CN201860384U - Video encryption camera - Google Patents

Video encryption camera Download PDF

Info

Publication number
CN201860384U
CN201860384U CN2010202798865U CN201020279886U CN201860384U CN 201860384 U CN201860384 U CN 201860384U CN 2010202798865 U CN2010202798865 U CN 2010202798865U CN 201020279886 U CN201020279886 U CN 201020279886U CN 201860384 U CN201860384 U CN 201860384U
Authority
CN
China
Prior art keywords
video
module
encryption
video data
preprocessor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2010202798865U
Other languages
Chinese (zh)
Inventor
李军
何任飞
李榕
梁展明
黄桂有
戴波
蔡宝强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
South China Normal University
Original Assignee
South China Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by South China Normal University filed Critical South China Normal University
Priority to CN2010202798865U priority Critical patent/CN201860384U/en
Application granted granted Critical
Publication of CN201860384U publication Critical patent/CN201860384U/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The utility model relates to a video encryption camera, which comprises a video acquisition module, a video preprocessing and encrypting module, a video storage module and a video transmitting module. The video acquisition module acquires video and transmits the video to the video preprocessing and encrypting module for preprocessing each frame of video data, a chaotic encryption system in the video storage module is invoked for calculating and generating chaotic sequences, the chaotic sequences and all frames of the video data are subjected to XOR operation for encrypting the video data, and the encrypted video data is stored in the video storage module or transmitted to a remote client through a video transmitting module network in real time. The video encryption camera encrypts video data while acquiring video data and preprocessing the video data, the encrypted video data is stored in the video storage module or transmitted to the remote client in real time, and accordingly original video data can avoid being stolen or falsified illegally.

Description

Video-encryption camera
Technical field
The utility model belongs to the video information safety technical field, relates to a kind of video data being had the encryption function video camera.
Background technology
At present, the stand-alone type video acquisition system that is applicable to outdoor follow shot all is that the video information that will collect directly is stored in its memory module.But; along with development of science and technology; the means of various thefts, the video content of distorting also develop rapidly, the authenticity of original video files content and reliability, with and the intellectual property that relates to all be subjected to serious threat, the video information protection in some field is extremely urgent.For example, often need during making and improving, prevent that content from leaking for the shooting of film, documentary film etc., and prevent that in the later stage content is copied freely propagation; And for example the original video data for the monitoring video in bank, examination hall etc. need prevent by people's malicious modification to ensure its authenticity and reliability; Ge Ren video information also needs to be maintained secrecy to prevent the leakage of individual privacy for another example.
In addition, adopt the authentication techniques of " usemame/password " mostly based on the monitoring remote video safe practice of fixed camera, video data is not encrypted in transmission course, is vulnerable to assault.And part adopts in the video monitoring system of video-encryption in the prior art, video is taken in equipment and video-encryption equipment is two autonomous devices, the integrated level of system is low, the assailant still can be by the video absorption equipment original video data of stealing or distort, there is potential safety hazard, also is not suitable for portable occasion simultaneously.
The utility model content
The purpose of this utility model is to overcome shortcoming of the prior art with not enough, and a kind of video-encryption camera is provided.
The utility model is achieved through the following technical solutions: a kind of video-encryption camera comprises video acquisition module, video preprocessor processing and encrypting module, video storage module and video transmission module.Described video acquisition module is sent to video preprocessor processing and encrypting module with video data after finishing video acquisition, video preprocessor is handled and encrypting module carries out preliminary treatment to each frame video data, and then the generation chaos sequence calculates in the chaos encryption system of calling in the video storage module, thereby then chaos sequence and each frame video data are carried out XOR video data is encrypted, the video data after the encryption is stored in real time in the video storage module or by the video transmission module network and transfers to Terminal Server Client.
Further, store at least two different chaos encryption systems in the described video storage module, video preprocessor is handled and encrypting module is encrypted video data according to the chaos encryption system that user instruction calls appointment.
Concrete, described video preprocessor is handled and encrypting module is a dsp chip.Described video acquisition module comprises camera lens, ccd sensor and A/D converter, external object is by camera lens imaging on ccd sensor, ccd sensor converts optical imagery to digital image information by A/D converter, is delivered to video preprocessor then and handles and encrypting module.Described video transmission module comprises VGA interface, I/O interface and ethernet communication device.Described video storage module comprises SDRAM, FLASH ROM, SD storage card and big capacity hard disk, wherein, store a plurality of chaos encryption system among the FLASH ROM, comprise Lorenz chaos encryption system, Logistic chaos encryption system, Liu chaos encryption system and two-dimentional cat mapping chaos encryption system, the video data after big capacity hard disk is handled and encrypted in order to the storage process.
With respect to prior art, video-encryption camera of the present utility model is being gathered video data and video data is carried out pretreatedly simultaneously video data being encrypted, video data after the encryption is stored in the video storage module or by the video transmission module and is sent to Terminal Server Client, the consequence of having avoided original video data to be illegally stolen or altered.In addition, a plurality of different chaos encryption system is stored in the video storage module to be selected to call for the user at random, has avoided the single encryption of video data and easy crack, the fail safe that has improved encryption efficiency and video data.Be widely used in the demand for security of stationary applica-tions such as web camera and the demand for security of an outdoor portable application such as shooting.
In order to understand the utility model more clearly, set forth embodiment of the present utility model below with reference to description of drawings.
Description of drawings
Fig. 1 is the structured flowchart of the utility model video-encryption camera.
Fig. 2 is the function schematic diagram of contrast stretching conversion function.
Fig. 3 is a Lorenz chaos system cryptographic algorithm flow chart.
Embodiment
Embodiment 1
See also Fig. 1, it is the structured flowchart of the utility model video-encryption camera.This video-encryption camera 100 comprises video acquisition module 110, video preprocessor processing and encrypting module 120, video storage module 130 and video transmission module 140.This video acquisition module 110 is finished video acquisition, and video data is sent to video preprocessor processing and encrypting module 120.Because the video council of taking is subjected to the restriction and the interference of various conditions, transmit definition and video quality that the noise pollution that produced etc. has influence on video as light inequality, circuit, so video preprocessor is handled and encrypting module 120 at first carries out preliminary treatment to improve its video quality to video data; And then video data encrypted.Under single cpu mode, will be stored in real time in the video storage module 130 through the video data after video preprocessor processing and encrypting module 120 encryptions.Video transmission module 140 is mainly finished the network service based on ICP/IP protocol, can be sent to client in real time by video transmission module 140 through the video data after video preprocessor processing and encrypting module 120 encryptions.
Concrete, described video acquisition module 110 comprises camera lens and image acquisition circuit.Described image acquisition circuit comprises ccd sensor and A/D converter, external object is by camera lens imaging on ccd sensor, after video acquisition module 110 receives acquisition instructions, ccd sensor converts optical imagery to digital image information by A/D converter, is delivered to video preprocessor then and handles and encrypting module 120.
Described video preprocessor is handled and encrypting module 120 specifically is made up of dsp chip (digital signal processing chip), it is the core of this video-encryption camera 100, in order to handle view data, finish figure image intensifying and encryption function from video acquisition module 110.
Described video storage module 130 comprises SDRAM (synchronous DRAM), FLASH ROM (flash memory), SD storage card (secure digital storage card) and big capacity hard disk.Wherein, SDRAM mainly stores the built-in operating system of video camera, plug-in, kernel data, view data etc.; FLASH ROM mainly stores the program or the document of developer's exploitation, store a plurality of chaos encryption system among the FLASH ROM of the present utility model, comprise Lorenz (Lorentz) chaos encryption system, Logistic (Rogers's base of a fruit) chaos encryption system, Liu (Liu Shi) chaos encryption system and two-dimentional cat mapping chaos encryption system etc.; The SD storage card is an expansion card, and some important documents or program that FLASH ROM produces can select unloading to this SD storage card; Video data after big capacity hard disk is handled and encrypted in order to the storage process.
Described video transmission module 140 includes VGA (Video Graphics Array) interface, I/O interface and ethernet communication device, makes video data to export Terminal Server Client to by multiple transmission means.
Below specify the course of work of this video-encryption camera 100:
S1: start this video-encryption camera 100;
S2: after video acquisition module 110 received acquisition instructions, ccd sensor converted optical imagery to digital image information by A/D converter, was delivered to video preprocessor then and handled and encrypting module 120;
S3: this video preprocessor is handled and 120 pairs of video images of encrypting module carry out video enhancing and encryption;
S4: under the pattern of unit, the video image after the encryption is stored in the big capacity hard disk.
If under the network remote control model, Terminal Server Client can send commands for controlling and start this video-encryption camera 100; Equally, after video acquisition module 110 received acquisition instructions, ccd sensor converted optical imagery to digital image information by A/D converter, was delivered to video preprocessor then and handled and encrypting module 120; This video preprocessor is handled and 120 pairs of video images of encrypting module carry out video enhancing and encryption; Video image after the encryption then is sent to Terminal Server Client in real time by network.
Video image after the encryption can't be consulted or be distorted.Just can watch original video after having only the decrypted program deciphering of validated user by correspondence.
This video preprocessor is handled and the Preprocessing Algorithm of encrypting module 120 is specially: adopt the piecewise linearity method of changing, be about to be divided into two sections or multistage between the video image gray area, then each section is done linear transformation respectively.The piecewise linearity method of changing that adopts contrast to stretch in the present embodiment, the dynamic range of gray scale when handling to improve.See also Fig. 2, it is the function schematic diagram of contrast stretching conversion function.The function expression that contrast stretches is:
f ( x ) = y 1 &CenterDot; x / x 1 x < x 1 ( y 2 - y 1 ) ( x - x 1 ) / ( x 2 - x 1 ) + y 1 x 1 &le; x &le; x 2 ( 255 - y 2 ) ( x - x 2 ) / ( 255 - x 2 ) + y 2 x > x 2
In the formula: (x 1, y 1) and (x 2, y 2) be two breakover point coordinates among Fig. 2.
The operation result of above-mentioned contrast stretching conversion function is at x with former figure 1And x 2Between gray scale be stretched to y 1And y 2Between.By between selectable stretching section gray area, can control the distribution of image grey level histogram neatly, to improve the quality of output image.
This video preprocessor is handled and 120 pairs of images of encrypting module carry out after the preliminary treatment, specifies the chaos encryption system that view data is encrypted for one that is stored among the FLASH ROM according to operating personnel's instruction calls.In the present embodiment, be example with the algorithm that calls the encryption of Lorenz chaos system, illustrate that this video preprocessor is handled and 120 pairs of view data of encrypting module are carried out encrypted process.
The kinetic equation of Lorenz system is:
dx / dt = - u ( x - y ) dy / dt = - xz + rz - y dz / dt = xy - bz
U in the formula, r, b is a system parameters, representative value is got u=10, r=28, b=8/3.Keeping u, b is constant, and r>24.74 an o'clock system enters chaos state.Here three-dimensional Lorenz system needs numerical integrating to generate chaos sequence, has selected Euler method in the present embodiment.The amount of calculation that this method requires is high but can reach the effect of scramble.The utilization Euler method turns to difference equation with equation: definition x, y, z are double, choose key initial value x (0)=0.6, y (0)=0.4, z (0)=0.6.Under the situation of given initial value, use following three equations to produce chaos series:
x ( i + 1 ) = x ( i ) + h * u * ( y ( i ) - x ) y ( i + 1 ) = y ( i ) + h * ( - x ( i ) * z ( i ) + r * x ( i ) - y ( i ) ) z ( i + 1 ) = z ( i ) + h * ( x ( i ) * y ( i ) - b * z ( i ) )
The equation parameter value is chosen h=0.001, u=10, and r=28, b=8/3, this system produces three chaos sequence x (i), y (i), z (i), intersect a mixing new sequence p of formation (i) promptly by three sequence numbers:
p(i)={x(1),y(1),z(1),x(2),y(2),z(2)...}。
As shown in Figure 3, with chaos sequence p (i) thus carrying out XOR with the raw video image data produces the ciphertext video data.
The decipherment algorithm of validated user is the inverse process of above-mentioned cryptographic algorithm.Reverting to original video data after the deciphering can normally watch.
With respect to prior art, video-encryption camera of the present utility model is being gathered video data and video data is carried out pretreatedly simultaneously video data being encrypted, video data after the encryption is stored in the video storage module, the consequence of having avoided original video data to be illegally stolen or altered.In addition, a plurality of different chaos encryption system is stored in the video storage module to be selected to call for the user at random, has avoided the single encryption of video data and easy crack, the fail safe that has improved encryption efficiency and video data.
Embodiment 2
Present embodiment and embodiment 1 have same video-encryption camera 100 structures, its difference only is that the video preprocessor in the present embodiment is handled and 120 pairs of images of encrypting module carry out after the preliminary treatment, according to operating personnel's instruction calls any one chaos encryption system among the FLASHROM of being stored in video data is carried out the dynamic key chaos system and encrypts.The principle that the dynamic key chaos system is encrypted is: the video data to each frame is encrypted with different keys, and this key has also carried out the chaos system scramble.
Present embodiment adopts Lorenz chaos system dynamic key enciphered method.As described in embodiment 1, Lorenz system dynamic equation is:
dx / dt = - u ( x - y ) dy / dt = - xz + rz - y dz / dt = xy - bz
U in the formula, r, b is a system parameters, representative value is got u=10, b=8/3.Keeping u, b is constant, and r>24.74 an o'clock system enters chaos state.As described in example 1 above, the Lorenz chaos system has produced three chaos sequences
H(i),J(i),K(i),i=1,2,3,4...m,
It is dynamic initial key that native system is looked G (n), and choosing of it is by even value in following definite span [0.6,1].That is:
If G (0)=0.6, so
Figure BSA00000214524700052
0.6<G (n)≤1 wherein, n=1,2,3,4 ... m
So G (n), n=1,2,3,4 ... m is a sequence that sorts from small to large.Then utilize the Lorenz chaos system that this sequence is carried out the order scramble once more, realize that principle is as follows:
Choose a sequence in three chaos sequences that the Lorenz chaos system produces arbitrarily, as get H (i), i=1,2,3,4 ... the m sequence, programming makes G (n), n=1 then, 2,3,4 ... ordering size and the H (i) of m, i=1,2,3,4 ... m series arrangement order size is consistent, G (n) like this, n=1,2,3,4 ... the m sequence just becomes a new sequence
U(n),n=1,2,3,4…m,
Make dynamic initial key have chaotic characteristic, become more unpredictable.
This new sequence U (n), n=1,2,3,4 ... m calculates the back by the Lorenz chaos system and forms new sequence P as the different key initial values of Lorenz chaos system 1(i), P 2(i) ... P m(i),
Promptly when dynamic initial key is U (1), form new sequence P by the Lorentz kinetic equation 1(i), by that analogy, when initial key is U (2), U (3) ... during U (m), form new sequence by the Lorentz kinetic equation
P 2(i),P 3(i)......P m(i)。
These new sequences are carried out XOR with the video data of each frame respectively then, form enciphered video data.
The application of this dynamic initial key makes that decoding will be complicated more.
Compare with embodiment 1, adopt the chaos system of dynamic initial key complicated more than the chaos system of static keys, decoding difficulty increases, and confidentiality is stronger.
The utility model is not limited to above-mentioned execution mode, if various changes of the present utility model or distortion are not broken away from spirit and scope of the present utility model, if these changes and distortion belong within claim of the present utility model and the equivalent technologies scope, then the utility model also is intended to comprise these changes and distortion.

Claims (5)

1. video-encryption camera, it is characterized in that: comprise video acquisition module, video preprocessor processing and encrypting module, video storage module and video transmission module, described video acquisition module is sent to video preprocessor processing and encrypting module with video data after finishing video acquisition, video preprocessor is handled and encrypting module carries out preliminary treatment and encryption to each frame video data, and the video data after the encryption is stored in real time in the video storage module or by the video transmission module network and transfers to Terminal Server Client.
2. video-encryption camera according to claim 1 is characterized in that: described video preprocessor is handled and encrypting module is a dsp chip.
3. video-encryption camera according to claim 1, it is characterized in that: described video acquisition module comprises camera lens, ccd sensor and A/D converter, external object is by camera lens imaging on ccd sensor, ccd sensor converts optical imagery to digital image information by A/D converter, is delivered to video preprocessor then and handles and encrypting module.
4. video-encryption camera according to claim 1 is characterized in that: described video transmission module comprises VGA interface, I/O interface and ethernet communication device.
5. video-encryption camera according to claim 1 is characterized in that: described video storage module comprises SDRAM, FLASH ROM, SD storage card and big capacity hard disk, the video data after big capacity hard disk is handled and encrypted in order to the storage process.
CN2010202798865U 2010-08-02 2010-08-02 Video encryption camera Expired - Fee Related CN201860384U (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010202798865U CN201860384U (en) 2010-08-02 2010-08-02 Video encryption camera

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010202798865U CN201860384U (en) 2010-08-02 2010-08-02 Video encryption camera

Publications (1)

Publication Number Publication Date
CN201860384U true CN201860384U (en) 2011-06-08

Family

ID=44106183

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010202798865U Expired - Fee Related CN201860384U (en) 2010-08-02 2010-08-02 Video encryption camera

Country Status (1)

Country Link
CN (1) CN201860384U (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102572392A (en) * 2011-12-21 2012-07-11 成都众询科技有限公司 Digital signal processor (DSP)-based wired and wireless transmission digital video acquisition system
CN103297736A (en) * 2013-06-13 2013-09-11 深圳南方汉邦数字技术有限公司 System and method for data storage and network transmission of video monitoring
CN104469274A (en) * 2013-09-22 2015-03-25 华南师范大学 An intelligent video surveillance system
CN104735322A (en) * 2015-03-25 2015-06-24 江苏物联网研究发展中心 Safety web camera with hardware encryption function
CN108881664A (en) * 2018-07-10 2018-11-23 深圳市华讯方舟太赫兹科技有限公司 Image storage and deployment method, processing equipment, processing system, storage device
CN112041904A (en) * 2018-05-07 2020-12-04 索尼公司 Communication terminal, sensing device and server

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102572392A (en) * 2011-12-21 2012-07-11 成都众询科技有限公司 Digital signal processor (DSP)-based wired and wireless transmission digital video acquisition system
CN103297736A (en) * 2013-06-13 2013-09-11 深圳南方汉邦数字技术有限公司 System and method for data storage and network transmission of video monitoring
CN104469274A (en) * 2013-09-22 2015-03-25 华南师范大学 An intelligent video surveillance system
CN104735322A (en) * 2015-03-25 2015-06-24 江苏物联网研究发展中心 Safety web camera with hardware encryption function
CN112041904A (en) * 2018-05-07 2020-12-04 索尼公司 Communication terminal, sensing device and server
CN108881664A (en) * 2018-07-10 2018-11-23 深圳市华讯方舟太赫兹科技有限公司 Image storage and deployment method, processing equipment, processing system, storage device

Similar Documents

Publication Publication Date Title
CN101902576B (en) Video-encryption camera and encryption method thereof
CN201860384U (en) Video encryption camera
CN101739695B (en) Three-dimensional Arnold mapping-based image grouping encryption method
Zhang et al. Cryptanalysis of S-box-only chaotic image ciphers against chosen plaintext attack
CN106251278A (en) A kind of image encryption territory based on histogram feature reversible information hidden method
Arya et al. A literature review on various recent steganography techniques
CN105847629A (en) Reversible information hiding method for encrypted image
Zhu et al. Image encryption algorithm with an avalanche effect based on a six-dimensional discrete chaotic system
Gao et al. Chaotic image encryption algorithm based on zigzag transform with bidirectional crossover from random position
Zhang et al. A new chaotic algorithm for image encryption
CN103491279A (en) 4-neighborhood exclusive or image encryption method based on hyper-chaos Lorenz system
CN103442157A (en) Image encryption method based on Arnold transformations and Henon chaotic system
CN103501224A (en) Asymmetric image encryption and decryption method based on quantum cell neural network system
CN114679250B (en) Image encryption algorithm based on mixed chaos and Arnold transformation
Man et al. A novel image encryption algorithm based on least squares generative adversarial network random number generator
CN106330435A (en) Key transformation method and device, and terminal
Zhang Plaintext related image encryption scheme using chaotic map
Noura et al. Design of a fast and robust chaos-based crypto-system for image encryption
Abdul-Hussein et al. Secured Transfer and Storage Image Data for Cloud Communications.
CN109618073A (en) A kind of more figure encryption methods based on Hyperchaotic Chen System
Huang et al. Duple color image encryption system based on 3D non-equilateral Arnold transform for IIoT
CN103593590A (en) Mixing additivity multi-time watermark embedding method and decoding method based on cloud environment
Rahman et al. A real-time privacy-sensitive data hiding approach based on chaos cryptography
CN101582170B (en) Remote sensing image encryption method based on elliptic curve cryptosystem
CN106529316B (en) Image data encryption method and device, web camera

Legal Events

Date Code Title Description
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20110608

Termination date: 20140802

EXPY Termination of patent right or utility model