CN102176759A - Method for encrypting video streaming information based on hyper-chaotic sequence - Google Patents

Method for encrypting video streaming information based on hyper-chaotic sequence Download PDF

Info

Publication number
CN102176759A
CN102176759A CN 201110038420 CN201110038420A CN102176759A CN 102176759 A CN102176759 A CN 102176759A CN 201110038420 CN201110038420 CN 201110038420 CN 201110038420 A CN201110038420 A CN 201110038420A CN 102176759 A CN102176759 A CN 102176759A
Authority
CN
China
Prior art keywords
sequence
carried out
formula
frame
xor operation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 201110038420
Other languages
Chinese (zh)
Inventor
董恩增
陈在平
李海芬
李程程
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin University of Technology
Original Assignee
Tianjin University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin University of Technology filed Critical Tianjin University of Technology
Priority to CN 201110038420 priority Critical patent/CN102176759A/en
Publication of CN102176759A publication Critical patent/CN102176759A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Compression Or Coding Systems Of Tv Signals (AREA)

Abstract

The invention provides a method for encrypting MPEG (moving picture experts group) video streaming information based on a hyper-chaotic sequence, which is characterized in that a streaming encryption technology is combined with a block encryption technology so as to encrypt I frames and P frames of MPEG video streaming; in an algorithm, an initial value of a four-dimensional hyper-chaotic system is taken as an external secret key, the hyper-chaotic sequence generated by the four-dimensional hyper-chaotic system is utilized, and AC (alternating current) coefficients of video images are utilized to generate an inner secret key; and an XOR operation is carried out on DC (direct current) and AC coefficients of the I frames respectively, position scrambling is carried out on luminance information of the I frames by taking a 8*8 block as a unit, the XOR operation is carried out on motion vectors of F macro blocks in the P frames, and original video information is disturbed sufficiently. In the method, the space of the secret keys is huge, and the capacity to resist brute force attacks is strong; because an encryption process is embedded into an MPEG coding process, the method is good in instantaneity; and due to the introduction of the inner secrete key, the capacity of the encryption algorithm to resist plain text attacks is strengthened.

Description

Video stream information encryption method based on the hyperchaos sequence
[technical field]
The invention belongs to field of information security technology, relate to a kind of Video stream information encryption method based on the hyperchaos sequence.
[background technology]
Fast development along with Internet technology, Video Applications based on the Streaming Media transmission is developed rapidly, bring great convenience for people's work and life, simultaneously, also emerge many serious information security issues, the popularity of video data storage and transmission and conveniency wreck it easily and attack thereupon.Video flowings such as Digital Television, video-mail, video telephone are easy to suffer artificial attack in network environment, for example leakage of information, information are stolen, the resource unauthorized is invaded and used etc., thereby the video flowing safety problem receives increasing concern in the network environment, becomes one of current problem that needs to be resolved hurrily.
In recent years, the cryptographic algorithm of a lot of images and video occurred, yet there is defective in a lot of algorithm on fail safe or enciphering rate.In the selective encryption algorithm of video flowing, stream cipher encrypting obtains very extensive studies.A good encryption method of video stream should possess following characteristics: the first, possess enough fail safes, and can effectively resist various attack; The second, real-time, the enciphering rate of assurance video stream data.Shi and Bhargava change the direct current and the sign bit of ac coefficient or the sign bit of motion vector by key of XOR and come mpeg video stream is encrypted.Figure place is few, processing speed is fast, cannot stand known plain text attack though this stream cipher encrypting method is encrypted.The assailant carries out XOR with both corresponding positions and just can easily obtain key if know original text and ciphertext.So, be not enough only with the stream cipher encrypting video data, need to increase methods such as replacement or scramble.In addition, there is mutual restriction in a lot of cryptographic algorithm on fail safe and enciphering rate, can not realize real-time.Hyperchaotic system has initial value sensitiveness and randomlikeness, have two or more Lyapunov indexes, have the dynamics more more complicated than chaos system, can have broad application prospects at information security field for cryptographic algorithm provides huge key space and good security performance.
[summary of the invention]
The present invention seeks to solve existing cryptographic algorithm and on fail safe and enciphering rate, have mutual restriction, can not realize the problem of real-time, a kind of mpeg video stream encryption method based on the hyperchaos sequence is provided, and this method has very high security performance when guaranteeing the cryptographic algorithm real-time.
The performing step of the Video stream information encryption method based on the hyperchaos sequence provided by the invention is as follows:
1st, utilize I, P, the B frame structure features of MPEG, at first the I frame is encrypted; The I frame information is carried out dct transform, and as formula (1), it is that wherein, A (0,0) is the DC coefficient in 8 * 8 the matrix A that the DCT coefficient is read in dimension, and all the other coefficients are the AC coefficient;
F ( u , v ) = 2 N C ( u ) C ( v ) Σ x = 0 N - 1 Σ y = 0 N - 1 f ( x , y ) cos ( 2 x + 1 ) uπ 2 N cos ( 2 y + 1 ) vπ 2 N - - - ( 1 )
In the formula, when u=v=0,
Figure BDA0000046830000000012
Work as u, v is not 0 o'clock entirely, and C (u)=C (v)=1.
2nd, select hyperchaotic system, and set its initial value x 1(0), x 2(0), x 3(0), x 4(0), adopts fourth-order Runge-Kutta method that hyperchaotic system is carried out iterative, in each iterative process, all can obtain 4 data and be x 1(i), x 2(i), x 3(i), x 4And then obtain 4 hyperchaos sequence x (i), 1, x 2, x 3, x 4, use formula (2) that 4 sequences are carried out numerical value then and handle,
x′ j(i)=mod((round(|x j(i)|-floor|x j(i)|)×10 14),256) (2)
In the formula, i=1,2,3 ... represent iteration the i time, j=1,2,3,4, mod () is a MOD function, and round () is a bracket function, and floor () is downward bracket function;
3rd, calculate the m value by formula (3), m ∈ [0,2] decides which group of selection to be used for encrypting by the m value;
m=mod(x′ 1(i),3) (3)
m Combinations of states
0 {x′ 1(i),x′ 2(i),x′ 3(i)}
1 {x′ 1(i),x′ 2(i),x′ 4(i)}
2 {x′ 2(i),x′ 3(i),x′ 4(i)}
If m=2, then select x ' 2(i), x ' 3(i), x ' 4(i) } be used for encrypting, utilize x ' 2Sequence is carried out the XOR cryptographic operation to DC coefficient sequence in the I frame, establishes that the DC coefficient sequence is L in the I frame Dc, the DC coefficient sequence is L ' behind the xor operation DcUtilize x ' 3It is the position scramble of unit that the Y plane space is carried out with 8 * 8 block of pixels,
L dc ′ = L dc ⊕ x 2 ′ - - - ( 3 )
In the formula,
Figure BDA0000046830000000022
The expression xor operation;
4th, the AC coefficient sequence of establishing non-zero in the I frame is L Ac, its element number is n, the k that calculates according to formula (4) is as internal key,
k = 1 256 ( Σ i = 1 n L ac ( i ) , 256 ) - - - ( 4 )
Utilize formula (5) to change the initial value of hyperchaotic system, and then, after formula (2) numerical value is handled, can obtain sequence of values based on the new hyperchaos sequence of hyperchaotic system generation
x ~ 1 ( 0 ) = x 1 ( 0 ) + 0.1 × k
(5)
x ~ 2 ( 0 ) = x 2 ( 0 ) + 0.1 × k
Intercepting
Figure BDA0000046830000000027
Preceding n data of sequence and L AcCarry out xor operation, the sequence behind the xor operation is designated as L ' Ac, as formula (6),
L ac ′ = L ac ⊕ x ~ 1 - - - ( 6 )
In the formula,
Figure BDA0000046830000000029
The expression xor operation; With L ' AcCoefficient sequence is carried out the haul distance compressed encoding, with L ' then according to the ordering of Zig-Zag shape DcCoefficient sequence is carried out differential pulse coding, carries out the Huffman coding at last, finishes the encryption of I two field picture;
5th, for guaranteeing the fail safe of algorithm, select the motion vector of F macro block in the P frame to encrypt, be provided with two macro block M 1And M 2, coded image macro block M 1Be reference picture macro block M 2Best matching blocks, their difference is exactly the poor of respective pixel values in these two macro blocks, and the difference of gained is carried out color space transformation, and does 4: 1: 1 sampling and obtain Y, C r, C bComponent value carries out dct transform, quantification and variable-length encoding then; Motion vector r with each F macro block of present frame i(x i, y i) convert one-dimensional sequence L to Mv=(x 1, y 1, x 2, y 2...) after, with x ' 4Carry out xor operation;
L mv ′ = L mv ⊕ x 4 ′ - - - ( 7 )
After operation is finished, the motion vector of each macro block of present frame is carried out the Huffman coding, finish the encryption of P frame information;
Above-mentioned cryptographic algorithm embeds in the compression encoding process of MPEG, and decipherment algorithm is the inverse process of cryptographic algorithm, is reversible owing to encrypt engineering, according to the reverse order of ciphering process encrypted video stream is handled, and just can obtain decrypted video stream.
More than the 2nd the step described hyperchaotic system be the four-dimension hyperchaotic system, its model is as follows:
x · 1 = a ( x 2 - x 1 ) + x 4 x · 2 = d x 2 - x 2 x 3 + c x 4 x · 3 = x 1 x 2 - b x 3 x · 4 = x 2 x 3 + r x 4 - - - ( 8 )
X wherein 1, x 2, x 3, x 4Be state variable, a, b, c, d are parameters, work as a=35, b=3, c=12, d=7, during r=0.6, system is a hyperchaotic system.
Advantage of the present invention and good effect:
The present invention proposes a kind of mpeg video stream encryption method based on the hyperchaos sequence.This cryptographic algorithm combines stream encryption technology and block encryption technology; Respectively DC, the AC coefficient of I frame carried out xor operation, is that unit carries out the position scramble with the piece to the monochrome information of I frame based on the hyperchaos sequence; Motion vector to the P frame carries out xor operation; Because introduce hyperchaotic system as signal source, the key space of this encryption method is huge, uprising power attacking ability strengthens; Ciphering process embeds MPEG and gets in the compression encoding process, and algorithm has good real-time, and simultaneously, the introducing of internal key significantly strengthens the anti-plaintext attack ability of algorithm.This algorithm security height, real-time are good, and the real-time Transmission that is suitable for mpeg video stream is encrypted.
[description of drawings]
Fig. 1 is that mpeg video stream is encrypted schematic diagram.
Fig. 2 is a mpeg video stream I frame scrambled flow process.
Fig. 3 is a mpeg video stream P frame scrambled flow process.
Fig. 4 is the normal structure of MPEG.
Fig. 5 is cipher round results figure, the former video figure of A, and B encrypts rear video figure, C deciphering rear video figure.
[embodiment]
Embodiment 1:
Give an example below and realize
1, mpeg video stream I two field picture is divided into 8 * 8 segment, uses formula (1) that each segment is carried out discrete cosine transform, obtain AC, DC coefficient after the quantification;
2, get hyperchaotic system initial value x 1(0)=x 2(0)=x 3(0)=x 4(0)=0.1 as external key, hyperchaotic system is carried out iteration 200000 times, obtain hyperchaos sequence x with fourth-order Runge-Kutta method 1, x 2, x 3, x 4, utilize formula (3) hyperchaos sequence to carry out numerical value and handle, obtain x ' 1, x ' 2, x ' 3, x ' 4Calculate the m value according to formula (4), select the chaos sequence combination;
3, the k that calculates according to formula (6) changes the initial value of hyperchaotic system as internal key, obtains new hyperchaos sequence
Figure BDA0000046830000000041
4, utilize x ' 1, x ' 2, x ' 3, x ' 4Sequence is carried out xor operation to DC coefficient in the I frame, and the piece that the Y plane space is carried out with 8 * 8 is the space scramble of unit; Utilize sequence
Figure BDA0000046830000000042
The AC coefficient is carried out xor operation, then DC, AC coefficient after encrypting are encoded;
5, utilize x ' 1, x ' 2, x ' 3, x ' 4Motion vector to F macro block in the P frame carries out xor operation, then, the motion vector of each macro block is carried out the Huffman coding;
Operate according to above-mentioned step, be that a tested object is 128 * 128 the mpeg video stream in 6 seconds of length below, test platform CPU is a Pentium IV 1.7G processor, 2G internal memory, operating system are Windows XP, a fragment in the intercepting video, its cipher round results as shown in Figure 5, it is abundant to encrypt the rear video image scrambling as can be seen, can't reflect any information of original image, and cipher round results is good; Video image and original image after the correct deciphering are in full accord.

Claims (2)

1. Video stream information encryption method based on the hyperchaos sequence is characterized in that the concrete steps of this method are as follows:
1st, utilize I, P, the B frame structure features of MPEG, at first the I frame is encrypted; The I frame information is carried out dct transform, and as formula (1), it is that wherein, A (0,0) is the DC coefficient in 8 * 8 the matrix A that the coefficient of DCT is read in dimension, and all the other coefficients are the AC coefficient;
F ( u , v ) = 2 N C ( u ) C ( v ) Σ x = 0 N - 1 Σ y = 0 N - 1 f ( x , y ) cos ( 2 x + 1 ) uπ 2 N cos ( 2 y + 1 ) vπ 2 N - - - ( 1 )
In the formula, when u=v=0,
Figure FDA0000046829990000012
Work as u, v is not 0 o'clock entirely, and C (u)=C (v)=1;
2nd, select hyperchaotic system, and set its initial value x 1(0), x 2(0), x 3(0), x 4(0), adopts fourth-order Runge-Kutta method that hyperchaotic system is carried out iterative, in each iterative process, all can obtain 4 data and be x 1(i), x 2(i), x 3(i), x 4And then obtain 4 hyperchaos sequence x (i), 1, x 2, x 3, x 4, use formula (2) that 4 sequences are carried out numerical value then and handle,
x′ j(i)=mod((round(|x j(i)|-floor|x j(i)|)×10 14),256) (2)
In the formula, i=1,2,3 ... represent iteration the i time, j=1,2,3,4, mod () is a MOD function, and round () is a bracket function, and floor () is downward bracket function;
3rd, calculate the m value by formula (3), m ∈ [0,2] decides which group of selection to be used for encrypting by the m value;
m=mod(x′ 1(i),3) (3)
m Combinations of states 0 {x′ 1(i),x′ 2(i),x′ 3(i)} 1 {x′ 1(i),x′ 2(i),x′ 4(i)} 2 {x′ 2(i),x′ 3(i),x′ 4(i)}
If m=2, then select x ' 2(i), x ' 3(i), x ' 4(i) } be used for encrypting, utilize x ' 2Sequence is carried out the XOR cryptographic operation to DC coefficient sequence in the I frame, establishes that the DC coefficient sequence is L in the I frame Dc, the DC coefficient sequence is L ' behind the xor operation DcUtilize x ' 3It is the position scramble of unit that the Y plane space is carried out with 8 * 8 block of pixels,
L dc ′ = L dc ⊕ x 2 ′ - - - ( 3 )
In the formula,
Figure FDA0000046829990000014
The expression xor operation;
4th, the AC coefficient sequence of establishing non-zero in the I frame is L Ac, its element number is n, the k that calculates according to formula (4) is as internal key,
k = 1 256 ( Σ i = 1 n L ac ( i ) , 256 ) - - - ( 4 )
Utilize formula (5) to change the initial value of hyperchaotic system, and then, after formula (2) numerical value is handled, can obtain sequence of values based on the new hyperchaos sequence of hyperchaotic system generation
Figure FDA0000046829990000021
x ~ 1 ( 0 ) = x 1 ( 0 ) + 0.1 × k
(5)
x ~ 2 ( 0 ) = x 2 ( 0 ) + 0.1 × k
Intercepting
Figure FDA0000046829990000024
Preceding n data of sequence and L AcCarry out xor operation, the sequence behind the xor operation is designated as L ' Ac, as formula (6),
L ac ′ = L ac ⊕ x ~ 1 - - - ( 6 )
In the formula,
Figure FDA0000046829990000026
The expression xor operation; With L ' AcCoefficient sequence is carried out the haul distance compressed encoding, with L ' then according to the ordering of Zig-Zag shape DeCoefficient sequence is carried out differential pulse coding, all carries out the Huffman coding at last, finishes the encryption of I two field picture;
5th, for guaranteeing the fail safe of algorithm, select the motion vector of F macro block in the P frame to encrypt, establish two macro block M 1And M 2, coded image macro block M 1Be reference picture macro block M 2Best matching blocks, their difference is exactly the poor of respective pixel values in these two macro blocks, and the difference of gained is carried out color space transformation, and does 4: 1: 1 sampling and obtain Y, C r, C bComponent value carries out dct transform, quantification and variable-length encoding then; Motion vector r with each F macro block of present frame i(x i, y i) convert one-dimensional sequence L to Mv=(x 1, y 1, x 2, y 2...) after, with x ' 4Carry out xor operation;
L mv ′ = L mv ⊕ x 4 ′ - - - ( 7 )
After operation is finished, the motion vector of each macro block of P frame is carried out the Huffman coding, finish the encryption of P frame information;
Above-mentioned cryptographic algorithm embeds in the compression encoding process of MPEG, decipherment algorithm is the inverse process of cryptographic algorithm, because xor operation and position scramble process all are reversible, according to the reverse order of ciphering process encrypted video stream are handled, just the video flowing that can obtain deciphering.
2. method according to claim 1 is characterized in that described hyperchaotic system of the 2nd step is four-dimensional hyperchaotic system, and its model is as follows:
x · 1 = a ( x 2 - x 1 ) + x 4 x · 2 = d x 2 - x 2 x 3 + c x 4 x · 3 = x 1 x 2 - b x 3 x · 4 = x 2 x 3 + r x 4 - - - ( 8 )
X wherein 1, x 2, x 3, x 4Be state variable, a, b, c, d are parameters, work as a=35, b=3, c=12, d=7, during r=0.6, system is a hyperchaotic system.
CN 201110038420 2011-02-15 2011-02-15 Method for encrypting video streaming information based on hyper-chaotic sequence Pending CN102176759A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 201110038420 CN102176759A (en) 2011-02-15 2011-02-15 Method for encrypting video streaming information based on hyper-chaotic sequence

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201110038420 CN102176759A (en) 2011-02-15 2011-02-15 Method for encrypting video streaming information based on hyper-chaotic sequence

Publications (1)

Publication Number Publication Date
CN102176759A true CN102176759A (en) 2011-09-07

Family

ID=44519848

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201110038420 Pending CN102176759A (en) 2011-02-15 2011-02-15 Method for encrypting video streaming information based on hyper-chaotic sequence

Country Status (1)

Country Link
CN (1) CN102176759A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103888637A (en) * 2014-04-08 2014-06-25 广东工业大学 Method for chaotic encryption of multi-path image digital information
CN104301727A (en) * 2014-09-22 2015-01-21 中国人民解放军重庆通信学院 H.264 video perception encryption algorithm with controllable quality on basis of CABAC
CN105430432A (en) * 2015-11-11 2016-03-23 广东省电信规划设计院有限公司 Method and system for chaotic encryption of video
CN105871537A (en) * 2016-06-16 2016-08-17 广东工业大学 Video communication method and device based on chaotic encryption
CN107612676A (en) * 2017-10-24 2018-01-19 天津工业大学 Qi hyperchaos video encryption methods based on FPGA
CN107845055A (en) * 2017-07-17 2018-03-27 安徽大学 The image encryption method of anti-Facebook compressions
CN110677694A (en) * 2019-10-15 2020-01-10 华南理工大学 Video encryption method for resisting contour attack
CN114640855A (en) * 2019-04-09 2022-06-17 西安万像电子科技有限公司 Data processing method and system
CN115695675B (en) * 2023-01-03 2023-03-10 北京特立信电子技术股份有限公司 Video encryption method for network data secure exchange

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《2010 Second International Conference on Intelligent Human-Machine System and Cybemetics》 20101231 Chen zaiping 等 A Hyper-chaos Based Image Encryption Algorithm 全文 1-2 , *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103888637A (en) * 2014-04-08 2014-06-25 广东工业大学 Method for chaotic encryption of multi-path image digital information
CN103888637B (en) * 2014-04-08 2017-06-13 广东工业大学 The method of multiway images digital information chaos encryption
CN104301727B (en) * 2014-09-22 2018-02-23 中国人民解放军重庆通信学院 Quality controllable H.264 video-aware AES based on CABAC
CN104301727A (en) * 2014-09-22 2015-01-21 中国人民解放军重庆通信学院 H.264 video perception encryption algorithm with controllable quality on basis of CABAC
CN105430432A (en) * 2015-11-11 2016-03-23 广东省电信规划设计院有限公司 Method and system for chaotic encryption of video
CN105430432B (en) * 2015-11-11 2018-06-05 广东省电信规划设计院有限公司 video chaotic encryption method and system
CN105871537A (en) * 2016-06-16 2016-08-17 广东工业大学 Video communication method and device based on chaotic encryption
CN105871537B (en) * 2016-06-16 2017-11-14 广东工业大学 A kind of video communication method and device based on chaos encryption
CN107845055A (en) * 2017-07-17 2018-03-27 安徽大学 The image encryption method of anti-Facebook compressions
CN107845055B (en) * 2017-07-17 2020-10-16 安徽大学 Image encryption method for resisting Facebook compression
CN107612676A (en) * 2017-10-24 2018-01-19 天津工业大学 Qi hyperchaos video encryption methods based on FPGA
CN114640855A (en) * 2019-04-09 2022-06-17 西安万像电子科技有限公司 Data processing method and system
CN110677694A (en) * 2019-10-15 2020-01-10 华南理工大学 Video encryption method for resisting contour attack
CN115695675B (en) * 2023-01-03 2023-03-10 北京特立信电子技术股份有限公司 Video encryption method for network data secure exchange

Similar Documents

Publication Publication Date Title
CN102176759A (en) Method for encrypting video streaming information based on hyper-chaotic sequence
Li et al. A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks
CN102843558B (en) H.264/AVC compressed domain video encryption/decryption device and encrypting/decrypting method thereof
CN104144343A (en) Digital image compressing, encrypting and encoding combined method
CN104093029A (en) Video encryption algorithm based on new spatiotemporal chaos system
Rodrigues et al. Selective encryption of human skin in JPEG images
CN104751401A (en) Novel piecewise linear chaotic mapping image encrypting and encoding method
ShreyamshaKumar et al. JPEG image encryption using fuzzy PN sequences
CN109168033B (en) Video privacy data protection system and method
Soleymani et al. A survey on principal aspects of secure image transmission
Younas et al. Comparative analysis of chaotic and non-chaotic image encryption schemes
Zhang et al. Color Image Encryption Algorithm Combining Compressive Sensing with Arnold Transform.
Huang et al. Duple color image encryption system based on 3-d nonequilateral Arnold transform for IIot
El-Mowafy et al. Chaos based encryption technique for compressed h264/avc videos
Batham et al. ICSECV: an efficient approach of video encryption
Xu et al. A selective image encryption algorithm based on hyper-chaos
Luo et al. JPEG image encryption algorithm based on spatiotemporal chaos
CN105721873A (en) Hidden transmission method based on MPEG4/2
Hooda et al. A comprehensive survey of video encryption algorithms
CN110071795A (en) Selective cryptographic method based on H.264/AVC video encoding behavior
Al-Hayani et al. Simultaneous video compression and encryption for real-time secure transmission
Chandra et al. A novel approach of digital video encryption
CN104301727A (en) H.264 video perception encryption algorithm with controllable quality on basis of CABAC
Rodrigues et al. Face protection by fast selective encryption in a video
Qiu-qiong et al. New video compression and encryption algorithm based on hyper-chaos

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20110907