CN108199824A - Video encryption method and video flowing method for safety monitoring based on AES-CTR and chaos algorithm - Google Patents
Video encryption method and video flowing method for safety monitoring based on AES-CTR and chaos algorithm Download PDFInfo
- Publication number
- CN108199824A CN108199824A CN201810049368.5A CN201810049368A CN108199824A CN 108199824 A CN108199824 A CN 108199824A CN 201810049368 A CN201810049368 A CN 201810049368A CN 108199824 A CN108199824 A CN 108199824A
- Authority
- CN
- China
- Prior art keywords
- video
- encryption
- aes
- ctr
- chaos
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/60—Network streaming of media packets
- H04L65/75—Media network packet handling
- H04L65/765—Media network packet handling intermediate
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
Video encryption method and video flowing method for safety monitoring based on AES CTR and chaos algorithm, are related to video encryption method and video flowing method for safety monitoring.The problem of the problem of Video stream information safety of current household thecamera head is not high and encryption all videos conductance cause video flowing transmission delay.The present invention is first by chaos iteration initial key KcIt is sent into Logistic pseudo-random sequence generators, each iteration of chaotic maps can generate 32bits binary numbers, be handled respectively with result is carried out standard AES block encryptions after Counter value XOR operation after 4 iteration, AES key Key;Exclusive or is carried out after encryption with first 128bits clear packets block again to handle to obtain ciphertext block block;And so on, using concurrent operation by the key frame of H.264 video flowing all by being encrypted to ensure that the high securities of data.The present invention is used for the encryption of video and video flowing security monitoring.
Description
Technical field
The invention belongs to the video-encryption communications fields, are related to video encryption method and video flowing method for safety monitoring.
Background technology
With the fast development of Internet technology, IP Camera is widely used.However, household camera shooting at present
The video stream data of head mostly in the form of plaintext in public transfers on network, easily by criminal attacked, steal by video data.Cause
This, the video monitoring system of a set of high security is particularly important.
H.264 it is a kind of video-frequency compression method, it is compiled using intra prediction, inter-prediction, DCT variations and quantization and entropy
Original video data is carried out compression and forms the smaller H.264 video flowing of data volume by the multiple technologies such as code.It is most at present
Camera is all using h.264 video compression technology.AES is referred to as advanced encryption algorithm, is a kind of block encryption of high security
Algorithm.There are many encryption modes, such as ECB, CBC, OFB, CFB, CTR for it.Wherein CBC, OFB, CFB encryption mode can not carry out
Concurrent operation, CBC, CFB encryption mode have serious error propagation.And CTR encryption modes is safe in ECB, but CTR
Pattern its randomness when generating for encrypted Counter values is inadequate.
Big multi-cam is there are video data security risk at present, if using mode completely encrypted to video data again
The problem of video flowing transmission delay can be caused excessive.
Invention content
The present invention solves the problems, such as that the Video stream information safety of current household thecamera head is not high and encryption is whole
Video flowing leads to the problem of video flowing transmission delay.
Video encryption method based on AES-CTR and chaos algorithm, includes the following steps:
First by chaos iteration initial key KcIt is sent into Logistic pseudo-random sequence generators, chaotic maps change every time
In generation, generates 32bits binary numbers, and by 4 grey iterative generations, four binary numbers, four binary numbers form 128bits two-values
Result is carried out at standard AES block encryptions after the Counter value XOR operation of sequence, 128bits binary sequences and 128bits
Reason, AES key Key;Exclusive or is carried out with first 128bits clear packets block after encryption again to handle to obtain first ciphertext point
Chunking;
The binary number generated based on the 4th iteration continues 4 interative computations, generates the two-value of new 128bits
Sequence, then carry out result at standard AES block encryptions again after operation from one value is added to carry out XOR operation with Counter values
Reason, second ciphertext block block is obtained after encryption with second 128bits Plaintext block phase exclusive or again;
And so on, the key frame of H.264 video flowing is all encrypted.
Further, the process of each iteration of the chaotic maps is as follows:
Pseudo-random sequence is generated using Logistic chaotic maps, iterative formula is
xn+1=1- λ xn 2 (1)
Wherein, xn+1、xnRespectively random sequence, λ are Logistic parameters;Formula (1) is deformed into
a2xn+1=a2-λ(axn)2, a ≠ 0;
Enable zn=axn+ a obtains following formula:
λ=2 are enabled, Logistic mappings at this time show chaotic characteristic;The distribution of its iterative value generated is from statistically
From the point of view of class white noise feature;Next step chaos iteration formula can abbreviation be furtherThe iteration precision of chaos
It is 32, zn∈[0,232], a=232-1, 4z is calculated in an iterative processnWhen only need znTwo are moved to left, and is calculatedWhen only
Needing willMove to right 30.
The video flowing method for safety monitoring of video-encryption based on AES-CTR and chaos algorithm, including:
Step 1, IP Camera acquire original YUV/RGB video data transmissions and give embedded video encryption equipment;
H.264, step 2, embedded video encryption equipment will be regarded after the RTSP acquired from IP Camera stream decapsulations
Frequency flows, and carrying out protocal analysis to video flowing extracts key frame, according to the video-encryption side of the AES-CTR and chaos algorithm
Method is encrypted, and is packaged into RTMP protocol data packets later and is sent to SRS data transmitting servers;The SRS data forwardings
Server is streaming media server;
Step 3, video playing end pull encrypted video stream and encrypted video stream are decrypted, and then real-time, safety
Watch front end camera video stream information.
Further, the detailed process of the step 2 includes the following steps:
Video flowing is handled using FFMpeg and RTMP libraries;First to chaos sequence generator and AES block encryptions
Algorithm is initialized;
After being initialized to Encryption Algorithm, pass through av_register_all () and avformat_network_init
() function initialization encapsulation and decapsulation library and network library;
Then the webcam video stream information by RTSP protocol encapsulations is obtained, av_read_ is called after solving agreement
Frame () function reads a frame h.264 video data, terminates program if failure is read, and passes through NAL nets if success
Network is abstracted layer protocol and extracts the key frame of this frame data and be grouped, and is grouped as the block number evidence of several 128bits;It
It creates multithreading afterwards and calls the video encryption method parallel encryption key frame data of the AES-CTR and chaos algorithm;
Output flow context is created and is configured finally by AVFormatContext structures, and by encrypted data
It is packaged into RTMP protocol propellings to SRS data transmitting servers by order of packets.
Further, video playing end pulls encrypted video stream and encrypted video stream is decrypted, Jin Ershi in step 3
When, safety the process of viewing front end camera video stream information include the following steps:
AES-CTR and the relevant parameter of chaotic maps are initialized first;Reinitialize encapsulation/decapsulation and network library;
Then encrypted H.264 Video stream information and frame by frame is pulled to SRS data transmitting servers by RTMP agreements
It reads, terminates program if failure is read, decrypted accordingly if successfully searching for key frame data, after decryption
H.264 video flowing is decoded by decipher;YUV/RGB original video formats will be H.264 decoded into and be shown as over the display
Video information.
The invention has the advantages that:
Video flowing safety monitoring system the present invention is based on chaology and AES-CTR Encryption Algorithm overcomes AES-CTR
The shortcomings that algorithm Counter value randomnesss are bad is enhanced the randomness of Counter values by chaology, strengthens AES encryption
The safety of algorithm.Compared to existing ordinary video flow encryption method, of the invention the safety is improved more than 10%.This hair simultaneously
It is bright to employ parallel computation and only encrypted video stream key frame, the encryption quanta of the video data of reduction, therefore ensureing high safety
The transmission delay of video flowing also reduced while property.In the case where mobile phone signal provides network flow, transmission of video is delayed very
It is small.
Description of the drawings
Fig. 1 is chaotic maps and AES-CTR encryption principle block diagrams;
Fig. 2 is video flowing security monitoring schematic diagram.
Fig. 3 is the flow diagram of four kinds of steps 2 of specific embodiment;
Fig. 4 is the structure diagram of embedded video encryption equipment;
Fig. 5 is the flow diagram of step 3 in specific embodiment five;
Fig. 6 is the Video stream information that mobile phone end is not decrypted;
Fig. 7 is the Video stream information after mobile phone end decryption.
Specific embodiment
Specific embodiment one:Chaotic maps and AES-CTR encryption principle block diagrams are as shown in Figure 1;
Video encryption method based on AES-CTR and chaos algorithm, includes the following steps:
First by chaos iteration initial key KcIt is sent into Logistic pseudo-random sequence generators, chaotic maps change every time
In generation, can generate 32bits binary numbers, and by 4 grey iterative generations, four binary numbers, four binary numbers form 128bits bis-
Result is subjected to standard AES block encryptions after the Counter value XOR operation of value sequence, 128bits binary sequences and 128bits
Processing, AES key Key;Exclusive or is carried out after encryption with first 128bits clear packets block again to handle to obtain first ciphertext
Grouping block;
The binary number generated based on the 4th iteration continues 4 interative computations, generates the two-value of new 128bits
Sequence, then carry out result at standard AES block encryptions again after operation from one value is added to carry out XOR operation with Counter values
Reason, second ciphertext block block is obtained after encryption with second 128bits Plaintext block phase exclusive or again;
And so on, the key frame of H.264 video flowing is all encrypted, to ensure the high security of data.
Specific embodiment two:
The process of each iteration of chaotic maps described in present embodiment is as follows:
Pseudo-random sequence is generated using Logistic chaotic maps, iterative formula is
xn+1=1- λ xn 2 (1)
Wherein, xn+1、xnRepresent random sequence, λ be Logistic parameters, λ ∈ (0,2], xn∈(-1,1);Herein in order to
Formula (1) can be deformed by accelerating arithmetic speed, and both members are multiplied by a simultaneously2, i.e. a2xn+1=a2-λ(axn)2, a ≠ 0;
Enable zn=axn+ a obtains following formula:
λ=2 are enabled, Logistic mappings at this time show chaotic characteristic;The distribution of its iterative value generated is from statistically
From the point of view of class white noise feature;Next step chaos iteration formula can abbreviation be furtherDue to embedded video
Encryption equipment is using 32 arm processors, therefore the iteration precision of chaos is 32, so zn∈[0,232], a=232-1,
4z is calculated in an iterative processnWhen only need znTwo are moved to left, and is calculatedWhen only need byMove to right 30;Displacement fortune
It calculates speed and is considerably faster than multiplying speed, the generation speed of pseudo-random sequence can be accelerated in this way.
Other steps and parameter are same as the specific embodiment one.
Specific embodiment three:Video flowing security monitoring is as shown in Figure 2;
The video flowing method for safety monitoring of video-encryption based on AES-CTR and chaos algorithm, including:
Step 1, IP Camera 1 acquire original YUV/RGB (RGB and YUV are color spaces, for representing color) and regard
Frequency evidence is transferred to embedded video encryption equipment 2;
Step 2, embedded video encryption equipment 2 are by the RTSP acquired from IP Camera (Real Time Streaming
Protocol, real time streaming transport protocol) stream decapsulation after obtain H.264 video flowing, to video flowing carry out protocal analysis extract
Key frame is encrypted according to the AES-CTR described in specific embodiment one or two and the video encryption method of chaos algorithm, it
Post package is sent to SRS data transmitting servers 4 into RTMP protocol data packets, and router 3 is responsible for network packet forwarding;It is described
SRS data transmitting servers 4 be streaming media server;
Step 3, integrate corresponding decipherment algorithm video playing end 6 (such as PC computers or smart mobile phone) pull encrypted video
It flows and encrypted video stream is decrypted, and then viewing front end camera video stream information in real time, safe, router 5 is responsible for
Network packet forwards.
Human-computer interaction interface is built in PC ends by C++ and MFC technologies, program be internally integrated decipherment algorithm and
Ffmpeg, RTMP remove in library processing ciphertext video flowing, and (acquisition of video flowing is stream to be drawn to obtain from SRS servers by sending order
Take), video information shown on the display of PC ends by SDL technologies after decrypting video flowing.Mobile phone end writes App application journeys
Sequence is similar with PC ends.
Specific embodiment four:
The detailed process of step 2 described in present embodiment includes the following steps:
As shown in figure 3, video flowing is handled using FFMpeg and RTMP libraries;First to chaos sequence generator and
AES block encryption algorithms are initialized;
After being initialized to Encryption Algorithm, pass through av_register_all () and avformat_network_init
() function initialization encapsulation and decapsulation library and network library;
Then the webcam video stream information by RTSP protocol encapsulations is obtained, av_read_ is called after solving agreement
Frame () function reads a frame h.264 video data, terminates program if failure is read, and passes through NAL nets if success
Network is abstracted layer protocol and extracts the key frame of this frame data and be grouped, and is grouped as the block number evidence of several 128bits;It
Multithreading is created afterwards and the AES-CTR described in calling specific embodiment one or two and the video encryption method of chaos algorithm are parallel
Cryptography key frame data shorten video flowing delay to accelerate enciphering rate;
Output flow context is created and is configured finally by AVFormatContext structures, and by encrypted data
It is packaged into RTMP protocol propellings to SRS data transmitting servers 4 by order of packets.
The core processor of embedded video encryption equipment is ARM11, in addition to this further includes Nand flash and power supply electricity
Road, double network interfaces, JTAG mouthfuls, the peripheral interfaces such as serial ports.The structure of embedded video encryption equipment is as shown in Figure 4.
Other steps and parameter are identical with specific embodiment three.
Specific embodiment five:
Video playing end pulls encrypted video stream and encrypted video stream is decrypted in present embodiment step 3, and then
In real time, the process of safe viewing front end camera video stream information includes the following steps:
As shown in figure 5, AES-CTR and the relevant parameter of chaotic maps are initialized first;Reinitialize encapsulation/decapsulation and
Network library;
Then encrypted H.264 Video stream information and frame by frame is pulled to SRS data transmitting servers by RTMP agreements
It reads, terminates program if failure is read, decrypted accordingly if successfully searching for key frame data, after decryption
H.264 video flowing is decoded by decipher;YUV/RGB original video formats will be H.264 decoded into and be shown as over the display
Video information.
Other steps and parameter are identical with specific embodiment three or four.
Illustrate that the present invention carries out the video monitoring effect of video-encryption and decryption by Fig. 6 and Fig. 7, Fig. 6 and Fig. 7 are respectively
Video stream information after video flowing that mobile phone end is not decrypted and decryption.The present invention is based on chaology and AES-CTR to encrypt
The video flowing safety monitoring system of algorithm overcomes the shortcomings that AES-CTR algorithm Counter value randomnesss are bad, is managed by chaos
By the randomness of enhancing Counter values, the safety of AES encryption algorithm is strengthened;In addition to this this algorithm can also carry out multi-thread
Journey concurrent operation, the enciphering rate for greatly accelerating video data frame reduce the delay of transmission of video;The further present invention
Propose the camera safe transmission method of complete set, including the Encryption Algorithm of modern high security, hardware configuration with
And the flow chart of encryption and decryption end software program;By experimental result it can be seen that its is safe, delay is small to disclosure satisfy that people
Demand.
Claims (5)
1. the video encryption method based on AES-CTR and chaos algorithm, which is characterized in that include the following steps:
First by chaos iteration initial key KcIt is sent into Logistic pseudo-random sequence generators, each iteration production of chaotic maps
Raw 32bits binary numbers, by 4 grey iterative generations, four binary numbers, four binary numbers form 128bits binary sequences,
Result is subjected to the processing of standard AES block encryptions after the Counter value XOR operation of 128bits binary sequences and 128bits,
AES key is Key;Exclusive or is carried out after encryption with first 128bits clear packets block again to handle to obtain first ciphertext block
Block;
The binary number generated based on the 4th iteration continues 4 interative computations, generates the two-value sequence of new 128bits
Row, then from one value is added to carry out XOR operation result is carried out to the processing of standard AES block encryptions again after operation with Counter values,
After encryption second ciphertext block block is obtained with second 128bits Plaintext block phase exclusive or again;
And so on, the key frame of H.264 video flowing is all encrypted.
2. the video encryption method according to claim 1 based on AES-CTR and chaos algorithm, which is characterized in that described
The process of each iteration of chaotic maps is as follows:
Pseudo-random sequence is generated using Logistic chaotic maps, iterative formula is
xn+1=1- λ xn 2 (1)
Wherein, xn+1、xnRespectively random sequence, λ are Logistic parameters;Formula (1) is deformed into
a2xn+1=a2-λ(axn)2, a ≠ 0;
Enable zn=axn+ a obtains following formula:
λ=2 are enabled, chaos iteration formula can abbreviation be furtherThe iteration precision of chaos is 32, zn∈
[0,232], a=232-1。
3. the video flowing method for safety monitoring of the video-encryption based on AES-CTR and chaos algorithm, which is characterized in that including:
Step 1, IP Camera (1) acquire original YUV/RGB video data transmissions and give embedded video encryption equipment (2);
H.264, step 2, embedded video encryption equipment (2) will be regarded after the RTSP acquired from IP Camera stream decapsulations
Frequency flows, and carrying out protocal analysis to video flowing extracts key frame according to the AES-CTR and chaos algorithm described in claims 1 or 2
Video encryption method be encrypted, be packaged into RTMP protocol data packets later and be sent to SRS data transmitting servers (4);Institute
The SRS data transmitting servers (4) stated are streaming media server;
Step 3, video playing end (6) pull encrypted video stream and encrypted video stream are decrypted, and then sight in real time, safe
See front end camera video stream information.
4. the video flowing method for safety monitoring of the video-encryption according to claim 3 based on AES-CTR and chaos algorithm,
It is characterized in that, the detailed process of the step 2 includes the following steps:
Video flowing is handled using FFMpeg and RTMP libraries;First to chaos sequence generator and AES block encryption algorithms
It is initialized;
After being initialized to Encryption Algorithm, pass through av_register_all () and avformat_network_init ()
Function initialization encapsulation and decapsulation library and network library;
Then the webcam video stream information by RTSP protocol encapsulations is obtained, av_read_frame () is called after solving agreement
Function reads a frame h.264 video data, terminates program if failure is read, and passes through NAL network abstract layers if success
Agreement is extracted the key frame of this frame data and is grouped, and is grouped as the block number evidence of several 128bits;It creates later more
Thread and the video encryption method parallel encryption key frame number for calling the AES-CTR and chaos algorithm described in claims 1 or 2
According to;
Output flow context is created and be configured finally by AVFormatContext structures, and encrypted data are pressed and are divided
Group sequence is packaged into RTMP protocol propellings to SRS data transmitting servers (4).
5. the video flowing security monitoring side of the video-encryption according to claim 3 or 4 based on AES-CTR and chaos algorithm
Method, which is characterized in that video playing end pulls encrypted video stream and encrypted video stream is decrypted in step 3, and then in real time,
The process of the viewing front end camera video stream information of safety includes the following steps:
AES-CTR and the relevant parameter of chaotic maps are initialized first;Reinitialize encapsulation/decapsulation and network library;
Then encrypted H.264 Video stream information is pulled to SRS data transmitting servers by RTMP agreements and read frame by frame,
Terminate program if failure is read, decrypted accordingly if successfully searching for key frame data, by the H.264 video after decryption
Stream is decoded by decipher;YUV/RGB original video formats will be H.264 decoded into and be shown as video information over the display.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810049368.5A CN108199824A (en) | 2018-01-18 | 2018-01-18 | Video encryption method and video flowing method for safety monitoring based on AES-CTR and chaos algorithm |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810049368.5A CN108199824A (en) | 2018-01-18 | 2018-01-18 | Video encryption method and video flowing method for safety monitoring based on AES-CTR and chaos algorithm |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108199824A true CN108199824A (en) | 2018-06-22 |
Family
ID=62589798
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810049368.5A Pending CN108199824A (en) | 2018-01-18 | 2018-01-18 | Video encryption method and video flowing method for safety monitoring based on AES-CTR and chaos algorithm |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108199824A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108718232A (en) * | 2018-08-17 | 2018-10-30 | 中国矿业大学 | Image encryption method based on AES and chaos |
CN109714162A (en) * | 2019-01-29 | 2019-05-03 | 南京南瑞国盾量子技术有限公司 | A kind of quantum key expansion method and system |
CN110427762A (en) * | 2019-07-23 | 2019-11-08 | 湖南匡安网络技术有限公司 | A kind of encryption and decryption approaches for realizing the transmission of electric power monitoring system Video security |
CN112714358A (en) * | 2020-12-29 | 2021-04-27 | 武汉烽火富华电气有限责任公司 | Video streaming media encryption and decryption transmission method and system |
CN113891171A (en) * | 2021-12-06 | 2022-01-04 | 杭州天宽科技有限公司 | Portable audio/video acquisition, storage and forwarding system based on RTMP/RTSP protocol |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3144433A1 (en) * | 2015-09-21 | 2017-03-22 | Oras Oy | An asssembly of a concealed sanitary fitting having a connecting member and a valve function unit |
CN107483173A (en) * | 2017-08-30 | 2017-12-15 | 广东工业大学 | A kind of video chaotic secret communication device and method |
-
2018
- 2018-01-18 CN CN201810049368.5A patent/CN108199824A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3144433A1 (en) * | 2015-09-21 | 2017-03-22 | Oras Oy | An asssembly of a concealed sanitary fitting having a connecting member and a valve function unit |
CN107483173A (en) * | 2017-08-30 | 2017-12-15 | 广东工业大学 | A kind of video chaotic secret communication device and method |
Non-Patent Citations (5)
Title |
---|
RESEARCHGATE: "CRYPTOGRAPHY:FOUNDATIONANDBASICCONCEPTS", 《RESEARCHGATE》 * |
S. KOTEL, F. SBIAA, M. ZEGHID, M. MACHHOUT, A. BAGANNE: "Efficient Hybrid Encryption System Based on Block Cipher and Chaos Generator", 《IEEE》 * |
张琴: "基于整数混合混沌的无线传感器分组加密算法", 《互联网》 * |
赵问道: "《多媒体技术原理与应用》", 31 December 2007 * |
陈谢: "基于H.265的视频加密算法研究与实现", 《CNKI中国硕士学位论文全文数据库信息科技辑》 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108718232A (en) * | 2018-08-17 | 2018-10-30 | 中国矿业大学 | Image encryption method based on AES and chaos |
CN109714162A (en) * | 2019-01-29 | 2019-05-03 | 南京南瑞国盾量子技术有限公司 | A kind of quantum key expansion method and system |
CN110427762A (en) * | 2019-07-23 | 2019-11-08 | 湖南匡安网络技术有限公司 | A kind of encryption and decryption approaches for realizing the transmission of electric power monitoring system Video security |
CN110427762B (en) * | 2019-07-23 | 2021-03-23 | 湖南匡安网络技术有限公司 | Encryption and decryption method for realizing video security transmission of power monitoring system |
CN112714358A (en) * | 2020-12-29 | 2021-04-27 | 武汉烽火富华电气有限责任公司 | Video streaming media encryption and decryption transmission method and system |
CN113891171A (en) * | 2021-12-06 | 2022-01-04 | 杭州天宽科技有限公司 | Portable audio/video acquisition, storage and forwarding system based on RTMP/RTSP protocol |
CN113891171B (en) * | 2021-12-06 | 2022-04-01 | 杭州天宽科技有限公司 | Portable audio/video acquisition, storage and forwarding system based on RTMP/RTSP protocol |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108199824A (en) | Video encryption method and video flowing method for safety monitoring based on AES-CTR and chaos algorithm | |
US7200232B2 (en) | Method and apparatus for symmetric-key decryption | |
JP4907518B2 (en) | Method and system for generating transcodable encrypted content | |
CN102123026A (en) | Chaos and hyperchaos based two-level video streaming media encryption method | |
Deshmukh et al. | Modified AES based algorithm for MPEG video encryption | |
CN108768606B (en) | Streaming media real-time encryption method and system based on video transmission | |
Wang et al. | Hash key-based video encryption scheme for H. 264/AVC | |
Dumbere et al. | Video encryption using AES algorithm | |
Huang et al. | A novel structure with dynamic operation mode for symmetric-key block ciphers | |
El-Shafai et al. | An efficient multimedia compression-encryption scheme using latin squares for securing Internet-of-things networks | |
Manupriya et al. | V⊕ SEE: Video secret sharing encryption technique | |
Gu et al. | A chaotic-cipher-based packet body encryption algorithm for JPEG2000 images | |
Megala et al. | Efficient high-end video data privacy preservation with integrity verification in cloud storage | |
Velliangiri | An Enhanced Multimedia Video Surveillance Security Using Wavelet Encryption Framework. | |
Abaas et al. | A new approach for video encryption based on modified AES algorithm | |
Sekhar et al. | A novel approach for hiding data in videos using network steganography methods | |
Shifa et al. | Efficient lightweight encryption algorithm for smart video applications | |
Castiglione et al. | Towards a lawfully secure and privacy preserving video surveillance system | |
Huang et al. | Research of H. 264 video transmission encryption technology based on blowfish algorithm | |
Roy et al. | Secured selective encryption algorithm for MPEG-2 video | |
Shanthakumari et al. | Data hiding in Image steganography using Range Technique for secure communication | |
JP2009213083A (en) | Image compression method and apparatus | |
Fan et al. | An unequal secure encryption scheme for H. 264/AVC video compression standard | |
Pappa et al. | A novel approach for watermarking in JPEG 2000 images using RC4-2S encryption | |
Sbiaa et al. | A Selective Video Encryption Scheme Based on a Block Cipher Algorithm and a Chaos Generator |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180622 |
|
WD01 | Invention patent application deemed withdrawn after publication |