CN109873696A - It is a kind of to be able to achieve the video encryption method for distorting frame alignment - Google Patents

It is a kind of to be able to achieve the video encryption method for distorting frame alignment Download PDF

Info

Publication number
CN109873696A
CN109873696A CN201910048638.5A CN201910048638A CN109873696A CN 109873696 A CN109873696 A CN 109873696A CN 201910048638 A CN201910048638 A CN 201910048638A CN 109873696 A CN109873696 A CN 109873696A
Authority
CN
China
Prior art keywords
frame
video
vector
encryption
scramble
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910048638.5A
Other languages
Chinese (zh)
Inventor
高静
龚雨琛
徐江涛
聂凯明
史再峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin University
Original Assignee
Tianjin University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin University filed Critical Tianjin University
Priority to CN201910048638.5A priority Critical patent/CN109873696A/en
Publication of CN109873696A publication Critical patent/CN109873696A/en
Pending legal-status Critical Current

Links

Landscapes

  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The present invention discloses a kind of video encryption method for being able to achieve and distorting frame alignment, comprising: generates a group key stream, the first key as frame image encryption each in video using logistics chaotic maps;Each frame picture edge characteristic is extracted, and carries out character array summation operation, the second key as each frame image encryption;Based on line shuffle vector and column scramble vector that hyperchaotic system is needed, select scheduled line shuffle vector and column scramble vector to frame pattern matrix procession coordinate scramble each in video, to complete to encrypt.The present invention is able to achieve the video encryption method for distorting frame alignment, can be achieved at the same time encryption of the video information in transmission process and anti-tamper function, can resist frame deletion and what Frame switch attacked that these digital watermarkings can not discover distorts means.

Description

It is a kind of to be able to achieve the video encryption method for distorting frame alignment
Technical field
The present invention relates to video-encryption technical field, the video-encryption side of frame alignment is distorted more particularly to a kind of be able to achieve Method.
Background technique
With the rapid development of Media Industry, authenticity of the video in transmission process and safety are particularly important, video Encryption is widely applied in video transmitting procedure with tamper-resistance techniques.Conventional method is embedded in digital water in video image Print, then encrypted transmission is carried out to video, recipient is extracted digital watermarking progress video content integrality and is recognized by decryption of video Card.In such methods, encryption is often separately carried out with anti-tamper function;In addition, being attacked for frame deletion and Frame switch, based on number The integrated authentication of word watermark, which will lead to, to be distorted information and can not be noticeable, and there are some potential safety problemss.
Summary of the invention
Frame alignment is distorted in view of the technical drawbacks of the prior art, it is an object of the present invention to provide one kind is able to achieve Video encryption method, video secrecy transmission and integrated authentication can be completed at the same time.
The technical solution adopted to achieve the purpose of the present invention is:
It is a kind of to be able to achieve the video encryption method for distorting frame alignment, comprising the following steps:
A group key stream is generated using logistics chaotic maps, first as frame image encryption each in video is close Key;
Each frame picture edge characteristic is extracted, and carries out character array summation operation, is added as each frame image The second close key;
The line shuffle vector and column scramble vector needed based on hyperchaotic system, select scheduled line shuffle vector with Column scramble vector is to frame pattern matrix procession coordinate scramble each in video, to complete to encrypt.
Described extracts each frame picture edge characteristic, and the step of carrying out character array summation operation is specific Are as follows:
Image is smoothed with opposite calculus of variations RTV, filters out texture complicated in the noise and image in image After information, Canny edge detection is carried out to the image after smoothing processing, obtains the edge contour character array of every frame image EGi, calculate sumEGi, as the second key.
The scheduled line shuffle vector of the selection and column scramble vector are to frame pattern matrix procession each in video Coordinate scramble, thus the step of completing encryption are as follows:
By the corresponding first key of kth frame image the second key corresponding with -1 frame video of kth, respectively to 4 remainders, utilize Calculated result selects the line shuffle vector that hyperchaotic system generates with column scramble vector, obtains the row of the kth frame image Column scramble vector carries out scramble to kth frame image ranks coordinate with the ranks scramble vector, to complete to kth frame image Encryption, and so on, until completing the encryption to frames all in video.
Compared with prior art, the beneficial effects of the present invention are:
The present invention is able to achieve the video encryption method for distorting frame alignment, can be achieved at the same time video information in transmission process Encryption and anti-tamper function, and can resist frame deletion and what Frame switch attacked that these digital watermarkings can not discover distorts hand Section.
Detailed description of the invention
Fig. 1 is to be able to achieve the video encryption method schematic diagram for distorting frame alignment;
Fig. 2 is able to achieve the decryption schematic diagram for distorting the video-encryption of frame alignment to be corresponding.
Specific embodiment
The present invention is described in further detail below in conjunction with the drawings and specific embodiments.It should be appreciated that described herein Specific embodiment be only used to explain the present invention, be not intended to limit the present invention.
As shown in Figure 1, it is of the invention it is a kind of be able to achieve the video encryption method for distorting frame alignment, include the following steps:
S1 generates a group key stream using logistics chaotic maps, and the part as frame each in video encryption is close Key;
The Logistics mapping is that common chaos system, difference expression are as follows in cryptosystem:
xk+1=μ xk(1-xk)
Steps are as follows for the generation of its key stream:
Step 1: input initial parameter x0,y0(i.e. the initial key of logistics chaos sequence) generates two chaos sequences Column, and l is divided into carrying out respectively between two chaos sequences1With 12Sampling, obtain chaos sequence { xi},{yi, i=1,2 ..., L, wherein L is video totalframes;
Step 2: respectively by { xi},{yi, i=1,2 ..., L integer-bit zero setting, and it is converted into binary system, take decimal First 16 obtain sequence { x' after pointi},{y'i, i=1,2 ..., L;
Step 3: enablingCalculate sumzi, close as the part of the i-th frame of video encryption Key.
S2 extracts each frame picture edge characteristic, and carries out character array summation operation, encrypts as each frame Another part key;
Firstly, being smoothed using opposite the calculus of variations (RTV) to image, filter out multiple in the noise and image in image Miscellaneous texture information carries out Canny edge detection to the image after smoothing processing, obtains the edge contour of every frame image later Character array EGiCalculate sumEGi,
S3 is based on hyperchaotic system, and each frame image is encrypted in the key pair video generated in conjunction with two step of front.
Wherein, a kind of kinetics equation of hyperchaotic system are as follows:
Rationally setting a, b, c, d, e, makes system be in hyperchaos state, as follows for the encrypting step of each frame video:
Step 1: setting initial parameter { x10,x20,x30,x40And { y10,y20,y30,y40, for M × N image, by { x10, x20,x30,x40And { y10,y20,y30,y40Utilize hyperchaotic system difference iteration M times and n times, to obtain 8 groups of chaos sequences {xam, a=1,2,3,4, m=1,2 ..., M }, { ybn, b=1,2,3,4, n=1,2 ..., N };
Step 2: by { xam},{ybnIn element arranged from big to small, 8 after obtained rearrangement group chaos sequence {Xam},{Ybn};Calculate { Xam},{YbnIn element in { xam},{ybnIn position, respectively obtain 4 groups of line shuffle vectorsWith 4 groups of column scramble vectorsIt is combined arrangement to it, 16 groups of ranks scramble vectors can be obtained;
Step 3: enabling s1=sumziMod 4, mod are complementations, i.e. sumziValue to 4 remainders, if s1=0, then it selects WithAs line shuffle vector, if s1=1, then it selectsAs line shuffle vector, and so on;Similarly, s is enabled2= sumEGi-1Mod 4, wherein EGi-1For the edge contour character array of previous frame image, s is utilized2Result alternative column scramble to Amount
Step 4: using the scramble vector of selection to the frame image procession scramble, completing encryption.If original i-th frame figure As row, column coordinate sequence is respectively Prow={ Pr1,Pr2,…,PrN, Pcol={ Pc1,Pc2,…,PcM, row after scrambling encryption, Column coordinate sequence is P 'row={ P'r1,P'r2,…,P'rN, P 'col={ P'c1,P'c2,…,P'cM, wherein
It is illustrated below with reference to Fig. 1-2, in Fig. 1, x0,y0For the initial key for generating logistics chaos sequence;sum zk-1,sum zk,sum zk+1Respectively -1 frame of kth, sampling chaos sequence corresponding to+1 frame of kth frame and kth by interception, ask The result of sum;sum EGk-1, sum EGk, sum EGk+1Respectively -1 frame of kth, edge feature corresponding to+1 frame of kth frame and kth Array summed result.
Detailed process is encrypted as shown in Figure 1: firstly, generating key stream sum z based on logistics chaotic mapsi, will be close The each frame of encryption key distribution in key stream to video;It is flat that characteristic extracting module carries out RTV to each frame image in input video The edge feature value sum EG of every frame video is extracted in sliding, Canny edge detection and the summation of edge feature arrayi;Later, sum zi With sum EGi-1Complete the encryption to the i-th frame image jointly based on hyperchaotic system.Such as kth frame video in Fig. 1, By the corresponding sum z of this frame videokWith the edge feature value sum EG from -1 frame video extraction of kthk-1Respectively to 4 remainders, utilize Calculated result selects the scramble vector that hyperchaotic system generates, and obtains the ranks scramble vector of the frame image, is set with this Random vector carries out scramble to image ranks coordinate, so that the encryption to kth frame video is completed, and so on, until completing to view The encryption of all frames in frequency.
The detailed process of decryption of video is as shown in Figure 2.Decrypting process is similar with ciphering process, is sent using video sender Key x0,y0The each frame video of algorithm calculating, which is generated, by key stream corresponds to sum zi, pass through sum z first1With initial key 1st frame video is decrypted;Later, by the sum EG of extraction1Sum z corresponding with the 2nd frame image2Respectively to 4 remainders, benefit The scramble vector that hyperchaotic system generates is selected with calculated result, the ranks scramble vector of the frame image is obtained, passes through Inverse transformation is carried out to ranks scramble vector and encrypted image ranks coordinate, realizes the decryption to the 2nd frame video, and so on, by Frame completes the decryption to video.
About distorting frame alignment:
For video present frame, there are two aspects to determine for the key used in ciphering process, first is that logistics The key stream sumz of generationi, second is that the edge contour feature sum EG of previous frame imagei-1, therefore in decrypting process, if hair Raw content frame distorts, Frame switch and frame deletion, then decrypting process can not be successfully progresss, the result judgement decrypted frame by frame by video Distort the position of generation.Referring to Fig. 2, the identification of tampered position is described in detail:
1. being distorted for content frame:
In video transmitting procedure, if kth frame image by attacker's Brute Force and is distorted in video, debit is connect It receives during video being decrypted after the video, the edge contour feature sum EG of the kth frame of extractionkIt changes, calculates Obtained descrambled vector is incorrect, causes+1 frame of kth that can not be decrypted, to find that video distorts the position of frame.
2. for Frame switch:
If -1 frame image of kth is swapped with+1 frame image of kth in video, for kth frame video in decrypting process For, the edge contour feature of former frame is by sum EGk-1Become sum EGk+1, the descrambled vector being calculated is incorrect, causes Kth frame can not be decrypted, to find that video distorts the position of frame.
3. for frame deletion:
If kth frame image is deleted in video, in decrypting process for+1 frame video of kth, the side of former frame Edge contour feature is by sum EGkBecome sum EGk-1, the descrambled vector being calculated is incorrect, causes+1 frame of kth that can not be solved It is close, to find that video distorts the position of frame.
The present invention is embedded in digital watermarking relative to conventional method in video image, then the side of encrypted transmission is carried out to video Formula, this method only need to carry out primary encryption to video, and process is more succinct;In addition, the present invention can hand over frame deletion and frame The attack that changing attack etc. can not be discovered based on digital watermarking is detected.
The above is only a preferred embodiment of the present invention, it is noted that for the common skill of the art For art personnel, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications Also it should be regarded as protection scope of the present invention.

Claims (3)

1. a kind of be able to achieve the video encryption method for distorting frame alignment, which comprises the following steps:
A group key stream is generated using logistics chaotic maps, the first key as frame image encryption each in video;
Each frame picture edge characteristic is extracted, and carries out character array summation operation, as each frame image encryption Second key;
Based on line shuffle vector and column scramble vector that hyperchaotic system is needed, scheduled line shuffle vector is selected to set with column Random vector is to frame pattern matrix procession coordinate scramble each in video, to complete to encrypt.
2. being able to achieve the video encryption method for distorting frame alignment as described in claim 1, which is characterized in that described to each frame Picture edge characteristic extracts, and the step of carrying out character array summation operation specifically:
Image is smoothed with opposite calculus of variations RTV, filters out texture information complicated in the noise and image in image Later, Canny edge detection is carried out to the image after smoothing processing, obtains the edge contour character array EG of every frame imagei, meter Calculate sumEGi, as the second key.
3. being able to achieve the video encryption method for distorting frame alignment as described in claim 1, which is characterized in that the selection is predetermined Line shuffle vector and column scramble vector to frame pattern matrix procession coordinate scramble each in video, thus complete encryption Step are as follows:
The corresponding first key of kth frame image the second key corresponding with -1 frame video of kth is utilized into calculating respectively to 4 remainders As a result the line shuffle vector generated to hyperchaotic system is selected with column scramble vector, and the ranks for obtaining the kth frame image are set Random vector carries out scramble to kth frame image ranks coordinate with the ranks scramble vector, so that the encryption to kth frame image is completed, And so on, until completing the encryption to frames all in video.
CN201910048638.5A 2019-01-18 2019-01-18 It is a kind of to be able to achieve the video encryption method for distorting frame alignment Pending CN109873696A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910048638.5A CN109873696A (en) 2019-01-18 2019-01-18 It is a kind of to be able to achieve the video encryption method for distorting frame alignment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910048638.5A CN109873696A (en) 2019-01-18 2019-01-18 It is a kind of to be able to achieve the video encryption method for distorting frame alignment

Publications (1)

Publication Number Publication Date
CN109873696A true CN109873696A (en) 2019-06-11

Family

ID=66917771

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910048638.5A Pending CN109873696A (en) 2019-01-18 2019-01-18 It is a kind of to be able to achieve the video encryption method for distorting frame alignment

Country Status (1)

Country Link
CN (1) CN109873696A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102184518A (en) * 2011-05-16 2011-09-14 重庆大学 DICOM (Digital Imaging and Communications in Medicine) medical image encrypting and decrypting method based on edge detection
CN102693523A (en) * 2012-05-09 2012-09-26 华南理工大学 Image two-grade encrypting method based on double-chaos system
CN102571754B (en) * 2011-12-05 2014-11-19 北京交通大学 Method for protecting security of visualized information system
CN106530207A (en) * 2016-12-06 2017-03-22 南京理工大学 Logistic chaotic mapping-based digital image encryption method
CN106910156A (en) * 2017-02-27 2017-06-30 东北大学 A kind of New chaotic image encryption method with plaintext association key stream generting machanism
CN107578399A (en) * 2017-07-25 2018-01-12 天津大学 Full reference image quality appraisement method based on boundary characteristic segmentation
CN107833174A (en) * 2017-08-11 2018-03-23 西京学院 A kind of image encryption method based on Logistic chaos system algorithms
CN108199823A (en) * 2017-09-20 2018-06-22 长春理工大学 Chaos video encryption method based on sliding encryption window
KR20180135354A (en) * 2017-06-12 2018-12-20 오현물류주식회사 WMS linkage type distribution management system and distribution management method

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102184518A (en) * 2011-05-16 2011-09-14 重庆大学 DICOM (Digital Imaging and Communications in Medicine) medical image encrypting and decrypting method based on edge detection
CN102184518B (en) * 2011-05-16 2013-11-06 重庆大学 DICOM (Digital Imaging and Communications in Medicine) medical image encrypting and decrypting method based on edge detection
CN102571754B (en) * 2011-12-05 2014-11-19 北京交通大学 Method for protecting security of visualized information system
CN102693523A (en) * 2012-05-09 2012-09-26 华南理工大学 Image two-grade encrypting method based on double-chaos system
CN106530207A (en) * 2016-12-06 2017-03-22 南京理工大学 Logistic chaotic mapping-based digital image encryption method
CN106910156A (en) * 2017-02-27 2017-06-30 东北大学 A kind of New chaotic image encryption method with plaintext association key stream generting machanism
KR20180135354A (en) * 2017-06-12 2018-12-20 오현물류주식회사 WMS linkage type distribution management system and distribution management method
CN107578399A (en) * 2017-07-25 2018-01-12 天津大学 Full reference image quality appraisement method based on boundary characteristic segmentation
CN107833174A (en) * 2017-08-11 2018-03-23 西京学院 A kind of image encryption method based on Logistic chaos system algorithms
CN108199823A (en) * 2017-09-20 2018-06-22 长春理工大学 Chaos video encryption method based on sliding encryption window

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
WENJUN LU ECT.: "Confidentiality-Preserving Image Search:A Comparative Study Between Homomorphic Encryption and Distance-Preserving Randomization", 《IEEE》 *
包浩明,朱义胜: "基于多层密钥的混沌映射保密通信系统", 《电子学报》 *

Similar Documents

Publication Publication Date Title
Ismail et al. A digital image encryption algorithm based a composition of two chaotic logistic maps.
Subramanyan et al. Image encryption based on AES key expansion
WO2017045594A1 (en) Anti-counterfeit method
CN108566500A (en) The reversible hidden method of adapting to image encrypted domain based on Hybrid Encryption mechanism
US20130179690A1 (en) Method and apparatus for fast image encryption and invisible digital watermark
CN108322622A (en) A kind of color digital image encryption method based on 2D-VMD and octuple hyperchaotic system
CN108122188B (en) Image encryption method
Shifa et al. Joint crypto-stego scheme for enhanced image protection with nearest-centroid clustering
Alzubi et al. A novel chaotic map encryption methodology for image cryptography and secret communication with steganography
Anbarasi et al. Secured secret color image sharing with steganography
Nayak et al. A secure and efficient color image encryption scheme based on two chaotic systems and advanced encryption standard
CN114401351B (en) Image encryption and decryption method based on two-dimensional fractional order chaotic mapping
Oravec et al. Substitution steganography with security improved by chaotic image encryption
Selvaraju et al. A method to improve the security level of ATM banking systems using AES algorithm
CN111597568B (en) Image encryption method of high-dimensional fractional order complex system based on distributed time lag
CN113259089A (en) Image encryption method based on combination of chaos principle and genetic algorithm
CN110569945B (en) QR code encryption method based on single-intensity recording phase recovery process
CN110136045B (en) Method for hiding and recovering based on mutual scrambling of two images
CN109873696A (en) It is a kind of to be able to achieve the video encryption method for distorting frame alignment
CN109559269B (en) Image encryption method and terminal
Ganavi et al. Two-layer security of images using elliptic curve cryptography with discrete wavelet transform
CN109214199B (en) Image encryption method and system and decryption method and system
CN107169912A (en) A kind of improved method of Image Chaos encryption technology
Huma et al. Wavelet and LSB-based encrypted watermarking approach to Hide Patient’s information in medical image
Bhagat et al. Image Steganography Using Improved Algorithms to Enhance Security and Payload of Traditional LSB Substitution

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190611

WD01 Invention patent application deemed withdrawn after publication