CN102176759A - Method for encrypting video streaming information based on hyper-chaotic sequence - Google Patents
Method for encrypting video streaming information based on hyper-chaotic sequence Download PDFInfo
- Publication number
- CN102176759A CN102176759A CN 201110038420 CN201110038420A CN102176759A CN 102176759 A CN102176759 A CN 102176759A CN 201110038420 CN201110038420 CN 201110038420 CN 201110038420 A CN201110038420 A CN 201110038420A CN 102176759 A CN102176759 A CN 102176759A
- Authority
- CN
- China
- Prior art keywords
- sequence
- carried out
- formula
- frame
- xor operation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Compression Or Coding Systems Of Tv Signals (AREA)
Abstract
The invention provides a method for encrypting MPEG (moving picture experts group) video streaming information based on a hyper-chaotic sequence, which is characterized in that a streaming encryption technology is combined with a block encryption technology so as to encrypt I frames and P frames of MPEG video streaming; in an algorithm, an initial value of a four-dimensional hyper-chaotic system is taken as an external secret key, the hyper-chaotic sequence generated by the four-dimensional hyper-chaotic system is utilized, and AC (alternating current) coefficients of video images are utilized to generate an inner secret key; and an XOR operation is carried out on DC (direct current) and AC coefficients of the I frames respectively, position scrambling is carried out on luminance information of the I frames by taking a 8*8 block as a unit, the XOR operation is carried out on motion vectors of F macro blocks in the P frames, and original video information is disturbed sufficiently. In the method, the space of the secret keys is huge, and the capacity to resist brute force attacks is strong; because an encryption process is embedded into an MPEG coding process, the method is good in instantaneity; and due to the introduction of the inner secrete key, the capacity of the encryption algorithm to resist plain text attacks is strengthened.
Description
[technical field]
The invention belongs to field of information security technology, relate to a kind of Video stream information encryption method based on the hyperchaos sequence.
[background technology]
Fast development along with Internet technology, Video Applications based on the Streaming Media transmission is developed rapidly, bring great convenience for people's work and life, simultaneously, also emerge many serious information security issues, the popularity of video data storage and transmission and conveniency wreck it easily and attack thereupon.Video flowings such as Digital Television, video-mail, video telephone are easy to suffer artificial attack in network environment, for example leakage of information, information are stolen, the resource unauthorized is invaded and used etc., thereby the video flowing safety problem receives increasing concern in the network environment, becomes one of current problem that needs to be resolved hurrily.
In recent years, the cryptographic algorithm of a lot of images and video occurred, yet there is defective in a lot of algorithm on fail safe or enciphering rate.In the selective encryption algorithm of video flowing, stream cipher encrypting obtains very extensive studies.A good encryption method of video stream should possess following characteristics: the first, possess enough fail safes, and can effectively resist various attack; The second, real-time, the enciphering rate of assurance video stream data.Shi and Bhargava change the direct current and the sign bit of ac coefficient or the sign bit of motion vector by key of XOR and come mpeg video stream is encrypted.Figure place is few, processing speed is fast, cannot stand known plain text attack though this stream cipher encrypting method is encrypted.The assailant carries out XOR with both corresponding positions and just can easily obtain key if know original text and ciphertext.So, be not enough only with the stream cipher encrypting video data, need to increase methods such as replacement or scramble.In addition, there is mutual restriction in a lot of cryptographic algorithm on fail safe and enciphering rate, can not realize real-time.Hyperchaotic system has initial value sensitiveness and randomlikeness, have two or more Lyapunov indexes, have the dynamics more more complicated than chaos system, can have broad application prospects at information security field for cryptographic algorithm provides huge key space and good security performance.
[summary of the invention]
The present invention seeks to solve existing cryptographic algorithm and on fail safe and enciphering rate, have mutual restriction, can not realize the problem of real-time, a kind of mpeg video stream encryption method based on the hyperchaos sequence is provided, and this method has very high security performance when guaranteeing the cryptographic algorithm real-time.
The performing step of the Video stream information encryption method based on the hyperchaos sequence provided by the invention is as follows:
1st, utilize I, P, the B frame structure features of MPEG, at first the I frame is encrypted; The I frame information is carried out dct transform, and as formula (1), it is that wherein, A (0,0) is the DC coefficient in 8 * 8 the matrix A that the DCT coefficient is read in dimension, and all the other coefficients are the AC coefficient;
2nd, select hyperchaotic system, and set its initial value x
1(0), x
2(0), x
3(0), x
4(0), adopts fourth-order Runge-Kutta method that hyperchaotic system is carried out iterative, in each iterative process, all can obtain 4 data and be x
1(i), x
2(i), x
3(i), x
4And then obtain 4 hyperchaos sequence x (i),
1, x
2, x
3, x
4, use formula (2) that 4 sequences are carried out numerical value then and handle,
x′
j(i)=mod((round(|x
j(i)|-floor|x
j(i)|)×10
14),256) (2)
In the formula, i=1,2,3 ... represent iteration the i time, j=1,2,3,4, mod () is a MOD function, and round () is a bracket function, and floor () is downward bracket function;
3rd, calculate the m value by formula (3), m ∈ [0,2] decides which group of selection to be used for encrypting by the m value;
m=mod(x′
1(i),3) (3)
m | Combinations of states |
0 | {x′ 1(i),x′ 2(i),x′ 3(i)} |
1 | {x′ 1(i),x′ 2(i),x′ 4(i)} |
2 | {x′ 2(i),x′ 3(i),x′ 4(i)} |
If m=2, then select x '
2(i), x '
3(i), x '
4(i) } be used for encrypting, utilize x '
2Sequence is carried out the XOR cryptographic operation to DC coefficient sequence in the I frame, establishes that the DC coefficient sequence is L in the I frame
Dc, the DC coefficient sequence is L ' behind the xor operation
DcUtilize x '
3It is the position scramble of unit that the Y plane space is carried out with 8 * 8 block of pixels,
4th, the AC coefficient sequence of establishing non-zero in the I frame is L
Ac, its element number is n, the k that calculates according to formula (4) is as internal key,
Utilize formula (5) to change the initial value of hyperchaotic system, and then, after formula (2) numerical value is handled, can obtain sequence of values based on the new hyperchaos sequence of hyperchaotic system generation
(5)
Intercepting
Preceding n data of sequence and L
AcCarry out xor operation, the sequence behind the xor operation is designated as L '
Ac, as formula (6),
In the formula,
The expression xor operation; With L '
AcCoefficient sequence is carried out the haul distance compressed encoding, with L ' then according to the ordering of Zig-Zag shape
DcCoefficient sequence is carried out differential pulse coding, carries out the Huffman coding at last, finishes the encryption of I two field picture;
5th, for guaranteeing the fail safe of algorithm, select the motion vector of F macro block in the P frame to encrypt, be provided with two macro block M
1And M
2, coded image macro block M
1Be reference picture macro block M
2Best matching blocks, their difference is exactly the poor of respective pixel values in these two macro blocks, and the difference of gained is carried out color space transformation, and does 4: 1: 1 sampling and obtain Y, C
r, C
bComponent value carries out dct transform, quantification and variable-length encoding then; Motion vector r with each F macro block of present frame
i(x
i, y
i) convert one-dimensional sequence L to
Mv=(x
1, y
1, x
2, y
2...) after, with x '
4Carry out xor operation;
After operation is finished, the motion vector of each macro block of present frame is carried out the Huffman coding, finish the encryption of P frame information;
Above-mentioned cryptographic algorithm embeds in the compression encoding process of MPEG, and decipherment algorithm is the inverse process of cryptographic algorithm, is reversible owing to encrypt engineering, according to the reverse order of ciphering process encrypted video stream is handled, and just can obtain decrypted video stream.
More than the 2nd the step described hyperchaotic system be the four-dimension hyperchaotic system, its model is as follows:
X wherein
1, x
2, x
3, x
4Be state variable, a, b, c, d are parameters, work as a=35, b=3, c=12, d=7, during r=0.6, system is a hyperchaotic system.
Advantage of the present invention and good effect:
The present invention proposes a kind of mpeg video stream encryption method based on the hyperchaos sequence.This cryptographic algorithm combines stream encryption technology and block encryption technology; Respectively DC, the AC coefficient of I frame carried out xor operation, is that unit carries out the position scramble with the piece to the monochrome information of I frame based on the hyperchaos sequence; Motion vector to the P frame carries out xor operation; Because introduce hyperchaotic system as signal source, the key space of this encryption method is huge, uprising power attacking ability strengthens; Ciphering process embeds MPEG and gets in the compression encoding process, and algorithm has good real-time, and simultaneously, the introducing of internal key significantly strengthens the anti-plaintext attack ability of algorithm.This algorithm security height, real-time are good, and the real-time Transmission that is suitable for mpeg video stream is encrypted.
[description of drawings]
Fig. 1 is that mpeg video stream is encrypted schematic diagram.
Fig. 2 is a mpeg video stream I frame scrambled flow process.
Fig. 3 is a mpeg video stream P frame scrambled flow process.
Fig. 4 is the normal structure of MPEG.
Fig. 5 is cipher round results figure, the former video figure of A, and B encrypts rear video figure, C deciphering rear video figure.
[embodiment]
Embodiment 1:
Give an example below and realize
1, mpeg video stream I two field picture is divided into 8 * 8 segment, uses formula (1) that each segment is carried out discrete cosine transform, obtain AC, DC coefficient after the quantification;
2, get hyperchaotic system initial value x
1(0)=x
2(0)=x
3(0)=x
4(0)=0.1 as external key, hyperchaotic system is carried out iteration 200000 times, obtain hyperchaos sequence x with fourth-order Runge-Kutta method
1, x
2, x
3, x
4, utilize formula (3) hyperchaos sequence to carry out numerical value and handle, obtain x '
1, x '
2, x '
3, x '
4Calculate the m value according to formula (4), select the chaos sequence combination;
3, the k that calculates according to formula (6) changes the initial value of hyperchaotic system as internal key, obtains new hyperchaos sequence
4, utilize x '
1, x '
2, x '
3, x '
4Sequence is carried out xor operation to DC coefficient in the I frame, and the piece that the Y plane space is carried out with 8 * 8 is the space scramble of unit; Utilize sequence
The AC coefficient is carried out xor operation, then DC, AC coefficient after encrypting are encoded;
5, utilize x '
1, x '
2, x '
3, x '
4Motion vector to F macro block in the P frame carries out xor operation, then, the motion vector of each macro block is carried out the Huffman coding;
Operate according to above-mentioned step, be that a tested object is 128 * 128 the mpeg video stream in 6 seconds of length below, test platform CPU is a Pentium IV 1.7G processor, 2G internal memory, operating system are Windows XP, a fragment in the intercepting video, its cipher round results as shown in Figure 5, it is abundant to encrypt the rear video image scrambling as can be seen, can't reflect any information of original image, and cipher round results is good; Video image and original image after the correct deciphering are in full accord.
Claims (2)
1. Video stream information encryption method based on the hyperchaos sequence is characterized in that the concrete steps of this method are as follows:
1st, utilize I, P, the B frame structure features of MPEG, at first the I frame is encrypted; The I frame information is carried out dct transform, and as formula (1), it is that wherein, A (0,0) is the DC coefficient in 8 * 8 the matrix A that the coefficient of DCT is read in dimension, and all the other coefficients are the AC coefficient;
2nd, select hyperchaotic system, and set its initial value x
1(0), x
2(0), x
3(0), x
4(0), adopts fourth-order Runge-Kutta method that hyperchaotic system is carried out iterative, in each iterative process, all can obtain 4 data and be x
1(i), x
2(i), x
3(i), x
4And then obtain 4 hyperchaos sequence x (i),
1, x
2, x
3, x
4, use formula (2) that 4 sequences are carried out numerical value then and handle,
x′
j(i)=mod((round(|x
j(i)|-floor|x
j(i)|)×10
14),256) (2)
In the formula, i=1,2,3 ... represent iteration the i time, j=1,2,3,4, mod () is a MOD function, and round () is a bracket function, and floor () is downward bracket function;
3rd, calculate the m value by formula (3), m ∈ [0,2] decides which group of selection to be used for encrypting by the m value;
m=mod(x′
1(i),3) (3)
If m=2, then select x '
2(i), x '
3(i), x '
4(i) } be used for encrypting, utilize x '
2Sequence is carried out the XOR cryptographic operation to DC coefficient sequence in the I frame, establishes that the DC coefficient sequence is L in the I frame
Dc, the DC coefficient sequence is L ' behind the xor operation
DcUtilize x '
3It is the position scramble of unit that the Y plane space is carried out with 8 * 8 block of pixels,
4th, the AC coefficient sequence of establishing non-zero in the I frame is L
Ac, its element number is n, the k that calculates according to formula (4) is as internal key,
Utilize formula (5) to change the initial value of hyperchaotic system, and then, after formula (2) numerical value is handled, can obtain sequence of values based on the new hyperchaos sequence of hyperchaotic system generation
(5)
Intercepting
Preceding n data of sequence and L
AcCarry out xor operation, the sequence behind the xor operation is designated as L '
Ac, as formula (6),
In the formula,
The expression xor operation; With L '
AcCoefficient sequence is carried out the haul distance compressed encoding, with L ' then according to the ordering of Zig-Zag shape
DeCoefficient sequence is carried out differential pulse coding, all carries out the Huffman coding at last, finishes the encryption of I two field picture;
5th, for guaranteeing the fail safe of algorithm, select the motion vector of F macro block in the P frame to encrypt, establish two macro block M
1And M
2, coded image macro block M
1Be reference picture macro block M
2Best matching blocks, their difference is exactly the poor of respective pixel values in these two macro blocks, and the difference of gained is carried out color space transformation, and does 4: 1: 1 sampling and obtain Y, C
r, C
bComponent value carries out dct transform, quantification and variable-length encoding then; Motion vector r with each F macro block of present frame
i(x
i, y
i) convert one-dimensional sequence L to
Mv=(x
1, y
1, x
2, y
2...) after, with x '
4Carry out xor operation;
After operation is finished, the motion vector of each macro block of P frame is carried out the Huffman coding, finish the encryption of P frame information;
Above-mentioned cryptographic algorithm embeds in the compression encoding process of MPEG, decipherment algorithm is the inverse process of cryptographic algorithm, because xor operation and position scramble process all are reversible, according to the reverse order of ciphering process encrypted video stream are handled, just the video flowing that can obtain deciphering.
2. method according to claim 1 is characterized in that described hyperchaotic system of the 2nd step is four-dimensional hyperchaotic system, and its model is as follows:
X wherein
1, x
2, x
3, x
4Be state variable, a, b, c, d are parameters, work as a=35, b=3, c=12, d=7, during r=0.6, system is a hyperchaotic system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 201110038420 CN102176759A (en) | 2011-02-15 | 2011-02-15 | Method for encrypting video streaming information based on hyper-chaotic sequence |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 201110038420 CN102176759A (en) | 2011-02-15 | 2011-02-15 | Method for encrypting video streaming information based on hyper-chaotic sequence |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102176759A true CN102176759A (en) | 2011-09-07 |
Family
ID=44519848
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 201110038420 Pending CN102176759A (en) | 2011-02-15 | 2011-02-15 | Method for encrypting video streaming information based on hyper-chaotic sequence |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102176759A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103888637A (en) * | 2014-04-08 | 2014-06-25 | 广东工业大学 | Method for chaotic encryption of multi-path image digital information |
CN104301727A (en) * | 2014-09-22 | 2015-01-21 | 中国人民解放军重庆通信学院 | H.264 video perception encryption algorithm with controllable quality on basis of CABAC |
CN105430432A (en) * | 2015-11-11 | 2016-03-23 | 广东省电信规划设计院有限公司 | Method and system for chaotic encryption of video |
CN105871537A (en) * | 2016-06-16 | 2016-08-17 | 广东工业大学 | Video communication method and device based on chaotic encryption |
CN107612676A (en) * | 2017-10-24 | 2018-01-19 | 天津工业大学 | Qi hyperchaos video encryption methods based on FPGA |
CN107845055A (en) * | 2017-07-17 | 2018-03-27 | 安徽大学 | The image encryption method of anti-Facebook compressions |
CN110677694A (en) * | 2019-10-15 | 2020-01-10 | 华南理工大学 | Video encryption method for resisting contour attack |
CN114640855A (en) * | 2019-04-09 | 2022-06-17 | 西安万像电子科技有限公司 | Data processing method and system |
CN115695675B (en) * | 2023-01-03 | 2023-03-10 | 北京特立信电子技术股份有限公司 | Video encryption method for network data secure exchange |
-
2011
- 2011-02-15 CN CN 201110038420 patent/CN102176759A/en active Pending
Non-Patent Citations (1)
Title |
---|
《2010 Second International Conference on Intelligent Human-Machine System and Cybemetics》 20101231 Chen zaiping 等 A Hyper-chaos Based Image Encryption Algorithm 全文 1-2 , * |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103888637A (en) * | 2014-04-08 | 2014-06-25 | 广东工业大学 | Method for chaotic encryption of multi-path image digital information |
CN103888637B (en) * | 2014-04-08 | 2017-06-13 | 广东工业大学 | The method of multiway images digital information chaos encryption |
CN104301727B (en) * | 2014-09-22 | 2018-02-23 | 中国人民解放军重庆通信学院 | Quality controllable H.264 video-aware AES based on CABAC |
CN104301727A (en) * | 2014-09-22 | 2015-01-21 | 中国人民解放军重庆通信学院 | H.264 video perception encryption algorithm with controllable quality on basis of CABAC |
CN105430432A (en) * | 2015-11-11 | 2016-03-23 | 广东省电信规划设计院有限公司 | Method and system for chaotic encryption of video |
CN105430432B (en) * | 2015-11-11 | 2018-06-05 | 广东省电信规划设计院有限公司 | video chaotic encryption method and system |
CN105871537A (en) * | 2016-06-16 | 2016-08-17 | 广东工业大学 | Video communication method and device based on chaotic encryption |
CN105871537B (en) * | 2016-06-16 | 2017-11-14 | 广东工业大学 | A kind of video communication method and device based on chaos encryption |
CN107845055A (en) * | 2017-07-17 | 2018-03-27 | 安徽大学 | The image encryption method of anti-Facebook compressions |
CN107845055B (en) * | 2017-07-17 | 2020-10-16 | 安徽大学 | Image encryption method for resisting Facebook compression |
CN107612676A (en) * | 2017-10-24 | 2018-01-19 | 天津工业大学 | Qi hyperchaos video encryption methods based on FPGA |
CN114640855A (en) * | 2019-04-09 | 2022-06-17 | 西安万像电子科技有限公司 | Data processing method and system |
CN110677694A (en) * | 2019-10-15 | 2020-01-10 | 华南理工大学 | Video encryption method for resisting contour attack |
CN115695675B (en) * | 2023-01-03 | 2023-03-10 | 北京特立信电子技术股份有限公司 | Video encryption method for network data secure exchange |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102176759A (en) | Method for encrypting video streaming information based on hyper-chaotic sequence | |
Li et al. | A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks | |
CN102843558B (en) | H.264/AVC compressed domain video encryption/decryption device and encrypting/decrypting method thereof | |
CN104144343A (en) | Digital image compressing, encrypting and encoding combined method | |
CN104093029A (en) | Video encryption algorithm based on new spatiotemporal chaos system | |
Rodrigues et al. | Selective encryption of human skin in JPEG images | |
CN104751401A (en) | Novel piecewise linear chaotic mapping image encrypting and encoding method | |
ShreyamshaKumar et al. | JPEG image encryption using fuzzy PN sequences | |
CN109168033B (en) | Video privacy data protection system and method | |
Soleymani et al. | A survey on principal aspects of secure image transmission | |
Younas et al. | Comparative analysis of chaotic and non-chaotic image encryption schemes | |
Zhang et al. | Color Image Encryption Algorithm Combining Compressive Sensing with Arnold Transform. | |
Huang et al. | Duple color image encryption system based on 3-d nonequilateral Arnold transform for IIot | |
El-Mowafy et al. | Chaos based encryption technique for compressed h264/avc videos | |
Batham et al. | ICSECV: an efficient approach of video encryption | |
Xu et al. | A selective image encryption algorithm based on hyper-chaos | |
Luo et al. | JPEG image encryption algorithm based on spatiotemporal chaos | |
CN105721873A (en) | Hidden transmission method based on MPEG4/2 | |
Hooda et al. | A comprehensive survey of video encryption algorithms | |
CN110071795A (en) | Selective cryptographic method based on H.264/AVC video encoding behavior | |
Al-Hayani et al. | Simultaneous video compression and encryption for real-time secure transmission | |
Chandra et al. | A novel approach of digital video encryption | |
CN104301727A (en) | H.264 video perception encryption algorithm with controllable quality on basis of CABAC | |
Rodrigues et al. | Face protection by fast selective encryption in a video | |
Qiu-qiong et al. | New video compression and encryption algorithm based on hyper-chaos |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20110907 |