CN109873696A - It is a kind of to be able to achieve the video encryption method for distorting frame alignment - Google Patents
It is a kind of to be able to achieve the video encryption method for distorting frame alignment Download PDFInfo
- Publication number
- CN109873696A CN109873696A CN201910048638.5A CN201910048638A CN109873696A CN 109873696 A CN109873696 A CN 109873696A CN 201910048638 A CN201910048638 A CN 201910048638A CN 109873696 A CN109873696 A CN 109873696A
- Authority
- CN
- China
- Prior art keywords
- frame
- video
- vector
- encryption
- scramble
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The present invention discloses a kind of video encryption method for being able to achieve and distorting frame alignment, comprising: generates a group key stream, the first key as frame image encryption each in video using logistics chaotic maps;Each frame picture edge characteristic is extracted, and carries out character array summation operation, the second key as each frame image encryption;Based on line shuffle vector and column scramble vector that hyperchaotic system is needed, select scheduled line shuffle vector and column scramble vector to frame pattern matrix procession coordinate scramble each in video, to complete to encrypt.The present invention is able to achieve the video encryption method for distorting frame alignment, can be achieved at the same time encryption of the video information in transmission process and anti-tamper function, can resist frame deletion and what Frame switch attacked that these digital watermarkings can not discover distorts means.
Description
Technical field
The present invention relates to video-encryption technical field, the video-encryption side of frame alignment is distorted more particularly to a kind of be able to achieve
Method.
Background technique
With the rapid development of Media Industry, authenticity of the video in transmission process and safety are particularly important, video
Encryption is widely applied in video transmitting procedure with tamper-resistance techniques.Conventional method is embedded in digital water in video image
Print, then encrypted transmission is carried out to video, recipient is extracted digital watermarking progress video content integrality and is recognized by decryption of video
Card.In such methods, encryption is often separately carried out with anti-tamper function;In addition, being attacked for frame deletion and Frame switch, based on number
The integrated authentication of word watermark, which will lead to, to be distorted information and can not be noticeable, and there are some potential safety problemss.
Summary of the invention
Frame alignment is distorted in view of the technical drawbacks of the prior art, it is an object of the present invention to provide one kind is able to achieve
Video encryption method, video secrecy transmission and integrated authentication can be completed at the same time.
The technical solution adopted to achieve the purpose of the present invention is:
It is a kind of to be able to achieve the video encryption method for distorting frame alignment, comprising the following steps:
A group key stream is generated using logistics chaotic maps, first as frame image encryption each in video is close
Key;
Each frame picture edge characteristic is extracted, and carries out character array summation operation, is added as each frame image
The second close key;
The line shuffle vector and column scramble vector needed based on hyperchaotic system, select scheduled line shuffle vector with
Column scramble vector is to frame pattern matrix procession coordinate scramble each in video, to complete to encrypt.
Described extracts each frame picture edge characteristic, and the step of carrying out character array summation operation is specific
Are as follows:
Image is smoothed with opposite calculus of variations RTV, filters out texture complicated in the noise and image in image
After information, Canny edge detection is carried out to the image after smoothing processing, obtains the edge contour character array of every frame image
EGi, calculate sumEGi, as the second key.
The scheduled line shuffle vector of the selection and column scramble vector are to frame pattern matrix procession each in video
Coordinate scramble, thus the step of completing encryption are as follows:
By the corresponding first key of kth frame image the second key corresponding with -1 frame video of kth, respectively to 4 remainders, utilize
Calculated result selects the line shuffle vector that hyperchaotic system generates with column scramble vector, obtains the row of the kth frame image
Column scramble vector carries out scramble to kth frame image ranks coordinate with the ranks scramble vector, to complete to kth frame image
Encryption, and so on, until completing the encryption to frames all in video.
Compared with prior art, the beneficial effects of the present invention are:
The present invention is able to achieve the video encryption method for distorting frame alignment, can be achieved at the same time video information in transmission process
Encryption and anti-tamper function, and can resist frame deletion and what Frame switch attacked that these digital watermarkings can not discover distorts hand
Section.
Detailed description of the invention
Fig. 1 is to be able to achieve the video encryption method schematic diagram for distorting frame alignment;
Fig. 2 is able to achieve the decryption schematic diagram for distorting the video-encryption of frame alignment to be corresponding.
Specific embodiment
The present invention is described in further detail below in conjunction with the drawings and specific embodiments.It should be appreciated that described herein
Specific embodiment be only used to explain the present invention, be not intended to limit the present invention.
As shown in Figure 1, it is of the invention it is a kind of be able to achieve the video encryption method for distorting frame alignment, include the following steps:
S1 generates a group key stream using logistics chaotic maps, and the part as frame each in video encryption is close
Key;
The Logistics mapping is that common chaos system, difference expression are as follows in cryptosystem:
xk+1=μ xk(1-xk)
Steps are as follows for the generation of its key stream:
Step 1: input initial parameter x0,y0(i.e. the initial key of logistics chaos sequence) generates two chaos sequences
Column, and l is divided into carrying out respectively between two chaos sequences1With 12Sampling, obtain chaos sequence { xi},{yi, i=1,2 ...,
L, wherein L is video totalframes;
Step 2: respectively by { xi},{yi, i=1,2 ..., L integer-bit zero setting, and it is converted into binary system, take decimal
First 16 obtain sequence { x' after pointi},{y'i, i=1,2 ..., L;
Step 3: enablingCalculate sumzi, close as the part of the i-th frame of video encryption
Key.
S2 extracts each frame picture edge characteristic, and carries out character array summation operation, encrypts as each frame
Another part key;
Firstly, being smoothed using opposite the calculus of variations (RTV) to image, filter out multiple in the noise and image in image
Miscellaneous texture information carries out Canny edge detection to the image after smoothing processing, obtains the edge contour of every frame image later
Character array EGiCalculate sumEGi,
S3 is based on hyperchaotic system, and each frame image is encrypted in the key pair video generated in conjunction with two step of front.
Wherein, a kind of kinetics equation of hyperchaotic system are as follows:
Rationally setting a, b, c, d, e, makes system be in hyperchaos state, as follows for the encrypting step of each frame video:
Step 1: setting initial parameter { x10,x20,x30,x40And { y10,y20,y30,y40, for M × N image, by { x10,
x20,x30,x40And { y10,y20,y30,y40Utilize hyperchaotic system difference iteration M times and n times, to obtain 8 groups of chaos sequences
{xam, a=1,2,3,4, m=1,2 ..., M }, { ybn, b=1,2,3,4, n=1,2 ..., N };
Step 2: by { xam},{ybnIn element arranged from big to small, 8 after obtained rearrangement group chaos sequence
{Xam},{Ybn};Calculate { Xam},{YbnIn element in { xam},{ybnIn position, respectively obtain 4 groups of line shuffle vectorsWith 4 groups of column scramble vectorsIt is combined arrangement to it, 16 groups of ranks scramble vectors can be obtained;
Step 3: enabling s1=sumziMod 4, mod are complementations, i.e. sumziValue to 4 remainders, if s1=0, then it selects
WithAs line shuffle vector, if s1=1, then it selectsAs line shuffle vector, and so on;Similarly, s is enabled2=
sumEGi-1Mod 4, wherein EGi-1For the edge contour character array of previous frame image, s is utilized2Result alternative column scramble to
Amount
Step 4: using the scramble vector of selection to the frame image procession scramble, completing encryption.If original i-th frame figure
As row, column coordinate sequence is respectively Prow={ Pr1,Pr2,…,PrN, Pcol={ Pc1,Pc2,…,PcM, row after scrambling encryption,
Column coordinate sequence is P 'row={ P'r1,P'r2,…,P'rN, P 'col={ P'c1,P'c2,…,P'cM, wherein
It is illustrated below with reference to Fig. 1-2, in Fig. 1, x0,y0For the initial key for generating logistics chaos sequence;sum
zk-1,sum zk,sum zk+1Respectively -1 frame of kth, sampling chaos sequence corresponding to+1 frame of kth frame and kth by interception, ask
The result of sum;sum EGk-1, sum EGk, sum EGk+1Respectively -1 frame of kth, edge feature corresponding to+1 frame of kth frame and kth
Array summed result.
Detailed process is encrypted as shown in Figure 1: firstly, generating key stream sum z based on logistics chaotic mapsi, will be close
The each frame of encryption key distribution in key stream to video;It is flat that characteristic extracting module carries out RTV to each frame image in input video
The edge feature value sum EG of every frame video is extracted in sliding, Canny edge detection and the summation of edge feature arrayi;Later, sum zi
With sum EGi-1Complete the encryption to the i-th frame image jointly based on hyperchaotic system.Such as kth frame video in Fig. 1,
By the corresponding sum z of this frame videokWith the edge feature value sum EG from -1 frame video extraction of kthk-1Respectively to 4 remainders, utilize
Calculated result selects the scramble vector that hyperchaotic system generates, and obtains the ranks scramble vector of the frame image, is set with this
Random vector carries out scramble to image ranks coordinate, so that the encryption to kth frame video is completed, and so on, until completing to view
The encryption of all frames in frequency.
The detailed process of decryption of video is as shown in Figure 2.Decrypting process is similar with ciphering process, is sent using video sender
Key x0,y0The each frame video of algorithm calculating, which is generated, by key stream corresponds to sum zi, pass through sum z first1With initial key
1st frame video is decrypted;Later, by the sum EG of extraction1Sum z corresponding with the 2nd frame image2Respectively to 4 remainders, benefit
The scramble vector that hyperchaotic system generates is selected with calculated result, the ranks scramble vector of the frame image is obtained, passes through
Inverse transformation is carried out to ranks scramble vector and encrypted image ranks coordinate, realizes the decryption to the 2nd frame video, and so on, by
Frame completes the decryption to video.
About distorting frame alignment:
For video present frame, there are two aspects to determine for the key used in ciphering process, first is that logistics
The key stream sumz of generationi, second is that the edge contour feature sum EG of previous frame imagei-1, therefore in decrypting process, if hair
Raw content frame distorts, Frame switch and frame deletion, then decrypting process can not be successfully progresss, the result judgement decrypted frame by frame by video
Distort the position of generation.Referring to Fig. 2, the identification of tampered position is described in detail:
1. being distorted for content frame:
In video transmitting procedure, if kth frame image by attacker's Brute Force and is distorted in video, debit is connect
It receives during video being decrypted after the video, the edge contour feature sum EG of the kth frame of extractionkIt changes, calculates
Obtained descrambled vector is incorrect, causes+1 frame of kth that can not be decrypted, to find that video distorts the position of frame.
2. for Frame switch:
If -1 frame image of kth is swapped with+1 frame image of kth in video, for kth frame video in decrypting process
For, the edge contour feature of former frame is by sum EGk-1Become sum EGk+1, the descrambled vector being calculated is incorrect, causes
Kth frame can not be decrypted, to find that video distorts the position of frame.
3. for frame deletion:
If kth frame image is deleted in video, in decrypting process for+1 frame video of kth, the side of former frame
Edge contour feature is by sum EGkBecome sum EGk-1, the descrambled vector being calculated is incorrect, causes+1 frame of kth that can not be solved
It is close, to find that video distorts the position of frame.
The present invention is embedded in digital watermarking relative to conventional method in video image, then the side of encrypted transmission is carried out to video
Formula, this method only need to carry out primary encryption to video, and process is more succinct;In addition, the present invention can hand over frame deletion and frame
The attack that changing attack etc. can not be discovered based on digital watermarking is detected.
The above is only a preferred embodiment of the present invention, it is noted that for the common skill of the art
For art personnel, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications
Also it should be regarded as protection scope of the present invention.
Claims (3)
1. a kind of be able to achieve the video encryption method for distorting frame alignment, which comprises the following steps:
A group key stream is generated using logistics chaotic maps, the first key as frame image encryption each in video;
Each frame picture edge characteristic is extracted, and carries out character array summation operation, as each frame image encryption
Second key;
Based on line shuffle vector and column scramble vector that hyperchaotic system is needed, scheduled line shuffle vector is selected to set with column
Random vector is to frame pattern matrix procession coordinate scramble each in video, to complete to encrypt.
2. being able to achieve the video encryption method for distorting frame alignment as described in claim 1, which is characterized in that described to each frame
Picture edge characteristic extracts, and the step of carrying out character array summation operation specifically:
Image is smoothed with opposite calculus of variations RTV, filters out texture information complicated in the noise and image in image
Later, Canny edge detection is carried out to the image after smoothing processing, obtains the edge contour character array EG of every frame imagei, meter
Calculate sumEGi, as the second key.
3. being able to achieve the video encryption method for distorting frame alignment as described in claim 1, which is characterized in that the selection is predetermined
Line shuffle vector and column scramble vector to frame pattern matrix procession coordinate scramble each in video, thus complete encryption
Step are as follows:
The corresponding first key of kth frame image the second key corresponding with -1 frame video of kth is utilized into calculating respectively to 4 remainders
As a result the line shuffle vector generated to hyperchaotic system is selected with column scramble vector, and the ranks for obtaining the kth frame image are set
Random vector carries out scramble to kth frame image ranks coordinate with the ranks scramble vector, so that the encryption to kth frame image is completed,
And so on, until completing the encryption to frames all in video.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910048638.5A CN109873696A (en) | 2019-01-18 | 2019-01-18 | It is a kind of to be able to achieve the video encryption method for distorting frame alignment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910048638.5A CN109873696A (en) | 2019-01-18 | 2019-01-18 | It is a kind of to be able to achieve the video encryption method for distorting frame alignment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109873696A true CN109873696A (en) | 2019-06-11 |
Family
ID=66917771
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910048638.5A Pending CN109873696A (en) | 2019-01-18 | 2019-01-18 | It is a kind of to be able to achieve the video encryption method for distorting frame alignment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109873696A (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102184518A (en) * | 2011-05-16 | 2011-09-14 | 重庆大学 | DICOM (Digital Imaging and Communications in Medicine) medical image encrypting and decrypting method based on edge detection |
CN102693523A (en) * | 2012-05-09 | 2012-09-26 | 华南理工大学 | Image two-grade encrypting method based on double-chaos system |
CN102571754B (en) * | 2011-12-05 | 2014-11-19 | 北京交通大学 | Method for protecting security of visualized information system |
CN106530207A (en) * | 2016-12-06 | 2017-03-22 | 南京理工大学 | Logistic chaotic mapping-based digital image encryption method |
CN106910156A (en) * | 2017-02-27 | 2017-06-30 | 东北大学 | A kind of New chaotic image encryption method with plaintext association key stream generting machanism |
CN107578399A (en) * | 2017-07-25 | 2018-01-12 | 天津大学 | Full reference image quality appraisement method based on boundary characteristic segmentation |
CN107833174A (en) * | 2017-08-11 | 2018-03-23 | 西京学院 | A kind of image encryption method based on Logistic chaos system algorithms |
CN108199823A (en) * | 2017-09-20 | 2018-06-22 | 长春理工大学 | Chaos video encryption method based on sliding encryption window |
KR20180135354A (en) * | 2017-06-12 | 2018-12-20 | 오현물류주식회사 | WMS linkage type distribution management system and distribution management method |
-
2019
- 2019-01-18 CN CN201910048638.5A patent/CN109873696A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102184518A (en) * | 2011-05-16 | 2011-09-14 | 重庆大学 | DICOM (Digital Imaging and Communications in Medicine) medical image encrypting and decrypting method based on edge detection |
CN102184518B (en) * | 2011-05-16 | 2013-11-06 | 重庆大学 | DICOM (Digital Imaging and Communications in Medicine) medical image encrypting and decrypting method based on edge detection |
CN102571754B (en) * | 2011-12-05 | 2014-11-19 | 北京交通大学 | Method for protecting security of visualized information system |
CN102693523A (en) * | 2012-05-09 | 2012-09-26 | 华南理工大学 | Image two-grade encrypting method based on double-chaos system |
CN106530207A (en) * | 2016-12-06 | 2017-03-22 | 南京理工大学 | Logistic chaotic mapping-based digital image encryption method |
CN106910156A (en) * | 2017-02-27 | 2017-06-30 | 东北大学 | A kind of New chaotic image encryption method with plaintext association key stream generting machanism |
KR20180135354A (en) * | 2017-06-12 | 2018-12-20 | 오현물류주식회사 | WMS linkage type distribution management system and distribution management method |
CN107578399A (en) * | 2017-07-25 | 2018-01-12 | 天津大学 | Full reference image quality appraisement method based on boundary characteristic segmentation |
CN107833174A (en) * | 2017-08-11 | 2018-03-23 | 西京学院 | A kind of image encryption method based on Logistic chaos system algorithms |
CN108199823A (en) * | 2017-09-20 | 2018-06-22 | 长春理工大学 | Chaos video encryption method based on sliding encryption window |
Non-Patent Citations (2)
Title |
---|
WENJUN LU ECT.: "Confidentiality-Preserving Image Search:A Comparative Study Between Homomorphic Encryption and Distance-Preserving Randomization", 《IEEE》 * |
包浩明,朱义胜: "基于多层密钥的混沌映射保密通信系统", 《电子学报》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ismail et al. | A digital image encryption algorithm based a composition of two chaotic logistic maps. | |
Subramanyan et al. | Image encryption based on AES key expansion | |
WO2017045594A1 (en) | Anti-counterfeit method | |
CN108566500A (en) | The reversible hidden method of adapting to image encrypted domain based on Hybrid Encryption mechanism | |
US20130179690A1 (en) | Method and apparatus for fast image encryption and invisible digital watermark | |
CN108322622A (en) | A kind of color digital image encryption method based on 2D-VMD and octuple hyperchaotic system | |
CN108122188B (en) | Image encryption method | |
Shifa et al. | Joint crypto-stego scheme for enhanced image protection with nearest-centroid clustering | |
Alzubi et al. | A novel chaotic map encryption methodology for image cryptography and secret communication with steganography | |
Anbarasi et al. | Secured secret color image sharing with steganography | |
Nayak et al. | A secure and efficient color image encryption scheme based on two chaotic systems and advanced encryption standard | |
CN114401351B (en) | Image encryption and decryption method based on two-dimensional fractional order chaotic mapping | |
Oravec et al. | Substitution steganography with security improved by chaotic image encryption | |
Selvaraju et al. | A method to improve the security level of ATM banking systems using AES algorithm | |
CN111597568B (en) | Image encryption method of high-dimensional fractional order complex system based on distributed time lag | |
CN113259089A (en) | Image encryption method based on combination of chaos principle and genetic algorithm | |
CN110569945B (en) | QR code encryption method based on single-intensity recording phase recovery process | |
CN110136045B (en) | Method for hiding and recovering based on mutual scrambling of two images | |
CN109873696A (en) | It is a kind of to be able to achieve the video encryption method for distorting frame alignment | |
CN109559269B (en) | Image encryption method and terminal | |
Ganavi et al. | Two-layer security of images using elliptic curve cryptography with discrete wavelet transform | |
CN109214199B (en) | Image encryption method and system and decryption method and system | |
CN107169912A (en) | A kind of improved method of Image Chaos encryption technology | |
Huma et al. | Wavelet and LSB-based encrypted watermarking approach to Hide Patient’s information in medical image | |
Bhagat et al. | Image Steganography Using Improved Algorithms to Enhance Security and Payload of Traditional LSB Substitution |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190611 |
|
WD01 | Invention patent application deemed withdrawn after publication |