CN201860384U - Video encryption camera - Google Patents
Video encryption camera Download PDFInfo
- Publication number
- CN201860384U CN201860384U CN2010202798865U CN201020279886U CN201860384U CN 201860384 U CN201860384 U CN 201860384U CN 2010202798865 U CN2010202798865 U CN 2010202798865U CN 201020279886 U CN201020279886 U CN 201020279886U CN 201860384 U CN201860384 U CN 201860384U
- Authority
- CN
- China
- Prior art keywords
- video
- module
- encryption
- video data
- preprocessor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The utility model relates to a video encryption camera, which comprises a video acquisition module, a video preprocessing and encrypting module, a video storage module and a video transmitting module. The video acquisition module acquires video and transmits the video to the video preprocessing and encrypting module for preprocessing each frame of video data, a chaotic encryption system in the video storage module is invoked for calculating and generating chaotic sequences, the chaotic sequences and all frames of the video data are subjected to XOR operation for encrypting the video data, and the encrypted video data is stored in the video storage module or transmitted to a remote client through a video transmitting module network in real time. The video encryption camera encrypts video data while acquiring video data and preprocessing the video data, the encrypted video data is stored in the video storage module or transmitted to the remote client in real time, and accordingly original video data can avoid being stolen or falsified illegally.
Description
Technical field
The utility model belongs to the video information safety technical field, relates to a kind of video data being had the encryption function video camera.
Background technology
At present, the stand-alone type video acquisition system that is applicable to outdoor follow shot all is that the video information that will collect directly is stored in its memory module.But; along with development of science and technology; the means of various thefts, the video content of distorting also develop rapidly, the authenticity of original video files content and reliability, with and the intellectual property that relates to all be subjected to serious threat, the video information protection in some field is extremely urgent.For example, often need during making and improving, prevent that content from leaking for the shooting of film, documentary film etc., and prevent that in the later stage content is copied freely propagation; And for example the original video data for the monitoring video in bank, examination hall etc. need prevent by people's malicious modification to ensure its authenticity and reliability; Ge Ren video information also needs to be maintained secrecy to prevent the leakage of individual privacy for another example.
In addition, adopt the authentication techniques of " usemame/password " mostly based on the monitoring remote video safe practice of fixed camera, video data is not encrypted in transmission course, is vulnerable to assault.And part adopts in the video monitoring system of video-encryption in the prior art, video is taken in equipment and video-encryption equipment is two autonomous devices, the integrated level of system is low, the assailant still can be by the video absorption equipment original video data of stealing or distort, there is potential safety hazard, also is not suitable for portable occasion simultaneously.
The utility model content
The purpose of this utility model is to overcome shortcoming of the prior art with not enough, and a kind of video-encryption camera is provided.
The utility model is achieved through the following technical solutions: a kind of video-encryption camera comprises video acquisition module, video preprocessor processing and encrypting module, video storage module and video transmission module.Described video acquisition module is sent to video preprocessor processing and encrypting module with video data after finishing video acquisition, video preprocessor is handled and encrypting module carries out preliminary treatment to each frame video data, and then the generation chaos sequence calculates in the chaos encryption system of calling in the video storage module, thereby then chaos sequence and each frame video data are carried out XOR video data is encrypted, the video data after the encryption is stored in real time in the video storage module or by the video transmission module network and transfers to Terminal Server Client.
Further, store at least two different chaos encryption systems in the described video storage module, video preprocessor is handled and encrypting module is encrypted video data according to the chaos encryption system that user instruction calls appointment.
Concrete, described video preprocessor is handled and encrypting module is a dsp chip.Described video acquisition module comprises camera lens, ccd sensor and A/D converter, external object is by camera lens imaging on ccd sensor, ccd sensor converts optical imagery to digital image information by A/D converter, is delivered to video preprocessor then and handles and encrypting module.Described video transmission module comprises VGA interface, I/O interface and ethernet communication device.Described video storage module comprises SDRAM, FLASH ROM, SD storage card and big capacity hard disk, wherein, store a plurality of chaos encryption system among the FLASH ROM, comprise Lorenz chaos encryption system, Logistic chaos encryption system, Liu chaos encryption system and two-dimentional cat mapping chaos encryption system, the video data after big capacity hard disk is handled and encrypted in order to the storage process.
With respect to prior art, video-encryption camera of the present utility model is being gathered video data and video data is carried out pretreatedly simultaneously video data being encrypted, video data after the encryption is stored in the video storage module or by the video transmission module and is sent to Terminal Server Client, the consequence of having avoided original video data to be illegally stolen or altered.In addition, a plurality of different chaos encryption system is stored in the video storage module to be selected to call for the user at random, has avoided the single encryption of video data and easy crack, the fail safe that has improved encryption efficiency and video data.Be widely used in the demand for security of stationary applica-tions such as web camera and the demand for security of an outdoor portable application such as shooting.
In order to understand the utility model more clearly, set forth embodiment of the present utility model below with reference to description of drawings.
Description of drawings
Fig. 1 is the structured flowchart of the utility model video-encryption camera.
Fig. 2 is the function schematic diagram of contrast stretching conversion function.
Fig. 3 is a Lorenz chaos system cryptographic algorithm flow chart.
Embodiment
Embodiment 1
See also Fig. 1, it is the structured flowchart of the utility model video-encryption camera.This video-encryption camera 100 comprises video acquisition module 110, video preprocessor processing and encrypting module 120, video storage module 130 and video transmission module 140.This video acquisition module 110 is finished video acquisition, and video data is sent to video preprocessor processing and encrypting module 120.Because the video council of taking is subjected to the restriction and the interference of various conditions, transmit definition and video quality that the noise pollution that produced etc. has influence on video as light inequality, circuit, so video preprocessor is handled and encrypting module 120 at first carries out preliminary treatment to improve its video quality to video data; And then video data encrypted.Under single cpu mode, will be stored in real time in the video storage module 130 through the video data after video preprocessor processing and encrypting module 120 encryptions.Video transmission module 140 is mainly finished the network service based on ICP/IP protocol, can be sent to client in real time by video transmission module 140 through the video data after video preprocessor processing and encrypting module 120 encryptions.
Concrete, described video acquisition module 110 comprises camera lens and image acquisition circuit.Described image acquisition circuit comprises ccd sensor and A/D converter, external object is by camera lens imaging on ccd sensor, after video acquisition module 110 receives acquisition instructions, ccd sensor converts optical imagery to digital image information by A/D converter, is delivered to video preprocessor then and handles and encrypting module 120.
Described video preprocessor is handled and encrypting module 120 specifically is made up of dsp chip (digital signal processing chip), it is the core of this video-encryption camera 100, in order to handle view data, finish figure image intensifying and encryption function from video acquisition module 110.
Described video storage module 130 comprises SDRAM (synchronous DRAM), FLASH ROM (flash memory), SD storage card (secure digital storage card) and big capacity hard disk.Wherein, SDRAM mainly stores the built-in operating system of video camera, plug-in, kernel data, view data etc.; FLASH ROM mainly stores the program or the document of developer's exploitation, store a plurality of chaos encryption system among the FLASH ROM of the present utility model, comprise Lorenz (Lorentz) chaos encryption system, Logistic (Rogers's base of a fruit) chaos encryption system, Liu (Liu Shi) chaos encryption system and two-dimentional cat mapping chaos encryption system etc.; The SD storage card is an expansion card, and some important documents or program that FLASH ROM produces can select unloading to this SD storage card; Video data after big capacity hard disk is handled and encrypted in order to the storage process.
Described video transmission module 140 includes VGA (Video Graphics Array) interface, I/O interface and ethernet communication device, makes video data to export Terminal Server Client to by multiple transmission means.
Below specify the course of work of this video-encryption camera 100:
S1: start this video-encryption camera 100;
S2: after video acquisition module 110 received acquisition instructions, ccd sensor converted optical imagery to digital image information by A/D converter, was delivered to video preprocessor then and handled and encrypting module 120;
S3: this video preprocessor is handled and 120 pairs of video images of encrypting module carry out video enhancing and encryption;
S4: under the pattern of unit, the video image after the encryption is stored in the big capacity hard disk.
If under the network remote control model, Terminal Server Client can send commands for controlling and start this video-encryption camera 100; Equally, after video acquisition module 110 received acquisition instructions, ccd sensor converted optical imagery to digital image information by A/D converter, was delivered to video preprocessor then and handled and encrypting module 120; This video preprocessor is handled and 120 pairs of video images of encrypting module carry out video enhancing and encryption; Video image after the encryption then is sent to Terminal Server Client in real time by network.
Video image after the encryption can't be consulted or be distorted.Just can watch original video after having only the decrypted program deciphering of validated user by correspondence.
This video preprocessor is handled and the Preprocessing Algorithm of encrypting module 120 is specially: adopt the piecewise linearity method of changing, be about to be divided into two sections or multistage between the video image gray area, then each section is done linear transformation respectively.The piecewise linearity method of changing that adopts contrast to stretch in the present embodiment, the dynamic range of gray scale when handling to improve.See also Fig. 2, it is the function schematic diagram of contrast stretching conversion function.The function expression that contrast stretches is:
In the formula: (x
1, y
1) and (x
2, y
2) be two breakover point coordinates among Fig. 2.
The operation result of above-mentioned contrast stretching conversion function is at x with former figure
1And x
2Between gray scale be stretched to y
1And y
2Between.By between selectable stretching section gray area, can control the distribution of image grey level histogram neatly, to improve the quality of output image.
This video preprocessor is handled and 120 pairs of images of encrypting module carry out after the preliminary treatment, specifies the chaos encryption system that view data is encrypted for one that is stored among the FLASH ROM according to operating personnel's instruction calls.In the present embodiment, be example with the algorithm that calls the encryption of Lorenz chaos system, illustrate that this video preprocessor is handled and 120 pairs of view data of encrypting module are carried out encrypted process.
The kinetic equation of Lorenz system is:
U in the formula, r, b is a system parameters, representative value is got u=10, r=28, b=8/3.Keeping u, b is constant, and r>24.74 an o'clock system enters chaos state.Here three-dimensional Lorenz system needs numerical integrating to generate chaos sequence, has selected Euler method in the present embodiment.The amount of calculation that this method requires is high but can reach the effect of scramble.The utilization Euler method turns to difference equation with equation: definition x, y, z are double, choose key initial value x (0)=0.6, y (0)=0.4, z (0)=0.6.Under the situation of given initial value, use following three equations to produce chaos series:
The equation parameter value is chosen h=0.001, u=10, and r=28, b=8/3, this system produces three chaos sequence x (i), y (i), z (i), intersect a mixing new sequence p of formation (i) promptly by three sequence numbers:
p(i)={x(1),y(1),z(1),x(2),y(2),z(2)...}。
As shown in Figure 3, with chaos sequence p (i) thus carrying out XOR with the raw video image data produces the ciphertext video data.
The decipherment algorithm of validated user is the inverse process of above-mentioned cryptographic algorithm.Reverting to original video data after the deciphering can normally watch.
With respect to prior art, video-encryption camera of the present utility model is being gathered video data and video data is carried out pretreatedly simultaneously video data being encrypted, video data after the encryption is stored in the video storage module, the consequence of having avoided original video data to be illegally stolen or altered.In addition, a plurality of different chaos encryption system is stored in the video storage module to be selected to call for the user at random, has avoided the single encryption of video data and easy crack, the fail safe that has improved encryption efficiency and video data.
Embodiment 2
Present embodiment and embodiment 1 have same video-encryption camera 100 structures, its difference only is that the video preprocessor in the present embodiment is handled and 120 pairs of images of encrypting module carry out after the preliminary treatment, according to operating personnel's instruction calls any one chaos encryption system among the FLASHROM of being stored in video data is carried out the dynamic key chaos system and encrypts.The principle that the dynamic key chaos system is encrypted is: the video data to each frame is encrypted with different keys, and this key has also carried out the chaos system scramble.
Present embodiment adopts Lorenz chaos system dynamic key enciphered method.As described in embodiment 1, Lorenz system dynamic equation is:
U in the formula, r, b is a system parameters, representative value is got u=10, b=8/3.Keeping u, b is constant, and r>24.74 an o'clock system enters chaos state.As described in example 1 above, the Lorenz chaos system has produced three chaos sequences
H(i),J(i),K(i),i=1,2,3,4...m,
It is dynamic initial key that native system is looked G (n), and choosing of it is by even value in following definite span [0.6,1].That is:
So G (n), n=1,2,3,4 ... m is a sequence that sorts from small to large.Then utilize the Lorenz chaos system that this sequence is carried out the order scramble once more, realize that principle is as follows:
Choose a sequence in three chaos sequences that the Lorenz chaos system produces arbitrarily, as get H (i), i=1,2,3,4 ... the m sequence, programming makes G (n), n=1 then, 2,3,4 ... ordering size and the H (i) of m, i=1,2,3,4 ... m series arrangement order size is consistent, G (n) like this, n=1,2,3,4 ... the m sequence just becomes a new sequence
U(n),n=1,2,3,4…m,
Make dynamic initial key have chaotic characteristic, become more unpredictable.
This new sequence U (n), n=1,2,3,4 ... m calculates the back by the Lorenz chaos system and forms new sequence P as the different key initial values of Lorenz chaos system
1(i), P
2(i) ... P
m(i),
Promptly when dynamic initial key is U (1), form new sequence P by the Lorentz kinetic equation
1(i), by that analogy, when initial key is U (2), U (3) ... during U (m), form new sequence by the Lorentz kinetic equation
P
2(i),P
3(i)......P
m(i)。
These new sequences are carried out XOR with the video data of each frame respectively then, form enciphered video data.
The application of this dynamic initial key makes that decoding will be complicated more.
Compare with embodiment 1, adopt the chaos system of dynamic initial key complicated more than the chaos system of static keys, decoding difficulty increases, and confidentiality is stronger.
The utility model is not limited to above-mentioned execution mode, if various changes of the present utility model or distortion are not broken away from spirit and scope of the present utility model, if these changes and distortion belong within claim of the present utility model and the equivalent technologies scope, then the utility model also is intended to comprise these changes and distortion.
Claims (5)
1. video-encryption camera, it is characterized in that: comprise video acquisition module, video preprocessor processing and encrypting module, video storage module and video transmission module, described video acquisition module is sent to video preprocessor processing and encrypting module with video data after finishing video acquisition, video preprocessor is handled and encrypting module carries out preliminary treatment and encryption to each frame video data, and the video data after the encryption is stored in real time in the video storage module or by the video transmission module network and transfers to Terminal Server Client.
2. video-encryption camera according to claim 1 is characterized in that: described video preprocessor is handled and encrypting module is a dsp chip.
3. video-encryption camera according to claim 1, it is characterized in that: described video acquisition module comprises camera lens, ccd sensor and A/D converter, external object is by camera lens imaging on ccd sensor, ccd sensor converts optical imagery to digital image information by A/D converter, is delivered to video preprocessor then and handles and encrypting module.
4. video-encryption camera according to claim 1 is characterized in that: described video transmission module comprises VGA interface, I/O interface and ethernet communication device.
5. video-encryption camera according to claim 1 is characterized in that: described video storage module comprises SDRAM, FLASH ROM, SD storage card and big capacity hard disk, the video data after big capacity hard disk is handled and encrypted in order to the storage process.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010202798865U CN201860384U (en) | 2010-08-02 | 2010-08-02 | Video encryption camera |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010202798865U CN201860384U (en) | 2010-08-02 | 2010-08-02 | Video encryption camera |
Publications (1)
Publication Number | Publication Date |
---|---|
CN201860384U true CN201860384U (en) | 2011-06-08 |
Family
ID=44106183
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2010202798865U Expired - Fee Related CN201860384U (en) | 2010-08-02 | 2010-08-02 | Video encryption camera |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN201860384U (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102572392A (en) * | 2011-12-21 | 2012-07-11 | 成都众询科技有限公司 | Digital signal processor (DSP)-based wired and wireless transmission digital video acquisition system |
CN103297736A (en) * | 2013-06-13 | 2013-09-11 | 深圳南方汉邦数字技术有限公司 | System and method for data storage and network transmission of video monitoring |
CN104469274A (en) * | 2013-09-22 | 2015-03-25 | 华南师范大学 | An intelligent video surveillance system |
CN104735322A (en) * | 2015-03-25 | 2015-06-24 | 江苏物联网研究发展中心 | Safety web camera with hardware encryption function |
CN108881664A (en) * | 2018-07-10 | 2018-11-23 | 深圳市华讯方舟太赫兹科技有限公司 | Image storage and deployment method, processing equipment, processing system, storage device |
CN112041904A (en) * | 2018-05-07 | 2020-12-04 | 索尼公司 | Communication terminal, sensing device and server |
-
2010
- 2010-08-02 CN CN2010202798865U patent/CN201860384U/en not_active Expired - Fee Related
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102572392A (en) * | 2011-12-21 | 2012-07-11 | 成都众询科技有限公司 | Digital signal processor (DSP)-based wired and wireless transmission digital video acquisition system |
CN103297736A (en) * | 2013-06-13 | 2013-09-11 | 深圳南方汉邦数字技术有限公司 | System and method for data storage and network transmission of video monitoring |
CN104469274A (en) * | 2013-09-22 | 2015-03-25 | 华南师范大学 | An intelligent video surveillance system |
CN104735322A (en) * | 2015-03-25 | 2015-06-24 | 江苏物联网研究发展中心 | Safety web camera with hardware encryption function |
CN112041904A (en) * | 2018-05-07 | 2020-12-04 | 索尼公司 | Communication terminal, sensing device and server |
CN108881664A (en) * | 2018-07-10 | 2018-11-23 | 深圳市华讯方舟太赫兹科技有限公司 | Image storage and deployment method, processing equipment, processing system, storage device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101902576B (en) | Video-encryption camera and encryption method thereof | |
CN201860384U (en) | Video encryption camera | |
CN101739695B (en) | Three-dimensional Arnold mapping-based image grouping encryption method | |
Zhang et al. | Cryptanalysis of S-box-only chaotic image ciphers against chosen plaintext attack | |
CN106251278A (en) | A kind of image encryption territory based on histogram feature reversible information hidden method | |
Arya et al. | A literature review on various recent steganography techniques | |
CN105847629A (en) | Reversible information hiding method for encrypted image | |
Zhu et al. | Image encryption algorithm with an avalanche effect based on a six-dimensional discrete chaotic system | |
Gao et al. | Chaotic image encryption algorithm based on zigzag transform with bidirectional crossover from random position | |
Zhang et al. | A new chaotic algorithm for image encryption | |
CN103491279A (en) | 4-neighborhood exclusive or image encryption method based on hyper-chaos Lorenz system | |
CN103442157A (en) | Image encryption method based on Arnold transformations and Henon chaotic system | |
CN103501224A (en) | Asymmetric image encryption and decryption method based on quantum cell neural network system | |
CN114679250B (en) | Image encryption algorithm based on mixed chaos and Arnold transformation | |
Man et al. | A novel image encryption algorithm based on least squares generative adversarial network random number generator | |
CN106330435A (en) | Key transformation method and device, and terminal | |
Zhang | Plaintext related image encryption scheme using chaotic map | |
Noura et al. | Design of a fast and robust chaos-based crypto-system for image encryption | |
Abdul-Hussein et al. | Secured Transfer and Storage Image Data for Cloud Communications. | |
CN109618073A (en) | A kind of more figure encryption methods based on Hyperchaotic Chen System | |
Huang et al. | Duple color image encryption system based on 3D non-equilateral Arnold transform for IIoT | |
CN103593590A (en) | Mixing additivity multi-time watermark embedding method and decoding method based on cloud environment | |
Rahman et al. | A real-time privacy-sensitive data hiding approach based on chaos cryptography | |
CN101582170B (en) | Remote sensing image encryption method based on elliptic curve cryptosystem | |
CN106529316B (en) | Image data encryption method and device, web camera |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20110608 Termination date: 20140802 |
|
EXPY | Termination of patent right or utility model |