CN117834951A - Signature information transmitting method, signature information transmitting device, electronic equipment and computer readable medium - Google Patents

Signature information transmitting method, signature information transmitting device, electronic equipment and computer readable medium Download PDF

Info

Publication number
CN117834951A
CN117834951A CN202410050406.4A CN202410050406A CN117834951A CN 117834951 A CN117834951 A CN 117834951A CN 202410050406 A CN202410050406 A CN 202410050406A CN 117834951 A CN117834951 A CN 117834951A
Authority
CN
China
Prior art keywords
information
key
stream
code stream
target code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410050406.4A
Other languages
Chinese (zh)
Inventor
邱嵩
卢京辉
王大治
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Zhongxing Electronics Co ltd
Zhongxing Micro Technology Co ltd
Vimicro Corp
Original Assignee
Guangdong Zhongxing Electronics Co ltd
Zhongxing Micro Technology Co ltd
Vimicro Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Zhongxing Electronics Co ltd, Zhongxing Micro Technology Co ltd, Vimicro Corp filed Critical Guangdong Zhongxing Electronics Co ltd
Priority to CN202410050406.4A priority Critical patent/CN117834951A/en
Publication of CN117834951A publication Critical patent/CN117834951A/en
Pending legal-status Critical Current

Links

Abstract

The embodiment of the disclosure discloses a signature information sending method, a signature information sending device, electronic equipment and a computer readable medium. One embodiment of the method comprises the following steps: acquiring a video to be encoded; coding the video to be coded to obtain a target code stream set; for the target code stream, the following steps are performed: encrypting the key stream information included in the target code stream by using a first preset secret key to obtain key stream encryption information; encrypting the non-key stream information included in the target code stream by using a second preset secret key to obtain non-key stream encryption information; generating encrypted stream information according to the key stream encryption information and the non-key stream encryption information; generating a summary information set according to the generated encrypted stream information; generating signature information according to the summary information set; and sending the signature information to a receiving end. The embodiment can improve the diversity of video data viewing authority processing and the security of data protection.

Description

Signature information transmitting method, signature information transmitting device, electronic equipment and computer readable medium
Technical Field
Embodiments of the present disclosure relate to the field of computer technology, and in particular, to a signature information sending method, a signature information sending device, an electronic device, and a computer readable medium.
Background
With the development of information technology and the advent of the big data age, various video data have brought convenience to people's work and life. At the same time, related video data security is also an important concern. In order to secure video data, data encryption technology and data signing technology are commonly applied to the data during transmission of the data. Currently, in performing a transmission operation on generated signature information, the following methods are generally adopted: first, by performing unified encryption or unified non-encryption processing on a video to be transmitted. Then, the video subjected to unified encryption or unified non-encryption is subjected to data signature processing, and signature information obtained after the data signature is sent to an associated receiving end.
However, when the generated signature information is transmitted in the above manner, there are often the following technical problems:
the video data to be transmitted is subjected to unified encryption or unified non-encryption processing, so that the processing mode of the video data viewing authority is single, the diversity of the video data viewing authority processing is poor (namely, a user at a receiving end cannot view the video data corresponding to the authority according to the authority level of the user, for example, when the processing is unified non-encryption processing, the user with the lower authority level views the video content (for example, the license plate number in the video) corresponding to the high authority), and the security of video data protection is poor.
The above information disclosed in this background section is only for enhancement of understanding of the background of the inventive concept and, therefore, may contain information that does not form the prior art that is already known to those of ordinary skill in the art in this country.
Disclosure of Invention
The disclosure is in part intended to introduce concepts in a simplified form that are further described below in the detailed description. The disclosure is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
Some embodiments of the present disclosure propose signature information transmission methods, apparatuses, electronic devices, and computer-readable media to solve one or more of the technical problems mentioned in the background section above.
In a first aspect, some embodiments of the present disclosure provide a signature information transmitting method, the method including: acquiring a video to be encoded; the video to be encoded is encoded to obtain an encoded video to be encoded as a target code stream set, wherein a target code stream in the target code stream set corresponds to an image to be encoded in the video to be encoded, and the target code stream in the target code stream set comprises key code stream information and non-key code stream information; for each target code stream in the target code stream set, the following steps are executed: encrypting the key stream information included in the target code stream by using a first preset secret key to obtain key stream encryption information, wherein the first preset secret key is a public key which is generated through a preset symmetric encryption function and corresponds to the key stream information; encrypting the non-key stream information included in the target code stream by using a second preset secret key to obtain non-key stream encryption information, wherein the second preset secret key is a public key corresponding to the non-key stream information generated by a preset symmetric encryption function; generating encryption stream information according to the key stream encryption information and the non-key stream encryption information; generating a summary information set according to the generated encrypted stream information; generating signature information according to the summary information set; and sending the signature information to an associated receiving end.
In a second aspect, some embodiments of the present disclosure provide a signature information transmitting apparatus, the apparatus including: an acquisition unit configured to acquire a video to be encoded; the coding processing unit is configured to code the video to be coded to obtain a target code stream set of the video to be coded after the coding processing, wherein a target code stream in the target code stream set corresponds to an image to be coded in the video to be coded, and the target code stream in the target code stream set comprises key code stream information and non-key code stream information; an execution unit configured to execute, for each target code stream in the target code stream set, the steps of: encrypting the key stream information included in the target code stream by using a first preset secret key to obtain key stream encryption information, wherein the first preset secret key is a public key which is generated through a preset symmetric encryption function and corresponds to the key stream information; encrypting the non-key stream information included in the target code stream by using a second preset secret key to obtain non-key stream encryption information, wherein the second preset secret key is a public key corresponding to the non-key stream information generated by a preset symmetric encryption function; generating encryption stream information according to the key stream encryption information and the non-key stream encryption information; a first generation unit configured to generate a summary information set from the generated respective encrypted stream information; a second generation unit configured to generate signature information from the summary information set; and a transmitting unit configured to transmit the signature information to an associated receiving end.
In a third aspect, some embodiments of the present disclosure provide an electronic device comprising: one or more processors; a storage device having one or more programs stored thereon, which when executed by one or more processors causes the one or more processors to implement the method described in any of the implementations of the first aspect above.
In a fourth aspect, some embodiments of the present disclosure provide a computer readable medium having a computer program stored thereon, wherein the program, when executed by a processor, implements the method described in any of the implementations of the first aspect above.
The above embodiments of the present disclosure have the following advantages: by the signature information sending method of some embodiments of the present disclosure, a manner of processing the viewing authority of the video data can be increased, so that diversity of processing the viewing authority of the video data is improved, and security of protecting the video data is improved. Specifically, the manner of processing the viewing authority of the video data is single, and the diversity of processing the viewing authority of the video data is poor, so that the security of protecting the video data is poor due to the following reasons: the video data to be transmitted is subjected to unified encryption or unified non-encryption processing, so that the processing mode of the video data viewing authority is single, the diversity of the video data viewing authority processing is poor (namely, a user at a receiving end cannot view the video data corresponding to the authority according to the authority level of the user, for example, when the processing is unified non-encryption processing, the user with the lower authority level views the video content (for example, the license plate number in the video) corresponding to the high authority), and the security of video data protection is poor. Based on this, the signature information transmitting method of some embodiments of the present disclosure first acquires a video to be encoded. Thus, the video to be encoded for viewing by the receiving end user can be obtained. And then, carrying out coding processing on the video to be coded to obtain the video to be coded after coding processing as a target code stream set. The target code stream in the target code stream set corresponds to an image to be encoded in the video to be encoded, and the target code stream in the target code stream set may include key code stream information and non-key code stream information. Thus, the target code stream set can be obtained and used for signature processing. Then, for each target code stream in the target code stream set, the following steps are executed: and encrypting the key stream information included in the target code stream by using a first preset secret key to obtain key stream encryption information. The first preset key may be a public key corresponding to the key stream information generated by a preset symmetric encryption function. Therefore, the key stream information representing the important content information of the video can be encrypted, so that the user with high authority level at the receiving end can browse the video conveniently. Thereby improving the security of data protection. And secondly, encrypting the non-key stream information included in the target code stream by using a second preset secret key to obtain non-key stream encryption information, wherein the second preset secret key can be a public key which is generated through a preset symmetric encryption function and corresponds to the non-key stream information. Therefore, the non-key stream information representing the non-important content information of the video can be encrypted, so that the user with low authority level at the receiving end can browse the video conveniently. Then, encryption stream information is generated based on the key stream encryption information and the non-key stream encryption information. Thus, encrypted stream information in which important content information and non-important content information in a single frame image are encrypted can be obtained. And then, generating a summary information set according to the generated encrypted stream information. Therefore, the summary information set corresponding to the video can be obtained, so that the video is hashed to obtain the summary information, and the workload of encryption processing is reduced. Then, signature information is generated according to the summary information set. Thus, the signature information corresponding to the video data can be obtained, and the signature information can be used for verifying the integrity and the authenticity of the video data by a user of a receiving end. And finally, the signature information is sent to an associated receiving end. Thus, the signature information can be transmitted to the receiving end having the video viewing request. And thus may be used for video browsing by the user. In the video processing process, the video after the encoding processing is divided into a key stream encryption information part and a non-key stream encryption information part according to the importance degree of the video content, and the two parts of information are respectively subjected to hierarchical encryption processing, so that the video content with corresponding authority can be opened to a user according to the viewing grade of the user at the receiving end. Furthermore, the method for processing the viewing authority of the video data can be increased, the diversity of processing the viewing authority of the video data is improved, and the security of protecting the video data is improved.
Drawings
The above and other features, advantages, and aspects of embodiments of the present disclosure will become more apparent by reference to the following detailed description when taken in conjunction with the accompanying drawings. The same or similar reference numbers will be used throughout the drawings to refer to the same or like elements. It should be understood that the figures are schematic and that elements and components are not necessarily drawn to scale.
FIG. 1 is a flow chart of some embodiments of a signature information transmission method according to the present disclosure;
fig. 2 is a schematic structural diagram of some embodiments of a signature information transmitting apparatus according to the present disclosure;
fig. 3 is a schematic structural diagram of an electronic device suitable for use in implementing some embodiments of the present disclosure.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete. It should be understood that the drawings and embodiments of the present disclosure are for illustration purposes only and are not intended to limit the scope of the present disclosure.
It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings. Embodiments of the present disclosure and features of embodiments may be combined with each other without conflict.
It should be noted that the terms "first," "second," and the like in this disclosure are merely used to distinguish between different devices, modules, or units and are not used to define an order or interdependence of functions performed by the devices, modules, or units.
It should be noted that references to "one", "a plurality" and "a plurality" in this disclosure are intended to be illustrative rather than limiting, and those of ordinary skill in the art will appreciate that "one or more" is intended to be understood as "one or more" unless the context clearly indicates otherwise.
The names of messages or information interacted between the various devices in the embodiments of the present disclosure are for illustrative purposes only and are not intended to limit the scope of such messages or information.
The present disclosure will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
Fig. 1 illustrates a flow 100 of some embodiments of a signature information transmission method according to the present disclosure. The signature information sending method comprises the following steps:
Step 101, obtaining a video to be encoded.
In some embodiments, the executing entity of the signature information transmission method (e.g., a computing device) may acquire the video to be encoded through a wired connection or a wireless connection, and through an associated video acquisition device. The associated video capturing device may be a device capable of capturing video. For example, the associated video capture device may be an industrial camera. The video to be encoded may be a video to be encoded acquired by the associated video acquisition device. It should be noted that the wireless connection may include, but is not limited to, 3G/4G connections, wiFi connections, bluetooth connections, wiMAX connections, zigbee connections, UWB (ultra wideband) connections, and other now known or later developed wireless connection means.
And 102, carrying out coding processing on the video to be coded to obtain the video to be coded after the coding processing as a target code stream set.
In some embodiments, the executing body may perform encoding processing on the video to be encoded, so as to obtain the video to be encoded after the encoding processing as the target code stream set. Wherein, the target code stream in the target code stream set corresponds to the image to be coded in the video to be coded one by one. The target code stream in the target code stream set may include key stream information and non-key stream information. The key stream information and the non-key stream information in the target code stream can be distinguished by the RBSP (Raw Byte Sequence Payload, original byte sequence load) data structure type identification corresponding to the target code stream. For example, when the data structure type is identified as 1, the key stream information is identified. When the data structure type is 2, non-key stream information is identified. The key stream information may be image information corresponding to a key image area in the image to be encoded. Specifically, the above-mentioned key stream information may be image information corresponding to a foreground image area in the image to be encoded. For example, the image to be encoded may be a vehicle image. The key image area in the image to be coded can be an image area corresponding to a vehicle or an image area corresponding to a license plate number of the vehicle. The key stream information may be image information corresponding to a license plate number of the vehicle in the vehicle image. The above-described non-key stream information may be image information corresponding to a non-key image region (other than the key image region) in the image to be encoded.
In some optional implementations of some embodiments, the executing body may perform encoding processing on the video to be encoded by using the encoded video to be encoded as a target bitstream set through the following steps:
and firstly, carrying out color space transformation processing on the video to be coded to obtain color space transformation video. In practice, first, for each frame of image to be encoded in the video to be encoded, the executing body may perform color space transformation processing on the image to be encoded through a preset transformation matrix to obtain a color space transformed image. The resulting individual color space converted images may then be combined into a color space converted video.
Wherein the color space transformed image can be expressed by the following formula:
wherein,each image in the color space transformed image may be representedAnd (5) plain. Above->The color component of each pixel in the image to be encoded may be represented. Above->A preset transition matrix may be represented. The R may represent a red color component corresponding to each pixel in the image to be encoded. The above G may represent a green color component corresponding to each pixel in the image to be encoded. The above B may represent a blue color component corresponding to each pixel in the image to be encoded. The above Y may represent the brightness of each pixel in the color space converted image. The above C b The chromaticity of each pixel in the color space converted image may be represented. The above Cr may represent the density of each pixel in the color space converted image.
A second step of, for each frame of color space converted image in the color space converted video, performing the steps of:
a first sub-step of performing image segmentation processing on the color space conversion image to generate a color space conversion segmented image set. In practice, the execution subject may perform image segmentation processing on the color space conversion image in accordance with 6*6 (pixels) to generate a color space conversion segmented image set.
And a second sub-step of performing coding processing on the color space conversion segmented image set to obtain the color space conversion segmented image set after coding processing as a target code stream.
And thirdly, determining each obtained target code stream as a target code stream set.
In some optional implementations of some embodiments, the executing body may perform encoding processing on the set of color space transformation split images by using the set of color space transformation split images after the encoding processing as a target code stream:
a first step of, for each color space transformation segmented image in the set of color space transformation segmented images, performing the steps of:
A first sub-step of performing a transformation process on the color space transformed segmented image to generate a frequency coefficient matrix corresponding to the color space transformed segmented image. In practice, the execution body may perform discrete cosine transform processing on the color space transform segmented image to generate a frequency coefficient matrix corresponding to the color space transform segmented image. Here, the discrete cosine transform process may reduce spatial correlation between image pixels, concentrating image energy in the upper left corner region, thereby facilitating data compression.
And a second sub-step of performing quantization processing on the frequency coefficient matrix to generate a quantization matrix. In practice, the execution body may perform quantization processing on the frequency coefficient matrix by using a preset quantization table to generate a quantization matrix. Here, first, for each frequency coefficient element in the frequency coefficient matrix, the execution body may determine a preset quantization element corresponding to the frequency coefficient element in a preset quantization table as the first element. And then, carrying out rounding processing on the ratio of the frequency coefficient element to the first element to obtain a quantized element. Finally, the matrix formed by each quantized element is determined as a quantized matrix. The preset quantization table may be a preset table for quantizing the frequency coefficient matrix. Here, the quantization table may be in the form of a matrix.
And a third sub-step of determining a quantization array according to the quantization matrix. In practice, the execution body may sort the quantization matrix by zigzag (e.g., starting from the upper left corner of the quantization matrix) the quantization elements included in the quantization matrix to generate a quantization array.
And a fourth sub-step of performing encoding processing on the quantized arrays to generate encoded information. In practice, the execution body may perform huffman coding on the quantization array to generate coded information.
And a second step of determining a target code stream according to the generated coding information. In practice, the execution body may perform splicing processing on each generated encoded information, so as to obtain each encoded information after the splicing processing as a target code stream.
Step 103, for each target code stream in the target code stream set, executing the following steps:
step 1031, using the first preset key to encrypt the key stream information included in the target code stream, so as to obtain the key stream encrypted information.
In some embodiments, the executing body may encrypt the key stream information included in the target code stream by using a first preset key, so as to obtain key stream encrypted information. The first preset key may be a public key corresponding to the key stream information generated by a preset symmetric encryption function. The preset symmetric encryption function may be a preset symmetric encryption function. The preset symmetric encryption function may include, but is not limited to, at least one of: DES, 3DES, AES, TDEA, blowfish, RC2, RC4 and RC5. In practice, the execution body may generate the first preset key using a DES encryption function. Then, the executing body may encrypt the key stream information included in the target code stream by using a first preset key, so as to obtain key stream encrypted information.
Step 1032, encrypting the non-key stream information included in the target code stream by using the second preset key to obtain non-key stream encrypted information.
In some embodiments, the executing body may encrypt the non-key stream information included in the target code stream by using a second preset key to obtain non-key stream encrypted information. The second preset key may be a public key corresponding to the non-key stream information generated by a preset symmetric encryption function. The preset symmetric encryption function may include, but is not limited to, at least one of: DES, 3DES, AES, TDEA, blowfish, RC2, RC4 and RC5. In practice, the executing entity may generate the second preset key using a 3DES encryption function. Then, the executing body may encrypt the non-key stream information included in the target code stream by using a second preset key, so as to obtain non-key stream encrypted information.
Step 1033, generating encrypted stream information according to the key stream encryption information and the non-key stream encryption information.
In some embodiments, the execution body may generate encrypted stream information based on the key stream encryption information and the non-key stream encryption information. In practice, the execution body may perform a combination process on the key stream encryption information and the non-key stream encryption information to obtain encrypted stream information. Here, the manner of the combining process may be splicing. For example, the key stream encryption information may be a. The non-key stream encryption information may be B. The encrypted stream information may be AB.
And 104, generating a summary information set according to the generated encrypted stream information.
In some embodiments, the execution body may generate a summary information set according to the generated encrypted stream information.
In some optional implementations of some embodiments, the executing entity may generate the summary information set according to the generated encrypted stream information, by:
first, for each encrypted stream information in each generated encrypted stream information, carrying out hash processing on the encrypted stream information by using a preset hash function to obtain the encrypted stream information after the hash processing as abstract information. The preset hash function may be a preset hash function. The preset hash function may include, but is not limited to: a message digest algorithm, a secure hash algorithm, and a message authentication code algorithm. For example. The predetermined hash function may be a message digest algorithm (e.g., SM 3).
And a second step of determining each piece of obtained summary information as a summary information set.
Step 105, generating signature information according to the summary information set.
In some embodiments, the executing entity may generate signature information based on the summary information set.
Optionally, before generating the signature information according to the summary information set, the executing body may further generate a signature private key and a signature public key according to a preset signature function. The preset signature function may be a preset signature function. For example, the signature function may be SM2. The signature private key may be a private key used to generate a signature. The signature private key and the signature public key are unique and correspond. The signature public key may be a public key that uniquely corresponds to the signature private key and is used for the receiving end to verify the signature.
In some optional implementations of some embodiments, the executing entity may generate signature information according to the summary information set by:
the first step, sorting the summary information included in the summary information set to obtain the sorted summary information as a summary information sequence. In practice, the execution body may perform sorting processing on each piece of summary information included in the summary information set according to the generation time of each image to be encoded corresponding to each piece of summary information, so as to obtain each piece of summary information after sorting processing as a summary information sequence.
And secondly, carrying out combination processing on each piece of summary information included in the summary information sequence to generate combined summary information. In practice, the execution body may perform splicing processing on each piece of summary information included in the summary information sequence, so as to obtain a summary information sequence after the splicing processing as combined summary information.
And thirdly, encrypting the combined abstract information by using the signature private key to generate signature information. In practice, the execution body may encrypt the combined digest information by using the signature private key, so as to obtain the encrypted combined digest information as signature information.
Further, in the process of solving the technical problems mentioned in the background art by adopting the technical scheme, the requirement of the user on the signature security level of the video to be signed is high. The conventional technical scheme for meeting the higher requirement of users on the signature security level of the video to be signed is that each frame of image in the video is independently subjected to hash processing and signature processing respectively. However, this approach may result in less complex signature processing. Therefore, considering the requirements of users on signature security level of videos to be signed and the requirements of improving the complexity of signature processing, it is decided to sequentially and respectively hash each frame of images to be signed in the videos to be signed, then combine the hash results of the first frame of images to be signed and the second frame of images to be signed, then hash the first frame of images to be signed, and then take the summary information of the hash processing as tree top summary information, then combine the summary information of the images to be signed with the summary information of the next frame of images to be signed, and then cycle until the summary information is combined with the hash result of the last frame of images to be signed and the hash processing is carried out, and finally, the finally obtained hash result is subjected to signature processing so as to meet the requirements of users on signature security level of videos to be signed and the requirements of improving the complexity of signature processing, thereby achieving the effect of improving the security of data signature.
In some optional implementations of some embodiments, the executing entity may further generate signature information according to the summary information set by:
the first step, sorting the summary information included in the summary information set to obtain the sorted summary information as a summary information sequence. In practice, the execution body may perform sorting processing on each piece of summary information included in the summary information set according to the generation time of each image to be encoded corresponding to each piece of summary information, so as to obtain each piece of summary information after sorting processing as a summary information sequence.
And secondly, combining the summary information at the first position and the summary information at the second position in the summary information sequence to generate initial summary information. Here, the manner of the combining process may be splicing. The first position may be understood as a position with a sequence number 1 corresponding to the summary information in the summary information sequence. The second position may be understood as a position with a sequence number of 2 corresponding to the summary information in the summary information sequence. Here, the sequence number may be a position sorting sequence number.
And thirdly, carrying out hash processing on the initial abstract information by using a preset hash function to obtain initial abstract information after hash processing as initial tree top abstract information. The pre-hash function may be a preset function for performing hash processing on the initial digest information. The preset hash function may include, but is not limited to: a message digest algorithm, a secure hash algorithm, and a message authentication code algorithm. Here, the preset hash function may be a function corresponding to a secure hash algorithm. In practice, the execution body may perform hash processing on the initial summary information by using a secure hash algorithm, so as to obtain initial summary information after hash processing as initial tree top summary information.
And step four, deleting the summary information at the first position and the summary information at the second position in the summary information sequence to obtain a summary information sequence after deleting as an updated summary information sequence.
Fifth, for each update summary information in the update summary information sequence, the following steps are performed:
and a first sub-step, carrying out combination processing on the updated abstract information and the initial tree top abstract information to obtain combined abstract information. Here, the manner of the combining process may be splicing.
And a second substep, carrying out hash processing on the combined abstract information by using a preset hash function to obtain the hashed combined abstract information as tree top abstract information.
And a third sub-step, determining the tree top abstract information as initial tree top abstract information so as to update the initial tree top abstract information.
And sixthly, carrying out signature processing on the updated initial tree top abstract information by using the signature private key so as to generate signature information. In practice, the executing body can encrypt the updated initial tree top abstract information by using the signature private key to obtain the encrypted and updated initial tree top abstract information as the signature information.
The first to sixth steps and related content are taken as an invention point of the embodiments of the present disclosure, which solves the technical problems that the complexity of signature processing is low and the signature security level requirement of a user on a video to be signed cannot be better met when the hash processing and the signature processing are separately performed on each frame of image in the video. The hash processing and the signature processing are respectively and independently performed on each frame of image in the video, so that the complexity of the signature processing is low, and the factors that the user cannot better meet the signature security level requirement of the video to be signed often are as follows: each frame of image in the video is subjected to hash processing and signature processing respectively, so that the complexity of the signature processing is low, and the signature security level requirement of a user on the video to be signed cannot be met well. If the above factors are solved, the effect of improving the complexity of signature processing and better meeting the signature security level requirements of users on the video to be signed can be achieved. In order to achieve the effect, the present disclosure decides to sequentially and respectively hash each frame of to-be-signed image in the to-be-signed video, then combine the hash results of the first frame of to-be-signed image and the second frame of to-be-signed image, then hash the to-be-signed image, and take the summary information of the hash to be the tree top summary information, then combine the summary information of the next frame of to-be-signed image, and so cycle until the hash result of the last frame of to-be-signed image is combined and hashed, and finally sign the obtained hash result, so as to meet the requirements of users on the signature security level of the to-be-signed video and the requirements of improving the complexity of the signature processing, thereby improving the security of data protection.
Optionally, after generating signature information according to the summary information set, the executing body may further execute the following steps:
and the first step is to send the signature public key, the signature information and the preset hash function to an associated authentication server so as to enable the authentication server to generate certificate information corresponding to the video to be encoded. Wherein the associated authentication server may be a server capable of generating a signed certificate. For example, the associated authentication server may be a signature verification server.
And a second step of receiving the certificate information sent by the authentication server.
And thirdly, determining a key stream security parameter information set according to the first preset key, the encryption stream information and the certificate information. In practice, the executing body may determine the first preset key, the respective encrypted stream information, and the certificate information as a key stream parameter information set. Therefore, the key stream parameter information set corresponding to the key stream information can be obtained, and the key stream parameter information set can be used for decryption and signature verification operations by utilizing the key stream parameter information set according to the high authority level of the user at the receiving end.
And step four, determining a non-key stream security parameter information set according to the second preset secret key, the encrypted stream information and the certificate information. In practice, the executing body may determine the second preset key, the respective encrypted stream information, and the certificate information as a non-key stream parameter information set. Therefore, the non-key stream parameter information set corresponding to the non-key stream information can be obtained, and the method can be used for the user of the receiving end to perform decryption and signature verification operations by utilizing the non-key stream parameter information set according to the low authority level of the user.
And fifthly, transmitting the key stream security parameter information set and the non-key stream security parameter information set to an associated receiving end.
And step 106, the signature information is sent to the associated receiving end.
In some embodiments, the executing entity may send the signature information to an associated receiving end. The associated receiving end may be a client end sending a video viewing request to be encoded. In practice, the executing entity may send the signature information to the associated receiving end.
The above embodiments of the present disclosure have the following advantages: by the signature information sending method of some embodiments of the present disclosure, a manner of processing the viewing authority of the video data can be increased, so that diversity of processing the viewing authority of the video data is improved, and security of protecting the video data is improved. Specifically, the manner of processing the viewing authority of the video data is single, and the diversity of processing the viewing authority of the video data is poor, so that the security of protecting the video data is poor due to the following reasons: the video data to be transmitted is subjected to unified encryption or unified non-encryption processing, so that the processing mode of the video data viewing authority is single, the diversity of the video data viewing authority processing is poor (namely, a user at a receiving end cannot view the video data corresponding to the authority according to the authority level of the user, for example, when the processing is unified non-encryption processing, the user with the lower authority level views the video content (for example, the license plate number in the video) corresponding to the high authority), and the security of video data protection is poor. Based on this, the signature information transmitting method of some embodiments of the present disclosure first acquires a video to be encoded. Thus, the video to be encoded for viewing by the receiving end user can be obtained. And then, carrying out coding processing on the video to be coded to obtain the video to be coded after coding processing as a target code stream set. The target code stream in the target code stream set corresponds to an image to be encoded in the video to be encoded, and the target code stream in the target code stream set may include key code stream information and non-key code stream information. Thus, the target code stream set can be obtained and used for signature processing. Then, for each target code stream in the target code stream set, the following steps are executed: and encrypting the key stream information included in the target code stream by using a first preset secret key to obtain key stream encryption information. The first preset key may be a public key corresponding to the key stream information generated by a preset symmetric encryption function. Therefore, the key stream information representing the important content information of the video can be encrypted, so that the user with high authority level at the receiving end can browse the video conveniently. Thereby improving the security of data protection. And secondly, encrypting the non-key stream information included in the target code stream by using a second preset secret key to obtain non-key stream encryption information, wherein the second preset secret key can be a public key which is generated through a preset symmetric encryption function and corresponds to the non-key stream information. Therefore, the non-key stream information representing the non-important content information of the video can be encrypted, so that the user with low authority level at the receiving end can browse the video conveniently. Then, encryption stream information is generated based on the key stream encryption information and the non-key stream encryption information. Thus, encrypted stream information in which important content information and non-important content information in a single frame image are encrypted can be obtained. And then, generating a summary information set according to the generated encrypted stream information. Therefore, the summary information set corresponding to the video can be obtained, so that the video is hashed to obtain the summary information, and the workload of encryption processing is reduced. Then, signature information is generated according to the summary information set. Thus, the signature information corresponding to the video data can be obtained, and the signature information can be used for verifying the integrity and the authenticity of the video data by a user of a receiving end. And finally, the signature information is sent to an associated receiving end. Thus, the signature information can be transmitted to the receiving end having the video viewing request. And thus may be used for video browsing by the user. In the video processing process, the video after the encoding processing is divided into a key stream encryption information part and a non-key stream encryption information part according to the importance degree of the video content, and the two parts of information are respectively subjected to hierarchical encryption processing, so that the video content with corresponding authority can be opened to a user according to the viewing grade of the user at the receiving end. Furthermore, the method for processing the viewing authority of the video data can be increased, the diversity of processing the viewing authority of the video data is improved, and the security of protecting the video data is improved.
With further reference to fig. 2, as an implementation of the method shown in the above figures, the present disclosure provides some embodiments of a signature information transmitting apparatus, which correspond to those method embodiments shown in fig. 2, and which are particularly applicable to various electronic devices.
As shown in fig. 2, the signature information transmitting apparatus 200 of some embodiments includes: an acquisition unit 201, an encoding processing unit 202, an execution unit 203, a first generation unit 204, a second generation unit 205, and a transmission unit 206. Wherein the acquisition unit 201 is configured to acquire a video to be encoded; the encoding processing unit 202 is configured to encode the video to be encoded to obtain an encoded video to be encoded as a target code stream set, wherein a target code stream in the target code stream set corresponds to an image to be encoded in the video to be encoded, and the target code stream in the target code stream set comprises key code stream information and non-key code stream information; the execution unit 203 is configured to execute, for each target code stream in the target code stream set, the following steps: encrypting the key stream information included in the target code stream by using a first preset secret key to obtain key stream encryption information, wherein the first preset secret key is a public key which is generated through a preset symmetric encryption function and corresponds to the key stream information; encrypting the non-key stream information included in the target code stream by using a second preset secret key to obtain non-key stream encryption information, wherein the second preset secret key is a public key corresponding to the non-key stream information generated by a preset symmetric encryption function; generating encryption stream information according to the key stream encryption information and the non-key stream encryption information; the first generating unit 204 is configured to generate a summary information set according to the generated respective encrypted stream information; the second generation unit 205 is configured to generate signature information from the above summary information set; the transmitting unit 206 is configured to transmit the signature information described above to an associated receiving end.
It will be appreciated that the elements described in the apparatus 200 correspond to the various steps in the method described with reference to fig. 1. Thus, the operations, features and resulting benefits described above for the method are equally applicable to the apparatus 200 and the units contained therein, and are not described in detail herein.
Referring now to FIG. 3, a schematic diagram of an electronic device (e.g., computing device) 300 suitable for use in implementing some embodiments of the present disclosure is shown. The electronic device shown in fig. 3 is merely an example and should not impose any limitations on the functionality and scope of use of embodiments of the present disclosure.
As shown in fig. 3, the electronic device 300 may include a processing means (e.g., a central processing unit, a graphics processor, etc.) 301 that may perform various suitable actions and processes in accordance with a program stored in a Read Only Memory (ROM) 302 or a program loaded from a storage means 308 into a Random Access Memory (RAM) 303. In the RAM 303, various programs and data required for the operation of the electronic device 600 are also stored. The processing device 601, the ROM 602, and the RAM 603 are connected to each other through a bus 604. An input/output (I/O) interface 605 is also connected to bus 304.
In general, the following devices may be connected to the I/O interface 305: input devices 303 including, for example, a touch screen, touchpad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; an output device 307 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 308 including, for example, magnetic tape, hard disk, etc.; and communication means 309. The communication means 309 may allow the electronic device 300 to communicate with other devices wirelessly or by wire to exchange data. While fig. 3 shows an electronic device 300 having various means, it is to be understood that not all of the illustrated means are required to be implemented or provided. More or fewer devices may be implemented or provided instead. Each block shown in fig. 3 may represent one device or a plurality of devices as needed.
In particular, according to some embodiments of the present disclosure, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, some embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flow chart. In such embodiments, the computer program may be downloaded and installed from a network via communications device 309, or from storage device 308, or from ROM 302. The above-described functions defined in the methods of some embodiments of the present disclosure are performed when the computer program is executed by the processing means 301.
It should be noted that, the computer readable medium described in some embodiments of the present disclosure may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In some embodiments of the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In some embodiments of the present disclosure, however, the computer-readable signal medium may comprise a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, fiber optic cables, RF (radio frequency), and the like, or any suitable combination of the foregoing.
In some implementations, the clients, servers may communicate using any currently known or future developed network protocol, such as HTTP (Hyper Text Transfer Protocol ), and may be interconnected with any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the internet (e.g., the internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed networks.
The computer readable medium may be contained in the electronic device; or may exist alone without being incorporated into the electronic device. The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: acquiring a video to be encoded; the video to be encoded is encoded to obtain an encoded video to be encoded as a target code stream set, wherein a target code stream in the target code stream set corresponds to an image to be encoded in the video to be encoded, and the target code stream in the target code stream set comprises key code stream information and non-key code stream information; for each target code stream in the target code stream set, the following steps are executed: encrypting the key stream information included in the target code stream by using a first preset secret key to obtain key stream encryption information, wherein the first preset secret key is a public key which is generated through a preset symmetric encryption function and corresponds to the key stream information; encrypting the non-key stream information included in the target code stream by using a second preset secret key to obtain non-key stream encryption information, wherein the second preset secret key is a public key corresponding to the non-key stream information generated by a preset symmetric encryption function; generating encryption stream information according to the key stream encryption information and the non-key stream encryption information; generating a summary information set according to the generated encrypted stream information; generating signature information according to the summary information set; and sending the signature information to an associated receiving end.
Computer program code for carrying out operations for some embodiments of the present disclosure may be written in one or more programming languages, including an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in some embodiments of the present disclosure may be implemented by means of software, or may be implemented by means of hardware. The described units may also be provided in a processor, for example, described as: a processor includes an acquisition unit, an encoding processing unit, an execution unit, a first generation unit, a second generation unit, and a transmission unit. The names of these units do not constitute a limitation on the unit itself in some cases, and for example, the acquisition unit may also be described as "a unit that acquires video to be encoded".
The functions described above herein may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: a Field Programmable Gate Array (FPGA), an Application Specific Integrated Circuit (ASIC), an Application Specific Standard Product (ASSP), a system on a chip (SOC), a Complex Programmable Logic Device (CPLD), and the like.
The foregoing description is only of the preferred embodiments of the present disclosure and description of the principles of the technology being employed. It will be appreciated by those skilled in the art that the scope of the invention in the embodiments of the present disclosure is not limited to the specific combination of the above technical features, but encompasses other technical features formed by any combination of the above technical features or their equivalents without departing from the spirit of the invention. Such as the above-described features, are mutually substituted with (but not limited to) the features having similar functions disclosed in the embodiments of the present disclosure.

Claims (10)

1. A signature information transmission method, comprising:
acquiring a video to be encoded;
the video to be encoded is encoded to obtain an encoded video to be encoded as a target code stream set, wherein a target code stream in the target code stream set corresponds to an image to be encoded in the video to be encoded, and the target code stream in the target code stream set comprises key code stream information and non-key code stream information;
for each target code stream in the target code stream set, performing the steps of:
encrypting key stream information included in the target code stream by using a first preset secret key to obtain key stream encryption information, wherein the first preset secret key is a public key which is generated through a preset symmetric encryption function and corresponds to the key stream information;
encrypting non-key stream information included in the target code stream by using a second preset secret key to obtain non-key stream encryption information, wherein the second preset secret key is a public key corresponding to the non-key stream information generated by a preset symmetric encryption function;
generating encryption stream information according to the key stream encryption information and the non-key stream encryption information;
Generating a summary information set according to the generated encrypted stream information;
generating signature information according to the abstract information set;
and sending the signature information to an associated receiving end.
2. The method of claim 1, wherein prior to said generating signature information from said summary information set, the method further comprises:
and generating a signature private key and a signature public key according to a preset signature function.
3. The method of claim 2, wherein the generating signature information from the summary information set comprises:
sequencing each piece of summary information included in the summary information set to obtain each piece of summary information after sequencing as a summary information sequence;
each piece of summary information included in the summary information sequence is subjected to combination processing to generate combined summary information;
and encrypting the combined abstract information by using the signature private key to generate signature information.
4. The method of claim 1, wherein the generating a summary information set from the generated respective encrypted stream information comprises:
for each piece of generated encrypted code stream information, carrying out hash processing on the encrypted code stream information by using a preset hash function to obtain the encrypted code stream information after the hash processing as abstract information;
And determining each piece of obtained summary information as a summary information set.
5. The method of claim 2, wherein after the generating signature information from the summary information set, the method further comprises:
transmitting the signature public key, the signature information and a preset hash function to an associated authentication server so that the authentication server generates certificate information corresponding to the video to be encoded;
receiving certificate information sent by the authentication server;
determining a key stream security parameter information set according to the first preset key, the encryption stream information and the certificate information;
determining a non-key stream security parameter information set according to the second preset secret key, the encryption stream information and the certificate information;
and sending the key stream security parameter information and the non-key stream security parameter information to an associated receiving end.
6. The method of claim 1, wherein the encoding the video to be encoded to obtain the encoded video to be encoded as a target code stream set comprises:
performing color space transformation processing on the video to be coded to obtain color space transformation video;
For each frame of color space transformed image in the color space transformed video, performing the steps of:
performing image segmentation processing on the color space conversion image to generate a color space conversion segmented image set;
performing coding processing on the color space transformation segmented image set to obtain a coded color space transformation segmented image set as a target code stream;
and determining each obtained target code stream as a target code stream set.
7. The method of claim 6, wherein the encoding the set of color space transformed segmented images to obtain the encoded set of color space transformed segmented images as a target code stream comprises:
for each color space transformation segmented image in the set of color space transformation segmented images, performing the steps of:
performing transformation processing on the color space transformation segmented image to generate a frequency coefficient matrix corresponding to the color space transformation segmented image;
carrying out quantization processing on the frequency coefficient matrix to generate a quantization matrix;
determining a quantization array according to the quantization matrix;
encoding the quantization array to generate encoded information;
And determining a target code stream according to the generated coding information.
8. A signature information transmitting apparatus comprising:
an acquisition unit configured to acquire a video to be encoded;
the coding processing unit is configured to code the video to be coded to obtain a target code stream set of the video to be coded after the coding processing, wherein a target code stream in the target code stream set corresponds to an image to be coded in the video to be coded, and the target code stream in the target code stream set comprises key code stream information and non-key code stream information;
an execution unit configured to, for each target code stream in the set of target code streams, execute the steps of: encrypting key stream information included in the target code stream by using a first preset secret key to obtain key stream encryption information, wherein the first preset secret key is a public key which is generated through a preset symmetric encryption function and corresponds to the key stream information; encrypting non-key stream information included in the target code stream by using a second preset secret key to obtain non-key stream encryption information, wherein the second preset secret key is a public key corresponding to the non-key stream information generated by a preset symmetric encryption function; generating encryption stream information according to the key stream encryption information and the non-key stream encryption information;
A first generation unit configured to generate a summary information set from the generated respective encrypted stream information;
a second generation unit configured to generate signature information from the summary information set;
and a transmitting unit configured to transmit the signature information to an associated receiving end.
9. An electronic device, comprising:
one or more processors;
a storage device having one or more programs stored thereon;
when executed by the one or more processors, causes the one or more processors to implement the method of any of claims 1 to 7.
10. A computer readable medium having stored thereon a computer program, wherein the program when executed by a processor implements the method of any of claims 1 to 7.
CN202410050406.4A 2024-01-12 2024-01-12 Signature information transmitting method, signature information transmitting device, electronic equipment and computer readable medium Pending CN117834951A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410050406.4A CN117834951A (en) 2024-01-12 2024-01-12 Signature information transmitting method, signature information transmitting device, electronic equipment and computer readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410050406.4A CN117834951A (en) 2024-01-12 2024-01-12 Signature information transmitting method, signature information transmitting device, electronic equipment and computer readable medium

Publications (1)

Publication Number Publication Date
CN117834951A true CN117834951A (en) 2024-04-05

Family

ID=90517505

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410050406.4A Pending CN117834951A (en) 2024-01-12 2024-01-12 Signature information transmitting method, signature information transmitting device, electronic equipment and computer readable medium

Country Status (1)

Country Link
CN (1) CN117834951A (en)

Similar Documents

Publication Publication Date Title
US11290252B2 (en) Compression and homomorphic encryption in secure query and analytics
US5907619A (en) Secure compressed imaging
US9883215B2 (en) Method and device for compressing and expanding image intended for encrypted communication, program, and storage medium
EP1487148A1 (en) Data processing apparatus and method thereof
JP6608436B2 (en) Encoder, decoder and method using partial data encryption
Zhang et al. Harnessing the hybrid cloud for secure big image data service
Chen et al. ARM-embedded implementation of a video chaotic secure communication via WAN remote transmission with desirable security and frame rate
Li et al. A novel 1D chaotic system for image encryption, authentication and compression in cloud
Zhang et al. Design and ARM-embedded implementation of a chaotic secure communication scheme based on H. 264 selective encryption
CN114785524B (en) Electronic seal generation method, device, equipment and medium
Bahrami et al. Encryption of multimedia content in partial encryption scheme of DCT transform coefficients using a lightweight stream algorithm
Gan et al. Content-adaptive image compression and encryption via optimized compressive sensing with double random phase encoding driven by chaos
Yang et al. Efficient color image encryption by color-grayscale conversion based on steganography
Fu et al. Cloud-decryption-assisted image compression and encryption based on compressed sensing
Yuan et al. On the security of encrypted jpeg image with adaptive key generated by invariant characteristic
Durdu Image transfer with secure communications application using a new reversible chaotic image encryption
Shao et al. Trinion discrete cosine transform with application to color image encryption
CN117834951A (en) Signature information transmitting method, signature information transmitting device, electronic equipment and computer readable medium
CN114499893B (en) Bidding file encryption and evidence storage method and system based on block chain
Ahmad et al. Region-Based Selective Compression and Selective Encryption of Medical Images
CN116847036B (en) Image display method, apparatus, electronic device, and computer-readable medium
CN111131270A (en) Data encryption and decryption method and device, electronic equipment and storage medium
Kester A Hybrid Lossy Compression Using 2-D Discrete Cosine Transform and Visual Cryptographic Technique for Security of Multimedia Image Data Communications in Internet of Things
CN116760992B (en) Video encoding, authentication, encryption and transmission methods, devices, equipment and media
Mua’ad Abu-Faraj et al. A DUAL APPROACH TO DIGITAL AUDIO SIGNAL CRYPTOGRAPHY

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination