KR20160118117A - Apparatus and method for secure transmission of video data - Google Patents

Apparatus and method for secure transmission of video data Download PDF

Info

Publication number
KR20160118117A
KR20160118117A KR1020150097988A KR20150097988A KR20160118117A KR 20160118117 A KR20160118117 A KR 20160118117A KR 1020150097988 A KR1020150097988 A KR 1020150097988A KR 20150097988 A KR20150097988 A KR 20150097988A KR 20160118117 A KR20160118117 A KR 20160118117A
Authority
KR
South Korea
Prior art keywords
image
image data
key frame
processor
cover
Prior art date
Application number
KR1020150097988A
Other languages
Korean (ko)
Inventor
백성욱
칸 무함마드
사자드 무함마드
이르판 메흐무르
자밀 아마드
이미영
Original Assignee
세종대학교산학협력단
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 세종대학교산학협력단 filed Critical 세종대학교산학협력단
Publication of KR20160118117A publication Critical patent/KR20160118117A/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
    • H04N21/23473Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption by pre-encrypting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/235Processing of additional data, e.g. scrambling of additional data or processing content descriptors
    • H04N21/2351Processing of additional data, e.g. scrambling of additional data or processing content descriptors involving encryption of additional data

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Closed-Circuit Television Systems (AREA)

Abstract

The present invention includes a communication module, a memory for storing a program for securely transferring image data, and a processor for executing the program. At this time, the processor extracts the key frame from the image data, extracts the key frame, performs multi-step encryption on the extracted key frame, and encodes the encrypted image on the cover image based on the least significant bit (LSB) And the encrypted image transmits the concealed cover image.

Description

TECHNICAL FIELD [0001] The present invention relates to an apparatus and method for securely transmitting image data,

The present invention relates to an apparatus and method for secure transmission of image data.

A wireless visual sensor network (WVSN) for secure transmission of image data transmits various image data about a surrounding environment observed by a distributed camera and an image sensor to a base station Lt; / RTI > In this case, in the wireless image sensor network, the camera and the image sensor can communicate with a video data transmission device such as a visual processing hub (VPH) using a communication module. The video data transmission device can analyze and process the video data collected through the communication module. The image data transmission apparatus can transmit image data to a base station to perform an additional operation on the image. Such a wireless image sensor network can provide an existing monitoring function and various applications to cope with war, terror, and crime through a video data transmission device.

In order to detect and prevent war, terrorism and crime in a wireless image sensor network, a video data transmission device needs to transmit a large amount of video data collected by a camera and an image sensor to a base station. However, the video data transmission apparatus can not transmit a large amount of data according to the limitations of power and network. Even if a video data transmission apparatus transmits a large amount of data, it takes a long time to transmit, and it can not cope with war, terrorism and crime quickly.

In addition, there is a great risk that a video data transmission apparatus will be leaked through hacking or the like while transmitting video data to a base station. Therefore, security of image data can be an important issue in image data transmission devices. Therefore, there is a need for a technique for securely transmitting a large amount of data in an image data transmission device in a wireless image sensor network.

Korean Patent Laid-Open Publication No. 10-2015-0009661 (entitled " Multiple Sensing Image Security Station ") discloses a security transmission technology of image data in such a wireless image sensor network. Discloses a multiple sensing image security station in which a plurality of security stations connected to networking perform tracking together by extracting features of a suspect by image and sound after integrating optical fiber sensors based on image technology and detecting a security situation .

SUMMARY OF THE INVENTION The present invention has been made to solve the above problems of the conventional art, and an embodiment of the present invention provides an apparatus and method for securely transmitting image data based on encryption and steganography, .

It should be understood, however, that the technical scope of the present invention is not limited to the above-described technical problems, and other technical problems may exist.

According to a first aspect of the present invention, there is provided an apparatus for transmitting secure video data according to the first aspect of the present invention includes a communication module, a memory for storing a program for securely transmitting image data, and a processor for executing a program. At this time, the processor generates a map of the ROI from the image data, extracts a key frame, performs multi-level encryption on the extracted key frame, and performs a magic least significant bit (LSB) The encrypted image is concealed in the cover image, and the encrypted image is transmitted as a cover image.

According to a second aspect of the present invention, there is provided a secure transmission method of a video data transmission apparatus, comprising: generating a region of interest map from video data and extracting a key frame; Performing multi-stage encryption on the extracted key frame; Hiding an encrypted image on a cover image based on a least significant bit (LSB) method; And transmitting the hidden image of the encrypted image.

According to any one of the above-mentioned means for solving the above-mentioned problems, the present invention can extract only a key frame and transmit it to a base station when transmitting a large amount of image data. Therefore, the present invention is effective because it can reduce power consumption and use of network resources. In addition, since the present invention can transmit key frames faster than transmitting large-capacity image data, it is possible to quickly cope with war, terror, and crime.

The present invention performs encryption based on multi-stage encryption, and conceals the cover image based on the magic LSB and transmits it to the base station, thus enabling secure transmission from leakage and hacking.

1 is a block diagram of a secure transmission apparatus according to an embodiment of the present invention.
2 is a block diagram of a program for supporting secure transmission of image data.
3 is a diagram illustrating an example of an integral image calculation according to an exemplary embodiment of the present invention.
4 is an illustration of multi-scale contrast in accordance with an embodiment of the present invention.
5 is an exemplary diagram of prominent motion extraction according to an embodiment of the present invention.
6 is an exemplary diagram of a region of interest map according to an embodiment of the present invention.
7 is a diagram illustrating an example of a concealment process based on a method of a magic LSB according to an embodiment of the present invention.
FIG. 8 is a flowchart illustrating a secure transmission method of a video data transmission apparatus according to an embodiment of the present invention.
FIG. 9 is a flowchart of a ROI generation according to an exemplary embodiment of the present invention.

Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings, which will be readily apparent to those skilled in the art. The present invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. In order to clearly explain the present invention in the drawings, parts not related to the description are omitted.

Throughout the specification, when a part is referred to as being "connected" to another part, it includes not only "directly connected" but also "electrically connected" with another part in between . Also, when a part is referred to as "including " an element, it does not exclude other elements unless specifically stated otherwise.

Next, a secure transmission apparatus 100 according to an embodiment of the present invention will be described with reference to FIGS. 1 and 2. FIG.

1 is a block diagram of a secure transmission apparatus 100 according to an embodiment of the present invention.

The secure transmission apparatus 100 transmits the image data 210 collected by the camera 110 and the image sensor 120 to the distant base station 130 or another sensor node. At this time, the secure transmission apparatus 100 extracts a key frame from the video data 210 based on a program supporting secure transmission of the video data 210. Then, the secure transmission apparatus 100 encrypts the extracted key frame. After performing the encryption, the secure transmission apparatus 100 uses the cover image 220 to conceal the encrypted key frame in the cover image 220. A program for supporting secure transmission of the image data 210 will now be described with reference to FIG.

FIG. 2 is a block diagram of a program for supporting secure transmission of image data 210. FIG.

The program 200 supporting secure transfer of the image data 210 may include a key frame extraction module 201, a multilevel encryption module 202, and an image concealment module 203.

More specifically, the program 200 can receive the image data 210 and the cover image 220. The program 200 may transmit the image data 220 to the key frame extraction module 201 and may transmit the cover image 220 to the image concealment module 203.

The key frame extraction module 201 receives the image data 210 and extracts a key frame. At this time, the key frame extraction module 201 may generate a saliency map to extract a key frame. The key frame extraction module 201 can transmit the extracted key frame to the multi-level encryption module 202.

The multi-stage encryption module 202 receiving the key frame can perform multi-stage encryption based on a plurality of encryption methods. And the multi-level encryption module 202 may transmit the encrypted key frame to the image concealment module 203. [

The image concealment module 203 receiving the encrypted key frame conceals the encrypted key frame in the cover image 220 using the received cover image 220 so that the encrypted image is stored in the cover image 230, Can be generated.

Next, a secure transmission apparatus 100 according to an embodiment of the present invention will be described in detail with reference to FIG. 1 and FIG. 3 to FIG.

1, the secure transmission apparatus 100 includes a communication module 101, a memory 102, and a processor 103. [

The communication module 101 communicates with the base station 130 for secure transmission. The communication module 101 may be utilized by the processor 103 to receive the image data 210 from the camera 110 and the image sensor 120. [ The communication module 101 may include a network module supporting wired or wireless network communication, an integrated driver electronics (IDE), a peripheral component interconnect bus (PCI), a parallel ATA (PATA), a serial ATA bus), and the like.

The memory 102 stores a program 200 that supports secure transfer of the image data 210. [ At this time, the memory 102 collectively refers to a non-volatile storage device that keeps stored information even when power is not supplied, and a volatile storage device that requires power to maintain stored information.

The processor 103 generates a saliency map in the image data 210 according to the execution of the program. In this case, the image data 210 may be a still image and a video image of the surrounding environment generated through the camera 110 and the image sensor 120 connected to the secure transmission apparatus 100. In addition, the image data 210 may be a still image and a moving image received through the communication module 101 after being photographed by an externally installed camera or a smart phone.

The image data 210 may be image data collected in real time through the camera 110 and the image sensor 120 connected to the secure transmission apparatus 100. For example, in the case of the secure transmission apparatus 100 for real-time monitoring control, the processor 103 generates a region-of-interest map in order to extract a key frame, which may cause a problem in monitoring and controlling, from the image data collected in real- .

The processor 103 may use multi-scale contrast and salient motion detection on the image data 210 to generate a region of interest map. Multi-scale contrast and prominent motion extraction are described with reference to Figures 3-5.

Processor 103 may first select a frame to analyze to generate a region of interest map. At this time, if the image data 210 is a still image, the frame to be analyzed may be a still image. If the image data 210 is a moving image, the processor 103 may divide the moving image into frames, and then select a frame to be analyzed from a plurality of separated frames. For example, the frame to be analyzed may be sequentially selected from the frame located at the beginning of the image data 210 to the frame positioned at the end.

The processor 103 can calculate an integral image for the selected frame as shown in FIG.

3 is a diagram illustrating an example of an integral image calculation according to an exemplary embodiment of the present invention. 3 (a) is a frame to be analyzed, and FIG. 3 (b) is an integrated image calculated for a frame to be analyzed.

When the integral image is calculated, the processor 103 extracts the ROI based on the multi-scale contrast and the prominent motion extraction based on the frame to be analyzed and the integral image calculated in the frame to be analyzed.

4 is an illustration of multi-scale contrast in accordance with an embodiment of the present invention. 5 is an exemplary diagram of prominent motion extraction according to an embodiment of the present invention.

The processor 103 may extract features based on the multi-scale contrast in the frame to be analyzed, as shown in FIG. 4 (a) is a frame to be analyzed and (b) is a feature extracted based on multi-scale contrast. As shown in FIG. 4, the processor 103 may extract features that are contrasted with the background based on the multi-scale contrast.

In addition, the processor 103 may extract the feature based on the motion extraction prominent in the frame to be analyzed as shown in FIG. In this case, FIG. 5A is a frame to be analyzed, FIG. 5B is a frame to extract a difference image, and FIG. 5C is a feature extracted based on a prominent motion extraction. For example, a frame to be extracted from a difference image may be a frame positioned before and after a frame to be analyzed. As shown in FIG. 5, the processor 103 extracts the difference image based on the prominent motion extraction, analyzes the difference between the two images, and extracts the motion feature.

Processor 103 may generate a ROI map by merging extracted features based on multi-scale contrast and extracted features based on prominent motion extraction. The generation of the ROI map will be described with reference to FIG.

6 is an exemplary diagram of a region of interest map according to an embodiment of the present invention.

The processor 103 merges the features extracted based on the extracted features of FIG. 6 (a) and the features extracted based on the multi-scale contrast of FIG. 6 (b) You can create an area of interest map. At this time, if there are more frames to be analyzed in the image data 210, the processor 103 may generate a ROI map for other frames.

The processor 103 may then extract a key frame based on one or more ROI maps. For example, the processor 103 may calculate distances or similarities for one or more ROI maps, and extract a predetermined number of ROI maps based on the calculated distances and similarities have. The processor 103 may extract a frame corresponding to the extracted ROI map as a key frame. Alternatively, the processor 103 may select a region of interest map whose value difference between pixels included in the ROI map is equal to or greater than a preset threshold value, and extract a frame corresponding to the selected ROI map as a key frame.

At this time, when the image data 210 is a moving image, one or more key frames may be extracted. In addition, one or more extracted key frames may be arranged in chronological order and utilized as a summarization image of the image data 210.

On the other hand, when a key frame is selected in the image data 210, the processor 103 performs multi-stage encryption on the extracted key frame. At this time, the multi-stage encryption means that encryption is performed using a plurality of encryption methods.

For example, the encryption method may be an XOR operation based on a secret key previously exchanged with the base station 130. Alternatively, the encryption method may be an XOR operation based on a public key and a secret key. In this case, the secret key may be generated by a random number generator, directly input by a user, or selected from a predefined secret key set. The encryption method may be a pattern shuffling based on pattern based on a shuffling pattern previously exchanged with the base station 130 and may be a block interchanging However, it is not limited to this.

The processor 103 performs multi-stage encryption on the extracted key frame, and then conceals the encrypted image on the cover image 220 based on a magic least significant bit (LSB) method. At this time, the cover image 220 may be a still image and a moving image regardless of the image data 210, regardless of whether the cover image 220 is leaked. For example, the cover image 220 may be a known photo, movie, or meaningless image. In addition, the cover image 220 may be a still image and a moving image of the background captured by the camera 110 and the image sensor 120. The concealment process based on the Magic LSB method will be described with reference to FIG.

7 is a diagram illustrating an example of a concealment process based on a method of a magic LSB according to an embodiment of the present invention.

The processor 103 may first divide the cover image P700 into RGB channels P720 to P722 based on the RGB values of the cover image P700. At this time, the R channel P720 is a red series extracted from the cover image P700, the G channel P721 is a green series extracted, and the B channel P722 is a blue series. It is extracted. The processor 103 may select a channel to hide the key frame in the RGB channels P720 to P722, and may select one or more least significant bit (LSB) numbers in the channel on which the key frame is to be hidden.

The processor 103 may generate a magic matrix based on the selected LSB number and the key frame that performed the multi-stage encryption. The processor 103 may then randomly arrange keyframes across selected channels based on the magic matrix. At this time, the magic matrix is used to make it difficult to extract the key frame even if the cover image 220 is leaked after concealing the key frame in the cover image 220. A magic matrix can refer to a matrix in which all the sums on the horizontal, vertical, and diagonal lines in the N x N matrix are the same.

After generating the magic matrix, the processor 103 may find the replacement and replacement suitable index and conceal it on the selected channel. The processor 103 may also conceal the key frames on other channels.

When the concealment of the key frame for each of the channels P720 to P722 is terminated, the processor 103 merges the hidden RGB channels P730 to P732, An image (stego image P740) can be generated.

The processor 103 transmits the key frame stained stereo image 230 to the base station 130 via the communication module 101. [

The base station 130 receiving the stego image 230 separates the key frame from the cover image 220 in the stego image 230 and decodes the key frame to identify the key frame. For example, the base station 130 receiving the stego image 230 may extract statistical features from the received stego image, and may separate the cover image and the encrypted image using a classifier based on a machine learning technique or the like. The base station 130 decrypts the separated encrypted image based on the public key and the secret key together with the secure transmission apparatus 100 through the communication module 101 and transmits the key frame transmitted by the secure transmission apparatus 100 Can be confirmed.

Meanwhile, the secure transmission apparatus 100 according to another embodiment of the present invention can securely transmit a large-capacity moving image generated by the camera 110 and the image sensor 120. Therefore, the processor 103 can extract the key frame from the large-capacity moving image. Then, the processor 103 can encrypt the extracted key frame. The processor 103 may conceal and transmit the key frame extracted from the large-capacity moving image to the cover image 220, which is a still image. Through this, the processor 103 can select only important key frames in a large-capacity moving image, and transmit the selected key frames in a low-capacity cover image.

8 to 9, a secure transmission method of the image data transmission apparatus 100 according to an embodiment of the present invention will be described.

8 is a flowchart of a security transmission method of the image data transmission apparatus 100 according to an embodiment of the present invention.

The image data transmission apparatus 100 generates a region of interest map from the collected image data 210. After generating the ROI map, the image data transmission apparatus 100 extracts one or more key frames based on the ROI map (S800). A method of generating the ROI map will be described with reference to FIG.

FIG. 9 is a flowchart of a ROI generation according to an exemplary embodiment of the present invention.

The image data transmission apparatus 100 may perform at least one of multi-scale contrast (S900) and prominent motion extraction (S910) in order to generate the ROI map. In operation S920, the image data transmission apparatus 100 may generate the ROI using one or more of the features extracted through the multi-scale contrast and the features extracted through the prominent motion extraction.

In this case, the image data 210 may be a still image and a moving image generated through the camera 110 and the image sensor 120 connected to the image data transmission apparatus 100, And may be the received still image and moving image after being photographed. The image data 210 may be image data collected in real time through the camera 110 and the image sensor 120 connected to the image data transmission apparatus 100 for real-time monitoring and control.

Then, the image data transmission apparatus 100 performs multi-step encryption on the extracted key frame to generate an encrypted image (S810). At this time, in order to perform multi-stage encryption, the image data transmission apparatus 100 may perform a plurality of encryption methods for key frames, such as an XOR operation based on a secret key, pattern-based bit shuffling, and block interchange.

The image data transmission apparatus 100 performs multi-stage encryption and then encapsulates the encrypted key frame in the cover image 220 (S820). At this time, the image data transmission apparatus 100 uses the magic LSB method as described above.

For example, when the image data 210 is a moving image, the cover image 220 may be a still image. Therefore, the image data transmission apparatus 100 can conceal a large-capacity moving image to a low-capacity still image.

The image data transmission apparatus 100 hides the encrypted key frame in the cover image 220 and transmits the encrypted cover image 230 to the base station 130 in operation S830.

The image data transmission apparatus 100 and method according to an embodiment of the present invention can extract only key frames and transmit them to the base station 130 when transmitting a large amount of image data. Therefore, the image data transmission apparatus 100 and method are effective because they can reduce power consumption and use of network resources. In addition, since the image data transmission apparatus 100 and method can transmit a key frame faster than transmitting a large amount of image data, it is possible to quickly cope with war, terror, and crime.

And the image data transmission apparatus 100 and method perform encryption based on the multi-stage encryption and conceal in the cover image 220 based on the magic LSB and transmit to the base station 130 so that a secure secure transmission from the outflow and hacking It is possible.

One embodiment of the present invention may also be embodied in the form of a recording medium including instructions executable by a computer, such as program modules, being executed by a computer. Computer readable media can be any available media that can be accessed by a computer and includes both volatile and nonvolatile media, removable and non-removable media. In addition, the computer-readable medium can include both computer storage media and communication media. Computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Communication media typically includes any information delivery media, including computer readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave, or other transport mechanism.

While the methods and systems of the present invention have been described in connection with specific embodiments, some or all of those elements or operations may be implemented using a computer system having a general purpose hardware architecture.

It will be understood by those skilled in the art that the foregoing description of the present invention is for illustrative purposes only and that those of ordinary skill in the art can readily understand that various changes and modifications may be made without departing from the spirit or essential characteristics of the present invention. will be. It is therefore to be understood that the above-described embodiments are illustrative in all aspects and not restrictive. For example, each component described as a single entity may be distributed and implemented, and components described as being distributed may also be implemented in a combined form.

The scope of the present invention is defined by the appended claims rather than the detailed description and all changes or modifications derived from the meaning and scope of the claims and their equivalents are to be construed as being included within the scope of the present invention do.

100: Secure transmission device 101: Communication module
102: memory 103: processor
110: camera 120: image sensor
130: Base station

Claims (11)

A secure transmission apparatus for video data,
Communication module,
A memory for storing a program for securely transmitting image data,
And a processor for executing the program,
The processor extracts a key frame from the image data to generate a ROI map, performs multi-stage encryption on the extracted key frame, and encodes the encrypted image based on a least significant bit (LSB) And the encrypted image transmits the concealed cover image.
The method according to claim 1,
Wherein the processor generates the ROI map based on at least one of multi-scale contrast and salient motion detection for the image data.
The method according to claim 1,
Wherein the processor performs multi-stage encryption for the key frame using a plurality of encryption methods during an XOR operation based on a secret key, pattern-based bit shuffling, and block interchange.
The method according to claim 1,
Wherein the image data is a moving image,
Wherein the cover image is a still image.
The method according to claim 1,
Wherein the image data is collected for real-time monitoring control.
A secure transmission method of a video data transmission apparatus,
Generating a region of interest map from the image data and extracting a key frame;
Performing multi-stage encryption on the extracted key frame;
Hiding the encrypted image on a cover image based on a least significant bit (LSB) method; And
And transmitting the encrypted image to a cover image.
The method according to claim 6,
The step of extracting the key frame
Performing multi-scale contrast on the image data;
Performing salient motion detection on the image data; And
Performing the multi-scale contrast performing step and / or the salient motion detecting performing step to generate the ROI map.
The method according to claim 6,
The step of performing the multi-
And performing a plurality of encryption methods on the key frame based on secret key-based XOR operations, pattern-based bit shuffling, and block interchange.
The method according to claim 6,
Wherein the image data is a moving image,
Wherein the cover image is a still image.
The method according to claim 6,
Wherein the image data is image data collected for real-time monitoring and control.
A computer-readable recording medium recording a program for performing the method according to any one of claims 6 to 10 on a computer.
KR1020150097988A 2015-04-01 2015-07-09 Apparatus and method for secure transmission of video data KR20160118117A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR20150046116 2015-04-01
KR1020150046116 2015-04-01

Publications (1)

Publication Number Publication Date
KR20160118117A true KR20160118117A (en) 2016-10-11

Family

ID=57162155

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020150097988A KR20160118117A (en) 2015-04-01 2015-07-09 Apparatus and method for secure transmission of video data

Country Status (1)

Country Link
KR (1) KR20160118117A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111246272A (en) * 2020-01-17 2020-06-05 北京达佳互联信息技术有限公司 Method and device for displaying video cover picture
CN113656642A (en) * 2021-08-20 2021-11-16 北京百度网讯科技有限公司 Cover image generation method, device, equipment, storage medium and program product
CN114143410A (en) * 2021-11-16 2022-03-04 国网江苏省电力有限公司信息通信分公司 Power monitoring image encryption transmission method based on Internet of things
CN114302177A (en) * 2021-11-18 2022-04-08 中国船舶重工集团公司第七0九研究所 Data security management method and system for streaming media storage system
CN114640855A (en) * 2019-04-09 2022-06-17 西安万像电子科技有限公司 Data processing method and system

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114640855A (en) * 2019-04-09 2022-06-17 西安万像电子科技有限公司 Data processing method and system
CN111246272A (en) * 2020-01-17 2020-06-05 北京达佳互联信息技术有限公司 Method and device for displaying video cover picture
CN113656642A (en) * 2021-08-20 2021-11-16 北京百度网讯科技有限公司 Cover image generation method, device, equipment, storage medium and program product
CN113656642B (en) * 2021-08-20 2024-05-28 北京百度网讯科技有限公司 Cover image generation method, device, apparatus, storage medium and program product
CN114143410A (en) * 2021-11-16 2022-03-04 国网江苏省电力有限公司信息通信分公司 Power monitoring image encryption transmission method based on Internet of things
CN114143410B (en) * 2021-11-16 2023-09-01 国网江苏省电力有限公司信息通信分公司 Electric power monitoring image encryption transmission method based on Internet of things
CN114302177A (en) * 2021-11-18 2022-04-08 中国船舶重工集团公司第七0九研究所 Data security management method and system for streaming media storage system
CN114302177B (en) * 2021-11-18 2024-02-06 中国船舶重工集团公司第七0九研究所 Data security management method and system for streaming media storage system

Similar Documents

Publication Publication Date Title
KR101853218B1 (en) Biometric template security and key generation
KR20160118117A (en) Apparatus and method for secure transmission of video data
TWI675308B (en) Method and apparatus for verifying the availability of biometric images
US10607312B2 (en) Method and apparatus for publishing locational copyrighted watermarking video
CN112949545B (en) Method, apparatus, computing device and medium for recognizing face image
JP2011129096A (en) Method and device of for privacy masking image
US11604893B2 (en) Privacy-preserving image distribution
JP2023139259A (en) Image collection apparatus, server, encryption method, and decryption method
US20150200773A1 (en) Watermark With Data Integrity Verification
CN104734852A (en) Identity authentication method and device
CN108712400A (en) Data transmission method, device, computer readable storage medium and electronic equipment
JP6167667B2 (en) Authentication system, authentication method, authentication program, and authentication apparatus
CN113052045B (en) Method, apparatus, computing device and medium for identifying finger vein image
CN115114667A (en) Privacy information processing and classifying method and device for security chip
CN114845115A (en) Information transmission method, device, equipment and storage medium
CN114387155A (en) Image processing method, apparatus and storage medium
CN113052044A (en) Method, apparatus, computing device, and medium for recognizing iris image
JP5718757B2 (en) Image management apparatus, image management program, and image management method
WO2016094978A1 (en) Method for recovering secrets encrypted with visual cryptography by automatic alignment in mobile devices
CN111488592A (en) Data encryption and decryption method and device and network equipment
GB2582456A (en) System, device and method for fingerprint authentication using a watermarked digital image
Aguilar Santiago et al. Chaotic Cryptosystem for Selective Encryption of Faces in Photographs
Ansari A Review on the Recent Trends of Image Steganography for VANET Applications.
Raja et al. Deep Steg Block: Deep Learning-Enhanced Steganography for Secure Communication in IoT Devices Using Blockchain
KR20240022085A (en) Network system, apparatus and method for supporting video packet encryption

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
E601 Decision to refuse application