CN107294946A - Data protection method - Google Patents
Data protection method Download PDFInfo
- Publication number
- CN107294946A CN107294946A CN201610571498.6A CN201610571498A CN107294946A CN 107294946 A CN107294946 A CN 107294946A CN 201610571498 A CN201610571498 A CN 201610571498A CN 107294946 A CN107294946 A CN 107294946A
- Authority
- CN
- China
- Prior art keywords
- bit stream
- group
- encryption
- bit
- target bit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 33
- 238000010586 diagram Methods 0.000 description 6
- 230000006835 compression Effects 0.000 description 3
- 238000007906 compression Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/067—Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Compression Or Coding Systems Of Tv Signals (AREA)
- Storage Device Security (AREA)
Abstract
A data protection method. After receiving the target bit stream, a random number sequence is obtained based on the cipher string. The plurality of numerical values included in the grouped random number sequence are a plurality of exchange groups. Based on the switching group, the arrangement order of a plurality of coding units included in the target bit stream is adjusted, so as to obtain the encrypted bit stream.
Description
Technical field
Coding unit order is rearranged the invention relates to a kind of data protection schemes, and in particular to one kind
Data guard method.
Background technology
With the arriving of information age, many contents are created in digitized form.It is interior compared to simulation is replicated
Hold for many time and efforts of needs, digital content can be easy to quickly replicated.Therefore, in order to avoid companion
With utilizing electronic installation down loading network resource, so may trigger bootlegging, using or transmission data etc. plant
Copyright relevant issues are planted, how to protect digital content to be increasingly becoming one of current subject under discussion focused on.
The content of the invention
The present invention provides a kind of data guard method, can be right in the case where not increasing the operation efficiency of hardware or firmware
Data carry out being effectively protected measure.
The data guard method of the present invention, including:Receive target bit;Random number (random is obtained based on password word string
Number) sequence;It is multiple exchange groups to divide multiple numerical value included by group's random number sequence;And based on above-mentioned friendship
Group is changed, acquisition encryption bit stream is used in putting in order for multiple coding units included by adjustment target bit.
In one embodiment of this invention, based on above-mentioned exchange group, the coding unit included by adjustment target bit
Put in order, the step of using acquisition encryption bit stream includes:One group is used as using one group of numerical value included by each exchange group
Numbering is exchanged, and in target bit, the group is exchanged into the corresponding coding unit of numbering swaps, and uses and is added
Mil stream.
In one embodiment of this invention, based on above-mentioned exchange group, the coding unit included by adjustment target bit
Put in order, the step of using acquisition encryption bit stream includes:In target bit, wherein two groups correspondences of group will be exchanged
Two groups of coding units swap, use acquisition encryption bit stream.
In one embodiment of this invention, password word string includes random number seed number and sequence length.And based on password
The step of word string obtains random number sequence includes:The length of random number sequence is determined based on sequence length;And with random
Several subnumbers inquire about the tables of random numbers to set up random number sequence.
In one embodiment of this invention, bit stream after the coding that target bit is obtained by original bit stream after encoded.And
After encryption bit stream is obtained, encrypted bits stream is decoded via decoder, and bit stream after being decoded.Here,
Bit stream can be different from original bit stream after decoding.
In one embodiment of this invention, bit stream after the coding that target bit is obtained by original bit stream after encoded, and
After encryption bit stream is obtained, further include:Receive password word string;The exchange group obtained based on password word string, also
Original encryption bit stream is target bit;And target bit is decoded via decoder, and obtain original bit stream.
In one embodiment of this invention, target bit can also be original bit stream.
In one embodiment of this invention, target bit is one of image bitstream, audio bit stream and video bit stream.
In one embodiment of this invention, coding unit can be frame (frame), or be minimum coding unit
(minimum coded unit, MCU).
Based on above-mentioned, reach the effect of data encryption by adjusting putting in order for coding unit, can not increase hard
In the case of the operation efficiency of part or firmware, data are carried out to be effectively protected measure.If also, encryption bit stream without
Decrypt and the decoding of footpath row, error message can't be produced, cracked automatically so being difficult the program of being cracked.Accordingly, if
Error message will not be produced in decoding process, can be reduced because being found automatically or by being artificially found to encrypted data,
And the risk that trial is cracked.
For the features described above and advantage of the present invention can be become apparent, special embodiment below, and coordinate institute's accompanying drawings
It is described in detail below.
Brief description of the drawings
Fig. 1 is the block diagram of the controller according to one embodiment of the invention.
Fig. 2 is the data guard method flow chart according to one embodiment of the invention.
Fig. 3 A and Fig. 3 B are the schematic diagrames of the encryption process according to one embodiment of the invention.
Fig. 4 is the schematic diagram of another ciphering process according to one embodiment of the invention.
Drawing reference numeral
100:Controller
110:Encoder
120:Encryption equipment
130:Decipher
140:Decoder
I:I frames
B:B frames
P:P frames
30A:Target bit
30B:Encrypt bit stream
S0~Sp:Exchange group
U_0~U_Ny:Coding unit
S205~S220:Each step of data guard method
Embodiment
The encryption requirements of the data streams such as video stream (data stream) increase day by day, so encryption algorithm common at present
It is required for hardware or firmware to provide powerful operation efficiency, and then encryption cost is improved.Therefore, the present invention is proposed
A kind of data guard method, in the case where not increasing the operation efficiency of hardware or firmware, to be carried out effectively to data
Safeguard measure.In order that present disclosure becomes apparent, below can actually be according to this as the present invention especially exemplified by embodiment
The example of implementation.
Fig. 1 is the block diagram of the controller according to one embodiment of the invention.Fig. 1 is refer to, controller 100 is, for example,
CPU (Central Processing Unit, CPU), graphics processing unit (Graphic Processing Unit,
GPU), physical processing unit (Physics Processing Unit, PPU), the microprocessor of programmable
(Microprocessor), embedded control chip, digital signal processor (Digital Signal Processor, DSP),
ASIC (Application Specific Integrated Circuits, ASIC) or other similar devices.
In addition, controller 100 can also be display controller (display controller), card is for example, shown.Or,
Controller 100 can be hard disk controller or Memory Controller.
Controller 100 incorporates encoder (encoder) 110, encryption equipment 120, decipher 130 and decoder
(decoder)140.Encoder 110, encryption equipment 120, decipher 130 and decoder 140 are, for example, hardware electricity
Road, software program or algorithm etc..Encoder 110 is data to be converted to by a kind of specific format (or coding)
Other specific formats (or coding).Decoder 140 to encoded data to decode.For example, audio is compiled
Decoder can be changed and compression sound data, and digital image data can be changed and compressed to Video Codec.
Here, encryption equipment 120 is to be encrypted action.That is, upset using encryption equipment 120 in target bit
Coding unit puts in order, and thereby reaches the effects of protection data.Decipher 130 is then and encryption equipment 120
It is corresponding, action is decrypted to the data after being encrypted to encryption equipment 120.And in other embodiments, encryption equipment
120 can be integrated into encoder 110, and decipher 130 is then integrated into decoder 140.
Carried out in addition, above-mentioned encryption, decryption acts are not limited in same terminal installation.That is, transmitted with data
For, it can be encrypted in the transmission end device of data, and be decrypted in the receiving end device of data.For example,
Encryption equipment 120 is provided with the server of streaming service business, correspondence is provided with the electric terminal device of general user
Decipher 130.And when the electric terminal device of general user was received by adding that encryption equipment 120 is encrypted
After mil stream, its decipher 130 encrypted bits stream will be decrypted, to obtain mesh after password word string is obtained
Mark stream.
It is beneath to further illustrate the detailed process that data guard method is performed using encryption equipment 120.
Fig. 2 is the data guard method flow chart according to one embodiment of the invention.Fig. 1 and Fig. 2 is refer to, in step
In S205, encryption equipment 120 receives target bit (bitstream).Target bit be image bitstream, audio bit stream or
Video bit stream.Can also be position after the coding after being encoded via encoder 110 and target bit can be original bit stream
Stream.
Then, in step S210, encryption equipment 120 is based on password word string and obtains random number sequence.Here, with
The difference of password word string, the content of the random number sequence obtained and the length of random number sequence can be different.In the implementation,
Password word string can be to preset, or voluntarily be inputted by user, also, further setting code word string include with
The several subnumbers of machine and sequence length.For example, password word string is set as 8, wherein 4 data representatives are random several
Subnumber, in addition the data of 4 then represent the length (being only for example, be not limited thereto) of random number sequence.And
Controller 100 is obtained after password word string, and encryption equipment 120 determines the length of random number sequence based on sequence length, and
And inquire about the table of random numbers to set up random number sequence with random number seed number.
Then, in step S215, multiple numerical value included by 120 points of group's random number sequences of encryption equipment are handed over to be multiple
Change group.For example, it is assumed that random number sequence includes y numerical value, i.e. N0, N1, N2 ..., Ny-1, Ny.
N0~Ny is unduplicated numerical value, and it is the coding unit numbering in bit stream, can be arbitrary integer.Encryption equipment 120
Divide group to same exchange group by two or more numerical value according to preset rules.
Here, carrying out dividing for group with two neighboring numerical value, for example, N0 is to exchange group S0, N2 with N1 points of groups
With N3 points of groups to exchange group S1 ... ..., Ny-1, Ny points of groups are to exchange group Sp by that analogy.So, it is above-mentioned
Point group is carried out by way of example only with two neighboring numerical value, is not limited thereto, can also be adjacent 3 or more than 3
Numerical value carry out a point group.In addition, can also be that N0 is to exchange group S0 with N2 points of groups in other embodiments,
N1 is to exchange group S1 etc. with N3 points of groups, by that analogy.
Then, in step S220, encryption equipment 120 is based on above-mentioned exchange group, adjusts included by target bit
Putting in order for multiple coding units, uses acquisition encryption bit stream.For example, encryption equipment 120 can be exchanged for single
Group swaps action, can also exchange group to swap action with two.
So that bit stream after the encoded rear coding obtained of original bit stream to be encrypted, and then for acquisition encryption bit stream,
It is not provided with corresponding to encryption equipment 120 in password word string, or controller 100 if controller 100 is not received
Decipher 130, then bit stream after decoder 140 can still be decoded and decoded to encrypted bits stream.Now, solve
Bit stream can be different from original bit stream after code.
On the other hand, if controller 100 is provided with the decipher 130 corresponding to encryption equipment 120, can further it lead to
Decipher 130 is crossed to obtain target bit.That is, after being encrypted to target bit, when the controller in decryption program
100 when receiving correct password word string, and decipher 130 can obtain corresponding random number sequence based on password word string,
And multiple numerical value according to included by preset rules point group's random number sequence are multiple exchange groups.Afterwards, decipher
130 are based on above-mentioned exchange group, and the putting in order for multiple coding units encrypted included by bit stream is restored into target position
Stream.Afterwards, target bit is decoded by decoder 140, and obtains original bit stream.
Because above-mentioned ciphering process is putting in order for the coding unit of adjustment target bit, therefore coding association will not be changed
The standard of defined is discussed, and suitable for various coding protocols.Also, due to not changing the standard of coding protocol defined,
Therefore, after the encrypted bits after by encryption are streamed to decoder 140, decoder 140 does not know that what is received adds
Mil stream passes through change, enters without producing any error message to point out user.Accordingly, it can reduce by connecing
Receiving end device automatically detects encrypted data, and attempts the risk that is cracked.In addition, in video streaming, only
It is to allow user to think that the noise in image is caused by network bandwidth problem, without allowing user to think to be received
The bit stream arrived is actually by caused by encryption.Accordingly, it can also reduce by artificially finding encrypted data, and attempt
The risk cracked.
Fig. 3 A and Fig. 3 B are the schematic diagrames of the encryption process according to one embodiment of the invention.In the present embodiment,
Coding unit is minimum coding unit (minimum coded unit, MCU).With Static Picture Compression standard JPEG
Exemplified by (joint photographic experts group), its bit stream (bitstream) form starts (Start including image
Of Image, SOI) mark (maker), frame (frame) and image to terminate (End of Image, EOI)
Mark.Frame further comprises header (header) and multiple scanning (scan) units.Each scanning element enters one
Step is divided into header and multiple blocks (segment).Each block is then further divided into minimum code block.
Ciphering process shown in Fig. 3 A, by encryption equipment 120, encryption bit stream 30B is converted to by target bit 30A.
Fig. 3 B show decrypting process, and by decipher 130, encryption bit stream 30B is converted into target bit 30A.
Reference picture 3A, one group of numerical value included by encryption equipment 120 using each exchange group is numbered as one group of exchange, and
In target bit 30A, the group is exchanged into the corresponding coding unit of numbering and swapped, acquisition encryption bit stream is used
30B.So that for exchanging group S0, it includes numerical value of N 0 and numerical value of N 1, then exchange numbering is set as N0 and N1.
In target bit 30A, numbering N0 coding unit U_N0 and numbering N1 coding unit U_N1 is carried out
Exchange.For exchanging group S1, to set exchange numbering as N2 and N3.In target bit 30A, it will number
N2 coding unit U_N2 and numbering N3 coding unit U_N3 are swapped.With for exchanging group Sp,
Exchange numbering is set as Ny-1 and Ny.In target bit 30A, by numbering Ny-1 coding unit U_Ny-1
And numbering Ny coding unit U_Ny is swapped.By that analogy, encryption equipment 120 completes the friendship of each exchange group
Move work, and obtains encryption bit stream 30B.
Reference picture 3B, decipher 130 is numbered based on one group of numerical value included by each exchange group as one group of exchange,
And in encryption bit stream 30B, the group is exchanged into the corresponding coding unit of numbering swaps, acquisition target position is used
Flow 30A.With for exchanging group S0, in encryption bit stream 30B, by positioned at the coding unit of numbering N0 positions
U_N1 and coding unit U_N0 positioned at numbering N1 positions are swapped.By that analogy, decipher 130 is completed
It is each to exchange the switching motion of group, and obtain target bit 30A.
In addition, in other embodiments, encryption equipment 120 may not necessarily be dynamic to swap with single exchange group
Make, but exchange group to swap action with two.In target bit 30A, encryption equipment 120 will be exchanged
The corresponding two groups of coding units of wherein two groups of group are swapped, and use acquisition encryption bit stream.With exchange group S0,
Exemplified by S1, the corresponding coding unit U_N0 of group S0, U_N1, coding corresponding with exchanging group S1 will be exchanged
Unit U_N2, U_N3 are swapped, i.e. coding unit U_N0 is exchanged with coding unit U_N2, and coding is single
The mode that first U_N1 is exchanged with coding unit U_N3.
In other embodiments, coding unit can also be frame (frame).Fig. 4 is according to one embodiment of the invention
Another ciphering process schematic diagram.In typical video compression design, main image type includes I images
(Intra pictures), B images (Bi-predictive pictures) and P images (Predicted pictures).
And above-mentioned image is alternatively referred to as being I frames (I-frame), B frames (B-frame), P frames (P-frame).
I frames can regard product of the image after overcompression as.I frames are typically each groups of pictures (Group
Of pictures, GOP) first frame.That is, a groups of pictures is formed between two I frames.P frames are needed to refer to
An I frame or B frames before it generate a complete image.B frames then will with reference to its previous I frame or
The previous P frames of person and a P frame behind generate a complete image.In decoding process, the solution of I frames
Code is independent of other frames;The decoding of P frames is then dependent on I frames or P frames above;The decoding of B frames is then depended on
I frames or front and rear P frames above.
One groups of pictures of formation between Fig. 4, two I frames is refer to, and this figure group includes multiple B frames and P
Frame.In the present embodiment, encryption equipment 120 can for example be swapped between I frames, or be swapped between B frames,
Or swapped between P frames.Due to representing a groups of pictures between two I frames, therefore exchanging I frames
In the case of be likely to result in the problem of mistake occurs in decoding, therefore preferably swapped between B frames, or in P
Swapped between frame.
By above-mentioned data guard method, incessantly available for data transfer, also it can be applicable in data storage.For example,
Controller 100 is hard disk controller or Memory Controller, when by data storage to storage device, utilizes encryption equipment
120 pairs of data are encrypted, and in encrypted data to be accessed, need to input correct password word string could access number
According to.
In addition, the length of password word string can be also determined according further to different access rights, to adjust password word string
Intensity.For example, the password word string setting of varying strength is provided according to the paid cases of user to be made for user
With.Assuming that according to paid cases be categorized as free member, general member and it is important (very important person,
VIP) member, then be supplied to the length difference for the password word string that free member, general member and VIP member use
For 6,8 and 10.
In addition, can also determine the bit stream quality that receiving end device can be watched by above-mentioned data guard method.For example,
The bit stream of different level of encryptions is provided according to the paid cases of user.For streaming service business on line, it is assumed that its
Logining state includes not logining state, freely logins state and pay and login state.Encryption equipment 120 can be according to difference
State is logined to decide whether that target bit is encrypted, and determine be encrypted when used cipher word
The length of string.For example, in the case where state is logined in paying, action will not be encrypted in encryption equipment 120.For providing payment
The bit stream for taking member will be without encryption so that paying member can watch complete image.
And do not logining state or freely logining under state, encryption equipment 120 can be come using the different password word strings of length respectively
It is encrypted.For example, in the case where not logining state, being encrypted with 10 password word strings;Logined freely under state,
It is encrypted with 6 password word strings.So, the length of above-mentioned password word string by way of example only, is not limited thereto.
In the implementation, in the case where not logining state, as long as compared with freely logining state, encryption equipment 120 improves target bit
Encrypt complexity so that the image quality seen in the case where not logining state is high-irregularity, and is freely logining shape
The image quality seen under state is low random degree.
Based on above-mentioned, in one embodiment, tool has the advantage that the present invention compared with prior art.That is, it can not increase
In the case of the operation efficiency of stiffened part or firmware, data are carried out to be effectively protected measure.Also, in existing coding
Under the framework of agreement, even if target bit is encrypted, it can also meet the standard of existing coding protocol defined.
Therefore, even if target bit passes through encipheror in decoding process, it can also enter in the case where not producing any error message
Row decoding.Accordingly, if encryption bit stream is decrypted and footpath row is decoded, error message can't be produced, thus be difficult by
Cracking programs are cracked automatically, and then can be reduced because being found automatically or by being artificially found to encrypted data, and attempt into
The risk that row is cracked.In addition, can also be according to different access right and use demand, to determine provided encryption
The encryption complexity of bit stream, and then reach different safeguard measures.
Although the present invention is disclosed above with embodiment, so it is not limited to the present invention, any people in the art
Member, without departing from the spirit and scope of the present invention, when can make a little change and retouching, therefore the protection model of the present invention
Enclose to work as and be defined depending on as defined in claim.
Claims (9)
1. a kind of data guard method, it is characterised in that including:
Receive a target bit;
One random number sequence is obtained based on a password word string;
It is multiple exchange groups to divide multiple numerical value included by group's random number sequence;And
Based on the plurality of exchange group, adjust multiple coding units included by the target bit one puts in order, by
Bit stream is encrypted to obtain one.
2. data guard method as claimed in claim 1, it is characterised in that based on the plurality of exchange group, is adjusted
This of the plurality of coding unit included by the whole target bit is put in order, and the step of using the acquisition encryption bit stream is wrapped
Include:
Numbered using each the plurality of one group of numerical value exchanged included by group as one group of exchange, and in the target bit
In, the group is exchanged into the corresponding coding unit of numbering and swapped, uses and obtains the encryption bit stream.
3. data guard method as claimed in claim 1, it is characterised in that based on the plurality of exchange group, is adjusted
This of the plurality of coding unit included by the whole target bit is put in order, and the step of using the acquisition encryption bit stream is wrapped
Include:
In the target bit, coding unit described in the plurality of wherein two groups corresponding two groups of group of exchange is handed over
Change, use and obtain the encryption bit stream.
4. data guard method as claimed in claim 1, it is characterised in that the password word string includes a random number
Seed number and a sequence length, and include the step of obtain the random number sequence based on the password word string:
The length of the random number sequence is determined based on the sequence length;And
Inquire about a table of random numbers to set up the random number sequence with the random number seed number.
5. data guard method as claimed in claim 1, it is characterised in that the target bit is an original bit stream
Bit stream after the coding obtained after encoded, and after the step of obtaining the encryption bit stream, further include:
The encrypted bits stream is decoded via a decoder, and obtains bit stream, wherein bit stream after the decoding after a decoding
Different from the original bit stream.
6. data guard method as claimed in claim 1, it is characterised in that the target bit is an original bit stream
Bit stream after the coding obtained after encoded, and after the step of obtaining the encryption bit stream, further include:
Receive the password word string;
The plurality of exchange group obtained based on the password word string, reduces the encryption bit stream for the target bit;And
The target bit is decoded via a decoder, and obtains the original bit stream.
7. data guard method as claimed in claim 1, it is characterised in that the target bit is an original bit stream.
8. data guard method as claimed in claim 1, it is characterised in that the target bit be an image bitstream,
One of one audio bit stream and a video bit stream.
9. data guard method as claimed in claim 1, it is characterised in that each the plurality of coding unit is frame,
Or each the plurality of coding unit is minimum coding unit.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW105110166A TWI578187B (en) | 2016-03-30 | 2016-03-30 | Data protection method |
TW105110166 | 2016-03-30 |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107294946A true CN107294946A (en) | 2017-10-24 |
Family
ID=59241152
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610571498.6A Withdrawn CN107294946A (en) | 2016-03-30 | 2016-07-20 | Data protection method |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107294946A (en) |
TW (1) | TWI578187B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107959885A (en) * | 2017-12-12 | 2018-04-24 | 华中科技大学 | A kind of HEVC/H.265 video encryption methods and video ciphertext method for testing motion |
WO2020220149A1 (en) * | 2019-04-30 | 2020-11-05 | 徐汉阳 | Open-air cinema audio transmission encryption system |
CN112235101A (en) * | 2020-09-02 | 2021-01-15 | 海量安全技术有限公司 | Encoding method and device and decoding method and device based on hybrid encoding mechanism |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1617584A (en) * | 2004-12-06 | 2005-05-18 | 武汉大学 | Dynamic random mess correction and enciphering-deenciphering method for video frequency information |
US20110103580A1 (en) * | 2009-11-02 | 2011-05-05 | International Business Machines Corporation | Compressing encrypted data without the encryption key |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US883759A (en) * | 1907-10-04 | 1908-04-07 | American Steel & Wire Co | Wire rope. |
US7549058B1 (en) * | 2005-06-30 | 2009-06-16 | Mavs Lab. Inc. | Method and apparatus for encrypting and decrypting digital data |
US8050404B2 (en) * | 2008-12-29 | 2011-11-01 | Nortel Networks Limited | Bandwidth efficient method and system for obscuring the existence of encryption in a communications channel |
-
2016
- 2016-03-30 TW TW105110166A patent/TWI578187B/en active
- 2016-07-20 CN CN201610571498.6A patent/CN107294946A/en not_active Withdrawn
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1617584A (en) * | 2004-12-06 | 2005-05-18 | 武汉大学 | Dynamic random mess correction and enciphering-deenciphering method for video frequency information |
US20110103580A1 (en) * | 2009-11-02 | 2011-05-05 | International Business Machines Corporation | Compressing encrypted data without the encryption key |
Non-Patent Citations (1)
Title |
---|
袁岁维: ""数字图像加密与加密算法性能评价研究"", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107959885A (en) * | 2017-12-12 | 2018-04-24 | 华中科技大学 | A kind of HEVC/H.265 video encryption methods and video ciphertext method for testing motion |
CN107959885B (en) * | 2017-12-12 | 2020-05-19 | 华中科技大学 | Motion detection method of encrypted video |
WO2020220149A1 (en) * | 2019-04-30 | 2020-11-05 | 徐汉阳 | Open-air cinema audio transmission encryption system |
CN112235101A (en) * | 2020-09-02 | 2021-01-15 | 海量安全技术有限公司 | Encoding method and device and decoding method and device based on hybrid encoding mechanism |
CN112235101B (en) * | 2020-09-02 | 2023-06-16 | 海量安全技术有限公司 | Coding method and device based on hybrid coding mechanism, decoding method and device |
Also Published As
Publication number | Publication date |
---|---|
TW201734876A (en) | 2017-10-01 |
TWI578187B (en) | 2017-04-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3668104B1 (en) | Video scrambling method and device with adaptive mode selection, network camera and readable storage medium | |
US8989377B2 (en) | Secure video transcoding with applications to adaptive streaming | |
WO2014075469A1 (en) | Method and device for information hiding | |
CN108768606B (en) | Streaming media real-time encryption method and system based on video transmission | |
CN100401769C (en) | Method for enciphering and deciphering living-broadcasting flow-medium data | |
CN106254382B (en) | Media data processing method and device | |
JP2013141253A (en) | Method for selectively scrambling bit stream | |
CN107294946A (en) | Data protection method | |
CN110149521B (en) | Data processing method and system | |
CN101489123B (en) | Digital video content fast protection and deprotection method | |
US10848777B2 (en) | Interleaved watermarking | |
US8818019B2 (en) | Robust watermark | |
Tang et al. | A format compliant framework for HEVC selective encryption after encoding | |
KR101757559B1 (en) | Fast processing and encription method and system for compressed video | |
CN100518280C (en) | Video encrypting/deciphering device and encrypting/deciphering method | |
CN201663660U (en) | Data encryption and data decryption system of digital video | |
Hooda et al. | A comprehensive survey of video encryption algorithms | |
US10489559B2 (en) | Method for providing protected multimedia content | |
CN106559682B (en) | A kind of method and device of DTV finger water-print protection | |
CN111698534B (en) | Video processing method and device, electronic equipment and storage medium | |
Potdar et al. | Comparison of MPEG video encryption algorithms | |
KR20120138940A (en) | System and method implementing a selective encryption for mobile terminal | |
JP2008147858A (en) | Moving image coding apparatus, moving image decoding apparatus, moving image coding method, moving image decoding method, moving image coding program, and moving image decoding program | |
JP2004120141A (en) | Access control system | |
CN116419002A (en) | HEVC video selective encryption method based on chaotic system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20171024 |