CN102123026A - Chaos and hyperchaos based two-level video streaming media encryption method - Google Patents
Chaos and hyperchaos based two-level video streaming media encryption method Download PDFInfo
- Publication number
- CN102123026A CN102123026A CN2011100903086A CN201110090308A CN102123026A CN 102123026 A CN102123026 A CN 102123026A CN 2011100903086 A CN2011100903086 A CN 2011100903086A CN 201110090308 A CN201110090308 A CN 201110090308A CN 102123026 A CN102123026 A CN 102123026A
- Authority
- CN
- China
- Prior art keywords
- data
- video
- encryption
- stream
- level
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The invention provides a chaos and hyperchaos based two-level video streaming media encryption method, which comprises the step of providing a chaos and hyperchaos based two-level video streaming media encryption algorithm. The method is combined with a video compression standard H.263 in network transmission; the first-level encryption is such that video streaming data is encrypted with a discrete cosine transform (DCT) based selective encryption algorithm in a video compression process; and the second-level encryption is performed after the video compression, and comprises the following two parts of: scrambling the video streaming data based on discrete Baker mapping, and confusing scrambled data based on hyperchaos mapping. As the multilevel encryption is adopted, and a hyperchaos system has a strong encryption performance, a video streaming media encryption system adopting the method can be used for effectively resisting malicious attacks and professional decryption; and moreover, the encryption method has a significant application value in the field of the safety of transmission information of network streaming media.
Description
[technical field]:
The invention belongs to information security technology and network communications technology field; relate to the algorithm that the video stream media of real-time Transmission in the network is encrypted, for maintain secrecy transmission and relevant knowledge property right protection of Internet video information security provides and encrypt solution safely and effectively.
[background technology]:
Current society is the society of advanced IT application, and information security issue is to national economy, social development and the people's lives ever more important that seems.In information security issue, the secrecy technology of network multimedia occupies important status.Along with the fast development and the extensive use of computer technology, network technology and multimedia technology, for obtaining with exchange of information, people provide great convenience, also containing huge commercial interest simultaneously.How to protect the safety of multimedia messages to become the international research focus.
Develop rapidly along with computer networking technology and hardware device, the Internet video Streaming Media is gained popularity also, as our common Online Video site for service, secure video meeting, pay TV, on-line film and special commercial or military Video transmission system etc.Computer technology, interpenetrating of the network communications technology and multimedia technology mutually promoted, and made the development of network flow-medium technology to have reached crucial moment from quantitative change to qualitative change.The Information technology of network delivery is more and more higher, develops into present literal, image, sound, video, the information of almost all kinds such as animation from simple word information.The continuous lifting of the network bandwidth, transfer of data coding techniques and be used for the continuous development of the server technology of publication medium is all in order to satisfy the transmission technology requirement of network flow media data.But because the opening of the Internet, sharing, characteristics such as dynamic make the safety of the network information be subjected to serious threat and interference, exist rogue attacks, distort, download and safety problem such as piracy.Therefore, the network information security especially privacy concerns of multi-medium data becomes the significant problem that is related to economic development and social safety, causes people's great attention.Because the complicated characteristics of video data, the real-time of video file requires high, adds that the data volume of video is very huge, and traditional cryptographic algorithm at text based on algebraically cipher theory System Design has not been suitable for video-encryption.Therefore need to adopt new theory and instrument to remove to design the information encryption system that can be applicable to Streaming Media.
" chaos " is acknowledged as one of most important scientific discovery in last century.As a forward position cross discipline with broad prospect of application, in many practical field of engineering and ecommerce by successful Application, and with many fields such as engineering in medicine, mechanics engineering, electronic engineering, Chemical Engineering, information engineering, computer engineering, laser technology, Applied Physics huge application potential is arranged biological.The most active application of chaology is the communications field at present, relates to the secure communication of data with synchronously, many aspects such as image encryption, digital watermarking are hidden, media stream encryption.Because some inherent features of chaos system, as the complicated randomness of chaos sequence, be difficult to analyze and predictability, to the extreme sensitiveness of initial value, therefore be highly suitable for the encryption of information.But mainly there is following problem in chaos encryption algorithm and the system that exists at present:
(1) existing most chaos encryption algorithm is not suitable for the online encryption to stream media information at the design of static objects such as image, watermark.
(2) existing chaos video-encryption algorithm adopts selective encryption algorithm more, and its core concept is exactly an encryption section data message.After the Video stream information processing, choose some pith information and encrypt, though ensured real-time, this type of selective encryption algorithm has a lot of defectives from safety perspective, is easy to be attacked and decode.
(3) design of chaos encryption algorithm is based on simple chaos system more, and simple chaos system is easy to be decoded by the nonlinear data treatment technology of maturation.
At above problem, need be based on chaology, proposition is at the multimedia video stream data encryption, new cryptographic algorithm, the video encryption system of setting up based on new algorithm is applied to the media video transmission, not only to have good transmission performance, as real-time, compression ratio and image transmission quality, and to have very high fail safe.A common selective encryption algorithm encryption section information, defensive measure are comparatively weak, are not enough to withstand the attack of malicious attacker, therefore need set up the encryption measures of many levels.Chaos encryption algorithm only adopts simple chaos, so need more complicated chaos system-hyperchaos.The complicated time series that hyperchaotic system produces has greatly improved the encryption quality, is very difficult to decode.Therefore the hyperchaos theory is applied to information encryption has important application prospects.
[summary of the invention]:
The present invention seeks to overcome the problems referred to above that prior art exists, the two level video stream media encryption methods based on chaos and hyperchaos with novelty are provided, for the fail safe transmission encryption system of realizing video stream media provides feasible solution.
Two level video stream media encryption methods based on chaos and hyperchaos provided by the invention, its main contents comprise:
1st, based on the structure of two level video stream data encipherment schemes of chaos and hyperchaos
Proposition is based on the structure of the video stream data encipherment scheme of two levels of chaos and hyperchaos, H.263, the design of this encryption system combines with video compression standard under the Network Transmission, adopt the H.263 stream after byte-by-byte tupe is handled coding, first level is in video compression video stream data to be carried out selectivity stream encryption based on chaotic maps; After the video compression, video stream data after the compression is carried out second level to be encrypted, promptly video stream data is carried out the piece scramble and data are obscured, wherein the piece scramble adopts two-dimensional discrete Baker mapping, then the The data hyperchaotic system behind the scramble is carried out data and obscures;
2nd, based on the video stream data encipherment scheme of first level of chaotic maps
The encipherment scheme of first level is: in video compression, based on chaotic maps video stream data is carried out optionally stream encryption, promptly the part of video data is carried out stream encryption based on chaotic maps, in the selective encryption algorithm based on chaotic maps, the coefficient of the discrete cosine transform DCT of piece is all by stream encryption in all frames;
Stream encryption: stream encryption also is sequential encryption, the encryption and decryption thought of stream cipher be earlier with video stream data as a plain text stream m who constitutes by basic coding unit 0 and 1, utilize a key stream k and this plain text stream m to encrypt bit by bit then, obtain a stream cipher c, decipher bit by bit with the same key stream k of synchronous generation and this stream cipher c during deciphering and recover plain text stream m; This key stream k is the sequence that adopts chaos system to generate, and what chaos system adopted is the one dimension Logist chaotic maps that disperses;
The Cipher Strength of stream encryption the place one's entire reliance upon randomness and the unpredictability of key stream, and chaos system has pseudo-randomness and unpredictability, again because its easy implementation when producing key stream, so the sequence that is generated by chaos system can be used as key stream, the present invention adopts discrete dimensional Logistic chaotic maps in stream encryption;
Selective encryption algorithm based on chaos: core concept is exactly an encryption section data, promptly based on chaotic maps the part of video data is carried out stream encryption;
Discrete cosine transform (DCT) coefficient: DCT is a kind of data processing method, its essence is and convert a spatial domain function to the frequency domain function, the 8*8 frequency system matrix that obtains according to dct transform, be called the DCT coefficient, the further outstanding image subject informational content (direct current and low frequency component) big to visual impact, and weaken or omit the minor incidental details little to visual impact (high fdrequency component);
The energy of compressed image mainly concentrates on the low frequency part and the direct current component of 64 DCT coefficients, therefore in order to obtain enough fail safes to resist the attack that may occur, in our selective encryption algorithm based on chaos, the DCT coefficient (1 DC and 63 AC) of piece is all by stream encryption in all frames;
3rd, based on the video stream data encipherment scheme of second level of discrete Baker mapping and hyperchaos mapping
To finishing the H.263 video stream data behind the first level scrambled, carry out the encryption of second level, the encipherment scheme of second level is made up of two parts, promptly at first adopts two-dimensional discrete Baker mapping to carry out data disorder, and mapping is carried out data to the data behind the scramble and obscured based on hyperchaos then;
3.1st, data disorder
Utilize two-dimensional discrete Baker mapping to realize behind the coding the H.263 data disorder of video stream data; In the cryptographic system structure of correspondence, the H.263 video stream data behind the first level scrambled is used as plain text stream, will provide the concrete steps of data disorder below:
The first step: from the H.263 video stream data behind the first level scrambled, take out N * N byte data and be used for two-dimensional discrete Baker mapping scramble iteration, scramble key k
BBy l, n
1, n
2..., n
kConstitute the iterations of l representative data scramble, (n
i, i=1,2 ..., k) be the component value of key, N, l, n
iBe taken as the integer greater than 0, the selection principle of N and l is for to obtain better balance between fail safe and processing speed, and N and l are big more, and fail safe is strong more, and processing speed is just slow more, (n
1, n
2, L n
k) to satisfy n
i| N, i=1, L, k, and n
1+ L+n
k=N;
Second step: the data (b that iteration is selected
1, b
2, L L b
N * N) scramble operation l time, obtain the data (bp behind the scramble
1, bp
2, L L bp
NN);
The 3rd step: with the data (bp behind the scramble
1, bp
2, L L bp
NN) store the origin-location of video stream data into;
3.2nd, data are obscured
The sequence of selecting for use the hyperchaos equation to generate realizes obscuring of data, the status switch (x that the hyperchaos equation generates
1, x
2, L L x
NN) will be obtained bit sequence (c by discretization
1, c
2, L L c
NN) with scramble after H.263 video stream data sequence (bp
1, bp
2, L L bp
NN) obscure operation, obscure operation and adopt xor operation to realize; H.263 video stream data after obscuring is used as the input data that video network transmits with unaltered H.263 video stream data.
Advantage of the present invention and good effect
The present invention proposes two level video stream media encryption methods, realized purpose the transmission of video stream media Information Security based on chaos and hyperchaos.
The present invention provides advanced effective method for the design and analysis of video stream media encryption system, greatly improved video data information transmission safety degree, the information security social for networking provides innovative technology, in fields such as cultural spreading industry, trade financing, military affairs, have good economic benefit and social benefit, while can promote the abundant and development of chaos cipher scientific principle opinion, so this achievement has important theory value and application prospect.
The present invention has the following advantages:
(1) design philosophy of the chaos video encryption system of two levels has been proposed, and combine with video compression standard H-263 under the Network Transmission, in video compression, carry out video flowing chaos encryption based on discrete cosine transform (DC), after the video compression, video flowing is carried out the piece scramble and data are obscured, this encipherment scheme is suitable for using in the network video stream media delivery more fully, has good feasibility, versatility and fail safe.
The encipherment scheme of (2) first levels is in video compression, based on the Logistic chaotic maps video stream data is carried out optionally stream encryption, promptly the part of video stream data is carried out stream encryption based on chaotic maps, this level is as a complementary encryption link that strengthens whole encryption system fail safe, in selective encryption algorithm based on chaotic maps, therefore the coefficient of the discrete cosine transform DCT of piece can obtain enough fail safes to resist the attack that may occur all by stream encryption in all frames.After video compression, adopt two-dimensional discrete Baker mapping carrying out video stream data scramble and based on hyperchaos mapping the data behind the scramble carried out data obscure; Be the organically blending of data encryption measure of multiple different attribute, make encryption system have higher fail safe.
(3) the existing encipherment scheme based on chaos utilizes disorder method to realize the key scramble of digital picture or video.And the cryptographic system here utilizes two-dimensional discrete Baker mapping to realize behind the coding the H.263 data disorder of video flowing.
(3) in this cryptographic algorithm, not only use simple chaos system, but also used hyperchaotic system.Simple chaos system only contains a positive Liapunov exponent, has the complicated dynamic expanding of one dimension, exists the possibility that is easy to by the decoding of the nonlinear data treatment technology of maturation.Hyperchaos is the chaos system of the complicated dynamic expanding in higher-dimension zone, and it is the chaos system with positive Liapunov exponent more than two.The complicated time series that hyperchaotic system produces has bigger randomness and unpredictability, adopts sort signal to encrypt, and has greatly improved the encryption quality, is very difficult to decode.
(4) the two level hyperchaos video encryption systems of realizing based on this cryptographic algorithm, through test statistics analysis under network environment, its fail safe and every performance index such as processing speed, compression ratio, rebuild back picture quality and all reach the ideal performance index request, shown the good practicability of this method.
[description of drawings]:
Fig. 1 is a chaos video-encryption network communicating system.
Fig. 2 is that the socket (socket) of udp protocol calls sequential chart.
Fig. 3 is based on the video encryption system model structure figure of chaos.
Fig. 4 is based on two level video stream media cryptographic algorithm block diagrams of chaos and hyperchaos.
Fig. 5 is a Logistic chaos sequence trajectory diagram.
Fig. 6 is the first level encrypt and decrypt system works flow process figure.
Fig. 7 is a second layer encryption system workflow diagram.
Fig. 8 is a two dimension Baker mapping graph continuously.
Fig. 9 is a two-dimensional discrete Baker mapping graph.
Figure 10 is a hyperchaos sequence trajectory diagram.
Figure 11 is based on two level video stream data encrypted instance effects of chaos and hyperchaos, (a) is original image, (b) is the coded image after encrypting through ground floor, (c) is (d) to be the image after the deciphering by the coded image after encrypting through the second layer.
[embodiment]:
The video stream media encryption system mainly consists of the following components: related hardware equipment, the video stream media encryption software, the video stream media decryption software, wherein encryption software is placed in Streaming Media issue end, decryption software is placed in the Streaming Media receiving terminal, the core of encryption software and decryption software is the encrypt and decrypt algorithm, the video flowing cryptographic algorithm design for scheme step and the know-why that are based on chaos and hyperchaos that the present invention mainly describes, in embodiment, at first aspect the network catenation principle of chaos video stream media encryption system and system function design, introduce the concrete implementation step of the encryption method in the invention of back major part combining video sequences case description.
1. based on the network catenation principle and the system function design of the video encryption system of chaos
1.1 video network catenation principle
The web stream media releasing of encrypting for needs, video conference, Digital Television etc., all need the video data after encrypting by Network Transmission in client, therefore just produced relevant Network Transmission control problem, here only provide with the present invention in notions such as the closely-related network transmission protocol of chaos video encryption system, chaos video-encryption network communicating system as shown in Figure 1:
Under the network environment, communication between the various computing machine is distribution process communication, it adopts client/server (Client/Server) pattern, client computer and server all are the application programs that communicates, client computer is to the server requests service under this pattern, and server response and provide service to client computer.ICP/IP protocol is that TCP is the basis of realizing the network interconnection, is made up of the IP agreement and the Transmission Control Protocol of bottom; Wherein the IP agreement is an Internet protocol, and all communicating pairs need communicate on Internet, and then all are connected to all necessary IP agreement of observing of computer of Internet.For the communication between the application process of finishing the various computing machine, ICP/IP protocol unique process of sign in the whole network scope, at this moment need to use the IP address of network layer and the port numbers of transport layer, they just are called socket (Socket) address altogether.Distributed process communication in the network environment need be adopted the Socket programming mode.In the network environment each computer all has the operating system of oneself, and operating system should offer the interface of web application, i.e. and network application DLL (dynamic link library) (Application Program Interface, API).Socket has shielded the difference of bottom communication software and specific operating system, makes any two the Transmission Control Protocol softwares to be installed and to be realized that communication becomes possibility between the computer of socket standard.
The real-time video system is higher to the transfer of data rate requirement, and in ICP/IP protocol, the user datagram protocol UDP agreement is mainly used in the application layer protocol that efficiency of transmission is had relatively high expectations.In UDP client-server pattern, client-server is represented the process of two application programs of mutual communication.The UDP server provides service by the port numbers of knowing to client computer.The UDP client computer is meant application program from the port numbers of provisional application to the server requests service that use certain network by.UDP server and UDP client computer all can be set up an output queue and an input rank, and they are respectively applied for and send and receive the UDP message bag.The UDP server adopts the mode of duplicate services device to handle concurrent service.The duplicate services device adopts a request queue to store the service request of arrival, and according to first come first served basis sequential processes server requests.The quantity of duplicate services device processing client request is subjected to the restriction of request queue length, but it can control the processing time to server requests effectively.The Socket of udp protocol calls sequential chart as shown in Figure 2.Actual motion verifies that also transport layer adopts udp protocol can enough guarantee the real-time Transmission of video data in the chaos video encryption system.
1.2 system function design
The chaos video encryption system is based upon in the TCP/IP procotol, interactional pattern between two processes is Client (C/S model), be that Internet video is gathered transmission encryption system server end in real time and waited for that the client files a request and responded, and Internet video is gathered transmission decryption system client in real time and is filed an application to server when needed, server end carries out all the time as finger daemon, monitor the network port, in case client requests is arranged, will start a service processes and respond this user.Software function realizes mainly being made of four parts: real-time video collection and broadcast, compressed encoding and decoding; Video network transmission, video-encryption and deciphering.To each video input bag, in order to be implemented in the end to end communication in the local area network (LAN), must know the IP and the port numbers of server end in advance, and carry out network connection dialogue and transfer of data.Here to highlight a bit, the cryptographic system that the present invention realizes does not adopt transmission control protocol RTP to guarantee the QoS (Quality of Service) of video Data Transmission, can further improve in this practical application afterwards to strengthen the applicability under wide area network.
1.3 real-time video collection and playing function realize
In the chaos video encryption system, need to gather and displaying video information in real time, therefore be necessary to choose and be easy to realize and very ripe video acquisition software and hardware.In the software of video, used the Video Capture technology.Can adopt digital video software kit VFW (Video for Windows) SDK who is specifically designed to Video Capture.VFW SDK provides the interface of standard for realization Video Capture in the Windows system, thereby greatly reduces the procedure development difficulty.VFW can make application program obtain digitized video clipping by digitizer from traditional analog video source.The key idea of VFW does not need specialized hardware when being broadcast, it has introduced the file standard of a kind of AVI of crying, how this standard code video and audio frequency this be stored on the hard disk, and the voice data that replaces stores video frames and be complementary with it in avi file.VFW make the programmer can by send message or set a property catch, broadcast and edit video clips.AVICap supports real-time video flowing to catch and the video single frames is caught.
The AVICap window class provides following function:
◆ the collection of control audio, video separately;
◆ adopt overlay (stack in real time) or preview (preview) mode display video image;
◆ work simultaneously with ICM and ACM, directly be compressed to the Voice ﹠ Video data in the application program;
◆ audio frequency, video flowing directly be compressed into avi file and do not need the details of developer's detail knowledge audio video interleaved;
◆ the input equipment of dynamic knowledge video and audio frequency;
◆ create, preserve and be written into palette;
◆ video palette is copied on the shear plate;
◆ control MCI equipment;
◆ catch single-frame images and preserve with the DIB form.
1.4 the compressed encoding function realizes
H.263 we adopt, and standard realizes compressed encoding and decoding function.H.263 standard is a kind of video compression coding standard of low message transmission rate, it adopts motion compensation, inter predictions etc. are removed the redundancy of image in time-domain, use discrete cosine transform (DCT) to remove the redundancy in image information space then, remove contained statistical redundancy degree in the DCT coefficient of quantification back with the long statistical coding of mutilation at last, reach the purpose of data compression.
2. based on the model formulation of the video encryption system of chaos
Video encryption system based on chaos belongs to digital enciphering system, promptly finds the solution chaos sequence that the chaos equation produces and is designed to key and video sequence encryption under the limited precision.It also belongs to symmetric-key systems.Frame of video is known as expressly, and the frame of video after encrypting accordingly is called as ciphertext.Here we provide the model formulation based on the video encryption system of chaos, comprise basic conception and structrual description, model structure as shown in Figure 3:
Video encryption system based on chaos is made of five parts, and its symbolic expression is P, C, K, { E
k, k ∈ K}, { D
k, k ∈ K}, the mathematical expression meaning is as follows:
1) P represents the finite aggregate of original frame of video.
The finite aggregate of the frame of video after 2) the C representative is encrypted.
3) K represents key, the cipher key sets that it is produced by one or more chaos or hyperchaotic system.
4), exist and encrypt equation E to each k ∈ K
k∈ ε and corresponding decryption equation D
k∈ D is here to each E
k: P → C and D
k: C → P has equation (1) as follows:
D
k(E
k(x))=x (1)
Each frame of video is all set up.Wherein ε and D are the set of all encryption and decryption equation.
Next the 3.2nd joint based on the stream encryption scheme of first level of chaos and 3.3.2 joint based on behind the scramble of hyperchaos equation H.263 video data to obscure encipherment scheme all be to design under above-mentioned framework, only Zui Da difference just is key K and encryption equation E
k: P → C and decryption equation D
k: the difference of C → P, this is the emphasis place that the password designer is worked.
3. based on two level video stream media encipherment scheme implementation step and examples of chaos and hyperchaos
3.1 structure based on two level video stream media encipherment schemes of chaos and hyperchaos
Fig. 4 has provided the structure chart of the encipherment scheme that is proposed.As can be seen from Figure 4, many chaos video encryption system of two levels also belongs to symmetric encryption system, and the client and server end of communicating pair has same key k
A, k
B, k
CCome encrypting plaintext and decrypting ciphertext.In software is realized, a series of frame of video is captured, compress and transmit by IP network, in this processing procedure, cryptographic algorithm is used to the opposing security threat, in order to satisfy the requirement of real-time video transmission, this encryption system has adopted H.263 codec, is applicable to satisfy the H.263 various video stream datas encryptions of standard.
In this example, the video stream data parameter of using is as follows: the frame of video video format of employing is the Qcif form, video luminance signal resolution is the 176x144 pixel, the vision signal chroma resolution is the 88x72 pixel, transmission bit rate is black and white video 6.1Mbit/s, color video 9.1Mbit/s, the maximum permission of every frame bit is 64, and frame of video adopts the pattern of intraframe coding in addition, and promptly all video hardwoods are counted as the I frame.Because we belong to symmetric encryption system by the encryption system of design, decrypting process is the inverse process of ciphering process, therefore will only provide cryptographic algorithm and ciphering process in conjunction with example.
3.2 stream encryption scheme based on first level of chaos
3.2.1 the first level chaos encryption system configuration
The encipherment scheme of first level is based on the Logistic chaotic maps video data is carried out optionally stream encryption, promptly encrypts all DCT coefficients, and the specific design of algorithm is as follows.
The structure that this encryption system comes design of cryptosystems with reference to Fig. 3, its five structural elements are as follows:
1) key k is by μ and x
0Form; P={a
i}={ DC, AC
1, L L AC
63Form by all 64 the DCT coefficients after DCT process and the quantification;
2) the DCT coefficient sets { b of C after by all stream encryptions
iForm;
3) E
kCan be described as Xor (XOR) operation, promptly by following formula (2) gained:
4) D
kCan be described as XOR (Xor) operation, promptly by following formula (3) gained:
3.2.2 process based on the video flowing encryption system of chaos
The ciphering process of this encryption system is made up of following six steps:
1) generation of key stream.According to given initial key, i.e. the initial condition x of chaos system
0With Control Parameter μ, iterative computation Logistic chaos system obtains chaos state x for N time
n, discrete then this chaos state x
nJust obtain x
n16 discretization represent.One-dimensional discrete time Logistic chaos system is represented with (4) formula:
x
k+1=μx
k(1-x
k) (4)
In the formula, x
k∈ X, k=0,1,2,3L is a discrete-time series, this system is with the current state x of sequence
kBe mapped to next state x
K+1As from initial condition x
0Beginning iterates, and then obtains sequence { x
k∈ X, k=0,1,2,3L}.This sequence is called a track of this discrete chaotic system.Wherein 0<μ≤4 are called branch parameter, x
K+1∈ (0,1).When getting 3.5699456≤μ≤4, calculate the sequence that this chaos system obtains and be chaos sequence.In this example, get μ=3.5699614 x
0=0.45678912345; Fig. 5 is the Logistic chaos sequence that calculates.
2) from video sequence, take out a frame, again through obtaining the video data of rgb format after the Video processing;
3) carry out DCT process and quantizing process to obtain all intra-frame macro blocks;
4) all the DCT coefficients to pieces all in the frame carry out the stream encryption operation, and concrete equation is the Ek (xor operation) that a last joint is introduced;
5) video flowing after encrypting is carried out Variable Length Code (VLC);
If the frame of handling is the last frame in the video sequence, then withdraw from whole encryption process, proceed otherwise forward step 2 to.
Because this encryption system is a symmetric encryption system, so decrypting process is corresponding with it, concrete structure chart is seen Fig. 6.
3.3 video-encryption scheme based on second level of Bakaer mapping and hyperchaos
The encipherment scheme of the second layer is made up of two independent parts, promptly carry out data disorder and carry out data with the data of hyperchaotic system after and obscure scramble based on 2-D Baker mapping, in the cryptographic system structure of correspondence, the H.263 video flowing behind the coding is used as expressly.The design module of the encipherment scheme of second level is seen Fig. 7.
3.3.1 the H.263 video data scramble of hinting obliquely at based on 2-D Baker
H.263 the data disorder of video flowing after the cryptographic system here utilizes the 2 discrete Baker mappings of dimension (2-D Baker mapping) to realize encoding.The computational methods of 2-D Baker mapping are as follows:
Two dimension Baker mapping is a chaotic maps, can define a two-dimentional Baker mapping in unit square.As shown in Figure 8, in the horizontal direction unit square is divided into k rectangular block [F
I-1, F
i) * [0,1), i=1, L, k, F
i=p
1+ Λ+p
i, F
0=0, p wherein
iBe the width of rectangle, and p is arranged
1+ L p
k=1.For i rectangular block [F
I-1, F
i) * [0,1), the Baker mapping is actually the 1/p that stretched on Width
i, and compressed p in the longitudinal direction
i, the rectangular block row of a horizontal direction arrangement become rectangular block row stacked mutually on the vertical direction the most at last.Said process is expressed as with mathematical expression:
When realizing on computers, continuous Baker mapping discretization promptly need be set up 2-D Baker mapping.Concrete 2-DBaker mapping can be undertaken by following step:
1) N * N square is divided into k rectangular block in the horizontal direction, each rectangular block has N * n
iIndividual pixel, wherein n
iAliquot N;
2) each rectangular block is divided into n again
iHeight piece (as shown in Figure 9) is because each large rectangular block has N * n
iIndividual pixel is so be divided into n
iBehind the height piece, each sub-piece just in time has N pixel;
3) in each rectangular block, to press from top to bottom, order from left to right is again with the line of pixels align.If square is N * N, use
Represent the general Baker mapping of discretization,
N
i=n
1+ Λ+n
i, n
i| N, i=1, A, k, and n
1+ Λ+n
k=N (6)
For pixel (r, s),
N wherein
i≤ r<N
i+ n
i, 0≤s<N.
Behind the certain number of times of iteration, 2-D Baker mapping has just presented the characteristic of chaos.
From the H.263 video stream data behind the coding, take out N * N byte data and be used for two-dimensional discrete Baker mapping scramble iteration, scramble key k
BBy l, n
1, n
2..., n
kConstitute the iterations of l representative data scramble, (n
i, i=1,2 ..., k) be the component value of key, N, l, n
iBe taken as the integer greater than 0, N and l are big more, and cryptographic security is strong more, but operand is also big more, and processing speed is just slow more, so the selection principle of N and l is for obtaining better balance, (n between fail safe and processing speed
1, n
2, L n
k) also to satisfy n
i| N, i=1, L, k, and n
1+ L+n
k=N; In this example, get N=32, l=9, k=4, { n
1, n
2, n
3, n
4}={ 4,8,16,4}.
To provide the concrete steps of data disorder below:
1) from the H.263 video flowing behind the coding, takes out N * N byte data (getting N=32 in this example).H.263 preceding 8 bytes of video flowing do not change, and mainly are because cryptanalysis person is easy to guess out the header structure of encoded video stream.
2) the selected data (b of iteration
1, b
2, L L b
N * N) scramble operation l time.
3) with the data (bp behind the data disorder
1, bp
2, L L bp
NN) store the origin-location of video flowing into.
3.3.2 based on obscuring of video data H.263 behind the scramble of hyperchaos equation
It is the character value that changes the H.263 video data of operating based on the scramble of 2-D Baker mapping that data are obscured, and this link adopts the encryption system based on hyperchaos, and in this example, the calculating of hyperchaotic system sequence is got as drag:
Hyperchaotic system is represented by equation group (8):
To this hyperchaos equation, as long as provide initial condition X
0=(x
0, y
0, z
0, w
0) can adopt the method for numerical computations to calculate its time sequence { X
j=(x
j, y
j, z
j, w
j), j=1 ..., NN}, normal Long Gekuta (Runge-Kutta) the quadravalence algorithm of classics that adopts calculates.
In this example, delivery shape parameter a=35, b=3, c=12, d=7 and e=0.58, key k
cFirst state of value X by equation (8)
0=(x
0, y
0, z
0, w
0) constitute, be taken as X
0=(1.12345678912345,2.12345678912345,3.12345678912345,4.12345678912345).This moment, the chaos locus of exponential type diffusion appearred in the system motion track in plural direction.From a security point of view, because hyperchaotic system has more complicated phase space than low-dimensional chaos system, be difficult for being decrypted with its design cryptographic algorithm.Under superincumbent parameter and the key, the sequence track that this system generates as shown in figure 10.
Obtain { X
j, j=1 ..., behind the NN}, can get certain component wherein, for example the hyperchaos status switch { x of first component formation
j, j=1 ..., NN} is used for encrypting.Hyperchaos state (x
1, x
2, L L X
NN) will be obtained bit sequence (c by discretization
1, c
1, L L c
NN) obscure operation with experiment, it is as follows to obscure the concrete equation (10) of operation (xor operation):
H.263 video flowing after obscuring with do not change other H.263 video data be used as the input data of video network transmission.
Above-mentioned steps just is based on the complete procedure of two level video encryption method of chaos and hyperchaos.
3.4 two level video encryption method effects
Provided after the encryption of last frame of video data walrus video among Figure 11 and the image effect figure after the deciphering, Figure 11. (a) be original image, Figure 11. (b) be the coded image after encrypting through ground floor, Figure 11. (c) be the coded image after encrypting through the second layer, Figure 11. (d) be the image after the deciphering.From Figure 11. (c) as can be seen, two level video-encryption algorithms have good cipher round results, because from the subjective sensation of human eye, almost do not have visual information to appear in the image.
Claims (1)
1. two level video stream media encryption methods based on chaos and hyperchaos is characterized in that this method comprises:
1st, based on the structure of two level video stream data encipherment schemes of chaos and hyperchaos
Proposition is based on the structure of the video stream data encipherment scheme of two levels of chaos and hyperchaos, H.263, the design of this encryption system combines with video compression standard under the Network Transmission, adopt the H.263 stream after byte-by-byte tupe is handled coding, first level is in video compression video stream data to be carried out selectivity stream encryption based on chaotic maps; After the video compression, video stream data after the compression is carried out second level to be encrypted, promptly video stream data is carried out the piece scramble and data are obscured, wherein the piece scramble adopts two-dimensional discrete Baker mapping, then the The data hyperchaotic system behind the scramble is carried out data and obscures;
2nd, based on the video stream data encipherment scheme of first level of chaotic maps
The encipherment scheme of first level is: in video compression, based on chaotic maps video stream data is carried out optionally stream encryption, promptly the part of video data is carried out stream encryption based on chaotic maps, in the selective encryption algorithm based on chaotic maps, the coefficient of the discrete cosine transform DCT of piece is all by stream encryption in all frames;
Stream encryption: stream encryption also is sequential encryption, the encryption and decryption thought of stream cipher be earlier with video stream data as a plain text stream m who constitutes by basic coding unit 0 and 1, utilize a key stream k and this plain text stream m to encrypt bit by bit then, obtain a stream cipher c, decipher bit by bit with the same key stream k of synchronous generation and this stream cipher c during deciphering and recover plain text stream m; This key stream k is the sequence that adopts chaos system to generate, and what chaos system adopted is the one dimension Logist chaotic maps that disperses;
3rd, based on the video stream data encipherment scheme of second level of discrete Baker mapping and hyperchaos mapping
To finishing the H.263 video stream data behind the first level scrambled, carry out the encryption of second level, the encipherment scheme of second level is made up of two parts, promptly at first adopts two-dimensional discrete Baker mapping to carry out data disorder, and mapping is carried out data to the data behind the scramble and obscured based on hyperchaos then;
3.1st, data disorder
Utilize two-dimensional discrete Baker mapping to realize behind the coding the H.263 data disorder of video stream data; In the cryptographic system structure of correspondence, the H.263 video stream data behind the first level scrambled is used as plain text stream, will provide the concrete steps of data disorder below:
The first step: from the H.263 video stream data behind the first level scrambled, take out N * N byte data and be used for two-dimensional discrete Baker mapping scramble iteration, scramble key k
BBy l, n
1, n
2..., n
kConstitute the iterations of l representative data scramble, n
i, i=1,2 ..., k is the component value of key, N, l, n
iBe taken as the integer greater than 0, the selection principle of N and l is for to obtain better balance between fail safe and processing speed, and N and l are big more, and fail safe is strong more, and processing speed is just slow more, n
1, n
2, L, n
kSatisfy n
i| N, i=1, L, k, and n
1+ L+n
k=N;
Second step: the data b that iteration is selected
1, b
2, L L, b
N * NScramble operation l time obtains the data b p behind the scramble
1, bp
2, L L, bp
NN
The 3rd step: with the data b p behind the scramble
1, bp
2, L L, bp
NNStore the origin-location of video stream data into;
3.2nd, data are obscured
The sequence of selecting for use the hyperchaos equation to generate realizes obscuring of data, the status switch x that the hyperchaos equation generates
1, x
2, L L, x
NNTo be obtained bit sequence c by discretization
1, c
2, L L, c
NNWith the H.263 video stream data sequence bp behind the scramble
1, bp
2, L L, bp
NNObscure operation, obscure operation and adopt xor operation to realize; H.263 video stream data after obscuring is used as the input data that video network transmits with unaltered H.263 video stream data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011100903086A CN102123026A (en) | 2011-04-12 | 2011-04-12 | Chaos and hyperchaos based two-level video streaming media encryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011100903086A CN102123026A (en) | 2011-04-12 | 2011-04-12 | Chaos and hyperchaos based two-level video streaming media encryption method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102123026A true CN102123026A (en) | 2011-07-13 |
Family
ID=44251490
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011100903086A Pending CN102123026A (en) | 2011-04-12 | 2011-04-12 | Chaos and hyperchaos based two-level video streaming media encryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102123026A (en) |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103888637A (en) * | 2014-04-08 | 2014-06-25 | 广东工业大学 | Method for chaotic encryption of multi-path image digital information |
CN105430432A (en) * | 2015-11-11 | 2016-03-23 | 广东省电信规划设计院有限公司 | Method and system for chaotic encryption of video |
CN106127669A (en) * | 2016-06-29 | 2016-11-16 | 广东工业大学 | Based on protecting the New chaotic image encryption method that area B aker maps |
CN106204671A (en) * | 2016-07-18 | 2016-12-07 | 浪潮集团有限公司 | Encryption method based on code grouping and replacement |
CN107181566A (en) * | 2017-05-10 | 2017-09-19 | 桂林电子科技大学 | A kind of chaos interleaving algorithm towards high-speed mobile communications |
CN107222749A (en) * | 2017-06-21 | 2017-09-29 | 同济大学 | A kind of chaos code constructing method for wireless video transmission |
CN107612676A (en) * | 2017-10-24 | 2018-01-19 | 天津工业大学 | Qi hyperchaos video encryption methods based on FPGA |
CN108898028A (en) * | 2018-07-06 | 2018-11-27 | 成都大象分形智能科技有限公司 | It is related to the neural network model encryption protection system and method for iteration and accidental enciphering |
CN108920981A (en) * | 2018-07-06 | 2018-11-30 | 成都大象分形智能科技有限公司 | It is related to the neural network model encryption protection system and method for data iterative cryptographic |
CN108924594A (en) * | 2018-08-07 | 2018-11-30 | 东北大学 | A kind of video encryption method based on hyperchaotic system |
CN109586894A (en) * | 2018-11-16 | 2019-04-05 | 重庆邮电大学 | The encryption method of data in OPC UA edge calculations is realized based on pseudo-random permutation |
CN109788299A (en) * | 2019-03-12 | 2019-05-21 | 广东工业大学 | Video transmission method, system, equipment and computer media between a kind of mobile device |
CN110381337A (en) * | 2019-09-04 | 2019-10-25 | 上海金桥信息股份有限公司 | A kind of video encryption method of the incompatible Video coding based on chaos cipher theory |
WO2019214024A1 (en) * | 2018-05-11 | 2019-11-14 | 吉林大学珠海学院 | Encryption and decryption method based on binary modulo operation utilizing stream hash |
CN111093098A (en) * | 2019-12-30 | 2020-05-01 | 北京电子科技学院 | Logistic mapping-based chaotic encryption method |
CN111970519A (en) * | 2020-08-28 | 2020-11-20 | 中国人民解放军国防科技大学 | Airborne video return method |
CN113055545A (en) * | 2021-04-01 | 2021-06-29 | 江苏经贸职业技术学院 | Image encryption system based on two-dimensional index-cosine chaotic system |
CN113079393A (en) * | 2021-04-01 | 2021-07-06 | 江苏经贸职业技术学院 | Video stream encryption system based on two-dimensional exponential-sinusoidal hyperchaotic system |
CN113612596A (en) * | 2021-07-02 | 2021-11-05 | 重庆邮电大学 | Image self-decryption method based on hyperchaotic system |
CN113784139A (en) * | 2021-08-13 | 2021-12-10 | 同济大学 | Pseudo-analog channel coding method and device based on two-dimensional chaotic coding |
CN114024662A (en) * | 2021-12-21 | 2022-02-08 | 渔翁信息技术股份有限公司 | Random number generator |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1581957A (en) * | 2003-07-31 | 2005-02-16 | 索尼英国有限公司 | Access control for digital video stream data |
CN101110944A (en) * | 2007-08-31 | 2008-01-23 | 湖北科创高新网络视频股份有限公司 | Method and apparatus for encrypting video data |
-
2011
- 2011-04-12 CN CN2011100903086A patent/CN102123026A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1581957A (en) * | 2003-07-31 | 2005-02-16 | 索尼英国有限公司 | Access control for digital video stream data |
CN101110944A (en) * | 2007-08-31 | 2008-01-23 | 湖北科创高新网络视频股份有限公司 | Method and apparatus for encrypting video data |
Non-Patent Citations (2)
Title |
---|
《中国图像图形学报》 20060930 ZHANG Meng等 Chaotic Video Encryption Algorithm Based on Baker Map 1327-1333 1 第11卷, 第9期 * |
ZHANG MENG等: "Chaotic Video Encryption Algorithm Based on Baker Map", 《中国图像图形学报》 * |
Cited By (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103888637B (en) * | 2014-04-08 | 2017-06-13 | 广东工业大学 | The method of multiway images digital information chaos encryption |
CN103888637A (en) * | 2014-04-08 | 2014-06-25 | 广东工业大学 | Method for chaotic encryption of multi-path image digital information |
CN105430432A (en) * | 2015-11-11 | 2016-03-23 | 广东省电信规划设计院有限公司 | Method and system for chaotic encryption of video |
CN105430432B (en) * | 2015-11-11 | 2018-06-05 | 广东省电信规划设计院有限公司 | video chaotic encryption method and system |
CN106127669A (en) * | 2016-06-29 | 2016-11-16 | 广东工业大学 | Based on protecting the New chaotic image encryption method that area B aker maps |
CN106204671A (en) * | 2016-07-18 | 2016-12-07 | 浪潮集团有限公司 | Encryption method based on code grouping and replacement |
CN107181566A (en) * | 2017-05-10 | 2017-09-19 | 桂林电子科技大学 | A kind of chaos interleaving algorithm towards high-speed mobile communications |
CN107222749B (en) * | 2017-06-21 | 2019-10-18 | 同济大学 | A kind of chaos code constructing method for wireless video transmission |
CN107222749A (en) * | 2017-06-21 | 2017-09-29 | 同济大学 | A kind of chaos code constructing method for wireless video transmission |
CN107612676A (en) * | 2017-10-24 | 2018-01-19 | 天津工业大学 | Qi hyperchaos video encryption methods based on FPGA |
WO2019214024A1 (en) * | 2018-05-11 | 2019-11-14 | 吉林大学珠海学院 | Encryption and decryption method based on binary modulo operation utilizing stream hash |
US10951399B2 (en) | 2018-05-11 | 2021-03-16 | Zhuhai College Of Jilin University | Binary stream hash modulus encryption and decryption method |
CN108920981B (en) * | 2018-07-06 | 2020-06-30 | 成都大象分形智能科技有限公司 | Neural network model encryption protection system and method related to data iterative encryption |
CN108898028A (en) * | 2018-07-06 | 2018-11-27 | 成都大象分形智能科技有限公司 | It is related to the neural network model encryption protection system and method for iteration and accidental enciphering |
CN108920981A (en) * | 2018-07-06 | 2018-11-30 | 成都大象分形智能科技有限公司 | It is related to the neural network model encryption protection system and method for data iterative cryptographic |
CN108924594A (en) * | 2018-08-07 | 2018-11-30 | 东北大学 | A kind of video encryption method based on hyperchaotic system |
CN109586894A (en) * | 2018-11-16 | 2019-04-05 | 重庆邮电大学 | The encryption method of data in OPC UA edge calculations is realized based on pseudo-random permutation |
CN109788299A (en) * | 2019-03-12 | 2019-05-21 | 广东工业大学 | Video transmission method, system, equipment and computer media between a kind of mobile device |
CN110381337A (en) * | 2019-09-04 | 2019-10-25 | 上海金桥信息股份有限公司 | A kind of video encryption method of the incompatible Video coding based on chaos cipher theory |
CN110381337B (en) * | 2019-09-04 | 2021-09-24 | 上海金桥信息股份有限公司 | Video encryption method based on chaos cipher theory and incompatible video coding |
CN111093098A (en) * | 2019-12-30 | 2020-05-01 | 北京电子科技学院 | Logistic mapping-based chaotic encryption method |
CN111970519B (en) * | 2020-08-28 | 2021-06-15 | 中国人民解放军国防科技大学 | Airborne video return method |
CN111970519A (en) * | 2020-08-28 | 2020-11-20 | 中国人民解放军国防科技大学 | Airborne video return method |
CN113055545A (en) * | 2021-04-01 | 2021-06-29 | 江苏经贸职业技术学院 | Image encryption system based on two-dimensional index-cosine chaotic system |
CN113079393A (en) * | 2021-04-01 | 2021-07-06 | 江苏经贸职业技术学院 | Video stream encryption system based on two-dimensional exponential-sinusoidal hyperchaotic system |
CN113612596A (en) * | 2021-07-02 | 2021-11-05 | 重庆邮电大学 | Image self-decryption method based on hyperchaotic system |
CN113784139A (en) * | 2021-08-13 | 2021-12-10 | 同济大学 | Pseudo-analog channel coding method and device based on two-dimensional chaotic coding |
CN113784139B (en) * | 2021-08-13 | 2023-08-29 | 同济大学 | Pseudo-analog channel coding method and device based on two-dimensional chaotic coding |
CN114024662A (en) * | 2021-12-21 | 2022-02-08 | 渔翁信息技术股份有限公司 | Random number generator |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102123026A (en) | Chaos and hyperchaos based two-level video streaming media encryption method | |
Yang et al. | Image compression-encryption scheme based on fractional order hyper-chaotic systems combined with 2D compressed sensing and DNA encoding | |
Krikor et al. | Image encryption using DCT and stream cipher | |
Bouteghrine et al. | Novel image encryption algorithm based on new 3-d chaos map | |
Deshmukh et al. | Modified AES based algorithm for MPEG video encryption | |
Chen et al. | Generalized optical encryption framework based on Shearlets for medical image | |
Gao et al. | A novel quantum image encryption technique based on improved controlled alternated quantum walks and hyperchaotic system | |
CN114157772B (en) | Digital image encryption method based on space-time chaotic system and half tensor product compressed sensing | |
Soleymani et al. | A survey on principal aspects of secure image transmission | |
CN110148189A (en) | A kind of light field image encryption method based on DNA sequence dna and chaos system | |
Manupriya et al. | V⊕ SEE: Video secret sharing encryption technique | |
Mohamed et al. | Fast and robust image encryption scheme based on quantum logistic map and hyperchaotic system | |
Sabir et al. | Multi-layer security based multiple image encryption technique | |
He et al. | Chosen plaintext attack on JPEG image encryption with adaptive key and run consistency | |
Velliangiri | An enhanced multimedia video surveillance security using wavelet encryption framework | |
Parekh et al. | Multilayer symmetric and asymmetric technique for audiovisual cryptography | |
Zhang et al. | Multiple-image encryption based on light-field imaging and gravity model | |
Ganesan et al. | Public key encryption of images and videos in real time using chebyshev maps | |
Naik et al. | An image cryptosystem based on diffusion of significant bit-planes of a scrambled image with generated binary key matrices | |
Abdel Hameed | Scrambled Encryption Approach for Color Images Based on 9-D Chaotic Systems with 3-D Substitution Bit Levels | |
Nair et al. | Colour image encryption algorithm using rubik’s cube scrambling with bitmap shuffling and frame rotation | |
Desai et al. | Chaos-based system for image encryption | |
Donev et al. | A novel secure solution of using mixed reality in data transmission for bowel and jaw surgical telepresence: enhanced rivest cipher RC6 block cipher | |
Seyedzadeh et al. | Using self-adaptive coupled piecewise nonlinear chaotic map for color image encryption scheme | |
Gunasekaran et al. | An Efficient Method for Secure 2D Image Visualization and Transmission through Chaotic Confusion and Pixel Diffusion |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20110713 |