video coding contents
US20130064285A1 (en) * 2011-09-14 2013-03-14 Mobitv, Inc. Distributed scalable encoder resources for live streams
CN103546750A (en) * 2013-10-22 2014-01-29 中国人民解放军重庆通信学院 H.264 video encryption method based on region of interest
CN103716637A (en) * 2014-01-15 2014-04-09 北京工业大学 H.264 compressed domain layered video encryption method based on content analysis

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1881873A (en) * 2005-06-17 2006-12-20 捷讯研究有限公司 Encoding messages for use in a communication system based on security classification status
CN101098478A (en) * 2006-06-29 2008-01-02 三星电子株式会社 Device and method for providing video stream with integrity
CN101495030A (en) * 2006-07-28 2009-07-29 皇家飞利浦电子股份有限公司 Automatic transfer and identification of monitored data with hierarchical key management infrastructure
JP2008048447A (en) * 2007-09-26 2008-02-28 Dolby Lab Licensing Corp Time and resolution layer structure to apply encryption and watermark processing thereto in next generation television
CN101610391A (en) * 2008-06-20 2009-12-23 韩国放送公社 Be used to protect the method and apparatus of scalable video coding contents
US20130064285A1 (en) * 2011-09-14 2013-03-14 Mobitv, Inc. Distributed scalable encoder resources for live streams
CN103546750A (en) * 2013-10-22 2014-01-29 中国人民解放军重庆通信学院 H.264 video encryption method based on region of interest
CN103716637A (en) * 2014-01-15 2014-04-09 北京工业大学 H.264 compressed domain layered video encryption method based on content analysis

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘光军: ""安全网络编码及其应用"", 《中国博士学位论文全文数据库信息科技辑》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114390317A (en) * 2022-01-18 2022-04-22 山东点盾云网络科技有限公司 Encryption method and system for streaming video
CN114390317B (en) * 2022-01-18 2024-03-19 山东点盾云网络科技有限公司 Encryption method and system for streaming video
WO2023206389A1 (en) * 2022-04-29 2023-11-02 京东方科技集团股份有限公司 Video transmission method and apparatus, electronic device, and readable medium

Also Published As

Publication number Publication date
CN107172429B (en) 2019-10-11

Similar Documents

Publication Publication Date Title
CN102891999B (en) Combined image compression/encryption method based on compressed sensing
CN1852088B (en) Enciphering-deciphering method for flow medium transmission code flow and module
TWI445323B (en) Hybrid codec apparatus and method for data transferring
CN103414686B (en) A kind of view data secure transmission system supporting transparent transcoding
CN110299987B (en) Mega-rich-root problem solving method based on homomorphic encryption
Khan et al. An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box
CN108989287A (en) encryption method, device, terminal device and storage medium
CN108197484B (en) Method for realizing node data security in distributed storage environment
KR20130140938A (en) Apparatus and method for transmitting and receiving packet in broadcasting and communication system
CN116722977B (en) Conditional proxy re-encryption method based on SM9 cryptographic key
Taghouti et al. Reduction of padding overhead for RLNC media distribution with variable size packets
CN107172429B (en) Scalable video stream encryption method based on network code
CN106850182A (en) Video chaotic encryption method based on quantum cellular neural
Tang et al. A format compliant framework for HEVC selective encryption after encoding
CN114793167A (en) Network coding method, system and equipment based on block encryption and threshold sharing
CN101710964B (en) Method for enciphering and deciphering MPEG2 transport stream packets
CN109819438B (en) Fountain coding wireless data secure transmission method based on AES encryption
CN107222284A (en) A kind of fountain coding anti-eavesdropping transmission method in Internet of Things based on channel feedback
CN109245863A (en) The device and method for being used for transmission and receiving forward error correction packet
CN107845055B (en) Image encryption method for resisting Facebook compression
CN102065289A (en) Reliable video transmission method and device based on network coding
Mohamadi et al. A versatile chaotic cryptosystem with a novel substitution-permutation scheme for internet-of-drones photography
Jiang et al. An intra prediction mode-based video encryption algorithm in H. 264
Zhou et al. Chaos-based delay-constrained green security communications for fog-enabled information-centric multimedia network
CN108768923A (en) A kind of real-time encrypted method of chat of the Encryption Algorithm based on Quantum Reversible Logic circuit

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant