KR20160118117A - Apparatus and method for secure transmission of video data - Google Patents
Apparatus and method for secure transmission of video data Download PDFInfo
- Publication number
- KR20160118117A KR20160118117A KR1020150097988A KR20150097988A KR20160118117A KR 20160118117 A KR20160118117 A KR 20160118117A KR 1020150097988 A KR1020150097988 A KR 1020150097988A KR 20150097988 A KR20150097988 A KR 20150097988A KR 20160118117 A KR20160118117 A KR 20160118117A
- Authority
- KR
- South Korea
- Prior art keywords
- image
- image data
- key frame
- processor
- cover
- Prior art date
Links
- 230000005540 biological transmission Effects 0.000 title claims description 64
- 238000000034 method Methods 0.000 title claims description 46
- 239000000284 extract Substances 0.000 claims abstract description 21
- 238000004891 communication Methods 0.000 claims abstract description 16
- 238000012544 monitoring process Methods 0.000 claims description 6
- 238000001514 detection method Methods 0.000 claims description 3
- 238000000605 extraction Methods 0.000 description 15
- 238000010586 diagram Methods 0.000 description 12
- 239000011159 matrix material Substances 0.000 description 7
- 230000008569 process Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000000007 visual effect Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 1
- 238000010801 machine learning Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000007723 transport mechanism Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
- H04N21/23473—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption by pre-encrypting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/235—Processing of additional data, e.g. scrambling of additional data or processing content descriptors
- H04N21/2351—Processing of additional data, e.g. scrambling of additional data or processing content descriptors involving encryption of additional data
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Closed-Circuit Television Systems (AREA)
Abstract
The present invention includes a communication module, a memory for storing a program for securely transferring image data, and a processor for executing the program. At this time, the processor extracts the key frame from the image data, extracts the key frame, performs multi-step encryption on the extracted key frame, and encodes the encrypted image on the cover image based on the least significant bit (LSB) And the encrypted image transmits the concealed cover image.
Description
The present invention relates to an apparatus and method for secure transmission of image data.
A wireless visual sensor network (WVSN) for secure transmission of image data transmits various image data about a surrounding environment observed by a distributed camera and an image sensor to a base station Lt; / RTI > In this case, in the wireless image sensor network, the camera and the image sensor can communicate with a video data transmission device such as a visual processing hub (VPH) using a communication module. The video data transmission device can analyze and process the video data collected through the communication module. The image data transmission apparatus can transmit image data to a base station to perform an additional operation on the image. Such a wireless image sensor network can provide an existing monitoring function and various applications to cope with war, terror, and crime through a video data transmission device.
In order to detect and prevent war, terrorism and crime in a wireless image sensor network, a video data transmission device needs to transmit a large amount of video data collected by a camera and an image sensor to a base station. However, the video data transmission apparatus can not transmit a large amount of data according to the limitations of power and network. Even if a video data transmission apparatus transmits a large amount of data, it takes a long time to transmit, and it can not cope with war, terrorism and crime quickly.
In addition, there is a great risk that a video data transmission apparatus will be leaked through hacking or the like while transmitting video data to a base station. Therefore, security of image data can be an important issue in image data transmission devices. Therefore, there is a need for a technique for securely transmitting a large amount of data in an image data transmission device in a wireless image sensor network.
Korean Patent Laid-Open Publication No. 10-2015-0009661 (entitled " Multiple Sensing Image Security Station ") discloses a security transmission technology of image data in such a wireless image sensor network. Discloses a multiple sensing image security station in which a plurality of security stations connected to networking perform tracking together by extracting features of a suspect by image and sound after integrating optical fiber sensors based on image technology and detecting a security situation .
SUMMARY OF THE INVENTION The present invention has been made to solve the above problems of the conventional art, and an embodiment of the present invention provides an apparatus and method for securely transmitting image data based on encryption and steganography, .
It should be understood, however, that the technical scope of the present invention is not limited to the above-described technical problems, and other technical problems may exist.
According to a first aspect of the present invention, there is provided an apparatus for transmitting secure video data according to the first aspect of the present invention includes a communication module, a memory for storing a program for securely transmitting image data, and a processor for executing a program. At this time, the processor generates a map of the ROI from the image data, extracts a key frame, performs multi-level encryption on the extracted key frame, and performs a magic least significant bit (LSB) The encrypted image is concealed in the cover image, and the encrypted image is transmitted as a cover image.
According to a second aspect of the present invention, there is provided a secure transmission method of a video data transmission apparatus, comprising: generating a region of interest map from video data and extracting a key frame; Performing multi-stage encryption on the extracted key frame; Hiding an encrypted image on a cover image based on a least significant bit (LSB) method; And transmitting the hidden image of the encrypted image.
According to any one of the above-mentioned means for solving the above-mentioned problems, the present invention can extract only a key frame and transmit it to a base station when transmitting a large amount of image data. Therefore, the present invention is effective because it can reduce power consumption and use of network resources. In addition, since the present invention can transmit key frames faster than transmitting large-capacity image data, it is possible to quickly cope with war, terror, and crime.
The present invention performs encryption based on multi-stage encryption, and conceals the cover image based on the magic LSB and transmits it to the base station, thus enabling secure transmission from leakage and hacking.
1 is a block diagram of a secure transmission apparatus according to an embodiment of the present invention.
2 is a block diagram of a program for supporting secure transmission of image data.
3 is a diagram illustrating an example of an integral image calculation according to an exemplary embodiment of the present invention.
4 is an illustration of multi-scale contrast in accordance with an embodiment of the present invention.
5 is an exemplary diagram of prominent motion extraction according to an embodiment of the present invention.
6 is an exemplary diagram of a region of interest map according to an embodiment of the present invention.
7 is a diagram illustrating an example of a concealment process based on a method of a magic LSB according to an embodiment of the present invention.
FIG. 8 is a flowchart illustrating a secure transmission method of a video data transmission apparatus according to an embodiment of the present invention.
FIG. 9 is a flowchart of a ROI generation according to an exemplary embodiment of the present invention.
Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings, which will be readily apparent to those skilled in the art. The present invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. In order to clearly explain the present invention in the drawings, parts not related to the description are omitted.
Throughout the specification, when a part is referred to as being "connected" to another part, it includes not only "directly connected" but also "electrically connected" with another part in between . Also, when a part is referred to as "including " an element, it does not exclude other elements unless specifically stated otherwise.
Next, a
1 is a block diagram of a
The
FIG. 2 is a block diagram of a program for supporting secure transmission of
The
More specifically, the
The key
The
The
Next, a
1, the
The
The
The
The
The
The
3 is a diagram illustrating an example of an integral image calculation according to an exemplary embodiment of the present invention. 3 (a) is a frame to be analyzed, and FIG. 3 (b) is an integrated image calculated for a frame to be analyzed.
When the integral image is calculated, the
4 is an illustration of multi-scale contrast in accordance with an embodiment of the present invention. 5 is an exemplary diagram of prominent motion extraction according to an embodiment of the present invention.
The
In addition, the
6 is an exemplary diagram of a region of interest map according to an embodiment of the present invention.
The
The
At this time, when the
On the other hand, when a key frame is selected in the
For example, the encryption method may be an XOR operation based on a secret key previously exchanged with the
The
7 is a diagram illustrating an example of a concealment process based on a method of a magic LSB according to an embodiment of the present invention.
The
The
After generating the magic matrix, the
When the concealment of the key frame for each of the channels P720 to P722 is terminated, the
The
The
Meanwhile, the
8 to 9, a secure transmission method of the image
8 is a flowchart of a security transmission method of the image
The image
FIG. 9 is a flowchart of a ROI generation according to an exemplary embodiment of the present invention.
The image
In this case, the
Then, the image
The image
For example, when the
The image
The image
And the image
One embodiment of the present invention may also be embodied in the form of a recording medium including instructions executable by a computer, such as program modules, being executed by a computer. Computer readable media can be any available media that can be accessed by a computer and includes both volatile and nonvolatile media, removable and non-removable media. In addition, the computer-readable medium can include both computer storage media and communication media. Computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Communication media typically includes any information delivery media, including computer readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave, or other transport mechanism.
While the methods and systems of the present invention have been described in connection with specific embodiments, some or all of those elements or operations may be implemented using a computer system having a general purpose hardware architecture.
It will be understood by those skilled in the art that the foregoing description of the present invention is for illustrative purposes only and that those of ordinary skill in the art can readily understand that various changes and modifications may be made without departing from the spirit or essential characteristics of the present invention. will be. It is therefore to be understood that the above-described embodiments are illustrative in all aspects and not restrictive. For example, each component described as a single entity may be distributed and implemented, and components described as being distributed may also be implemented in a combined form.
The scope of the present invention is defined by the appended claims rather than the detailed description and all changes or modifications derived from the meaning and scope of the claims and their equivalents are to be construed as being included within the scope of the present invention do.
100: Secure transmission device 101: Communication module
102: memory 103: processor
110: camera 120: image sensor
130: Base station
Claims (11)
Communication module,
A memory for storing a program for securely transmitting image data,
And a processor for executing the program,
The processor extracts a key frame from the image data to generate a ROI map, performs multi-stage encryption on the extracted key frame, and encodes the encrypted image based on a least significant bit (LSB) And the encrypted image transmits the concealed cover image.
Wherein the processor generates the ROI map based on at least one of multi-scale contrast and salient motion detection for the image data.
Wherein the processor performs multi-stage encryption for the key frame using a plurality of encryption methods during an XOR operation based on a secret key, pattern-based bit shuffling, and block interchange.
Wherein the image data is a moving image,
Wherein the cover image is a still image.
Wherein the image data is collected for real-time monitoring control.
Generating a region of interest map from the image data and extracting a key frame;
Performing multi-stage encryption on the extracted key frame;
Hiding the encrypted image on a cover image based on a least significant bit (LSB) method; And
And transmitting the encrypted image to a cover image.
The step of extracting the key frame
Performing multi-scale contrast on the image data;
Performing salient motion detection on the image data; And
Performing the multi-scale contrast performing step and / or the salient motion detecting performing step to generate the ROI map.
The step of performing the multi-
And performing a plurality of encryption methods on the key frame based on secret key-based XOR operations, pattern-based bit shuffling, and block interchange.
Wherein the image data is a moving image,
Wherein the cover image is a still image.
Wherein the image data is image data collected for real-time monitoring and control.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR20150046116 | 2015-04-01 | ||
KR1020150046116 | 2015-04-01 |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20160118117A true KR20160118117A (en) | 2016-10-11 |
Family
ID=57162155
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150097988A KR20160118117A (en) | 2015-04-01 | 2015-07-09 | Apparatus and method for secure transmission of video data |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20160118117A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111246272A (en) * | 2020-01-17 | 2020-06-05 | 北京达佳互联信息技术有限公司 | Method and device for displaying video cover picture |
CN113656642A (en) * | 2021-08-20 | 2021-11-16 | 北京百度网讯科技有限公司 | Cover image generation method, device, equipment, storage medium and program product |
CN114143410A (en) * | 2021-11-16 | 2022-03-04 | 国网江苏省电力有限公司信息通信分公司 | Power monitoring image encryption transmission method based on Internet of things |
CN114302177A (en) * | 2021-11-18 | 2022-04-08 | 中国船舶重工集团公司第七0九研究所 | Data security management method and system for streaming media storage system |
CN114640855A (en) * | 2019-04-09 | 2022-06-17 | 西安万像电子科技有限公司 | Data processing method and system |
-
2015
- 2015-07-09 KR KR1020150097988A patent/KR20160118117A/en not_active Application Discontinuation
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114640855A (en) * | 2019-04-09 | 2022-06-17 | 西安万像电子科技有限公司 | Data processing method and system |
CN111246272A (en) * | 2020-01-17 | 2020-06-05 | 北京达佳互联信息技术有限公司 | Method and device for displaying video cover picture |
CN113656642A (en) * | 2021-08-20 | 2021-11-16 | 北京百度网讯科技有限公司 | Cover image generation method, device, equipment, storage medium and program product |
CN113656642B (en) * | 2021-08-20 | 2024-05-28 | 北京百度网讯科技有限公司 | Cover image generation method, device, apparatus, storage medium and program product |
CN114143410A (en) * | 2021-11-16 | 2022-03-04 | 国网江苏省电力有限公司信息通信分公司 | Power monitoring image encryption transmission method based on Internet of things |
CN114143410B (en) * | 2021-11-16 | 2023-09-01 | 国网江苏省电力有限公司信息通信分公司 | Electric power monitoring image encryption transmission method based on Internet of things |
CN114302177A (en) * | 2021-11-18 | 2022-04-08 | 中国船舶重工集团公司第七0九研究所 | Data security management method and system for streaming media storage system |
CN114302177B (en) * | 2021-11-18 | 2024-02-06 | 中国船舶重工集团公司第七0九研究所 | Data security management method and system for streaming media storage system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101853218B1 (en) | Biometric template security and key generation | |
KR20160118117A (en) | Apparatus and method for secure transmission of video data | |
TWI675308B (en) | Method and apparatus for verifying the availability of biometric images | |
US10607312B2 (en) | Method and apparatus for publishing locational copyrighted watermarking video | |
CN112949545B (en) | Method, apparatus, computing device and medium for recognizing face image | |
JP2011129096A (en) | Method and device of for privacy masking image | |
US11604893B2 (en) | Privacy-preserving image distribution | |
JP2023139259A (en) | Image collection apparatus, server, encryption method, and decryption method | |
US20150200773A1 (en) | Watermark With Data Integrity Verification | |
CN104734852A (en) | Identity authentication method and device | |
CN108712400A (en) | Data transmission method, device, computer readable storage medium and electronic equipment | |
JP6167667B2 (en) | Authentication system, authentication method, authentication program, and authentication apparatus | |
CN113052045B (en) | Method, apparatus, computing device and medium for identifying finger vein image | |
CN115114667A (en) | Privacy information processing and classifying method and device for security chip | |
CN114845115A (en) | Information transmission method, device, equipment and storage medium | |
CN114387155A (en) | Image processing method, apparatus and storage medium | |
CN113052044A (en) | Method, apparatus, computing device, and medium for recognizing iris image | |
JP5718757B2 (en) | Image management apparatus, image management program, and image management method | |
WO2016094978A1 (en) | Method for recovering secrets encrypted with visual cryptography by automatic alignment in mobile devices | |
CN111488592A (en) | Data encryption and decryption method and device and network equipment | |
GB2582456A (en) | System, device and method for fingerprint authentication using a watermarked digital image | |
Aguilar Santiago et al. | Chaotic Cryptosystem for Selective Encryption of Faces in Photographs | |
Ansari | A Review on the Recent Trends of Image Steganography for VANET Applications. | |
Raja et al. | Deep Steg Block: Deep Learning-Enhanced Steganography for Secure Communication in IoT Devices Using Blockchain | |
KR20240022085A (en) | Network system, apparatus and method for supporting video packet encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E601 | Decision to refuse application |