CN108307203A - Film encryption method, decryption method based on multi-projector splicing fusion - Google Patents
Film encryption method, decryption method based on multi-projector splicing fusion Download PDFInfo
- Publication number
- CN108307203A CN108307203A CN201711465803.4A CN201711465803A CN108307203A CN 108307203 A CN108307203 A CN 108307203A CN 201711465803 A CN201711465803 A CN 201711465803A CN 108307203 A CN108307203 A CN 108307203A
- Authority
- CN
- China
- Prior art keywords
- film
- encryption
- decryption
- splicing fusion
- password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 65
- 230000004927 fusion Effects 0.000 title claims abstract description 47
- 238000009877 rendering Methods 0.000 claims abstract description 4
- 230000002708 enhancing effect Effects 0.000 claims description 5
- 230000010354 integration Effects 0.000 claims description 4
- 238000005516 engineering process Methods 0.000 abstract description 12
- 229910002056 binary alloy Inorganic materials 0.000 abstract description 7
- 238000010586 diagram Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 5
- 230000000694 effects Effects 0.000 description 4
- 230000009466 transformation Effects 0.000 description 4
- 230000000740 bleeding effect Effects 0.000 description 3
- 239000003086 colorant Substances 0.000 description 3
- 238000004040 coloring Methods 0.000 description 3
- 238000004519 manufacturing process Methods 0.000 description 3
- 239000000203 mixture Substances 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000035807 sensation Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 150000001875 compounds Chemical class 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 239000004744 fabric Substances 0.000 description 1
- 239000000155 melt Substances 0.000 description 1
- 238000010899 nucleation Methods 0.000 description 1
- 238000007500 overflow downdraw method Methods 0.000 description 1
- 238000012805 post-processing Methods 0.000 description 1
- 238000009331 sowing Methods 0.000 description 1
- 238000003860 storage Methods 0.000 description 1
- 230000026676 system process Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/266—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
- H04N21/26613—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing keys in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
- H04N21/4405—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
- H04N21/4408—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/47—End-user applications
- H04N21/482—End-user interface for program selection
- H04N21/4821—End-user interface for program selection using a grid, e.g. sorted out by channel and broadcast time
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/835—Generation of protective data, e.g. certificates
- H04N21/8358—Generation of protective data, e.g. certificates involving watermark
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N9/00—Details of colour television systems
- H04N9/12—Picture reproducers
- H04N9/31—Projection devices for colour picture display, e.g. using electronic spatial light modulators [ESLM]
- H04N9/3141—Constructional details thereof
- H04N9/3147—Multi-projection systems
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Databases & Information Systems (AREA)
- Controls And Circuits For Display Device (AREA)
- Projection Apparatus (AREA)
Abstract
The invention belongs to video-encryption fields, and in particular to a kind of film encryption method, decryption method based on multi-projector splicing fusion, it is intended to solve the film film source encryption and decryption technique of film Copyright Protection, this method includes:(1) projection screen is parameterized and is divided, select encryption section;(2) password is generated on the target machine using encryption software;(3) password is converted to binary number, selects its first n to generate film encryption mask;(4) during rendering generation film, superposition watermark mask generates encrypted screener;(5) link is being played, is calling same encipheror, generating and encrypting same password, and switching to binary system ordered series of numbers, generating splicing fusion decryption configuration parameter;(6) splicing fusion software calls decryption configuration parameter, plays encrypted screener film source, realizes that decryption plays.The present invention is realized splices fusion film encryption technology for multi-projector special type curtain.
Description
Technical field
The invention belongs to video-encryption fields, and in particular to a kind of film encryption side based on multi-projector splicing fusion
Method, decryption method.
Background technology
It is the extraordinary film of curved surface multi-projector splicing fusion of representative with ring curtain, spherical screen stereoscopic film etc., is to occur early 20th century
One kind greatly regard subtended angle special type curtain film.The making of big shooting and cartoon scene regarding subtended angle motion picture film, uses ultra-wide angle
Fish eye lens or image multiple-camera compound lens.Curtain journey annular or hemispherical, spectators are surrounded staying wherein.Due to
Image is big regarding subtended angle to spectators, and with surround sound so that spectators have sense on the spot in person.Due to ring curtain, spherical screen stereoscopic film
Curtain is huge, projecting apparatus placing space is limited, and one projector can not make entire screen.And since one projector is shown
Limited resolution, therefore show output in such a way that more projector splicings merge.
Due to splicing fusion film is big regarding subtended angle, film viewing distance is close, cause entire film source resolution ratio big, makes
It is high to make period length, cost of manufacture.Therefore it is the key issues of the industry development for the protection of film copyright.If not to film source
Encryption, and only to playing program or splicing fusion program encryption, then not can be well protected film.Therefore, the present invention provides
It is a kind of that film film source is encrypted, and the encryption and decryption technique of broadcasting can only be correctly decrypted on formulating broadcasting machine.
The present invention is directed to the problem of copyright protection, it is proposed that a kind of encrypting and decrypting skill based on multi-projection system integration technology
Art.Encryption ring nodule is closed the parametric grid division of projection splicing fusion, Crypto++ programmed algorithms, film later stage system by the technology
Make technology, generates encryption film source;In decryption link, the color change link knot that decrypting process is merged with multi-projector splicing
It closes, broadcasting is decrypted.Only encrypt and decrypt keying sequence equally just can be in the case where being generated on formulating player
Obtain correct movie play back effect.The present invention realizes the good protection to film source, cleverly utilizes extraordinary film splicing fusion
Technical characteristic, the multi-projector splicing integration technology that encryption and decryption technique is invented with the present inventor is integrally combined.
Film encryption technology based on splicing fusion is made of technology segment in detail below:Encryption part is to target curtain
Parametrization grid is established, encryption section is selected according to parametrization grid, Crypto++ algorithms is then run and generates the machine password simultaneously
It is converted into binary system ordered series of numbers.It establishes binary system ordered series of numbers and parameterizes the correspondence in mesh refinement section, according to password binary system
Sequence generates encrypted watermark mask figures.Each frame of the film source of unencryption and watermark mask figures are done into phase using post-production software
Multiply post-processing, using treated result as encrypted film source.Part is played in decoding, it is same to call Crytpo++ generations close
Code is simultaneously converted to binary sequence, each equally established in binary sequence is corresponding with each grid of encryption section
Relationship, the color attenuation module during deciphering module is merged with splicing unite to form new color change manner, realize solution
Heavy seeding is put.Simultaneously for the other machines or place broadcasting the case where, due to generate clear crytpographic key and Crypted password it is inconsistent and
It cannot obtain correctly decrypting and play result.
Invention content
In order to solve the above problem in the prior art, in order to solve the film film source encryption of film Copyright Protection
Decryption technology, an aspect of of the present present invention, it is proposed that a kind of film encryption method based on multi-projector splicing fusion, including it is following
Step:
Step A1 carries out parametrization gridding point to projection screen, and selects encryption section;
Step A2 generates password respectively on the target machine to the parametric grid of the encryption section using encryption software;
The step A2 passwords generated are converted to binary number by step A3, select its first n to generate film encryption
mask;
Step A4, during rendering generation projection film, superposition watermark mask generates encrypted screener.
Further, described " carry out parametrization gridding point to projection screen, and select encryption section ", method is:
By projection screen according to parametrization equation model split be (M+1) * (N+1) a parametric grid, wherein parameter net
Lattice point coordinate is [i, j] (i=0,1,2,3...M;J=0,1,2,3...N);
It selects integration region for encryption section, determines the corresponding parametric grid in the encryption section.
Further, described " the step A2 passwords generated to be converted to binary number, select its preceding n generation film
Mask " is encrypted, method is:
The step A2 passwords generated are converted to binary number;
Based on default decaying method for generating cipher code, the mesh refinement mask colors RGB that serial number i is corresponded on mask figures is calculated
Component color decaying password Ei。
Further, the default decaying method for generating cipher code is
Further, described " superposition watermark mask generates encrypted screener ", method is:
The each frame for the film source to be maintained secrecy is encrypted by watermark superposition program;Encrypted mode is watermark and artwork
The mode of multiplication.
Further, the encryption software is that Crypto++ passwords generate library.
Another aspect of the present invention, it is proposed that a kind of film decryption method based on multi-projector splicing fusion, including with
Lower step:
Step B1 identifies encryption section;
Step B2 calls used encryption software when generating password, is given birth to respectively to the parametric grid of the encryption section
At the same password with encryption;
The step B2 passwords generated are converted to binary number by step B3, generate splicing fusion decryption configuration parameter;
Step B4, splicing fusion software call decryption configuration parameter, play encrypted screener film source, broadcasting is decrypted.
Further, it is carrying out executing step B2 when splicing fusion plays.
Further, described " the step B2 passwords generated to be converted to binary number, generate splicing fusion decryption configuration
Parameter ", method are:
The step A2 passwords generated are converted to binary number;
Based on default decaying method for generating cipher code, the mesh refinement mask colors RGB that serial number i is corresponded on mask figures is calculated
Component color decaying password Ei, generate color enhancing password E 'i。
Further, the default decaying method for generating cipher code is
The color enhancing password E 'iFor
Encrypting and decrypting problem of the present invention for the extraordinary film such as ring curtain, ball curtain, it is proposed that a set of based on to film film source
The technology for playing decryption is merged in encryption in conjunction with splicing, realizes encryption, decryption in film mandate playing process, for extraordinary shadow
Piece intellectual property protection provides a kind of reliable guarantee.The ingenious speical play mode that extraordinary film is utilized of the present invention, will
Encrypting and decrypting is combined together with film source granting, film source broadcasting, the intellectual property protection in the field is provided a kind of completely new
Resolution policy.
Description of the drawings
Fig. 1 is the film encryption method merged the present invention is based on multi-projector splicing, decryption method flow diagram;
Fig. 2 is that curtain mesh parameterization divides schematic diagram;
Fig. 3 is ordered series of numbers schematic diagram corresponding with grid correspondence;
Fig. 4 is encryption ring section flow diagram;
Fig. 5 is decryption link flow diagram;
Fig. 6 is encrypting and decrypting links design sketch.
Specific implementation mode
The preferred embodiment of the present invention described with reference to the accompanying drawings.It will be apparent to a skilled person that this
A little embodiments are used only for explaining the technical principle of the present invention, it is not intended that limit the scope of the invention.
The present invention carries out parameterized mesh to target projection curtain, selectes encryption section;In specified player local
It runs Crypto++ passwords and generates Software Create keying sequence;Password is converted to binary sequence, by the every of binary sequence
Each of bit and encryption section grid correspond, and generate add corresponding with encryption section parametrization grid
Close mask watermarks figure;In AE (Adobe After Effect), using the mode for the addition watermark that is multiplied, do not add with mask codes and
Each frame picture of close film source carries out multiplication operation and obtains encrypted film source;Link is played in decryption, for being broadcast specified
The case where machine sowing is put is put, Crypto++ is first called to generate password same as encryption link before playing and is converted into binary system sequence
Row are merged using the sequence 0,1 information of each as the color bleeding parameter of decryption link with the splicing of the present inventor's invention
The colouring intensity attenuation process of software is combined.The new color attenuation parameter for including solution confidential information is generated, to encryption film source
Each frame plays out, can since the keying sequence generated in the decryption link of specified player is consistent with encryption link
With correct decryption encrypt film source, and for other machines or other movie theatres broadcasting the case where, due to decrypted sequences and encryption
Sequence is inconsistent therefore cannot correctly restore film source color.To what is merged based on multi-projector splicing according to above step realization
Film encrypting and decrypting play-back technology.
The present invention includes the film encryption method merged based on multi-projector splicing, the shadow merged based on multi-projector splicing
Piece decryption method, two methods match using encryption, the decryption oprerations that could be completed to film, realize the processing of a completion
Flow.As shown in Figure 1, (1) ciphering process:Target curtain is subjected to parameterized mesh and selected encryption section, specified
Target machine on call player password to generate software (Crypto++) to produce player the machine keying sequence, and converted
For binary system ordered series of numbers, the correspondence of encryption section parametrization grid and Crypted password binary sequence is established, encryption is generated
Mask watermark figures generate encrypted screener film source (since the binary number of keying sequence has generated, so generating in post-production
Mask watermark figures are encrypted, encrypted screener film source is generated in post-production can carry out strange land processing);(2) decrypting process:The mistake
Journey is run simultaneously when playing film, is run Crypto++ first and is generated clear crytpographic key and be converted into binary system ordered series of numbers, generates and spell
Connect fusing and decoding configuration information, and based on this by binary number column information be fused to that splicing fusion plays it is color transformed in,
Splicing fusion it is color transformed in together with color decaying together complete decryption play.And if only if on authorizing specified machine
When playing encryption film source, film source just can be decoded correctly;And when being played on other machines, encryption film source will not be correct
Decoding.To realize the copyright protection to film source.
The film encryption method based on multi-projector splicing fusion of the embodiment of the present invention, including:
Step A1 carries out parametrization gridding point to projection screen, and selects encryption section.
Parameterized mesh is carried out to target curtain, as shown in Fig. 2, by taking ring curtain as an example:By curtain according to parametrization side
The model split of journey is (M+1) * (N+1) a parametric grid.Parametric grid point coordinates thereon:[i, j] (i=0,1,2,
3...M;J=0,1,2,3...N).Point coordinates is on the cylinder of the corresponding ring curtain of the mesh coordinate:[i*Δθ,j*Δh].This hair
In bright, select encrypted region for corresponding circle of sensation, the parameter section corresponding to corresponding circle of sensation is:i∈[i0, i1].In fig. 2, filament and
The grid of thick line is target curtain parametrization grid, and thick line portion therein is encryption section, while being also color blend region;
Step A2 generates password respectively on the target machine to the parametric grid of the encryption section using encryption software.
It calls Crypto++ passwords to generate library, password C is generated on player0, by password C0It is converted into binary sequence
C1.(i before selection1-i0) N, the digit of each bit corresponds to the fusion grid that ID (code bit) is the digit.Two into
The correspondence of ordered series of numbers processed and curtain parametric grid, as shown in figure 3, code bit be 1,2,3,4,5 ..., corresponding code value be 0,0,1,
1、1…;
The step A2 passwords generated are converted to binary number by step A3, select its first n to generate film encryption
mask。
As shown in figure 3, according to the corresponding binary digit D of each grid IDiIt is 0 or 1, generates splicing fusion encryption
The mesh refinement mask color RGB component colors decaying password E that ID is i is corresponded on mask, mask figureiGenerating mode such as formula
(1) shown in:
The encryption mask figures generated, which are one, (i1-i0) N number of grid gray-scale map, the gray value of each grid is by this
Position corresponds to ID decaying passwords EiIt is determined as 0.5 or 1.
Step A4, during rendering generation projection film, superposition watermark mask generates encrypted screener.
As shown in figure 4, after player (server) generates password mask, in AE (Adobe After Effects)
The each frame for the film source to be maintained secrecy is encrypted using watermark superposition program.What encrypted mode was multiplied using watermark with artwork
Mode.Pass through multiplication so that former piece is realized in encryption section part and encrypted.If the corresponding ID of grid in encrypted region declines
Subtract password:EiWhen being 0.5, the meshing colouring intensity of the encrypted each frame of film source becomes half before encrypting;
And EiWhen being 1, the meshing colouring intensity of each frame of film source is consistent with before encryption after encryption.Encrypted video source in this way
Encryption section just generate color shade variation arrangement cipher round results.
The present invention based on multi-projector splicing fusion film decryption method, in the link of broadcasting to encryption film source into
Row splicing fusion and decryption simultaneously operating, the process that the process of decryption is merged with splicing is unified to be carried out.Splicing fusion is using spelling
Fusion software is connect, geometric transformation is carried out to each frame image of film source according to parameter grid division and color bleeding forms splicing and melts
It closes.
For no encrypted film source, the splicing called in the present invention merges program to film source according to curtain shape and curtain
The relative position and attitude relationship of cloth and projecting apparatus, carry out geometric transformation make the projection unit split screen of each projecting apparatus intact with
The intact fitting in the projection part of curtain and other projecting apparatus, completes the function of film multi-projector splicing part;It is right simultaneously
In the overlapping region of different projecting apparatus, Alhpa transformation is carried out to the color of different projecting apparatus, i.e.,:It is remote according to it to chroma-luminance
Decay with a distance from non-fused region so that the projection of chroma-luminance and single projector after multiple projecting apparatus overlappings is imitated
Fruit is consistent, completes the color bleeding partial function of multi-projector.
In the present invention, completely the same for encrypted film source geometric transformation part and not encrypted film source, and
Part is changed other than carrying out color decaying in color piece, is carried out at the same time decryption.The effect of decryption is only to be run on player
The fusion program of splicing containing decryption of the present invention just can be decrypted correctly, and for attempting to play the encrypted screener on other machines
Situation cannot all occur correctly decrypting broadcasting.
The film decryption method based on multi-projector splicing fusion of the embodiment of the present invention, includes the following steps:
Step B1 identifies encryption section;
Step B2 calls used encryption software when generating password, is given birth to respectively to the parametric grid of the encryption section
At the same password with encryption;
The step B2 passwords generated are converted to binary number by step B3, generate splicing fusion decryption configuration parameter;
Step B4, splicing fusion software call decryption configuration parameter, play encrypted screener film source, broadcasting is decrypted.
Decryption method of the present invention is illustrated in order to clearer, detailed process combination Fig. 5 is described again:It is first
It is first, when fusion playing program is spliced in operation, Crypto++ password generating programs, generation and ciphering process are run in the machine
In identical password (if in specified player operation, the password is different for other machines), and will change close
Code is converted into binary code.Based on default decaying method for generating cipher code structure color enhancing password E 'iCalculation formula, such as formula
(2) shown in.For Crypted password EiFor 0.5 grid, splicing fusion program is other than completing normal color attenuation change, also
It will be according to EiFor 0.5 this information, 2 are multiplied by chroma-luminance;And for Crypted password EiFor 1 grid, only carry out and without encryption
Film source play the decaying of duplicate color.Such just complete merges decrypting process to the splicing for encrypting film source.
And be directed to the case where attempting to play this encryption film source on other machines, due to running Crypto on other machines
++ obtained password and Crypted password are not consistent, then there will not be correct decrypted result.Its final playing display
As a result some grid blocks are had obviously secretly in other parts, and other grid blocks are bright in other parts, or even there is specular
Domain.Thus it can not correctly play the encrypted screener.
Fig. 6 is encrypting and decrypting links design sketch.Wherein, Fig. 6 a are unencryption film source single frames design sketch, and Fig. 6 b are to add
Close film source single frames design sketch, Fig. 6 c are that decryption film source plays single frames design sketch.
It is directed to using same player the case where other movie theatres play, since the several of invention program are merged in this splicing
What conversion section is the machine play position calculating setting for specified film, then for other movie theatres due to curtain
Size is different, each projecting apparatus and curtain to put relative position and attitude different, therefore the same program of operation will not obtain just
True splicing fusion results.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can use hardware, processor to execute
The combination of software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only memory
(ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field
In any other form of storage medium well known to interior.
Those skilled in the art should be able to recognize that, side described in conjunction with the examples disclosed in the embodiments of the present disclosure
Method step, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate electronic hardware and
The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These
Function is executed with electronic hardware or software mode actually, depends on the specific application and design constraint of technical solution.
Those skilled in the art can use different methods to achieve the described function each specific application, but this reality
Now it should not be considered as beyond the scope of the present invention.
Term " comprising " or any other like term are intended to cover non-exclusive inclusion, so that including a system
Process, the method for row element include not only those elements, but also include the other elements being not explicitly listed, or further include
The intrinsic element of these processes, method.
So far, it has been combined preferred embodiment shown in the drawings and describes technical scheme of the present invention, still, this field
Technical staff is it is easily understood that protection scope of the present invention is expressly not limited to these specific implementation modes.Without departing from this
Under the premise of the principle of invention, those skilled in the art can make the relevant technologies feature equivalent change or replacement, these
Technical solution after change or replacement is fallen within protection scope of the present invention.
Claims (10)
1. a kind of film encryption method based on multi-projector splicing fusion, which is characterized in that include the following steps:
Step A1 carries out parametrization gridding point to projection screen, and selects encryption section;
Step A2 generates password respectively on the target machine to the parametric grid of the encryption section using encryption software;
The step A2 passwords generated are converted to binary number by step A3, select its first n to generate film encryption mask;
Step A4, during rendering generation projection film, superposition watermark mask generates encrypted screener.
2. the film encryption method according to claim 1 based on multi-projector splicing fusion, which is characterized in that described
" carry out parametrization gridding point to projection screen, and select encryption section ", method is:
By projection screen according to parametrization equation model split be (M+1) * (N+1) a parametric grid, wherein parametric grid point
Coordinate is [i, j] (i=0,1,2,3...M;J=0,1,2,3...N);
It selects integration region for encryption section, determines the corresponding parametric grid in the encryption section.
3. the film encryption method according to claim 2 based on multi-projector splicing fusion, which is characterized in that described
" the step A2 passwords generated are converted to binary number, select its first n to generate film encryption mask ", method is:
The step A2 passwords generated are converted to binary number;
Based on default decaying method for generating cipher code, the mesh refinement mask color RGB components that serial number i is corresponded on mask figures are calculated
Color decaying password Ei。
4. the film encryption method according to claim 3 based on multi-projector splicing fusion, which is characterized in that described pre-
If decaying method for generating cipher code is
5. the film encryption method according to claim 3 based on multi-projector splicing fusion, which is characterized in that described
" superposition watermark mask generates encrypted screener ", method is:
The each frame for the film source to be maintained secrecy is encrypted by watermark superposition program;Encrypted mode is that watermark is multiplied with artwork
Mode.
6. according to the film encryption method that claim 1-5 any one of them is merged based on multi-projector splicing, feature exists
In the encryption software is that Crypto++ passwords generate library.
7. a kind of film decryption method based on multi-projector splicing fusion, which is characterized in that include the following steps:
Step B1 identifies encryption section;
Step B2 calls used encryption software when generating password, the parametric grid of the encryption section is generated respectively and
Encrypt same password;
The step B2 passwords generated are converted to binary number by step B3, generate splicing fusion decryption configuration parameter;
Step B4, splicing fusion software call decryption configuration parameter, play encrypted screener film source, broadcasting is decrypted.
8. the film decryption method according to claim 7 based on multi-projector splicing fusion, which is characterized in that carrying out
Splicing fusion executes step B2 when playing.
9. the film decryption method according to claim 8 based on multi-projector splicing fusion, which is characterized in that described
" the step B2 passwords generated being converted to binary number, generate splicing fusion decryption configuration parameter ", method is:
The step A2 passwords generated are converted to binary number;
Based on default decaying method for generating cipher code, the mesh refinement mask color RGB components that serial number i is corresponded on mask figures are calculated
Color decaying password Ei, generate color enhancing password E 'i。
10. the film encryption method according to claim 9 based on multi-projector splicing fusion, which is characterized in that described
Presetting decaying method for generating cipher code is
The color enhancing password E 'iFor
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711465803.4A CN108307203B (en) | 2017-12-28 | 2017-12-28 | Film encryption method, decryption method based on multi-projector splicing fusion |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711465803.4A CN108307203B (en) | 2017-12-28 | 2017-12-28 | Film encryption method, decryption method based on multi-projector splicing fusion |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108307203A true CN108307203A (en) | 2018-07-20 |
CN108307203B CN108307203B (en) | 2019-11-08 |
Family
ID=62867750
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711465803.4A Active CN108307203B (en) | 2017-12-28 | 2017-12-28 | Film encryption method, decryption method based on multi-projector splicing fusion |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108307203B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113709428A (en) * | 2020-05-20 | 2021-11-26 | 中强光电股份有限公司 | Projection system and projection method |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020016916A1 (en) * | 1997-09-29 | 2002-02-07 | Hewlett-Packard Company | Watermarking of digital object |
US6463162B1 (en) * | 1998-09-30 | 2002-10-08 | Hewlett-Packard Company | Robust watermarking for digital objects |
CN1455578A (en) * | 2003-05-10 | 2003-11-12 | 合肥工业大学 | Image waterprint method for copyright protection |
CN1608361A (en) * | 2001-10-26 | 2005-04-20 | 松下电器产业株式会社 | Digital work protection system, key management apparatus, and user apparatus |
CN1945623A (en) * | 2006-10-26 | 2007-04-11 | 丹东东方测控技术有限公司 | Method for removing visual watermark of block local encrypted digital image |
CN102103738A (en) * | 2011-03-04 | 2011-06-22 | 西南交通大学 | Method for generating and authenticating digital image tampered content recoverable variable capacity watermarks |
CN102609889A (en) * | 2011-01-20 | 2012-07-25 | 北京中盈信安科技发展有限责任公司 | Image digital watermark embedding method and image digital watermark detecting method |
CN103886543A (en) * | 2014-04-02 | 2014-06-25 | 海南大学 | Volume data robust multi-watermark method based on three-dimensional DFT perceptual Hashing |
CN105025281A (en) * | 2015-06-29 | 2015-11-04 | 北京中科盘古科技发展有限公司 | Large-dimension full dome super-clear film playing and interaction application splicing fusion method |
-
2017
- 2017-12-28 CN CN201711465803.4A patent/CN108307203B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020016916A1 (en) * | 1997-09-29 | 2002-02-07 | Hewlett-Packard Company | Watermarking of digital object |
US6463162B1 (en) * | 1998-09-30 | 2002-10-08 | Hewlett-Packard Company | Robust watermarking for digital objects |
CN1608361A (en) * | 2001-10-26 | 2005-04-20 | 松下电器产业株式会社 | Digital work protection system, key management apparatus, and user apparatus |
CN1455578A (en) * | 2003-05-10 | 2003-11-12 | 合肥工业大学 | Image waterprint method for copyright protection |
CN1945623A (en) * | 2006-10-26 | 2007-04-11 | 丹东东方测控技术有限公司 | Method for removing visual watermark of block local encrypted digital image |
CN102609889A (en) * | 2011-01-20 | 2012-07-25 | 北京中盈信安科技发展有限责任公司 | Image digital watermark embedding method and image digital watermark detecting method |
CN102103738A (en) * | 2011-03-04 | 2011-06-22 | 西南交通大学 | Method for generating and authenticating digital image tampered content recoverable variable capacity watermarks |
CN103886543A (en) * | 2014-04-02 | 2014-06-25 | 海南大学 | Volume data robust multi-watermark method based on three-dimensional DFT perceptual Hashing |
CN105025281A (en) * | 2015-06-29 | 2015-11-04 | 北京中科盘古科技发展有限公司 | Large-dimension full dome super-clear film playing and interaction application splicing fusion method |
Non-Patent Citations (3)
Title |
---|
XINPENG ZHANG: "Reversible Data Hiding in Encrypted Image", 《IEEE SIGNAL PROCESSING LETTERS ( VOLUME: 18 , ISSUE: 4 , APRIL 2011 )》 * |
李海燕等: "一种基于视觉特性的彩色图像数字水印算法", 《电脑知识与技术》 * |
项世军等: "加密域可逆水印综述", 《暨南大学学报(自然科学与医学版)》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113709428A (en) * | 2020-05-20 | 2021-11-26 | 中强光电股份有限公司 | Projection system and projection method |
Also Published As
Publication number | Publication date |
---|---|
CN108307203B (en) | 2019-11-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7298865B2 (en) | Secure robust high-fidelity watermarking | |
US10607421B2 (en) | Secure rendering system that generates ray tracing samples with obfuscated position data | |
CN104185998B (en) | The method and system controlled for the cryptographic acess of video | |
US11023596B2 (en) | Non-rasterized image streaming system that uses ray tracing samples | |
Chang et al. | Meaningful secret sharing technique with authentication and remedy abilities | |
US10372920B2 (en) | Non-rasterized image streaming system that uses ray tracing samples | |
Dhiman et al. | Extended visual cryptography techniques for true color images | |
CN111241554A (en) | Digital image encryption and decryption system based on visual password | |
JP2004159309A (en) | Method and apparatus for digital watermarking and watermark decoding | |
CN101616233A (en) | Information processor and information processing method | |
US10331862B2 (en) | Viewport decryption | |
US20180212766A1 (en) | Asymmetric content protection of large datastreams | |
CN108307203B (en) | Film encryption method, decryption method based on multi-projector splicing fusion | |
CN101616232A (en) | Information processor and information processing method | |
US9959906B2 (en) | Method and a receiver device configured to mark digital media content | |
Shiny et al. | An efficient tagged visual cryptography for color images | |
CN109845272A (en) | The method for reading and generating the video flowing of the image comprising compression and encryption | |
WO2015121182A1 (en) | Method for encrypting or decrypting a 3d object | |
CN109993679B (en) | Digital watermark encryption method based on vector parameters | |
CN104718764B (en) | Information processing equipment | |
Spraul | How software works: the magic behind encryption, CGI, search engines, and other everyday technologies | |
Chavan et al. | Lossless tagged visual cryptography scheme using bit plane slicing for image processing | |
AU2021102762A4 (en) | A Novel Watermarking Techniques for 3D Mesh Objects | |
Choi et al. | Beyond the Screen | |
Zhang et al. | Two-level QR code scheme based on region matrix image secret sharing algorithm |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |