CN107294946A - Data protection method - Google Patents

Data protection method Download PDF

Info

Publication number
CN107294946A
CN107294946A CN201610571498.6A CN201610571498A CN107294946A CN 107294946 A CN107294946 A CN 107294946A CN 201610571498 A CN201610571498 A CN 201610571498A CN 107294946 A CN107294946 A CN 107294946A
Authority
CN
China
Prior art keywords
bit stream
group
encryption
bit
target bit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201610571498.6A
Other languages
Chinese (zh)
Inventor
谢崇祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nuvoton Technology Corp
Original Assignee
Nuvoton Technology Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nuvoton Technology Corp filed Critical Nuvoton Technology Corp
Publication of CN107294946A publication Critical patent/CN107294946A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/067Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Compression Or Coding Systems Of Tv Signals (AREA)
  • Storage Device Security (AREA)

Abstract

A data protection method. After receiving the target bit stream, a random number sequence is obtained based on the cipher string. The plurality of numerical values included in the grouped random number sequence are a plurality of exchange groups. Based on the switching group, the arrangement order of a plurality of coding units included in the target bit stream is adjusted, so as to obtain the encrypted bit stream.

Description

Data guard method
Technical field
Coding unit order is rearranged the invention relates to a kind of data protection schemes, and in particular to one kind Data guard method.
Background technology
With the arriving of information age, many contents are created in digitized form.It is interior compared to simulation is replicated Hold for many time and efforts of needs, digital content can be easy to quickly replicated.Therefore, in order to avoid companion With utilizing electronic installation down loading network resource, so may trigger bootlegging, using or transmission data etc. plant Copyright relevant issues are planted, how to protect digital content to be increasingly becoming one of current subject under discussion focused on.
The content of the invention
The present invention provides a kind of data guard method, can be right in the case where not increasing the operation efficiency of hardware or firmware Data carry out being effectively protected measure.
The data guard method of the present invention, including:Receive target bit;Random number (random is obtained based on password word string Number) sequence;It is multiple exchange groups to divide multiple numerical value included by group's random number sequence;And based on above-mentioned friendship Group is changed, acquisition encryption bit stream is used in putting in order for multiple coding units included by adjustment target bit.
In one embodiment of this invention, based on above-mentioned exchange group, the coding unit included by adjustment target bit Put in order, the step of using acquisition encryption bit stream includes:One group is used as using one group of numerical value included by each exchange group Numbering is exchanged, and in target bit, the group is exchanged into the corresponding coding unit of numbering swaps, and uses and is added Mil stream.
In one embodiment of this invention, based on above-mentioned exchange group, the coding unit included by adjustment target bit Put in order, the step of using acquisition encryption bit stream includes:In target bit, wherein two groups correspondences of group will be exchanged Two groups of coding units swap, use acquisition encryption bit stream.
In one embodiment of this invention, password word string includes random number seed number and sequence length.And based on password The step of word string obtains random number sequence includes:The length of random number sequence is determined based on sequence length;And with random Several subnumbers inquire about the tables of random numbers to set up random number sequence.
In one embodiment of this invention, bit stream after the coding that target bit is obtained by original bit stream after encoded.And After encryption bit stream is obtained, encrypted bits stream is decoded via decoder, and bit stream after being decoded.Here, Bit stream can be different from original bit stream after decoding.
In one embodiment of this invention, bit stream after the coding that target bit is obtained by original bit stream after encoded, and After encryption bit stream is obtained, further include:Receive password word string;The exchange group obtained based on password word string, also Original encryption bit stream is target bit;And target bit is decoded via decoder, and obtain original bit stream.
In one embodiment of this invention, target bit can also be original bit stream.
In one embodiment of this invention, target bit is one of image bitstream, audio bit stream and video bit stream.
In one embodiment of this invention, coding unit can be frame (frame), or be minimum coding unit (minimum coded unit, MCU).
Based on above-mentioned, reach the effect of data encryption by adjusting putting in order for coding unit, can not increase hard In the case of the operation efficiency of part or firmware, data are carried out to be effectively protected measure.If also, encryption bit stream without Decrypt and the decoding of footpath row, error message can't be produced, cracked automatically so being difficult the program of being cracked.Accordingly, if Error message will not be produced in decoding process, can be reduced because being found automatically or by being artificially found to encrypted data, And the risk that trial is cracked.
For the features described above and advantage of the present invention can be become apparent, special embodiment below, and coordinate institute's accompanying drawings It is described in detail below.
Brief description of the drawings
Fig. 1 is the block diagram of the controller according to one embodiment of the invention.
Fig. 2 is the data guard method flow chart according to one embodiment of the invention.
Fig. 3 A and Fig. 3 B are the schematic diagrames of the encryption process according to one embodiment of the invention.
Fig. 4 is the schematic diagram of another ciphering process according to one embodiment of the invention.
Drawing reference numeral
100:Controller
110:Encoder
120:Encryption equipment
130:Decipher
140:Decoder
I:I frames
B:B frames
P:P frames
30A:Target bit
30B:Encrypt bit stream
S0~Sp:Exchange group
U_0~U_Ny:Coding unit
S205~S220:Each step of data guard method
Embodiment
The encryption requirements of the data streams such as video stream (data stream) increase day by day, so encryption algorithm common at present It is required for hardware or firmware to provide powerful operation efficiency, and then encryption cost is improved.Therefore, the present invention is proposed A kind of data guard method, in the case where not increasing the operation efficiency of hardware or firmware, to be carried out effectively to data Safeguard measure.In order that present disclosure becomes apparent, below can actually be according to this as the present invention especially exemplified by embodiment The example of implementation.
Fig. 1 is the block diagram of the controller according to one embodiment of the invention.Fig. 1 is refer to, controller 100 is, for example, CPU (Central Processing Unit, CPU), graphics processing unit (Graphic Processing Unit, GPU), physical processing unit (Physics Processing Unit, PPU), the microprocessor of programmable (Microprocessor), embedded control chip, digital signal processor (Digital Signal Processor, DSP), ASIC (Application Specific Integrated Circuits, ASIC) or other similar devices. In addition, controller 100 can also be display controller (display controller), card is for example, shown.Or, Controller 100 can be hard disk controller or Memory Controller.
Controller 100 incorporates encoder (encoder) 110, encryption equipment 120, decipher 130 and decoder (decoder)140.Encoder 110, encryption equipment 120, decipher 130 and decoder 140 are, for example, hardware electricity Road, software program or algorithm etc..Encoder 110 is data to be converted to by a kind of specific format (or coding) Other specific formats (or coding).Decoder 140 to encoded data to decode.For example, audio is compiled Decoder can be changed and compression sound data, and digital image data can be changed and compressed to Video Codec.
Here, encryption equipment 120 is to be encrypted action.That is, upset using encryption equipment 120 in target bit Coding unit puts in order, and thereby reaches the effects of protection data.Decipher 130 is then and encryption equipment 120 It is corresponding, action is decrypted to the data after being encrypted to encryption equipment 120.And in other embodiments, encryption equipment 120 can be integrated into encoder 110, and decipher 130 is then integrated into decoder 140.
Carried out in addition, above-mentioned encryption, decryption acts are not limited in same terminal installation.That is, transmitted with data For, it can be encrypted in the transmission end device of data, and be decrypted in the receiving end device of data.For example, Encryption equipment 120 is provided with the server of streaming service business, correspondence is provided with the electric terminal device of general user Decipher 130.And when the electric terminal device of general user was received by adding that encryption equipment 120 is encrypted After mil stream, its decipher 130 encrypted bits stream will be decrypted, to obtain mesh after password word string is obtained Mark stream.
It is beneath to further illustrate the detailed process that data guard method is performed using encryption equipment 120.
Fig. 2 is the data guard method flow chart according to one embodiment of the invention.Fig. 1 and Fig. 2 is refer to, in step In S205, encryption equipment 120 receives target bit (bitstream).Target bit be image bitstream, audio bit stream or Video bit stream.Can also be position after the coding after being encoded via encoder 110 and target bit can be original bit stream Stream.
Then, in step S210, encryption equipment 120 is based on password word string and obtains random number sequence.Here, with The difference of password word string, the content of the random number sequence obtained and the length of random number sequence can be different.In the implementation, Password word string can be to preset, or voluntarily be inputted by user, also, further setting code word string include with The several subnumbers of machine and sequence length.For example, password word string is set as 8, wherein 4 data representatives are random several Subnumber, in addition the data of 4 then represent the length (being only for example, be not limited thereto) of random number sequence.And Controller 100 is obtained after password word string, and encryption equipment 120 determines the length of random number sequence based on sequence length, and And inquire about the table of random numbers to set up random number sequence with random number seed number.
Then, in step S215, multiple numerical value included by 120 points of group's random number sequences of encryption equipment are handed over to be multiple Change group.For example, it is assumed that random number sequence includes y numerical value, i.e. N0, N1, N2 ..., Ny-1, Ny. N0~Ny is unduplicated numerical value, and it is the coding unit numbering in bit stream, can be arbitrary integer.Encryption equipment 120 Divide group to same exchange group by two or more numerical value according to preset rules.
Here, carrying out dividing for group with two neighboring numerical value, for example, N0 is to exchange group S0, N2 with N1 points of groups With N3 points of groups to exchange group S1 ... ..., Ny-1, Ny points of groups are to exchange group Sp by that analogy.So, it is above-mentioned Point group is carried out by way of example only with two neighboring numerical value, is not limited thereto, can also be adjacent 3 or more than 3 Numerical value carry out a point group.In addition, can also be that N0 is to exchange group S0 with N2 points of groups in other embodiments, N1 is to exchange group S1 etc. with N3 points of groups, by that analogy.
Then, in step S220, encryption equipment 120 is based on above-mentioned exchange group, adjusts included by target bit Putting in order for multiple coding units, uses acquisition encryption bit stream.For example, encryption equipment 120 can be exchanged for single Group swaps action, can also exchange group to swap action with two.
So that bit stream after the encoded rear coding obtained of original bit stream to be encrypted, and then for acquisition encryption bit stream, It is not provided with corresponding to encryption equipment 120 in password word string, or controller 100 if controller 100 is not received Decipher 130, then bit stream after decoder 140 can still be decoded and decoded to encrypted bits stream.Now, solve Bit stream can be different from original bit stream after code.
On the other hand, if controller 100 is provided with the decipher 130 corresponding to encryption equipment 120, can further it lead to Decipher 130 is crossed to obtain target bit.That is, after being encrypted to target bit, when the controller in decryption program 100 when receiving correct password word string, and decipher 130 can obtain corresponding random number sequence based on password word string, And multiple numerical value according to included by preset rules point group's random number sequence are multiple exchange groups.Afterwards, decipher 130 are based on above-mentioned exchange group, and the putting in order for multiple coding units encrypted included by bit stream is restored into target position Stream.Afterwards, target bit is decoded by decoder 140, and obtains original bit stream.
Because above-mentioned ciphering process is putting in order for the coding unit of adjustment target bit, therefore coding association will not be changed The standard of defined is discussed, and suitable for various coding protocols.Also, due to not changing the standard of coding protocol defined, Therefore, after the encrypted bits after by encryption are streamed to decoder 140, decoder 140 does not know that what is received adds Mil stream passes through change, enters without producing any error message to point out user.Accordingly, it can reduce by connecing Receiving end device automatically detects encrypted data, and attempts the risk that is cracked.In addition, in video streaming, only It is to allow user to think that the noise in image is caused by network bandwidth problem, without allowing user to think to be received The bit stream arrived is actually by caused by encryption.Accordingly, it can also reduce by artificially finding encrypted data, and attempt The risk cracked.
Fig. 3 A and Fig. 3 B are the schematic diagrames of the encryption process according to one embodiment of the invention.In the present embodiment, Coding unit is minimum coding unit (minimum coded unit, MCU).With Static Picture Compression standard JPEG Exemplified by (joint photographic experts group), its bit stream (bitstream) form starts (Start including image Of Image, SOI) mark (maker), frame (frame) and image to terminate (End of Image, EOI) Mark.Frame further comprises header (header) and multiple scanning (scan) units.Each scanning element enters one Step is divided into header and multiple blocks (segment).Each block is then further divided into minimum code block.
Ciphering process shown in Fig. 3 A, by encryption equipment 120, encryption bit stream 30B is converted to by target bit 30A. Fig. 3 B show decrypting process, and by decipher 130, encryption bit stream 30B is converted into target bit 30A.
Reference picture 3A, one group of numerical value included by encryption equipment 120 using each exchange group is numbered as one group of exchange, and In target bit 30A, the group is exchanged into the corresponding coding unit of numbering and swapped, acquisition encryption bit stream is used 30B.So that for exchanging group S0, it includes numerical value of N 0 and numerical value of N 1, then exchange numbering is set as N0 and N1. In target bit 30A, numbering N0 coding unit U_N0 and numbering N1 coding unit U_N1 is carried out Exchange.For exchanging group S1, to set exchange numbering as N2 and N3.In target bit 30A, it will number N2 coding unit U_N2 and numbering N3 coding unit U_N3 are swapped.With for exchanging group Sp, Exchange numbering is set as Ny-1 and Ny.In target bit 30A, by numbering Ny-1 coding unit U_Ny-1 And numbering Ny coding unit U_Ny is swapped.By that analogy, encryption equipment 120 completes the friendship of each exchange group Move work, and obtains encryption bit stream 30B.
Reference picture 3B, decipher 130 is numbered based on one group of numerical value included by each exchange group as one group of exchange, And in encryption bit stream 30B, the group is exchanged into the corresponding coding unit of numbering swaps, acquisition target position is used Flow 30A.With for exchanging group S0, in encryption bit stream 30B, by positioned at the coding unit of numbering N0 positions U_N1 and coding unit U_N0 positioned at numbering N1 positions are swapped.By that analogy, decipher 130 is completed It is each to exchange the switching motion of group, and obtain target bit 30A.
In addition, in other embodiments, encryption equipment 120 may not necessarily be dynamic to swap with single exchange group Make, but exchange group to swap action with two.In target bit 30A, encryption equipment 120 will be exchanged The corresponding two groups of coding units of wherein two groups of group are swapped, and use acquisition encryption bit stream.With exchange group S0, Exemplified by S1, the corresponding coding unit U_N0 of group S0, U_N1, coding corresponding with exchanging group S1 will be exchanged Unit U_N2, U_N3 are swapped, i.e. coding unit U_N0 is exchanged with coding unit U_N2, and coding is single The mode that first U_N1 is exchanged with coding unit U_N3.
In other embodiments, coding unit can also be frame (frame).Fig. 4 is according to one embodiment of the invention Another ciphering process schematic diagram.In typical video compression design, main image type includes I images (Intra pictures), B images (Bi-predictive pictures) and P images (Predicted pictures). And above-mentioned image is alternatively referred to as being I frames (I-frame), B frames (B-frame), P frames (P-frame).
I frames can regard product of the image after overcompression as.I frames are typically each groups of pictures (Group Of pictures, GOP) first frame.That is, a groups of pictures is formed between two I frames.P frames are needed to refer to An I frame or B frames before it generate a complete image.B frames then will with reference to its previous I frame or The previous P frames of person and a P frame behind generate a complete image.In decoding process, the solution of I frames Code is independent of other frames;The decoding of P frames is then dependent on I frames or P frames above;The decoding of B frames is then depended on I frames or front and rear P frames above.
One groups of pictures of formation between Fig. 4, two I frames is refer to, and this figure group includes multiple B frames and P Frame.In the present embodiment, encryption equipment 120 can for example be swapped between I frames, or be swapped between B frames, Or swapped between P frames.Due to representing a groups of pictures between two I frames, therefore exchanging I frames In the case of be likely to result in the problem of mistake occurs in decoding, therefore preferably swapped between B frames, or in P Swapped between frame.
By above-mentioned data guard method, incessantly available for data transfer, also it can be applicable in data storage.For example, Controller 100 is hard disk controller or Memory Controller, when by data storage to storage device, utilizes encryption equipment 120 pairs of data are encrypted, and in encrypted data to be accessed, need to input correct password word string could access number According to.
In addition, the length of password word string can be also determined according further to different access rights, to adjust password word string Intensity.For example, the password word string setting of varying strength is provided according to the paid cases of user to be made for user With.Assuming that according to paid cases be categorized as free member, general member and it is important (very important person, VIP) member, then be supplied to the length difference for the password word string that free member, general member and VIP member use For 6,8 and 10.
In addition, can also determine the bit stream quality that receiving end device can be watched by above-mentioned data guard method.For example, The bit stream of different level of encryptions is provided according to the paid cases of user.For streaming service business on line, it is assumed that its Logining state includes not logining state, freely logins state and pay and login state.Encryption equipment 120 can be according to difference State is logined to decide whether that target bit is encrypted, and determine be encrypted when used cipher word The length of string.For example, in the case where state is logined in paying, action will not be encrypted in encryption equipment 120.For providing payment The bit stream for taking member will be without encryption so that paying member can watch complete image.
And do not logining state or freely logining under state, encryption equipment 120 can be come using the different password word strings of length respectively It is encrypted.For example, in the case where not logining state, being encrypted with 10 password word strings;Logined freely under state, It is encrypted with 6 password word strings.So, the length of above-mentioned password word string by way of example only, is not limited thereto. In the implementation, in the case where not logining state, as long as compared with freely logining state, encryption equipment 120 improves target bit Encrypt complexity so that the image quality seen in the case where not logining state is high-irregularity, and is freely logining shape The image quality seen under state is low random degree.
Based on above-mentioned, in one embodiment, tool has the advantage that the present invention compared with prior art.That is, it can not increase In the case of the operation efficiency of stiffened part or firmware, data are carried out to be effectively protected measure.Also, in existing coding Under the framework of agreement, even if target bit is encrypted, it can also meet the standard of existing coding protocol defined. Therefore, even if target bit passes through encipheror in decoding process, it can also enter in the case where not producing any error message Row decoding.Accordingly, if encryption bit stream is decrypted and footpath row is decoded, error message can't be produced, thus be difficult by Cracking programs are cracked automatically, and then can be reduced because being found automatically or by being artificially found to encrypted data, and attempt into The risk that row is cracked.In addition, can also be according to different access right and use demand, to determine provided encryption The encryption complexity of bit stream, and then reach different safeguard measures.
Although the present invention is disclosed above with embodiment, so it is not limited to the present invention, any people in the art Member, without departing from the spirit and scope of the present invention, when can make a little change and retouching, therefore the protection model of the present invention Enclose to work as and be defined depending on as defined in claim.

Claims (9)

1. a kind of data guard method, it is characterised in that including:
Receive a target bit;
One random number sequence is obtained based on a password word string;
It is multiple exchange groups to divide multiple numerical value included by group's random number sequence;And
Based on the plurality of exchange group, adjust multiple coding units included by the target bit one puts in order, by Bit stream is encrypted to obtain one.
2. data guard method as claimed in claim 1, it is characterised in that based on the plurality of exchange group, is adjusted This of the plurality of coding unit included by the whole target bit is put in order, and the step of using the acquisition encryption bit stream is wrapped Include:
Numbered using each the plurality of one group of numerical value exchanged included by group as one group of exchange, and in the target bit In, the group is exchanged into the corresponding coding unit of numbering and swapped, uses and obtains the encryption bit stream.
3. data guard method as claimed in claim 1, it is characterised in that based on the plurality of exchange group, is adjusted This of the plurality of coding unit included by the whole target bit is put in order, and the step of using the acquisition encryption bit stream is wrapped Include:
In the target bit, coding unit described in the plurality of wherein two groups corresponding two groups of group of exchange is handed over Change, use and obtain the encryption bit stream.
4. data guard method as claimed in claim 1, it is characterised in that the password word string includes a random number Seed number and a sequence length, and include the step of obtain the random number sequence based on the password word string:
The length of the random number sequence is determined based on the sequence length;And
Inquire about a table of random numbers to set up the random number sequence with the random number seed number.
5. data guard method as claimed in claim 1, it is characterised in that the target bit is an original bit stream Bit stream after the coding obtained after encoded, and after the step of obtaining the encryption bit stream, further include:
The encrypted bits stream is decoded via a decoder, and obtains bit stream, wherein bit stream after the decoding after a decoding Different from the original bit stream.
6. data guard method as claimed in claim 1, it is characterised in that the target bit is an original bit stream Bit stream after the coding obtained after encoded, and after the step of obtaining the encryption bit stream, further include:
Receive the password word string;
The plurality of exchange group obtained based on the password word string, reduces the encryption bit stream for the target bit;And
The target bit is decoded via a decoder, and obtains the original bit stream.
7. data guard method as claimed in claim 1, it is characterised in that the target bit is an original bit stream.
8. data guard method as claimed in claim 1, it is characterised in that the target bit be an image bitstream, One of one audio bit stream and a video bit stream.
9. data guard method as claimed in claim 1, it is characterised in that each the plurality of coding unit is frame, Or each the plurality of coding unit is minimum coding unit.
CN201610571498.6A 2016-03-30 2016-07-20 Data protection method Withdrawn CN107294946A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
TW105110166A TWI578187B (en) 2016-03-30 2016-03-30 Data protection method
TW105110166 2016-03-30

Publications (1)

Publication Number Publication Date
CN107294946A true CN107294946A (en) 2017-10-24

Family

ID=59241152

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610571498.6A Withdrawn CN107294946A (en) 2016-03-30 2016-07-20 Data protection method

Country Status (2)

Country Link
CN (1) CN107294946A (en)
TW (1) TWI578187B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107959885A (en) * 2017-12-12 2018-04-24 华中科技大学 A kind of HEVC/H.265 video encryption methods and video ciphertext method for testing motion
WO2020220149A1 (en) * 2019-04-30 2020-11-05 徐汉阳 Open-air cinema audio transmission encryption system
CN112235101A (en) * 2020-09-02 2021-01-15 海量安全技术有限公司 Encoding method and device and decoding method and device based on hybrid encoding mechanism

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1617584A (en) * 2004-12-06 2005-05-18 武汉大学 Dynamic random mess correction and enciphering-deenciphering method for video frequency information
US20110103580A1 (en) * 2009-11-02 2011-05-05 International Business Machines Corporation Compressing encrypted data without the encryption key

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US883759A (en) * 1907-10-04 1908-04-07 American Steel & Wire Co Wire rope.
US7549058B1 (en) * 2005-06-30 2009-06-16 Mavs Lab. Inc. Method and apparatus for encrypting and decrypting digital data
US8050404B2 (en) * 2008-12-29 2011-11-01 Nortel Networks Limited Bandwidth efficient method and system for obscuring the existence of encryption in a communications channel

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1617584A (en) * 2004-12-06 2005-05-18 武汉大学 Dynamic random mess correction and enciphering-deenciphering method for video frequency information
US20110103580A1 (en) * 2009-11-02 2011-05-05 International Business Machines Corporation Compressing encrypted data without the encryption key

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
袁岁维: ""数字图像加密与加密算法性能评价研究"", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107959885A (en) * 2017-12-12 2018-04-24 华中科技大学 A kind of HEVC/H.265 video encryption methods and video ciphertext method for testing motion
CN107959885B (en) * 2017-12-12 2020-05-19 华中科技大学 Motion detection method of encrypted video
WO2020220149A1 (en) * 2019-04-30 2020-11-05 徐汉阳 Open-air cinema audio transmission encryption system
CN112235101A (en) * 2020-09-02 2021-01-15 海量安全技术有限公司 Encoding method and device and decoding method and device based on hybrid encoding mechanism
CN112235101B (en) * 2020-09-02 2023-06-16 海量安全技术有限公司 Coding method and device based on hybrid coding mechanism, decoding method and device

Also Published As

Publication number Publication date
TW201734876A (en) 2017-10-01
TWI578187B (en) 2017-04-11

Similar Documents

Publication Publication Date Title
EP3668104B1 (en) Video scrambling method and device with adaptive mode selection, network camera and readable storage medium
US8989377B2 (en) Secure video transcoding with applications to adaptive streaming
WO2014075469A1 (en) Method and device for information hiding
CN108768606B (en) Streaming media real-time encryption method and system based on video transmission
CN100401769C (en) Method for enciphering and deciphering living-broadcasting flow-medium data
CN106254382B (en) Media data processing method and device
JP2013141253A (en) Method for selectively scrambling bit stream
CN107294946A (en) Data protection method
CN110149521B (en) Data processing method and system
CN101489123B (en) Digital video content fast protection and deprotection method
US10848777B2 (en) Interleaved watermarking
US8818019B2 (en) Robust watermark
Tang et al. A format compliant framework for HEVC selective encryption after encoding
KR101757559B1 (en) Fast processing and encription method and system for compressed video
CN100518280C (en) Video encrypting/deciphering device and encrypting/deciphering method
CN201663660U (en) Data encryption and data decryption system of digital video
Hooda et al. A comprehensive survey of video encryption algorithms
US10489559B2 (en) Method for providing protected multimedia content
CN106559682B (en) A kind of method and device of DTV finger water-print protection
CN111698534B (en) Video processing method and device, electronic equipment and storage medium
Potdar et al. Comparison of MPEG video encryption algorithms
KR20120138940A (en) System and method implementing a selective encryption for mobile terminal
JP2008147858A (en) Moving image coding apparatus, moving image decoding apparatus, moving image coding method, moving image decoding method, moving image coding program, and moving image decoding program
JP2004120141A (en) Access control system
CN116419002A (en) HEVC video selective encryption method based on chaotic system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20171024