CN110446105B - Video encryption and decryption method and device - Google Patents

Video encryption and decryption method and device Download PDF

Info

Publication number
CN110446105B
CN110446105B CN201910894201.3A CN201910894201A CN110446105B CN 110446105 B CN110446105 B CN 110446105B CN 201910894201 A CN201910894201 A CN 201910894201A CN 110446105 B CN110446105 B CN 110446105B
Authority
CN
China
Prior art keywords
encrypted
data
area
target
video
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910894201.3A
Other languages
Chinese (zh)
Other versions
CN110446105A (en
Inventor
何冠有
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Netease Hangzhou Network Co Ltd
Original Assignee
Netease Hangzhou Network Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Netease Hangzhou Network Co Ltd filed Critical Netease Hangzhou Network Co Ltd
Priority to CN201910894201.3A priority Critical patent/CN110446105B/en
Publication of CN110446105A publication Critical patent/CN110446105A/en
Application granted granted Critical
Publication of CN110446105B publication Critical patent/CN110446105B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/44008Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving operations for analysing video streams, e.g. detecting features or characteristics in the video stream
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4402Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving reformatting operations of video signals for household redistribution, storage or real-time display
    • H04N21/440245Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving reformatting operations of video signals for household redistribution, storage or real-time display the reformatting operation being performed only on part of the stream, e.g. a region of the image or a time segment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4405Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
    • H04N21/44055Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption by partially decrypting, e.g. decrypting a video stream that has been partially encrypted
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Television Signal Processing For Recording (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The embodiment of the invention provides a method and a device for encrypting and decrypting videos, wherein an encryption side can encrypt the area where each target to be encrypted is located in a source video, so that after the decryption side acquires the encrypted video, the decryption side can only decrypt the target to be decrypted according to the user authority of the decryption side in a matching and adapting mode, namely, the encryption of the division area of the source video is realized, each user can only decrypt the relevant area of the user, each target to be encrypted in the video can not be seen by other users in the monitoring video acquired at the place where the privacy is important, and the monitoring without dead angles can be realized while the privacy is prevented from being leaked.

Description

Video encryption and decryption method and device
Technical Field
The present invention relates to the field of image processing technologies, and in particular, to a method and an apparatus for video encryption and decryption.
Background
With the development of computer technology, the field of video monitoring is rapidly developed. The video monitoring can enable a user to acquire video images of a monitored area at any time and any place. Generally, in order to ensure that a video image in video monitoring is not randomly leaked, encryption protection can be set for a video file in video monitoring.
In the prior art, a certain decryption right is usually set for the whole video file, and when the right of a user meets the decryption right, the whole video file is decrypted.
However, in practical applications, in some scenes where privacy is important, such as a toilet, a hotel room, etc., due to the consideration of privacy protection, video monitoring equipment cannot be installed, and thus, these places where privacy is important become dead monitoring corners.
Disclosure of Invention
The embodiment of the invention provides a video encryption and decryption method and device, which can encrypt and protect partial areas in a video, so that privacy areas can be independently encrypted in a monitoring video acquired from a place with important privacy, privacy disclosure is avoided, and monitoring without dead angles can be realized.
A first aspect of an embodiment of the present invention provides a method for video encryption, including:
acquiring a source video;
identifying at least one target to be encrypted in the source video;
determining a corresponding region to be encrypted of the target to be encrypted in a source video frame;
and encrypting the area to be encrypted corresponding to the target to be encrypted to obtain the target video.
Optionally, the target to be encrypted includes a first target to be encrypted and a second target to be encrypted;
the encrypting the area to be encrypted corresponding to the target to be encrypted includes:
encrypting a first area to be encrypted corresponding to the first object to be encrypted according to a first key;
and encrypting a second area to be encrypted corresponding to the second target to be encrypted according to a second key.
Optionally, after determining the area to be encrypted corresponding to the target to be encrypted in the source video frame, the method further includes:
and writing the identification of the target to be encrypted and the position of the area to be encrypted in the source video frame into a record.
Optionally, the encrypting the area to be encrypted corresponding to the target to be encrypted to obtain the target video includes:
for each area to be encrypted, encrypting data corresponding to the area to be encrypted to obtain encrypted data;
under the condition that the encrypted data is larger than the data corresponding to the area to be encrypted, replacing the data corresponding to the area to be encrypted in the source video with first data in the encrypted data, and writing second data in the encrypted data into the record to obtain a target video comprising the record; the size of the first data is equal to the size of the data corresponding to the area to be encrypted, and the second data is the data remaining in the encrypted data except the first data.
Optionally, the encrypting the data corresponding to the area to be encrypted includes:
extracting data corresponding to the area to be encrypted;
arranging the data corresponding to the area to be encrypted into a byte array of a continuous memory;
and encrypting the byte array by adopting an encryption algorithm.
Optionally, the target to be encrypted is a human face.
A second aspect of the embodiments of the present invention provides a method for video decryption, including:
acquiring a target video, wherein the target video comprises encrypted data; the encrypted data is: encrypting data corresponding to an area to be encrypted of a source video frame, wherein the area to be encrypted at least comprises an area where a target to be encrypted in the source video is located;
determining a target to be decrypted and a region of the target to be decrypted in the target video according to the user authority;
and decrypting the data corresponding to the area to be decrypted.
Optionally, the target video further includes a record, where the record includes an identifier of the object to be encrypted and a position of the area to be encrypted in a source video frame;
the determining of the target to be decrypted according to the user authority and the region of the target to be decrypted in the target video comprises the following steps:
and determining a target to be decrypted and a region of the target to be decrypted in the target video according to the user identifier and the recorded identifier of the object to be encrypted.
Optionally, the encrypted data includes at least one first data; for each area to be encrypted, the first data is: and in the data obtained after encrypting the data corresponding to the area to be encrypted, the data size is equal to the data size corresponding to the area to be encrypted in the source video.
Optionally, the record further comprises at least one second data; for each of the areas to be encrypted, the second data is: and encrypting the data corresponding to the area to be encrypted to obtain the remaining data except the first data.
Optionally, decrypting the data corresponding to the area to be decrypted includes:
splicing the first data corresponding to the area to be decrypted with the second data corresponding to the area to be decrypted to obtain a continuous byte array;
decrypting the byte array by adopting a decryption algorithm;
and writing the decrypted byte data into the target video.
Optionally, after decrypting the data corresponding to the area to be decrypted, the method further includes:
playing the decrypted video and/or storing the decrypted video.
Optionally, the target to be encrypted is a human face.
A third aspect of the embodiments of the present invention provides a video encryption apparatus, including:
the source video acquisition module is used for acquiring a source video;
the identification module is used for identifying at least one target to be encrypted in the source video;
the device comprises a to-be-encrypted area determining module, a to-be-encrypted area determining module and a to-be-encrypted area determining module, wherein the to-be-encrypted area determining module is used for determining a corresponding to-be-encrypted area of the to-be-encrypted target in a source video frame;
and the target video obtaining module is used for encrypting the area to be encrypted corresponding to the target to be encrypted to obtain the target video.
Optionally, the target to be encrypted includes a first target to be encrypted and a second target to be encrypted;
the target video obtaining module is specifically configured to:
encrypting a first area to be encrypted corresponding to the first object to be encrypted according to a first key;
and encrypting a second area to be encrypted corresponding to the second target to be encrypted according to a second key.
Optionally, the method further includes:
and the recording module is used for writing the identifier of the target to be encrypted and the position of the area to be encrypted in the source video frame into a record.
Optionally, the target video obtaining module is further specifically configured to:
for each area to be encrypted, encrypting data corresponding to the area to be encrypted to obtain encrypted data;
under the condition that the encrypted data is larger than the data corresponding to the area to be encrypted, replacing the data corresponding to the area to be encrypted in the source video with first data in the encrypted data, and writing second data in the encrypted data into the record to obtain a target video comprising the record; the size of the first data is equal to the size of the data corresponding to the area to be encrypted, and the second data is the data remaining in the encrypted data except the first data.
Optionally, the target video obtaining module is further specifically configured to:
extracting data corresponding to the area to be encrypted;
arranging the data corresponding to the area to be encrypted into a byte array of a continuous memory;
and encrypting the byte array by adopting an encryption algorithm.
Optionally, the target to be encrypted is a human face.
A fourth aspect of the embodiments of the present invention provides a video decryption apparatus, including:
the target video acquisition module is used for acquiring a target video, and the target video comprises encrypted data; the encrypted data is: encrypting data corresponding to an area to be encrypted of a source video frame, wherein the area to be encrypted at least comprises an area where a target to be encrypted in the source video is located; (ii) a
The device comprises a to-be-decrypted region determining module, a to-be-decrypted region determining module and a to-be-decrypted region determining module, wherein the to-be-decrypted region determining module is used for determining a to-be-decrypted target and the to-be-decrypted region of the to-be-decrypted target in a target video according to user authority;
and the decryption module is used for decrypting the data corresponding to the area to be decrypted.
Optionally, the target video further includes a record, where the record includes an identifier of the object to be encrypted and a position of the area to be encrypted in a source video frame;
the to-be-decrypted area determining module is specifically configured to:
and determining a target to be decrypted and a region of the target to be decrypted in the target video according to the user identifier and the recorded identifier of the object to be encrypted.
Optionally, the encrypted data includes at least one first data; for each area to be encrypted, the first data is: and in the data obtained after encrypting the data corresponding to the area to be encrypted, the data size is equal to the data size corresponding to the area to be encrypted in the source video.
Optionally, the record further comprises at least one second data; for each of the areas to be encrypted, the second data is: and encrypting the data corresponding to the area to be encrypted to obtain the remaining data except the first data.
Optionally, the decryption module is specifically configured to:
splicing the first data corresponding to the area to be decrypted with the second data corresponding to the area to be decrypted to obtain a continuous byte array;
decrypting the byte array by adopting a decryption algorithm;
and writing the decrypted byte data into the target video.
Optionally, the method further includes:
and the processing module is used for playing the decrypted video and/or storing the decrypted video.
Optionally, the target to be encrypted is a human face.
A fifth aspect of an embodiment of the present invention provides an electronic device, including: a processor, a memory, and a computer program; wherein the computer program is stored in the memory and configured to be executed by the processor, the computer program comprising instructions for performing the method of any of the preceding first or second aspects.
A sixth aspect of embodiments of the present invention provides a computer-readable storage medium, which stores a computer program that, when executed, implements a method according to any one of the first or second aspects.
Compared with the prior art, the embodiment of the invention has the following beneficial effects:
the embodiment of the invention provides a video encryption and decryption method and device, wherein an encryption side can encrypt the area where each target to be encrypted is located in a source video, so that after the decryption side acquires the encrypted video, the decryption side can only decrypt the target to be decrypted according to the user authority of the decryption side in a matching and adapting mode, namely, the encryption of the division area of the source video is realized, each user can only decrypt the relevant area of the user, each target to be encrypted in the video can not be seen by other users in the monitoring video acquired at the place where the privacy is important, and the monitoring without dead angles can be realized while the privacy is prevented from being leaked. Specifically, the encryption side may identify at least one target to be encrypted in the source video after obtaining the source video, determine a region to be encrypted corresponding to the target to be encrypted in a source video frame, and encrypt the region to be encrypted corresponding to the target to be encrypted to obtain the target video. Adaptively, after a target video including encrypted data is acquired at a decryption side, determining a target to be decrypted and a region to be decrypted of the target to be decrypted in the target video according to user authority; and decrypting the data corresponding to the area to be decrypted to obtain the video content matched with the user authority.
Drawings
Fig. 1 is a schematic flowchart of a video encryption method according to an embodiment of the present invention;
fig. 2 is a schematic view of an interface for recognizing a human face according to an embodiment of the present invention;
fig. 3 is a schematic view of an interface for encrypting a face according to an embodiment of the present invention;
fig. 4 is a flowchart illustrating a method for video decryption according to an embodiment of the present invention;
FIG. 5 is a schematic diagram of an interface for decrypting a face according to an embodiment of the present invention;
FIG. 6 is a schematic structural diagram of a video encryption apparatus according to the present invention;
fig. 7 is a schematic structural diagram of a video decryption apparatus according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
It should be understood that the described embodiments are only some embodiments of the invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terminology used in the embodiments of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the examples of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be understood that the term "and/or" as used herein is merely one type of association that describes an associated object, meaning that three relationships may exist, e.g., a and/or B may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
It is to be understood that the terms "first," "second," "third," "fourth," and the like (if any) in the description and claims of this invention and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order.
The words "if", as used herein, may be interpreted as "at … …" or "at … …" or "in response to a determination" or "in response to a detection", depending on the context. Similarly, the phrases "if determined" or "if detected (a stated condition or event)" may be interpreted as "when determined" or "in response to a determination" or "when detected (a stated condition or event)" or "in response to a detection (a stated condition or event)", depending on the context.
It is also noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a good or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such good or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a commodity or system that includes the element.
The embodiment of the invention provides a video encryption and decryption method and device, wherein an encryption side can encrypt the area where each target to be encrypted is located in a source video, so that after the decryption side acquires the encrypted video, the decryption side can only decrypt the target to be decrypted according to the user authority of the decryption side in a matching and adapting mode, namely, the encryption of the division area of the source video is realized, each user can only decrypt the relevant area of the user, each target to be encrypted in the video can not be seen by other users in the monitoring video acquired at the place where the privacy is important, and the monitoring without dead angles can be realized while the privacy is prevented from being leaked. Specifically, the encryption side may identify at least one target to be encrypted in the source video after obtaining the source video, determine a region to be encrypted corresponding to the target to be encrypted in a source video frame, and encrypt the region to be encrypted corresponding to the target to be encrypted to obtain the target video. Adaptively, after a target video including encrypted data is acquired at a decryption side, determining a target to be decrypted and a region to be decrypted of the target to be decrypted in the target video according to user authority; and decrypting the data corresponding to the area to be decrypted to obtain the video content matched with the user authority.
The video encryption method of the embodiment of the invention can be applied to a terminal, and the terminal can comprise: electronic equipment such as cell-phone, panel computer, notebook computer, supervisory equipment.
The video decryption method of the embodiment of the invention can be applied to a terminal, and the terminal can comprise: electronic equipment such as a mobile phone, a tablet computer, a notebook computer, a desktop computer or a server.
The source video described in the embodiment of the present invention may be a video file or a video stream recorded by using a camera or other image capturing devices.
The embodiment of the invention can be applied to a scene of real-time monitoring, wherein a source video is a monitoring video, the encryption and decryption algorithm of the embodiment of the invention can be carried out while recording the monitoring video in the process of acquiring the monitoring video by monitoring equipment, the content displayed in real time by a monitoring picture is related to the authority of a user managing the monitoring picture, and for example, an object to be encrypted is taken as a face. Or if the user account does not have the viewing right for any object, the encrypted video is displayed in the monitoring picture, and at least all faces in the decrypted video cannot be displayed.
The embodiment of the invention can be applied to the scene of processing the video file in the later period, for example, the existing video file can be processed according to the encryption method of the embodiment of the invention, and the encrypted video can be subsequently decrypted by adopting the decryption method of the embodiment of the invention. The embodiment of the invention does not limit the specific application scenes.
Some embodiments of the invention are described in detail below with reference to the accompanying drawings. The embodiments described below and the features of the embodiments can be combined with each other without conflict.
As shown in fig. 1, fig. 1 is a schematic flowchart of a video encryption method according to an embodiment of the present invention.
The method specifically comprises the following steps:
step S101: a source video is acquired.
In the embodiment of the present invention, the source video may be recorded in real time at the compression side, or may be acquired from a local or network side at the compression side, which is not specifically limited in the implementation of the present invention.
When the source video is acquired from the local or network side, the identifier corresponding to the source video may be input according to a requirement, so as to acquire the source video, or the source video may be randomly acquired, which is not specifically limited in the embodiment of the present invention.
Step S102: and identifying at least one target to be encrypted in the source video.
In the embodiment of the present invention, the target to be encrypted may be set according to an actual application scenario, for example, the target to be encrypted may include: the embodiment of the invention does not specifically limit the target to be encrypted, such as the human face, the sensitive part of the human body, or the whole human body.
In the embodiment of the present invention, any image recognition technology may be adopted to recognize at least one target to be encrypted in the source video, and the specific method for recognition is not specifically limited in the embodiment of the present invention.
Step S103: and determining a corresponding area to be encrypted of the target to be encrypted in a source video frame.
In the embodiment of the invention, for each frame of video frame in the source video, the area to be encrypted in the video frame at least comprises the area where the object to be encrypted in the video frame is located, so that the area where the object to be encrypted is located can not be displayed after the area to be encrypted is encrypted.
It can be understood that there may be one or more targets to be encrypted in the video frame, and each target to be encrypted may correspond to different objects, for example, the target to be encrypted may be a target containing privacy content, and taking the target to be encrypted as a face as an example, in this embodiment of the present application, an area corresponding to each face may be determined as an area to be encrypted.
Step S104: and encrypting the area to be encrypted corresponding to the target to be encrypted to obtain the target video.
In the embodiment of the present invention, when the area to be encrypted corresponding to the target to be encrypted is encrypted, the specific content of the encryption algorithm may be set according to the actual application scenario.
In an optional implementation manner of the embodiment of the present invention, the target to be encrypted includes a first target to be encrypted and a second target to be encrypted; the encrypting the area to be encrypted corresponding to the target to be encrypted includes: encrypting a first area to be encrypted corresponding to the first object to be encrypted according to a first key; and encrypting a second area to be encrypted corresponding to the second target to be encrypted according to a second key.
In the embodiment of the present invention, specific contents of the first key and the second key may be determined according to an actual application scenario, which is not specifically limited in the embodiment of the present invention. In the embodiment of the invention, different encryption modes are adopted for different targets to be encrypted, so that in subsequent decryption, a user can only secrete part of the target area according to the authority.
For example, if there are multiple faces in the source video, different encryption keys may be used when encrypting the multiple faces, for example, different keys are used for face a and face B, so that the content in the face B area cannot be decrypted by using the key of face a when decrypting, and thus independent encryption of each person can be achieved.
As an optional implementation manner of the embodiment of the present invention, after determining the area to be encrypted corresponding to the target to be encrypted in the source video frame, the method further includes: and writing the identification of the target to be encrypted and the position of the area to be encrypted in the source video frame into a record.
In the embodiment of the invention, the identifier of the target to be encrypted included in each area to be encrypted and the position of each area to be encrypted in the source video frame are written into the record, so that during subsequent decryption, the corresponding decryption area can be determined according to the identifier of the target to be encrypted in the record and the position of each area to be encrypted in the source video frame.
For example, taking an object to be encrypted as a face as an example, the face in a source video frame may be identified according to a face identification algorithm, and an area corresponding to the identified face may be determined as an area to be encrypted. The embodiment of the invention does not limit the specific implementation of the face recognition. In the process of face recognition, the face can be further divided, for example, the face of the person a is usually different from the face of the person B, so that different identifications can be set for different faces, each identification can uniquely identify one face, and therefore, in the subsequent decryption process, a corresponding decryption area can be determined according to the identification of the face.
For example, as shown in fig. 2, in a frame of video image, a face a and a face B in the frame of video image may be segmented by using a deep learning technique, and the position of each face is recorded in a record, where the record R is: r [ 'a' { 'x0':354, 'y0':8, 'x1':570, 'y1':300}, 'B' { 'x0':790, 'y0':172, 'x1':990, 'y1':460} ]; wherein { 'x0':354, 'y0':8, 'x1':570, 'y1':300} is the position information of the face a, and { 'x0':790, 'y0':172, 'x1':990, 'y1':460} is the position information of the face B. It can be understood that the dashed-line block diagram in fig. 2 is used to illustrate the recognized face, and in practical application, the block diagram may be used to calibrate the face; or the face can be calibrated without adopting a block diagram, and only the face and the position of the face are identified.
As an optional implementation manner of the embodiment of the present invention, the encrypting the area to be encrypted corresponding to the target to be encrypted to obtain the target video includes: for each area to be encrypted, encrypting data corresponding to the area to be encrypted to obtain encrypted data; under the condition that the encrypted data is larger than the data corresponding to the area to be encrypted, replacing the data corresponding to the area to be encrypted in the source video with first data in the encrypted data, and writing second data in the encrypted data into the record to obtain a target video comprising the record; the size of the first data is equal to the size of the data corresponding to the area to be encrypted, and the second data is the data remaining in the encrypted data except the first data.
In the embodiment of the present invention, in consideration of the fact that there is a high possibility that data before and after encryption is inconsistent, for example, in the case of asymmetric encryption, since there is message redundancy, the encrypted data is generally larger than the data before encryption, and if the encrypted data is larger, the encrypted data cannot be completely written back to the original video area (because the amount of data that can be loaded in one area is determined, the data cannot be larger or smaller), therefore, first data having the same size as that of the original area in the encrypted data can be written into the area to be encrypted in the source video, data corresponding to the area to be encrypted in the source video can be replaced, and second data other than the first data can be written into the record in a certain format.
It can be understood that if the encrypted data has the same size as the data before encryption, the encrypted data can be used to directly replace the data before encryption without additionally writing data in the record.
As an optional specific implementation manner of the embodiment of the present invention, the encrypting the data corresponding to the area to be encrypted includes: extracting data corresponding to the area to be encrypted; arranging the data corresponding to the area to be encrypted into a byte array of a continuous memory; and encrypting the byte array by adopting an encryption algorithm.
In the embodiment of the present invention, taking an object to be encrypted as a face as an example, a pair of a public key and a private key may be generated for each face, then the Advanced Encryption Standard (AES) is used to encrypt the face a and the face B, which are enclosed by dotted lines in fig. 2, respectively, and then the face a and the face B are written back to an original video frame, the effect of the encrypted video frame may be as shown in fig. 3, and an area corresponding to the face a and an area corresponding to the face B cannot be displayed normally. It can be understood that a mosaic, advertisement information, or any other information different from the face a and the face B may also be displayed in the region corresponding to the face a and the region corresponding to the face B, which is not specifically limited in this embodiment of the present invention. It should be noted that, in practical applications, because AES requires 16 bytes (Byte) alignment, when AES encryption is used, the pixel points in the dashed frame are integer multiples of 16 bytes.
In the specific implementation of the embodiment of the present invention, after the data corresponding to the area to be encrypted is extracted, the data corresponding to the area to be encrypted is arranged into a byte array (bytes array) of the continuous memory, and the byte array is encrypted by using the vector vec and the key in the AES secret, it can be understood that the vector vec and the key can also be stored in the record, so as to facilitate the subsequent decryption.
In an optional implementation manner of the embodiment of the present invention, considering that the record R is available to all users, some sensitive data (such as a symmetrically encrypted vector and a key) in the record R or the record R may also be encrypted and stored in the target video, so as to prevent leakage of the sensitive data in the record. It is understood that the key for decrypting the record R or some sensitive data in the record R may be issued to the decryption side separately.
In summary, the encryption side can encrypt the area where each target to be encrypted in the source video is located, so that the decryption side can only decrypt the target to be decrypted according to the user permission matching adaptation of the decryption side after acquiring the encrypted video, that is, the source video segmentation area encryption is realized, each user can only decrypt the relevant area, so that in the monitoring video acquired at the place where the privacy is important, each target to be encrypted can not be seen by other users in the video, and no dead angle in monitoring can be realized while avoiding the privacy disclosure. Specifically, the encryption side may identify at least one target to be encrypted in the source video after obtaining the source video, determine a region to be encrypted corresponding to the target to be encrypted in a source video frame, and encrypt the region to be encrypted corresponding to the target to be encrypted to obtain the target video. Adaptively, after a target video including encrypted data is acquired at a decryption side, determining a target to be decrypted and a region to be decrypted of the target to be decrypted in the target video according to user authority; and decrypting the data corresponding to the area to be decrypted to obtain the video content matched with the user authority.
As shown in fig. 4, fig. 4 is a flowchart illustrating a video decryption method according to an embodiment of the present invention.
The method specifically comprises the following steps:
step S201: acquiring a target video, wherein the target video comprises encrypted data; the encrypted data is: the method comprises the steps that data corresponding to an area to be encrypted of a source video frame are encrypted, and the area to be encrypted at least comprises an area where a target to be encrypted in a source video is located.
In this embodiment of the present invention, the decompression side may obtain the target video from the local or network side, for example, the decompression side may obtain the target video from the local or network side according to the identifier corresponding to the target video, or may randomly obtain the target video, which is not specifically limited in this embodiment of the present invention.
The specific content and the obtaining manner of the target video encrypted data may refer to the description of the embodiment corresponding to fig. 1, and are not described herein again.
Step S202: and determining a target to be decrypted and a region of the target to be decrypted in the target video according to the user authority.
In the embodiment of the application, the user right may be related to a user identifier, and the user identifier may be a face identifier of the user or an identifier of another user associated with the user. For example, in a scenario of real-time monitoring in a kindergarten, a user may be a parent, and the parent may register with a manager of the kindergarten monitoring and then view the real-time monitoring through a network. The monitoring system acquires the face identification of the child corresponding to the parent according to the account of the parent, then matches the face identification of the child in the record, and determines the face of the child as a target to be decrypted and a region to be decrypted of the target to be decrypted in each frame of video image in the target video. After decryption, the parents can only see the faces of the children in the decrypted video, and other faces cannot be seen, so that the parents can know the safety conditions of the children at any time, and the privacy of other children can be prevented from being revealed.
In a specific application, a root user may also exist, and the root user is a super administrator in the system and has the authority equivalent to that of the operating system. For root user decryption, all encrypted targets included in the target video can be determined as targets to be decrypted, and then all targets to be decrypted in the target video can be decrypted to obtain a completely displayed video file.
Step S203: and decrypting the data corresponding to the area to be decrypted.
In the embodiment of the present invention, when decrypting data in the decryption area, the decryption algorithm corresponds to the encryption algorithm, and the decryption algorithm is not specifically limited in the embodiment of the present invention.
As an optional implementation manner of the embodiment of the present invention, the target video further includes a record, where the record includes an identifier of the object to be encrypted and a position of the area to be encrypted in a source video frame; the determining of the target to be decrypted according to the user authority and the region of the target to be decrypted in the target video comprises the following steps: and determining a target to be decrypted and a region of the target to be decrypted in the target video according to the user identifier and the recorded identifier of the object to be encrypted.
For example, in the embodiment corresponding to fig. 1, the AES encryption is used as an example, and when decrypting, the encrypted data includes at least one first data; for each area to be encrypted, the first data is: in data obtained after encrypting the data corresponding to the area to be encrypted, the data size is equal to the data size corresponding to the area to be encrypted in the source video; the record further comprises at least one second data; for each of the areas to be encrypted, the second data is: and encrypting the data corresponding to the area to be encrypted to obtain the remaining data except the first data. The decrypting the data corresponding to the area to be decrypted includes: splicing the first data corresponding to the area to be decrypted with the second data corresponding to the area to be decrypted to obtain a continuous byte array; decrypting the byte array by adopting a decryption algorithm; and writing the decrypted byte data into the target video.
In the embodiment of the present invention, for example, after matching is performed in a record according to a user identifier, determining that a target face is a face B, obtaining a private key corresponding to the face B through a secure channel (such as an encrypted network), obtaining a key and a vec used in an encryption algorithm according to the record R, for each frame image, splicing first data corresponding to a face B region and second data recorded in the record by the face B, arranging the spliced data into a continuous byte array, decrypting the byte array according to the key and the vec, and writing the decrypted byte data into a target video, so that a decrypted video file can be obtained, where fig. 5 shows a display effect of the decrypted video image, the face B can be normally displayed, but the face a cannot be normally displayed.
As an optional implementation manner of the embodiment of the present invention, after decrypting the data corresponding to the to-be-decrypted region, the method further includes: playing the decrypted video and/or storing the decrypted video.
In the embodiment of the present invention, the decrypted video may be played, or the decrypted video may be stored, or the decrypted video may be played and decrypted according to an actual requirement, which is not specifically limited in the embodiment of the present invention.
In summary, the embodiments of the present invention provide a method and an apparatus for video encryption and decryption, where an encryption side may encrypt an area where each target to be encrypted in a source video is located, so that after obtaining an encrypted video, a decryption side can only decrypt the target to be decrypted according to user permission matching adaptation of the decryption side, that is, encryption of a source video partition area is achieved, and each user can only decrypt its own related area, so that in a surveillance video obtained in a place where privacy is important, each target to be encrypted in the video may not be seen by other users, and while avoiding privacy disclosure, monitoring without dead angles may be achieved. Specifically, the encryption side may identify at least one target to be encrypted in the source video after obtaining the source video, determine a region to be encrypted corresponding to the target to be encrypted in a source video frame, and encrypt the region to be encrypted corresponding to the target to be encrypted to obtain the target video. Adaptively, after a target video including encrypted data is acquired at a decryption side, determining a target to be decrypted and a region to be decrypted of the target to be decrypted in the target video according to user authority; and decrypting the data corresponding to the area to be decrypted to obtain the video content matched with the user authority.
Fig. 6 is a schematic structural diagram of an embodiment of a video encryption apparatus according to the present invention. As shown in fig. 6, the apparatus provided in this embodiment includes:
a source video acquiring module 31, configured to acquire a source video;
the identification module 32 is used for identifying at least one target to be encrypted in the source video;
a to-be-encrypted region determining module 33, configured to determine a to-be-encrypted region corresponding to the to-be-encrypted target in a source video frame;
and a target video obtaining module 34, configured to encrypt the area to be encrypted corresponding to the target to be encrypted, so as to obtain a target video.
Optionally, the target to be encrypted includes a first target to be encrypted and a second target to be encrypted;
the target video obtaining module is specifically configured to:
encrypting a first area to be encrypted corresponding to the first object to be encrypted according to a first key;
and encrypting a second area to be encrypted corresponding to the second target to be encrypted according to a second key.
Optionally, the method further includes:
and the recording module is used for writing the identifier of the target to be encrypted and the position of the area to be encrypted in the source video frame into a record.
Optionally, the target video obtaining module is further specifically configured to:
for each area to be encrypted, encrypting data corresponding to the area to be encrypted to obtain encrypted data;
under the condition that the encrypted data is larger than the data corresponding to the area to be encrypted, replacing the data corresponding to the area to be encrypted in the source video with first data in the encrypted data, and writing second data in the encrypted data into the record to obtain a target video comprising the record; the size of the first data is equal to the size of the data corresponding to the area to be encrypted, and the second data is the data remaining in the encrypted data except the first data.
Optionally, the target video obtaining module is further specifically configured to:
extracting data corresponding to the area to be encrypted;
arranging the data corresponding to the area to be encrypted into a byte array of a continuous memory;
and encrypting the byte array by adopting an encryption algorithm.
Optionally, the target to be encrypted is a human face.
In summary, the embodiments of the present invention provide a method and an apparatus for video encryption and decryption, where an encryption side may encrypt an area where each target to be encrypted in a source video is located, so that after obtaining an encrypted video, a decryption side can only decrypt the target to be decrypted according to user permission matching adaptation of the decryption side, that is, encryption of a source video partition area is achieved, and each user can only decrypt its own related area, so that in a surveillance video obtained in a place where privacy is important, each target to be encrypted in the video may not be seen by other users, and while avoiding privacy disclosure, monitoring without dead angles may be achieved. Specifically, the encryption side may identify at least one target to be encrypted in the source video after obtaining the source video, determine a region to be encrypted corresponding to the target to be encrypted in a source video frame, and encrypt the region to be encrypted corresponding to the target to be encrypted to obtain the target video. Adaptively, after a target video including encrypted data is acquired at a decryption side, determining a target to be decrypted and a region to be decrypted of the target to be decrypted in the target video according to user authority; and decrypting the data corresponding to the area to be decrypted to obtain the video content matched with the user authority.
Fig. 7 is a schematic structural diagram of an apparatus for video decryption according to an embodiment of the present invention. As shown in fig. 7, the apparatus provided in this embodiment includes:
a target video obtaining module 41, configured to obtain a target video, where the target video includes encrypted data; the encrypted data is: encrypting data corresponding to an area to be encrypted of a source video frame, wherein the area to be encrypted at least comprises an area where a target to be encrypted in the source video is located; (ii) a
A to-be-decrypted region determining module 42, configured to determine, according to a user right, a to-be-decrypted target and a to-be-decrypted region of the to-be-decrypted target in the target video;
and the decryption module 43 is configured to decrypt the data corresponding to the area to be decrypted.
Optionally, the target video further includes a record, where the record includes an identifier of the object to be encrypted and a position of the area to be encrypted in a source video frame;
the to-be-decrypted area determining module is specifically configured to:
and determining a target to be decrypted and a region of the target to be decrypted in the target video according to the user identifier and the recorded identifier of the object to be encrypted.
Optionally, the encrypted data includes at least one first data; for each area to be encrypted, the first data is: and in the data obtained after encrypting the data corresponding to the area to be encrypted, the data size is equal to the data size corresponding to the area to be encrypted in the source video.
Optionally, the record further comprises at least one second data; for each of the areas to be encrypted, the second data is: and encrypting the data corresponding to the area to be encrypted to obtain the remaining data except the first data.
Optionally, the decryption module is specifically configured to:
splicing the first data corresponding to the area to be decrypted with the second data corresponding to the area to be decrypted to obtain a continuous byte array;
decrypting the byte array by adopting a decryption algorithm;
and writing the decrypted byte data into the target video.
Optionally, the method further includes:
and the processing module is used for playing the decrypted video and/or storing the decrypted video.
Optionally, the target to be encrypted is a human face.
In summary, the embodiments of the present invention provide a method and an apparatus for video encryption and decryption, where an encryption side may encrypt an area where each target to be encrypted in a source video is located, so that after obtaining an encrypted video, a decryption side can only decrypt the target to be decrypted according to user permission matching adaptation of the decryption side, that is, encryption of a source video partition area is achieved, and each user can only decrypt its own related area, so that in a surveillance video obtained in a place where privacy is important, each target to be encrypted in the video may not be seen by other users, and while avoiding privacy disclosure, monitoring without dead angles may be achieved. Specifically, the encryption side may identify at least one target to be encrypted in the source video after obtaining the source video, determine a region to be encrypted corresponding to the target to be encrypted in a source video frame, and encrypt the region to be encrypted corresponding to the target to be encrypted to obtain the target video. Adaptively, after a target video including encrypted data is acquired at a decryption side, determining a target to be decrypted and a region to be decrypted of the target to be decrypted in the target video according to user authority; and decrypting the data corresponding to the area to be decrypted to obtain the video content matched with the user authority.
The video encryption and decryption apparatus provided in the embodiments of the present invention can be used to execute the methods shown in the corresponding embodiments, and the implementation manner and principle thereof are the same, and are not described again.
An embodiment of the present invention further provides an electronic device, including: a processor, a memory, and a computer program; wherein the computer program is stored in the memory and configured to be executed by the processor, the computer program comprising instructions for performing the method of any of the preceding embodiments.
Embodiments of the present invention also provide a computer-readable storage medium, which stores a computer program, and when the computer program is executed, the computer program implements the method according to any one of the foregoing embodiments.
Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (14)

1. A method of video encryption, the method comprising:
acquiring a source video;
identifying at least one target to be encrypted in the source video;
determining a corresponding region to be encrypted of the target to be encrypted in a source video frame;
encrypting the area to be encrypted corresponding to the target to be encrypted to obtain a target video;
the encrypting the area to be encrypted corresponding to the object to be encrypted to obtain the object video comprises:
for each area to be encrypted, encrypting data corresponding to the area to be encrypted to obtain encrypted data;
under the condition that the encrypted data is larger than the data corresponding to the area to be encrypted, replacing the data corresponding to the area to be encrypted in the source video with first data in the encrypted data, and writing second data in the encrypted data into a record to obtain a target video comprising the record; the size of the first data is equal to the size of the data corresponding to the area to be encrypted, and the second data is the data remaining in the encrypted data except the first data.
2. The method according to claim 1, wherein the objects to be encrypted include a first object to be encrypted and a second object to be encrypted;
the encrypting the area to be encrypted corresponding to the target to be encrypted includes:
encrypting a first area to be encrypted corresponding to the first object to be encrypted according to a first key;
and encrypting a second area to be encrypted corresponding to the second target to be encrypted according to a second key.
3. The method according to claim 2, wherein after determining the corresponding region to be encrypted of the target to be encrypted in the source video frame, further comprising:
and writing the identification of the target to be encrypted and the position of the area to be encrypted in the source video frame into a record.
4. The method according to claim 1, wherein the encrypting the data corresponding to the area to be encrypted comprises:
extracting data corresponding to the area to be encrypted;
arranging the data corresponding to the area to be encrypted into a byte array of a continuous memory;
and encrypting the byte array by adopting an encryption algorithm.
5. The method according to any one of claims 1 to 4, wherein the object to be encrypted is a human face.
6. A method for video decryption, the method comprising:
acquiring a target video, wherein the target video comprises encrypted data; the encrypted data is: encrypting data corresponding to an area to be encrypted of a source video frame, wherein the area to be encrypted at least comprises an area where a target to be encrypted in the source video is located;
determining a target to be decrypted and a region of the target to be decrypted in the target video according to the user authority; decrypting the data corresponding to the area to be decrypted;
the encrypted data comprises at least one first data; for each area to be encrypted, the first data is: in data obtained after encrypting the data corresponding to the area to be encrypted, the data size is equal to the data size corresponding to the area to be encrypted in the source video;
the record further comprises at least one second data; for each of the areas to be encrypted, the second data is: and encrypting the data corresponding to the area to be encrypted to obtain the remaining data except the first data.
7. The method of claim 6, wherein the target video further comprises a record, wherein the record comprises an identification of the object to be encrypted and a location of the area to be encrypted in a source video frame;
the determining of the target to be decrypted according to the user authority and the region of the target to be decrypted in the target video comprises the following steps:
and determining a target to be decrypted and a region of the target to be decrypted in the target video according to the user identifier and the recorded identifier of the object to be encrypted.
8. The method according to claim 7, wherein decrypting the data corresponding to the area to be decrypted comprises:
splicing the first data corresponding to the area to be decrypted with the second data corresponding to the area to be decrypted to obtain a continuous byte array;
decrypting the byte array by adopting a decryption algorithm;
and writing the decrypted byte data into the target video.
9. The method according to any one of claims 6 to 8, wherein after decrypting the data corresponding to the area to be decrypted, the method further comprises:
playing the decrypted video and/or storing the decrypted video.
10. The method according to any one of claims 6 to 8, wherein the object to be encrypted is a human face.
11. An apparatus for video encryption, comprising:
the source video acquisition module is used for acquiring a source video;
the identification module is used for identifying at least one target to be encrypted in the source video;
the device comprises a to-be-encrypted area determining module, a to-be-encrypted area determining module and a to-be-encrypted area determining module, wherein the to-be-encrypted area determining module is used for determining a corresponding to-be-encrypted area of the to-be-encrypted target in a source video frame;
the target video obtaining module is used for encrypting the area to be encrypted corresponding to the target to be encrypted to obtain a target video;
the target video obtaining module is specifically configured to encrypt, for each to-be-encrypted area, data corresponding to the to-be-encrypted area to obtain encrypted data;
under the condition that the encrypted data is larger than the data corresponding to the area to be encrypted, replacing the data corresponding to the area to be encrypted in the source video with first data in the encrypted data, and writing second data in the encrypted data into a record to obtain a target video comprising the record; the size of the first data is equal to the size of the data corresponding to the area to be encrypted, and the second data is the data remaining in the encrypted data except the first data.
12. An apparatus for video decryption, comprising:
the target video acquisition module is used for acquiring a target video, and the target video comprises encrypted data; the encrypted data is: encrypting data corresponding to an area to be encrypted of a source video frame, wherein the area to be encrypted at least comprises an area where a target to be encrypted in the source video is located; the device comprises a to-be-decrypted region determining module, a to-be-decrypted region determining module and a to-be-decrypted region determining module, wherein the to-be-decrypted region determining module is used for determining a to-be-decrypted target and the to-be-decrypted region of the to-be-decrypted target in a target video according to user authority;
the decryption module is used for decrypting the data corresponding to the area to be decrypted;
the encrypted data comprises at least one first data; for each area to be encrypted, the first data is: in data obtained after encrypting the data corresponding to the area to be encrypted, the data size is equal to the data size corresponding to the area to be encrypted in the source video;
the record further comprises at least one second data; for each of the areas to be encrypted, the second data is: and encrypting the data corresponding to the area to be encrypted to obtain the remaining data except the first data.
13. An electronic device, comprising:
a processor, a memory, and a computer program; wherein the computer program is stored in the memory and configured to be executed by the processor, the computer program comprising instructions for performing the method of any of claims 1-5; or, the computer program comprises instructions for performing the method of any of claims 6-10.
14. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which, when executed, implements the method of any of claims 1-5, or which, when executed, implements the method of any of claims 6-10.
CN201910894201.3A 2019-09-20 2019-09-20 Video encryption and decryption method and device Active CN110446105B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910894201.3A CN110446105B (en) 2019-09-20 2019-09-20 Video encryption and decryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910894201.3A CN110446105B (en) 2019-09-20 2019-09-20 Video encryption and decryption method and device

Publications (2)

Publication Number Publication Date
CN110446105A CN110446105A (en) 2019-11-12
CN110446105B true CN110446105B (en) 2021-11-16

Family

ID=68440588

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910894201.3A Active CN110446105B (en) 2019-09-20 2019-09-20 Video encryption and decryption method and device

Country Status (1)

Country Link
CN (1) CN110446105B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111083424B (en) * 2019-11-25 2023-04-07 视联动力信息技术股份有限公司 Audio and video encryption transmission method and device, electronic equipment and storage medium
EP4040319B1 (en) 2021-02-09 2022-12-14 Axis AB Devices and methods for safe storage of media containing personal data and erasure of stored personal data
CN112800454B (en) * 2021-03-22 2021-08-13 北京焦点新干线信息技术有限公司 Case data processing method, related device and computer readable medium
CN113038089B (en) * 2021-05-21 2021-09-14 浙江宇视科技有限公司 Intelligent identification dynamic self-decoding processing method and device, electronic equipment and storage medium
CN113613040A (en) * 2021-10-11 2021-11-05 北京创米智汇物联科技有限公司 Video file encryption method, decryption method and key management method
CN114173332B (en) * 2022-02-09 2022-04-19 国网浙江省电力有限公司信息通信分公司 Data encryption transmission method and device suitable for 5G intelligent power grid inspection robot
CN114938465B (en) * 2022-07-25 2022-10-18 广州万协通信息技术有限公司 Encrypted data transmission method and device based on characteristic sequence
CN115633193B (en) * 2022-12-19 2023-04-18 吉林省信息技术研究所 Monitoring video encryption method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101167361A (en) * 2005-04-25 2008-04-23 松下电器产业株式会社 Monitoring camera system, imaging device, and video display device
CN103914634A (en) * 2014-03-26 2014-07-09 小米科技有限责任公司 Image encryption method, image encryption device and electronic device
CN106664460A (en) * 2014-06-20 2017-05-10 索尼公司 Information processing apparatus and information processing method
CN106971114A (en) * 2017-03-31 2017-07-21 联想(北京)有限公司 A kind of method and device of image security
CN107070649A (en) * 2017-03-02 2017-08-18 桂林电子科技大学 A kind of big file selective cryptographic method for reducing write-in
CN108989736A (en) * 2017-06-05 2018-12-11 中兴通讯股份有限公司 multimedia resource encryption method, device, system, storage medium and processor

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005341316A (en) * 2004-05-27 2005-12-08 Sony Corp Information processing system and method, information processing apparatus and method, and its program
FR2932046B1 (en) * 2008-06-03 2010-08-20 Thales Sa METHOD AND SYSTEM FOR VISUALLY CRYPTING MOBILE OBJECTS WITHIN A COMPRESSED VIDEO STREAM
US8630412B2 (en) * 2010-08-25 2014-01-14 Motorola Mobility Llc Transport of partially encrypted media
JP5644467B2 (en) * 2010-12-20 2014-12-24 ソニー株式会社 Information processing apparatus, information processing method, and program
US8782392B1 (en) * 2011-04-11 2014-07-15 Google Inc. Privacy-protective data transfer and storage
CN102932634B (en) * 2012-11-15 2016-04-27 同方(深圳)云计算技术股份有限公司 The encrypting/decrypting method of network video monitor and control system and vision signal thereof, device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101167361A (en) * 2005-04-25 2008-04-23 松下电器产业株式会社 Monitoring camera system, imaging device, and video display device
CN103914634A (en) * 2014-03-26 2014-07-09 小米科技有限责任公司 Image encryption method, image encryption device and electronic device
CN106664460A (en) * 2014-06-20 2017-05-10 索尼公司 Information processing apparatus and information processing method
CN107070649A (en) * 2017-03-02 2017-08-18 桂林电子科技大学 A kind of big file selective cryptographic method for reducing write-in
CN106971114A (en) * 2017-03-31 2017-07-21 联想(北京)有限公司 A kind of method and device of image security
CN108989736A (en) * 2017-06-05 2018-12-11 中兴通讯股份有限公司 multimedia resource encryption method, device, system, storage medium and processor

Also Published As

Publication number Publication date
CN110446105A (en) 2019-11-12

Similar Documents

Publication Publication Date Title
CN110446105B (en) Video encryption and decryption method and device
US10713391B2 (en) Tamper protection and video source identification for video processing pipeline
US10062406B2 (en) Video masking processing method and apparatus
CN102077206B (en) Segmented media content rights management
KR100922052B1 (en) Information processing method, information processing device, and computer-readable storage medium of storing the computer program for achieving the information processing method
US10467427B2 (en) Method and apparatus for providing secure image encryption and decryption
US20170039387A1 (en) Method and system for differentiated privacy protection
CN104680078B (en) Method for shooting picture, method, system and terminal for viewing picture
KR102213839B1 (en) Method for preventing video falsification and apparatus therefor
US11768957B2 (en) Privacy-preserving image distribution
WO2017026356A1 (en) Image processing device, image restoring device, image processing method, and image restoring method
WO2017215148A1 (en) File protection method and device
US20170011212A1 (en) Access control for a resource
EP3537319A1 (en) Tamper protection and video source identification for video processing pipeline
WO2021159644A1 (en) Screen capture management method and apparatus, and mobile terminal
CN108650526B (en) Identification method, computer equipment and storage medium
CN102567657A (en) Digital work ownership authentication system and digital work ownership authentication method
CN103765909A (en) Thwarting unauthorized content copying using media tracking code
CN114205587A (en) Image display method, device, system and equipment
CN115550691A (en) Video processing method, video transmission method, video viewing method and device
WO2021017277A1 (en) Image capture method and apparatus, and computer storage medium
CN113672950B (en) Electronic file circulation tamper-proof method and device
CN112434327B (en) Information protection method and device and electronic equipment
KR102016051B1 (en) Main server providing video export service capable of tracing an leaking point and operation method thereof
JP7426937B2 (en) Authentication of digital records

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant