CN108199824A - Video encryption method and video flowing method for safety monitoring based on AES-CTR and chaos algorithm - Google Patents

Video encryption method and video flowing method for safety monitoring based on AES-CTR and chaos algorithm Download PDF

Info

Publication number
CN108199824A
CN108199824A CN201810049368.5A CN201810049368A CN108199824A CN 108199824 A CN108199824 A CN 108199824A CN 201810049368 A CN201810049368 A CN 201810049368A CN 108199824 A CN108199824 A CN 108199824A
Authority
CN
China
Prior art keywords
video
encryption
aes
ctr
chaos
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810049368.5A
Other languages
Chinese (zh)
Inventor
丁群
范春雷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Heilongjiang University
Original Assignee
Heilongjiang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Heilongjiang University filed Critical Heilongjiang University
Priority to CN201810049368.5A priority Critical patent/CN108199824A/en
Publication of CN108199824A publication Critical patent/CN108199824A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/60Network streaming of media packets
    • H04L65/75Media network packet handling
    • H04L65/765Media network packet handling intermediate
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

Video encryption method and video flowing method for safety monitoring based on AES CTR and chaos algorithm, are related to video encryption method and video flowing method for safety monitoring.The problem of the problem of Video stream information safety of current household thecamera head is not high and encryption all videos conductance cause video flowing transmission delay.The present invention is first by chaos iteration initial key KcIt is sent into Logistic pseudo-random sequence generators, each iteration of chaotic maps can generate 32bits binary numbers, be handled respectively with result is carried out standard AES block encryptions after Counter value XOR operation after 4 iteration, AES key Key;Exclusive or is carried out after encryption with first 128bits clear packets block again to handle to obtain ciphertext block block;And so on, using concurrent operation by the key frame of H.264 video flowing all by being encrypted to ensure that the high securities of data.The present invention is used for the encryption of video and video flowing security monitoring.

Description

Video encryption method and video flowing security monitoring based on AES-CTR and chaos algorithm Method
Technical field
The invention belongs to the video-encryption communications fields, are related to video encryption method and video flowing method for safety monitoring.
Background technology
With the fast development of Internet technology, IP Camera is widely used.However, household camera shooting at present The video stream data of head mostly in the form of plaintext in public transfers on network, easily by criminal attacked, steal by video data.Cause This, the video monitoring system of a set of high security is particularly important.
H.264 it is a kind of video-frequency compression method, it is compiled using intra prediction, inter-prediction, DCT variations and quantization and entropy Original video data is carried out compression and forms the smaller H.264 video flowing of data volume by the multiple technologies such as code.It is most at present Camera is all using h.264 video compression technology.AES is referred to as advanced encryption algorithm, is a kind of block encryption of high security Algorithm.There are many encryption modes, such as ECB, CBC, OFB, CFB, CTR for it.Wherein CBC, OFB, CFB encryption mode can not carry out Concurrent operation, CBC, CFB encryption mode have serious error propagation.And CTR encryption modes is safe in ECB, but CTR Pattern its randomness when generating for encrypted Counter values is inadequate.
Big multi-cam is there are video data security risk at present, if using mode completely encrypted to video data again The problem of video flowing transmission delay can be caused excessive.
Invention content
The present invention solves the problems, such as that the Video stream information safety of current household thecamera head is not high and encryption is whole Video flowing leads to the problem of video flowing transmission delay.
Video encryption method based on AES-CTR and chaos algorithm, includes the following steps:
First by chaos iteration initial key KcIt is sent into Logistic pseudo-random sequence generators, chaotic maps change every time In generation, generates 32bits binary numbers, and by 4 grey iterative generations, four binary numbers, four binary numbers form 128bits two-values Result is carried out at standard AES block encryptions after the Counter value XOR operation of sequence, 128bits binary sequences and 128bits Reason, AES key Key;Exclusive or is carried out with first 128bits clear packets block after encryption again to handle to obtain first ciphertext point Chunking;
The binary number generated based on the 4th iteration continues 4 interative computations, generates the two-value of new 128bits Sequence, then carry out result at standard AES block encryptions again after operation from one value is added to carry out XOR operation with Counter values Reason, second ciphertext block block is obtained after encryption with second 128bits Plaintext block phase exclusive or again;
And so on, the key frame of H.264 video flowing is all encrypted.
Further, the process of each iteration of the chaotic maps is as follows:
Pseudo-random sequence is generated using Logistic chaotic maps, iterative formula is
xn+1=1- λ xn 2 (1)
Wherein, xn+1、xnRespectively random sequence, λ are Logistic parameters;Formula (1) is deformed into
a2xn+1=a2-λ(axn)2, a ≠ 0;
Enable zn=axn+ a obtains following formula:
λ=2 are enabled, Logistic mappings at this time show chaotic characteristic;The distribution of its iterative value generated is from statistically From the point of view of class white noise feature;Next step chaos iteration formula can abbreviation be furtherThe iteration precision of chaos It is 32, zn∈[0,232], a=232-1, 4z is calculated in an iterative processnWhen only need znTwo are moved to left, and is calculatedWhen only Needing willMove to right 30.
The video flowing method for safety monitoring of video-encryption based on AES-CTR and chaos algorithm, including:
Step 1, IP Camera acquire original YUV/RGB video data transmissions and give embedded video encryption equipment;
H.264, step 2, embedded video encryption equipment will be regarded after the RTSP acquired from IP Camera stream decapsulations Frequency flows, and carrying out protocal analysis to video flowing extracts key frame, according to the video-encryption side of the AES-CTR and chaos algorithm Method is encrypted, and is packaged into RTMP protocol data packets later and is sent to SRS data transmitting servers;The SRS data forwardings Server is streaming media server;
Step 3, video playing end pull encrypted video stream and encrypted video stream are decrypted, and then real-time, safety Watch front end camera video stream information.
Further, the detailed process of the step 2 includes the following steps:
Video flowing is handled using FFMpeg and RTMP libraries;First to chaos sequence generator and AES block encryptions Algorithm is initialized;
After being initialized to Encryption Algorithm, pass through av_register_all () and avformat_network_init () function initialization encapsulation and decapsulation library and network library;
Then the webcam video stream information by RTSP protocol encapsulations is obtained, av_read_ is called after solving agreement Frame () function reads a frame h.264 video data, terminates program if failure is read, and passes through NAL nets if success Network is abstracted layer protocol and extracts the key frame of this frame data and be grouped, and is grouped as the block number evidence of several 128bits;It It creates multithreading afterwards and calls the video encryption method parallel encryption key frame data of the AES-CTR and chaos algorithm;
Output flow context is created and is configured finally by AVFormatContext structures, and by encrypted data It is packaged into RTMP protocol propellings to SRS data transmitting servers by order of packets.
Further, video playing end pulls encrypted video stream and encrypted video stream is decrypted, Jin Ershi in step 3 When, safety the process of viewing front end camera video stream information include the following steps:
AES-CTR and the relevant parameter of chaotic maps are initialized first;Reinitialize encapsulation/decapsulation and network library;
Then encrypted H.264 Video stream information and frame by frame is pulled to SRS data transmitting servers by RTMP agreements It reads, terminates program if failure is read, decrypted accordingly if successfully searching for key frame data, after decryption H.264 video flowing is decoded by decipher;YUV/RGB original video formats will be H.264 decoded into and be shown as over the display Video information.
The invention has the advantages that:
Video flowing safety monitoring system the present invention is based on chaology and AES-CTR Encryption Algorithm overcomes AES-CTR The shortcomings that algorithm Counter value randomnesss are bad is enhanced the randomness of Counter values by chaology, strengthens AES encryption The safety of algorithm.Compared to existing ordinary video flow encryption method, of the invention the safety is improved more than 10%.This hair simultaneously It is bright to employ parallel computation and only encrypted video stream key frame, the encryption quanta of the video data of reduction, therefore ensureing high safety The transmission delay of video flowing also reduced while property.In the case where mobile phone signal provides network flow, transmission of video is delayed very It is small.
Description of the drawings
Fig. 1 is chaotic maps and AES-CTR encryption principle block diagrams;
Fig. 2 is video flowing security monitoring schematic diagram.
Fig. 3 is the flow diagram of four kinds of steps 2 of specific embodiment;
Fig. 4 is the structure diagram of embedded video encryption equipment;
Fig. 5 is the flow diagram of step 3 in specific embodiment five;
Fig. 6 is the Video stream information that mobile phone end is not decrypted;
Fig. 7 is the Video stream information after mobile phone end decryption.
Specific embodiment
Specific embodiment one:Chaotic maps and AES-CTR encryption principle block diagrams are as shown in Figure 1;
Video encryption method based on AES-CTR and chaos algorithm, includes the following steps:
First by chaos iteration initial key KcIt is sent into Logistic pseudo-random sequence generators, chaotic maps change every time In generation, can generate 32bits binary numbers, and by 4 grey iterative generations, four binary numbers, four binary numbers form 128bits bis- Result is subjected to standard AES block encryptions after the Counter value XOR operation of value sequence, 128bits binary sequences and 128bits Processing, AES key Key;Exclusive or is carried out after encryption with first 128bits clear packets block again to handle to obtain first ciphertext Grouping block;
The binary number generated based on the 4th iteration continues 4 interative computations, generates the two-value of new 128bits Sequence, then carry out result at standard AES block encryptions again after operation from one value is added to carry out XOR operation with Counter values Reason, second ciphertext block block is obtained after encryption with second 128bits Plaintext block phase exclusive or again;
And so on, the key frame of H.264 video flowing is all encrypted, to ensure the high security of data.
Specific embodiment two:
The process of each iteration of chaotic maps described in present embodiment is as follows:
Pseudo-random sequence is generated using Logistic chaotic maps, iterative formula is
xn+1=1- λ xn 2 (1)
Wherein, xn+1、xnRepresent random sequence, λ be Logistic parameters, λ ∈ (0,2], xn∈(-1,1);Herein in order to Formula (1) can be deformed by accelerating arithmetic speed, and both members are multiplied by a simultaneously2, i.e. a2xn+1=a2-λ(axn)2, a ≠ 0;
Enable zn=axn+ a obtains following formula:
λ=2 are enabled, Logistic mappings at this time show chaotic characteristic;The distribution of its iterative value generated is from statistically From the point of view of class white noise feature;Next step chaos iteration formula can abbreviation be furtherDue to embedded video Encryption equipment is using 32 arm processors, therefore the iteration precision of chaos is 32, so zn∈[0,232], a=232-1, 4z is calculated in an iterative processnWhen only need znTwo are moved to left, and is calculatedWhen only need byMove to right 30;Displacement fortune It calculates speed and is considerably faster than multiplying speed, the generation speed of pseudo-random sequence can be accelerated in this way.
Other steps and parameter are same as the specific embodiment one.
Specific embodiment three:Video flowing security monitoring is as shown in Figure 2;
The video flowing method for safety monitoring of video-encryption based on AES-CTR and chaos algorithm, including:
Step 1, IP Camera 1 acquire original YUV/RGB (RGB and YUV are color spaces, for representing color) and regard Frequency evidence is transferred to embedded video encryption equipment 2;
Step 2, embedded video encryption equipment 2 are by the RTSP acquired from IP Camera (Real Time Streaming Protocol, real time streaming transport protocol) stream decapsulation after obtain H.264 video flowing, to video flowing carry out protocal analysis extract Key frame is encrypted according to the AES-CTR described in specific embodiment one or two and the video encryption method of chaos algorithm, it Post package is sent to SRS data transmitting servers 4 into RTMP protocol data packets, and router 3 is responsible for network packet forwarding;It is described SRS data transmitting servers 4 be streaming media server;
Step 3, integrate corresponding decipherment algorithm video playing end 6 (such as PC computers or smart mobile phone) pull encrypted video It flows and encrypted video stream is decrypted, and then viewing front end camera video stream information in real time, safe, router 5 is responsible for Network packet forwards.
Human-computer interaction interface is built in PC ends by C++ and MFC technologies, program be internally integrated decipherment algorithm and Ffmpeg, RTMP remove in library processing ciphertext video flowing, and (acquisition of video flowing is stream to be drawn to obtain from SRS servers by sending order Take), video information shown on the display of PC ends by SDL technologies after decrypting video flowing.Mobile phone end writes App application journeys Sequence is similar with PC ends.
Specific embodiment four:
The detailed process of step 2 described in present embodiment includes the following steps:
As shown in figure 3, video flowing is handled using FFMpeg and RTMP libraries;First to chaos sequence generator and AES block encryption algorithms are initialized;
After being initialized to Encryption Algorithm, pass through av_register_all () and avformat_network_init () function initialization encapsulation and decapsulation library and network library;
Then the webcam video stream information by RTSP protocol encapsulations is obtained, av_read_ is called after solving agreement Frame () function reads a frame h.264 video data, terminates program if failure is read, and passes through NAL nets if success Network is abstracted layer protocol and extracts the key frame of this frame data and be grouped, and is grouped as the block number evidence of several 128bits;It Multithreading is created afterwards and the AES-CTR described in calling specific embodiment one or two and the video encryption method of chaos algorithm are parallel Cryptography key frame data shorten video flowing delay to accelerate enciphering rate;
Output flow context is created and is configured finally by AVFormatContext structures, and by encrypted data It is packaged into RTMP protocol propellings to SRS data transmitting servers 4 by order of packets.
The core processor of embedded video encryption equipment is ARM11, in addition to this further includes Nand flash and power supply electricity Road, double network interfaces, JTAG mouthfuls, the peripheral interfaces such as serial ports.The structure of embedded video encryption equipment is as shown in Figure 4.
Other steps and parameter are identical with specific embodiment three.
Specific embodiment five:
Video playing end pulls encrypted video stream and encrypted video stream is decrypted in present embodiment step 3, and then In real time, the process of safe viewing front end camera video stream information includes the following steps:
As shown in figure 5, AES-CTR and the relevant parameter of chaotic maps are initialized first;Reinitialize encapsulation/decapsulation and Network library;
Then encrypted H.264 Video stream information and frame by frame is pulled to SRS data transmitting servers by RTMP agreements It reads, terminates program if failure is read, decrypted accordingly if successfully searching for key frame data, after decryption H.264 video flowing is decoded by decipher;YUV/RGB original video formats will be H.264 decoded into and be shown as over the display Video information.
Other steps and parameter are identical with specific embodiment three or four.
Illustrate that the present invention carries out the video monitoring effect of video-encryption and decryption by Fig. 6 and Fig. 7, Fig. 6 and Fig. 7 are respectively Video stream information after video flowing that mobile phone end is not decrypted and decryption.The present invention is based on chaology and AES-CTR to encrypt The video flowing safety monitoring system of algorithm overcomes the shortcomings that AES-CTR algorithm Counter value randomnesss are bad, is managed by chaos By the randomness of enhancing Counter values, the safety of AES encryption algorithm is strengthened;In addition to this this algorithm can also carry out multi-thread Journey concurrent operation, the enciphering rate for greatly accelerating video data frame reduce the delay of transmission of video;The further present invention Propose the camera safe transmission method of complete set, including the Encryption Algorithm of modern high security, hardware configuration with And the flow chart of encryption and decryption end software program;By experimental result it can be seen that its is safe, delay is small to disclosure satisfy that people Demand.

Claims (5)

1. the video encryption method based on AES-CTR and chaos algorithm, which is characterized in that include the following steps:
First by chaos iteration initial key KcIt is sent into Logistic pseudo-random sequence generators, each iteration production of chaotic maps Raw 32bits binary numbers, by 4 grey iterative generations, four binary numbers, four binary numbers form 128bits binary sequences, Result is subjected to the processing of standard AES block encryptions after the Counter value XOR operation of 128bits binary sequences and 128bits, AES key is Key;Exclusive or is carried out after encryption with first 128bits clear packets block again to handle to obtain first ciphertext block Block;
The binary number generated based on the 4th iteration continues 4 interative computations, generates the two-value sequence of new 128bits Row, then from one value is added to carry out XOR operation result is carried out to the processing of standard AES block encryptions again after operation with Counter values, After encryption second ciphertext block block is obtained with second 128bits Plaintext block phase exclusive or again;
And so on, the key frame of H.264 video flowing is all encrypted.
2. the video encryption method according to claim 1 based on AES-CTR and chaos algorithm, which is characterized in that described The process of each iteration of chaotic maps is as follows:
Pseudo-random sequence is generated using Logistic chaotic maps, iterative formula is
xn+1=1- λ xn 2 (1)
Wherein, xn+1、xnRespectively random sequence, λ are Logistic parameters;Formula (1) is deformed into
a2xn+1=a2-λ(axn)2, a ≠ 0;
Enable zn=axn+ a obtains following formula:
λ=2 are enabled, chaos iteration formula can abbreviation be furtherThe iteration precision of chaos is 32, zn∈ [0,232], a=232-1
3. the video flowing method for safety monitoring of the video-encryption based on AES-CTR and chaos algorithm, which is characterized in that including:
Step 1, IP Camera (1) acquire original YUV/RGB video data transmissions and give embedded video encryption equipment (2);
H.264, step 2, embedded video encryption equipment (2) will be regarded after the RTSP acquired from IP Camera stream decapsulations Frequency flows, and carrying out protocal analysis to video flowing extracts key frame according to the AES-CTR and chaos algorithm described in claims 1 or 2 Video encryption method be encrypted, be packaged into RTMP protocol data packets later and be sent to SRS data transmitting servers (4);Institute The SRS data transmitting servers (4) stated are streaming media server;
Step 3, video playing end (6) pull encrypted video stream and encrypted video stream are decrypted, and then sight in real time, safe See front end camera video stream information.
4. the video flowing method for safety monitoring of the video-encryption according to claim 3 based on AES-CTR and chaos algorithm, It is characterized in that, the detailed process of the step 2 includes the following steps:
Video flowing is handled using FFMpeg and RTMP libraries;First to chaos sequence generator and AES block encryption algorithms It is initialized;
After being initialized to Encryption Algorithm, pass through av_register_all () and avformat_network_init () Function initialization encapsulation and decapsulation library and network library;
Then the webcam video stream information by RTSP protocol encapsulations is obtained, av_read_frame () is called after solving agreement Function reads a frame h.264 video data, terminates program if failure is read, and passes through NAL network abstract layers if success Agreement is extracted the key frame of this frame data and is grouped, and is grouped as the block number evidence of several 128bits;It creates later more Thread and the video encryption method parallel encryption key frame number for calling the AES-CTR and chaos algorithm described in claims 1 or 2 According to;
Output flow context is created and be configured finally by AVFormatContext structures, and encrypted data are pressed and are divided Group sequence is packaged into RTMP protocol propellings to SRS data transmitting servers (4).
5. the video flowing security monitoring side of the video-encryption according to claim 3 or 4 based on AES-CTR and chaos algorithm Method, which is characterized in that video playing end pulls encrypted video stream and encrypted video stream is decrypted in step 3, and then in real time, The process of the viewing front end camera video stream information of safety includes the following steps:
AES-CTR and the relevant parameter of chaotic maps are initialized first;Reinitialize encapsulation/decapsulation and network library;
Then encrypted H.264 Video stream information is pulled to SRS data transmitting servers by RTMP agreements and read frame by frame, Terminate program if failure is read, decrypted accordingly if successfully searching for key frame data, by the H.264 video after decryption Stream is decoded by decipher;YUV/RGB original video formats will be H.264 decoded into and be shown as video information over the display.
CN201810049368.5A 2018-01-18 2018-01-18 Video encryption method and video flowing method for safety monitoring based on AES-CTR and chaos algorithm Pending CN108199824A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810049368.5A CN108199824A (en) 2018-01-18 2018-01-18 Video encryption method and video flowing method for safety monitoring based on AES-CTR and chaos algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810049368.5A CN108199824A (en) 2018-01-18 2018-01-18 Video encryption method and video flowing method for safety monitoring based on AES-CTR and chaos algorithm

Publications (1)

Publication Number Publication Date
CN108199824A true CN108199824A (en) 2018-06-22

Family

ID=62589798

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810049368.5A Pending CN108199824A (en) 2018-01-18 2018-01-18 Video encryption method and video flowing method for safety monitoring based on AES-CTR and chaos algorithm

Country Status (1)

Country Link
CN (1) CN108199824A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108718232A (en) * 2018-08-17 2018-10-30 中国矿业大学 Image encryption method based on AES and chaos
CN109714162A (en) * 2019-01-29 2019-05-03 南京南瑞国盾量子技术有限公司 A kind of quantum key expansion method and system
CN110427762A (en) * 2019-07-23 2019-11-08 湖南匡安网络技术有限公司 A kind of encryption and decryption approaches for realizing the transmission of electric power monitoring system Video security
CN112714358A (en) * 2020-12-29 2021-04-27 武汉烽火富华电气有限责任公司 Video streaming media encryption and decryption transmission method and system
CN113891171A (en) * 2021-12-06 2022-01-04 杭州天宽科技有限公司 Portable audio/video acquisition, storage and forwarding system based on RTMP/RTSP protocol

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3144433A1 (en) * 2015-09-21 2017-03-22 Oras Oy An asssembly of a concealed sanitary fitting having a connecting member and a valve function unit
CN107483173A (en) * 2017-08-30 2017-12-15 广东工业大学 A kind of video chaotic secret communication device and method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3144433A1 (en) * 2015-09-21 2017-03-22 Oras Oy An asssembly of a concealed sanitary fitting having a connecting member and a valve function unit
CN107483173A (en) * 2017-08-30 2017-12-15 广东工业大学 A kind of video chaotic secret communication device and method

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
RESEARCHGATE: "CRYPTOGRAPHY:FOUNDATIONANDBASICCONCEPTS", 《RESEARCHGATE》 *
S. KOTEL, F. SBIAA, M. ZEGHID, M. MACHHOUT, A. BAGANNE: "Efficient Hybrid Encryption System Based on Block Cipher and Chaos Generator", 《IEEE》 *
张琴: "基于整数混合混沌的无线传感器分组加密算法", 《互联网》 *
赵问道: "《多媒体技术原理与应用》", 31 December 2007 *
陈谢: "基于H.265的视频加密算法研究与实现", 《CNKI中国硕士学位论文全文数据库信息科技辑》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108718232A (en) * 2018-08-17 2018-10-30 中国矿业大学 Image encryption method based on AES and chaos
CN109714162A (en) * 2019-01-29 2019-05-03 南京南瑞国盾量子技术有限公司 A kind of quantum key expansion method and system
CN110427762A (en) * 2019-07-23 2019-11-08 湖南匡安网络技术有限公司 A kind of encryption and decryption approaches for realizing the transmission of electric power monitoring system Video security
CN110427762B (en) * 2019-07-23 2021-03-23 湖南匡安网络技术有限公司 Encryption and decryption method for realizing video security transmission of power monitoring system
CN112714358A (en) * 2020-12-29 2021-04-27 武汉烽火富华电气有限责任公司 Video streaming media encryption and decryption transmission method and system
CN113891171A (en) * 2021-12-06 2022-01-04 杭州天宽科技有限公司 Portable audio/video acquisition, storage and forwarding system based on RTMP/RTSP protocol
CN113891171B (en) * 2021-12-06 2022-04-01 杭州天宽科技有限公司 Portable audio/video acquisition, storage and forwarding system based on RTMP/RTSP protocol

Similar Documents

Publication Publication Date Title
CN108199824A (en) Video encryption method and video flowing method for safety monitoring based on AES-CTR and chaos algorithm
US7200232B2 (en) Method and apparatus for symmetric-key decryption
JP4907518B2 (en) Method and system for generating transcodable encrypted content
CN102123026A (en) Chaos and hyperchaos based two-level video streaming media encryption method
Deshmukh et al. Modified AES based algorithm for MPEG video encryption
CN108768606B (en) Streaming media real-time encryption method and system based on video transmission
Wang et al. Hash key-based video encryption scheme for H. 264/AVC
Dumbere et al. Video encryption using AES algorithm
Huang et al. A novel structure with dynamic operation mode for symmetric-key block ciphers
El-Shafai et al. An efficient multimedia compression-encryption scheme using latin squares for securing Internet-of-things networks
Manupriya et al. V⊕ SEE: Video secret sharing encryption technique
Gu et al. A chaotic-cipher-based packet body encryption algorithm for JPEG2000 images
Megala et al. Efficient high-end video data privacy preservation with integrity verification in cloud storage
Velliangiri An Enhanced Multimedia Video Surveillance Security Using Wavelet Encryption Framework.
Abaas et al. A new approach for video encryption based on modified AES algorithm
Sekhar et al. A novel approach for hiding data in videos using network steganography methods
Shifa et al. Efficient lightweight encryption algorithm for smart video applications
Castiglione et al. Towards a lawfully secure and privacy preserving video surveillance system
Huang et al. Research of H. 264 video transmission encryption technology based on blowfish algorithm
Roy et al. Secured selective encryption algorithm for MPEG-2 video
Shanthakumari et al. Data hiding in Image steganography using Range Technique for secure communication
JP2009213083A (en) Image compression method and apparatus
Fan et al. An unequal secure encryption scheme for H. 264/AVC video compression standard
Pappa et al. A novel approach for watermarking in JPEG 2000 images using RC4-2S encryption
Sbiaa et al. A Selective Video Encryption Scheme Based on a Block Cipher Algorithm and a Chaos Generator

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180622

WD01 Invention patent application deemed withdrawn after publication