CN111510745B - Internet video data encryption transmission method - Google Patents
Internet video data encryption transmission method Download PDFInfo
- Publication number
- CN111510745B CN111510745B CN202010227367.2A CN202010227367A CN111510745B CN 111510745 B CN111510745 B CN 111510745B CN 202010227367 A CN202010227367 A CN 202010227367A CN 111510745 B CN111510745 B CN 111510745B
- Authority
- CN
- China
- Prior art keywords
- video
- data
- data block
- encryption
- bits
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving video stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
- H04N21/4405—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving video stream decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/845—Structuring of content, e.g. decomposing content into time segments
- H04N21/8456—Structuring of content, e.g. decomposing content into time segments by decomposing the content in the time domain, e.g. in time segments
Abstract
The invention belongs to an internet data transmission method, and particularly relates to an internet video data encryption transmission method. It includes: step 1: setting a video streaming transmission capacity; step 2: encrypting; encrypting the video for one time; and step 3: then encrypting; carrying out secondary encryption on the video; and 4, step 4: data encapsulation; packaging the secondarily encrypted data; and 5: transmitting and decrypting; and (4) transmitting the data in the step (4) and decrypting the data at the target node. The invention has the following remarkable effects: (1) the invention achieves the aim of keeping the transmission process secret by segmenting and recombining the video. Anybody cannot normally play even if the video is obtained without knowing the video encryption method. (2) The invention ensures enough safety of the video through twice encryption. (3) The invention respectively transmits the keys encrypted twice, even if partial videos are obtained, the videos cannot be unlocked, and the safety of the videos is ensured to the maximum extent.
Description
Technical Field
The invention belongs to an internet data transmission method, and particularly relates to an internet video data encryption transmission method.
Background
With the development of the internet, the application of internet videos is wider and wider. The internet video can be divided into a wide spread type and a limited spread type from the viewpoint of confidentiality of the internet video. The internet video of the limited transmission type, that is, the contents of the internet video are not desired to be seen by anyone except a specific crowd.
The existing internet video security mode is almost membership mode, namely, the security of the video is achieved by cutting off the way of contacting the internet video by a user. The disadvantage of this approach is that once the unique barrier is breached, the video will appear to the attacker without retention. There is therefore a great need for a method that can keep the video secret during transmission.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides an internet video data encryption transmission method.
The invention is realized by the following steps: an internet video data encryption transmission method comprises the following steps:
step 1: setting video streaming capacity
Step 2: encryption
Encrypting the video for one time;
and step 3: re-encryption
Carrying out secondary encryption on the video;
and 4, step 4: data encapsulation
Packaging the secondarily encrypted data;
and 5: transmission and decryption
And (4) transmitting the data in the step (4) and decrypting the data at the target node.
The method for the encrypted transmission of the internet video data, as described above, wherein the step 1 comprises,
according to the practical situation of network communication, the minimum capacity of the network for transmitting the video stream per unit time is set, the capacity is k, and the unit of k can be kilobytes, megabytes, gigabytes or other units according to the practical situation of the network, but k is a determined number.
The method for the encrypted transmission of the internet video data, as described above, wherein the step 2 comprises,
step 2.1: generating random numbers
Generating a random number, the random number has a minimum value of 1 and a maximum value not exceeding k, and the random number is a decimal integer and is marked as aTen pieces of cloth,
Step 2.2: binary conversion
The random number a generated in the step 2 is addedTen pieces of clothConverted into a binary number, the binary number being denoted as aII,aIIThe converted binary digits have n bits in total
Step 2.3: segmenting video
Each minimum video unit to be transmitted is segmented by the number of segments corresponding to the binary digit a in step 3IIThe number of bits of (a) is the same,
step 2.4: reverse order adjustment
The segmented data in step 2.3 is sorted in reverse order and then a new data block is formed.
The method for encrypting and transmitting internet video data as described above, wherein step 3 includes
Step 3.1: get system time
Taking the system time of the current moment, wherein the taken time comprises year, month, day, time, minute and second, the year is recorded by 4 bits, the month and the day are recorded by two bits, the hour is recorded by two bits for 24 hours, the minute and the second are recorded by two bits, the taken time is recorded as b, the b is a 14-bit number, and the step 3.2: calculating segmentation coefficients
The segmentation coefficient m is calculated by the following formula
m=1+b(mod3)
Where mod represents the remainder, b (mod3) represents the remainder of b divided by 3,
step 3.3: reverse order of segmentation
And (3) carrying out average segmentation on the data obtained in the step (2.4), and recombining the segmented segments according to the calculation result of the step (3.2) and the reverse order of the segmented segments to form a new data block.
The method for encrypting and transmitting internet video data as described above, wherein step 4 includes
And (3) combining the new data block obtained in the step (3.3), the system time sum of the last data block and the random number generated in the step (2.1) into new data.
The method for encrypting and transmitting internet video data as described above, wherein the step 5 includes
And (4) transmitting the encapsulated data obtained in the step (4) to a target node, firstly, resolving a segmentation coefficient m of the last data block by the target node according to the system time in the obtained current data block, carrying out segmentation and reverse order combination, then, carrying out primary decryption on the last data block, then, obtaining a data segmentation number n from a random number in the last data block, dividing the data block subjected to primary decryption into n segments, and carrying out reverse order permutation and combination to form original video data.
The invention has the following remarkable effects: (1) the invention achieves the aim of keeping the transmission process secret by segmenting and recombining the video. Anybody cannot normally play even if the video is obtained without knowing the video encryption method. (2) The invention ensures enough safety of the video through twice encryption. (3) The invention respectively transmits the keys encrypted twice, even if partial videos are obtained, the videos cannot be unlocked, and the safety of the videos is ensured to the maximum extent.
Detailed Description
An encryption transmission method for Internet video data comprises the following steps
Step 1: setting video streaming capacity
According to the practical situation of network communication, the minimum capacity of the network for transmitting the video stream per unit time is set, the capacity is k, and the unit of k can be kilobytes, megabytes, gigabytes or other units according to the practical situation of the network, but k is a determined number.
Step 2: encryption
Step 2.1: generating random numbers
Generating a random number, the random number has a minimum value of 1 and a maximum value not exceeding k, and the random number is a decimal integer and is marked as aTen pieces of cloth。
E.g., k is 14 megabytes in step 1, then a random number a is generatedTen pieces of clothMay be any one of 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13.
Step 2.2: binary conversion
The random number a generated in the step 2 is addedTen pieces of clothConverted into a binary number, the binary number being denoted as aII。aIIThe converted binary digits have n bits in total
For example if the random number a generated in step 2.1Ten pieces of clothIs 12, then the converted binary digit aIIThis is 1100, where n is 4.
Step 2.3: segmenting video
Each minimum video unit to be transmitted is segmented by the number of segments corresponding to the binary digit a in step 3IIThe number of bits is the same.
For example, binary digit a in step 2.2IIIs 4, then the minimum video unit is divided into 4 segments.
Step 2.4: reverse order adjustment
The segmented data in step 2.3 is sorted in reverse order and then a new data block is formed.
And step 3: multiple encryption
Step 3.1: get system time
And (3) taking the system time of the current moment, wherein the taken time comprises year, month, day, hour, minute and second, the year is recorded by 4 bits, the month and day are recorded by two bits, the hour is recorded by two bits for 24-hour system, and the minute and the second are recorded by two bits. The time taken out was denoted as b. b is a 14-bit number.
For example, assuming that the current time is 38 minutes 4 seconds at noon 12 at 24/3/2020, the value of b is 20200324123804.
Step 3.2: calculating segmentation coefficients
The segmentation coefficient m is calculated by the following formula
m=1+b(mod3)
Where mod represents the remainder, and b (mod3) represents the remainder of b divided by 3.
Step 3.3: reverse order of segmentation
And (3) carrying out average segmentation on the data obtained in the step (2.4), and recombining the segmented segments according to the calculation result of the step (3.2) and the reverse order of the segmented segments to form a new data block.
And 4, step 4: data encapsulation
And (3) combining the new data block obtained in the step (3.3), the system time sum of the last data block and the random number generated in the step (2.1) into new data.
And 5: transmission and decryption
And (4) transmitting the encapsulated data obtained in the step (4) to a target node, firstly, resolving a segmentation coefficient m of the last data block by the target node according to the system time in the obtained current data block, carrying out segmentation and reverse order combination, then, carrying out primary decryption on the last data block, then, obtaining a data segmentation number n from a random number in the last data block, dividing the data block subjected to primary decryption into n segments, and carrying out reverse order permutation and combination to form original video data.
The data block received this time can only obtain the system time of the data block received this time after the next data block is received.
Claims (2)
1. An internet video data encryption transmission method is characterized by comprising the following steps:
step 1: setting video streaming capacity
Step 2: encryption
Encrypting the video for one time;
and step 3: re-encryption
Carrying out secondary encryption on the video;
and 4, step 4: data encapsulation
Packaging the secondarily encrypted data;
and 5: transmission and decryption
Transmitting the data in the step 4, and decrypting the data at the target node;
the step 1 comprises the steps of,
according to the practical situation of network communication, the minimum capacity of the network for transmitting the video stream in unit time is set, the capacity is k, the unit of k according to the practical situation of the network can be kilobyte, megabyte, G byte or other units, but k is a determined number;
the step 2 comprises the steps of (a) preparing,
step 2.1: generating random numbers
Generating a random number, the random number has a minimum value of 1 and a maximum value not exceeding k, and the random number is a decimal integer and is marked as aTen pieces of cloth,
Step 2.2: binary conversion
The random number a generated in the step 2 is addedTen pieces of clothConverted into a binary number, the binary number being denoted as aII,aIIThe converted binary digits have n bits in total
Step 2.3: segmenting video
Each minimum video unit to be transmitted is segmented by the number of segments corresponding to the binary digit a in step 3IIThe number of bits of (a) is the same,
step 2.4: reverse order adjustment
Arranging the segmented data in the step 2.3 in a reverse order, and then forming a new data block;
the step 3 comprises
Step 3.1: get system time
Taking the system time of the current moment, wherein the taken time comprises year, month, day, hour, minute and second, the year is recorded by 4 bits, the month and day are recorded by two bits, the hour is recorded by two bits for 24 hours, the minute and the second are recorded by two bits, the taken time is recorded as b, the b is a 14-bit number,
step 3.2: calculating segmentation coefficients
The segmentation coefficient m is calculated by the following formula
Where mod represents the remainder taken from the remainder of the process,the remainder of b divided by 3 is shown,
step 3.3: reverse order of segmentation
The data obtained in the step 2.4 is segmented averagely, the number of the segmented segments is recombined according to the reverse order of the number of the segments to form a new data block according to the calculation result of the step 3.2
The step 4 comprises
And (4) combining the new data block obtained in the step (3.3), the system time of the last data block and the random number generated in the step (2.1) into new data.
2. The internet video data encryption transmission method of claim 1, wherein: the step 5 comprises
And (4) transmitting the encapsulated data obtained in the step (4) to a target node, firstly, resolving a segmentation coefficient m of the last data block by the target node according to the system time in the obtained current data block, carrying out segmentation and reverse order combination, then, carrying out primary decryption on the last data block, then, obtaining a data segmentation number n from a random number in the last data block, dividing the data block subjected to primary decryption into n segments, and carrying out reverse order permutation and combination to form original video data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010227367.2A CN111510745B (en) | 2020-03-27 | 2020-03-27 | Internet video data encryption transmission method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010227367.2A CN111510745B (en) | 2020-03-27 | 2020-03-27 | Internet video data encryption transmission method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111510745A CN111510745A (en) | 2020-08-07 |
CN111510745B true CN111510745B (en) | 2021-01-19 |
Family
ID=71877818
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010227367.2A Expired - Fee Related CN111510745B (en) | 2020-03-27 | 2020-03-27 | Internet video data encryption transmission method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111510745B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112565656B (en) * | 2020-11-27 | 2023-05-23 | Oppo广东移动通信有限公司 | Video call method, device, system, electronic equipment and storage medium |
CN114640867A (en) * | 2022-05-20 | 2022-06-17 | 广州万协通信息技术有限公司 | Video data processing method and device based on video stream authentication |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105407366A (en) * | 2015-12-24 | 2016-03-16 | 北京腾锐视讯科技有限公司 | Internet video and data file hardware encryption transmission system |
CN107147616A (en) * | 2017-03-31 | 2017-09-08 | 武汉斗鱼网络科技有限公司 | Data ciphering method and device |
CN107809436A (en) * | 2017-11-10 | 2018-03-16 | 北京世纪鼎点软件有限公司 | Authority discrimination method, encryption method, the apparatus and system of Internet video access |
CN110138749A (en) * | 2019-04-23 | 2019-08-16 | 华为技术有限公司 | Data security protection method and related equipment |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4457474B2 (en) * | 2000-04-04 | 2010-04-28 | ソニー株式会社 | Information recording apparatus, information reproducing apparatus, information recording method, information reproducing method, information recording medium, and program providing medium |
EP2158718B1 (en) * | 2007-05-18 | 2019-04-17 | Verimatrix, Inc. | System and method for defining programmable processing steps applied when protecting the data |
CN101621376A (en) * | 2008-06-30 | 2010-01-06 | 北京中星微电子有限公司 | Method, device and system for multi-level encryption and decryption |
TW201243643A (en) * | 2011-04-22 | 2012-11-01 | Inst Information Industry | Hierarchical encryption/decryption device and method thereof |
CN102170448A (en) * | 2011-05-04 | 2011-08-31 | 无锡锐视清信息技术有限公司 | Copyright protection system, multimedia data transmitting and receiving equipment and method based on cloud media publishing platform |
US9344278B2 (en) * | 2011-10-18 | 2016-05-17 | Broadcom Corporation | Secure data transfer using random ordering and random block sizing |
JP5875441B2 (en) * | 2012-03-29 | 2016-03-02 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | Apparatus and method for encrypting data |
CN105898376A (en) * | 2015-12-11 | 2016-08-24 | 乐视网信息技术(北京)股份有限公司 | Online video stream play method, device and system |
CN108668133B (en) * | 2017-03-31 | 2020-11-03 | 鸿富锦精密工业(深圳)有限公司 | Video encryption and decryption method and device |
CN109067814B (en) * | 2018-10-31 | 2021-04-20 | 苏州科达科技股份有限公司 | Media data encryption method, system, device and storage medium |
-
2020
- 2020-03-27 CN CN202010227367.2A patent/CN111510745B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105407366A (en) * | 2015-12-24 | 2016-03-16 | 北京腾锐视讯科技有限公司 | Internet video and data file hardware encryption transmission system |
CN107147616A (en) * | 2017-03-31 | 2017-09-08 | 武汉斗鱼网络科技有限公司 | Data ciphering method and device |
CN107809436A (en) * | 2017-11-10 | 2018-03-16 | 北京世纪鼎点软件有限公司 | Authority discrimination method, encryption method, the apparatus and system of Internet video access |
CN110138749A (en) * | 2019-04-23 | 2019-08-16 | 华为技术有限公司 | Data security protection method and related equipment |
Also Published As
Publication number | Publication date |
---|---|
CN111510745A (en) | 2020-08-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8687800B2 (en) | Encryption method for message authentication | |
US8755520B2 (en) | Apparatus and method for generating a key for broadcast encryption | |
JP3901909B2 (en) | ENCRYPTION DEVICE AND RECORDING MEDIUM CONTAINING PROGRAM | |
KR100424786B1 (en) | Method and apparatus for generating encrypted signature using hash key | |
US8249255B2 (en) | System and method for securing communications between devices | |
CN109145612B (en) | Block chain-based cloud data sharing method for preventing data tampering and user collusion | |
US20170070340A1 (en) | Homomorphically-created symmetric key | |
US7254232B2 (en) | Method and system for selecting encryption keys from a plurality of encryption keys | |
CN111510745B (en) | Internet video data encryption transmission method | |
CN104660590A (en) | Cloud storage scheme for file encryption security | |
Mo et al. | Two-party fine-grained assured deletion of outsourced data in cloud systems | |
CN102469173A (en) | IPv6 (Internet Protocol Version 6) network layer credible transmission method and system based on combined public key algorithm | |
Saraswathi et al. | A block cipher algorithm for multimedia content protection with random substitution using binary tree traversal | |
CN111918012A (en) | Video encryption and key management method based on private block chain | |
US20010033654A1 (en) | W-EC1 encryption and decryption method and system | |
CN110098937B (en) | Data block associated encryption algorithm based on timestamp | |
JP2024511683A (en) | Secure file sharing method and system based on domestic encryption algorithm | |
CN110225028B (en) | Distributed anti-counterfeiting system and method thereof | |
CN113312646B (en) | Data encryption method based on block chain | |
CN113840115B (en) | Monitoring video data encryption transmission system and method based on block chain | |
JP2004515160A (en) | Threshold encryption method and system for message authentication system | |
CN114244635B (en) | Encryption type data coding method of communication equipment | |
CN111447174A (en) | Data encryption method based on block chain | |
KR100551992B1 (en) | encryption/decryption method of application data | |
Gennaro et al. | Two-phase cryptographic key recovery system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20210119 |
|
CF01 | Termination of patent right due to non-payment of annual fee |