CN111770343A - Method for supporting hierarchical security protection of ultra-high-definition video data - Google Patents

Method for supporting hierarchical security protection of ultra-high-definition video data Download PDF

Info

Publication number
CN111770343A
CN111770343A CN202010690802.5A CN202010690802A CN111770343A CN 111770343 A CN111770343 A CN 111770343A CN 202010690802 A CN202010690802 A CN 202010690802A CN 111770343 A CN111770343 A CN 111770343A
Authority
CN
China
Prior art keywords
video
watermark
encryption key
ultra
dark watermark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010690802.5A
Other languages
Chinese (zh)
Inventor
张正强
杨瑾焜
吴震
李斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu 30kaitian Communication Industry Co ltd
Original Assignee
Chengdu 30kaitian Communication Industry Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu 30kaitian Communication Industry Co ltd filed Critical Chengdu 30kaitian Communication Industry Co ltd
Priority to CN202010690802.5A priority Critical patent/CN111770343A/en
Publication of CN111770343A publication Critical patent/CN111770343A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/46Embedding additional information in the video signal during the compression process
    • H04N19/467Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements

Abstract

The invention discloses a method for supporting hierarchical security protection of ultra-high-definition video data, which comprises the following steps: s11, adding a digital dark watermark to the original ultra-high definition video to generate a dark watermark video; s12, carrying out digital certificate signature on the dark watermark video to obtain the dark watermark video with the signature; and S13, encrypting the signed dark watermark video by using a national commercial algorithm to generate an encrypted video. The invention realizes the grading safety protection of the ultra-high-definition video with large code rate and large capacity, and the method can meet the safety protection requirement of the ultra-high-definition video under different protection grade conditions by utilizing the national commercial cryptographic algorithm and the digital dark watermark technology under the condition of considering both the processing efficiency and the safety requirement.

Description

Method for supporting hierarchical security protection of ultra-high-definition video data
Technical Field
The invention relates to the technical field of security monitoring and ultra-high-definition video security of broadcast television, in particular to a method for supporting hierarchical security protection of ultra-high-definition video data.
Background
1. Domestic commercial cipher technology
The password is used as a core technology and a basic support for maintaining national network and information security, and plays an important role in maintaining national network space security, information security, economic security and the like. Cryptographic algorithms are the most basic and important cryptographic techniques. The national cryptology administration places high importance on the management work of the cryptographic algorithm, and in recent 10 years, SM2 public key cryptographic algorithm, SM3 cryptographic hash algorithm, SM4 block cryptographic algorithm, SM9 identification cryptographic algorithm and other SM series algorithms and ZUC sequence cryptographic algorithm are issued, so that a complete and autonomous domestic cryptographic algorithm system comprising a symmetric cryptographic algorithm, an asymmetric cryptographic algorithm, a hash cryptographic algorithm, an identification cryptographic algorithm and a sequence cryptographic algorithm is formed. As a domestic cryptographic algorithm which is greatly popularized in China, especially after the algorithm becomes a cryptographic industry standard, the application of SM series algorithms and ZUC algorithms obtains remarkable results, and plays a great role in promoting the development of commercial passwords and guaranteeing the information security of China.
2. Ultra-high definition video
Based on the definition of the ultra-high-definition video standard published by the ministry of national industry and informatization, ultra-high-definition video refers to a new generation of video which has a resolution of 4K (3840 × 2160 pixels) or 8K (7680 × 4320 pixels) and meets the technical requirements of high frame rate, wide color gamut, high dynamic range and the like. The ultra-high-definition video has finer image details, stronger information bearing capacity and wider application range, provides new tools, new elements and new scenes for consumption upgrade, industrial innovation and social governance and powerfully promotes the deep revolution of various fields of the economic society.
3. Digital dark watermark technology
Digital watermarking (digital watermarking) is an effective method for realizing copyright protection, has become a hotspot in the research field of multimedia information security, and is also an important branch in the research field of information hiding technology. It verifies ownership of the data by embedding secret information, the watermark (watermark), in the original data. The embedded watermark may be a piece of text, a logo, a serial number, etc. The watermark, which is typically invisible or invisible, is tightly bound to and hidden from the original data (e.g., image, audio, video data, etc.), becomes an inseparable part of the source data, and can survive some operation that does not destroy the value of the source data for use or commercial use.
The digital watermarking technology has the common characteristics of an information hiding technology, and also has the inherent characteristics and a research method. For example, from the privacy perspective of information security, if hidden information is destroyed, the system can be considered secure because secret information is not revealed; however, in the digital watermarking system, the loss of the hidden information means the loss of copyright information, thereby losing the function of copyright protection, and the system is failed. Therefore, the digital watermarking technology must have strong robustness, security and transparency.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: aiming at the existing problems, a method for supporting the hierarchical security protection of the ultra-high-definition video data is provided.
The technical scheme adopted by the invention is as follows:
a method for supporting hierarchical security protection of ultra-high definition video data comprises the following steps:
s11, adding a digital dark watermark to the original ultra-high definition video to generate a dark watermark video;
s12, carrying out digital certificate signature on the dark watermark video to obtain the dark watermark video with the signature;
and S13, encrypting the signed dark watermark video by using a national commercial algorithm to generate an encrypted video.
Further, step S11 includes the following sub-steps:
s111, decoding the original ultra-high definition video, and dividing the original ultra-high definition video into video frames and audio data;
s112, converting the watermark information to be embedded into binary stream, then carrying out error correction coding and adding synchronous codes to combine a group of bit sequences to be embedded;
s113, analyzing the frequency domain characteristics of each video frame, comparing the front and rear frame change conditions of the video frame in the time domain in a color channel appointed by the video frame, selecting an image area with relatively small change for wavelet transformation, and embedding a bit sequence in a middle-high frequency part after wavelet transformation, so that the bit sequence is sequentially embedded into each video frame to generate a video frame with a watermark;
and S114, recoding the video frame containing the watermark and the audio data to synthesize the video frame containing the watermark and the audio data into a dark watermark video.
Further, in step S12, the user private key is used to perform digital certificate signature on the dark watermark video, so as to obtain the signed dark watermark video.
Further, step S13 includes the following sub-steps:
s131, generating a video encryption key by using a national commercial algorithm;
s132, carrying out encryption calculation on the signed dark watermark video by using a video encryption key to obtain a video ciphertext;
s133, acquiring a video key encryption key and a video key encryption key ID uniquely corresponding to the video key encryption key from the server, and then carrying out encryption calculation on the video key encryption key by using the video key encryption key to obtain a video encryption key ciphertext;
s134, packaging the video cipher text, the video encryption key cipher text and the video key encryption key ID according to a specified format to obtain an encrypted video.
Further, the method also comprises the following video restoration steps:
s21, decrypting the encrypted video to obtain a dark watermark video with a signature;
s22, verifying the signed dark watermark video, and executing the step S23 after the verification is successful;
and S23, extracting the digital dark watermark from the dark watermark video, and restoring the original ultra-high definition video.
Further, step S21 includes the following sub-steps:
s211, unpacking the encrypted video according to a specified format to obtain a video ciphertext, a video encryption key ciphertext and a video key encryption key ID;
s212, inquiring the server according to the video key encryption key ID to obtain a video key encryption key, and then decrypting the video key encryption key ciphertext by using the video key encryption key to obtain a video encryption key;
s213, the video cipher text is decrypted by using the video encryption key to obtain the dark watermark video with the signature.
Further, in step S22, a prompt alarm is given after the signature verification fails.
Further, in step S22, the signed dark watermark video is verified by using the private key of the user.
Further, step S23 includes the following sub-steps:
s231, decoding the dark watermark video, and dividing the dark watermark video into video frames and audio data;
s232, finding out a region embedded with a bit sequence from a color channel appointed by a video frame, finding out the video frame embedded with the bit sequence in a middle-high frequency part after wavelet transformation, judging after extracting the bit sequence from all video frames containing watermarks, extracting original watermark information by adopting an error correction method after determining the bit sequence embedded in each video frame and extracting a synchronous code, and restoring the original video frame;
and S233, recoding the original video frame and the audio data to synthesize the original ultrahigh-definition video.
Further, the watermark information contains user unique information.
In summary, due to the adoption of the technical scheme, the invention has the beneficial effects that:
the invention adopts two-stage safety protection, the first stage uses a digital dark watermark technology to ensure the source tracing and right confirmation of the tail end of the ultra-high definition video data, and simultaneously uses a digital certificate signature technology to ensure the integrity of the ultra-high definition video data; and the second level uses a national commercial cipher encryption algorithm on the basis of the first level of security to ensure the confidentiality and the integrity of the distribution and transmission process of the ultra-high definition video data. According to the method, the hierarchical security protection of the ultra-high-definition video with large code rate and large capacity is realized, and the method can meet the security protection requirements of the ultra-high-definition video under different protection grade conditions by utilizing the national commercial cryptographic algorithm and the digital dark watermark technology under the condition of considering both the processing efficiency and the security requirements.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is a flowchart of a method for supporting hierarchical security protection of ultra high definition video data according to the present invention.
Fig. 2 is a flowchart of adding a digital dark watermark according to embodiment 1 of the present invention.
Fig. 3 is a flowchart of video encryption according to embodiment 1 of the present invention.
Fig. 4 is a flowchart of video decryption according to embodiment 2 of the present invention.
Fig. 5 is a flowchart of the signature verification in embodiment 2 of the present invention.
Fig. 6 is a flowchart of extracting a digital dark watermark according to embodiment 2 of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the detailed description and specific examples, while indicating the preferred embodiment of the invention, are intended for purposes of illustration only and are not intended to limit the scope of the invention. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
The features and properties of the present invention are described in further detail below with reference to examples.
Example 1
As shown in fig. 1, a method for supporting hierarchical security protection of ultra high definition video data according to this embodiment includes the following steps:
(1.1) adding a digital dark watermark to the original ultrahigh-definition video to generate a dark watermark video;
as shown in fig. 2, step (1.1) comprises the following sub-steps:
(1.11) decoding the original ultra-high definition video, and dividing the original ultra-high definition video into video frames and audio data;
(1.12) converting watermark information to be embedded into binary stream, then carrying out error correction coding and adding synchronous codes to combine a group of bit sequences to be embedded; wherein the watermark information contains user unique information, such as user ID, etc.;
(1.13) in a color channel appointed by a video frame, comparing the change conditions of front and back frames of the video frame in a time domain by analyzing the frequency domain characteristics of each video frame, selecting an image area with relatively small change (namely, less influence on video quality) to perform wavelet transformation, and performing bit sequence embedding in a middle-high frequency part after the wavelet transformation, thereby embedding the bit sequence into each video frame in sequence to generate a video frame containing a watermark;
and (1.14) recoding the watermark-containing video frames and the audio data to synthesize the watermark-containing video into the dark watermark video.
(1.2) carrying out digital certificate signature on the dark watermark video to obtain the dark watermark video with the signature; the dark watermarked video may be digitally certificate signed using a user private key.
And (1.3) encrypting the signed dark watermark video by using a national commercial algorithm to generate an encrypted video.
As shown in fig. 3, step (1.3) comprises the following sub-steps:
(1.31) generating a video encryption key by using a national commercial algorithm;
(1.32) carrying out encryption calculation on the signed dark watermark video by using a video encryption key to obtain a video ciphertext;
(1.33) acquiring a video key encryption key and a video key encryption key ID which is uniquely corresponding to the video key encryption key from the server, and then carrying out encryption calculation on the video key encryption key by using the video key encryption key to obtain a video encryption key ciphertext;
and (1.34) packaging the video ciphertext and the video encryption key ciphertext according to a specified format to obtain an encrypted video.
Example 2
As shown in fig. 1, on the basis of embodiment 1, the method for supporting hierarchical security protection of ultra high definition video data further includes the following steps of video restoration:
(2.1) decrypting the encrypted video to obtain a dark watermark video with a signature;
as shown in fig. 4, step (2.1) comprises the following sub-steps:
(2.11) unpacking the encrypted video according to a specified format to obtain a video cipher text, a video encryption key cipher text and a video key encryption key ID;
(2.12) inquiring the server according to the video key encryption key ID to obtain a video key encryption key, and then decrypting the video key encryption key ciphertext by using the video key encryption key to obtain a video encryption key;
(2.13) decrypting the video ciphertext by using the video encryption key to obtain a dark watermark video with a signature;
(2.2) verifying the signed dark watermark video, as shown in fig. 5:
(2.21) executing the step (2.3) after the signature verification is successful;
(2.22) ending the flow after the signature verification fails, and as an implementation mode, prompting and alarming can be performed after the signature verification fails;
this step may use the user private key (consistent with the user private key used in step 1.2) to digitally certificate sign the dark watermarked video.
(2.3) extracting the digital dark watermark in the dark watermark video, and restoring the original ultrahigh-definition video;
as shown in fig. 6, step (2.3) comprises the following sub-steps:
(2.31) decoding the dark watermark video into video frames and audio data;
(2.32) finding out a region embedded with a bit sequence from a color channel appointed by a video frame, finding out the video frame embedded with the bit sequence in a middle-high frequency part after wavelet transformation, judging after extracting the bit sequence from all video frames containing watermarks, extracting original watermark information by adopting an error correction method after determining the bit sequence embedded in each video frame and extracting a synchronous code, and thus restoring the original video frame;
and (2.33) recoding the original video frame and the audio data to synthesize the original ultrahigh-definition video.
Through the process, two-stage safety protection is adopted, the first stage uses a digital dark watermark technology to ensure the source tracing right of the tail end of the ultra-high definition video data, and simultaneously uses a digital certificate signature technology to ensure the integrity of the ultra-high definition video data; and the second level uses a national commercial cipher encryption algorithm on the basis of the first level of security to ensure the confidentiality and the integrity of the distribution and transmission process of the ultra-high definition video data. According to the method, the hierarchical security protection of the ultra-high-definition video with large code rate and large capacity is realized, and the method can meet the security protection requirements of the ultra-high-definition video under different protection grade conditions by utilizing the national commercial cryptographic algorithm and the digital dark watermark technology under the condition of considering both the processing efficiency and the security requirements.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention are intended to be included within the scope of the present invention.

Claims (10)

1. A method for supporting hierarchical security protection of ultra-high-definition video data is characterized by comprising the following steps:
s11, adding a digital dark watermark to the original ultra-high definition video to generate a dark watermark video;
s12, carrying out digital certificate signature on the dark watermark video to obtain the dark watermark video with the signature;
and S13, encrypting the signed dark watermark video by using a national commercial algorithm to generate an encrypted video.
2. The method for supporting hierarchical security protection of ultra high definition video data according to claim 1, wherein step S11 comprises the following sub-steps:
s111, decoding the original ultra-high definition video, and dividing the original ultra-high definition video into video frames and audio data;
s112, converting the watermark information to be embedded into binary stream, then carrying out error correction coding and adding synchronous codes to combine a group of bit sequences to be embedded;
s113, analyzing the frequency domain characteristics of each video frame, selecting an image area with relatively small change to perform wavelet transformation by comparing the change conditions of front and back frames of the video frame in a time domain, and performing bit sequence embedding on a middle-high frequency part after the wavelet transformation, so that the bit sequence is sequentially embedded into each video frame to generate a video frame containing a watermark;
and S114, recoding the video frame containing the watermark and the audio data to synthesize the video frame containing the watermark and the audio data into a dark watermark video.
3. The method for supporting ultra high definition video data hierarchical security protection according to claim 1, wherein in step S12, the digital certificate signature is performed on the dark watermark video by using a private key of a user, so as to obtain a signed dark watermark video.
4. The method for supporting hierarchical security protection of ultra high definition video data according to claim 1, wherein step S13 comprises the following sub-steps:
s131, generating a video encryption key by using a national commercial algorithm;
s132, carrying out encryption calculation on the signed dark watermark video by using a video encryption key to obtain a video ciphertext;
s133, acquiring a video key encryption key and a video key encryption key ID uniquely corresponding to the video key encryption key from the server, and then carrying out encryption calculation on the video key encryption key by using the video key encryption key to obtain a video encryption key ciphertext;
s134, packaging the video cipher text, the video encryption key cipher text and the video key encryption key ID according to a specified format to obtain an encrypted video.
5. The method for supporting hierarchical security protection of ultra high definition video data according to claim 1, further comprising the following steps of video restoration:
s21, decrypting the encrypted video to obtain a dark watermark video with a signature;
s22, verifying the signed dark watermark video, and executing the step S23 after the verification is successful;
and S23, extracting the digital dark watermark from the dark watermark video, and restoring the original ultra-high definition video.
6. The method for supporting hierarchical security protection of ultra high definition video data according to claim 5, wherein the step S21 comprises the following sub-steps:
s211, unpacking the encrypted video according to a specified format to obtain a video ciphertext, a video encryption key ciphertext and a video key encryption key ID;
s212, inquiring the server according to the video key encryption key ID to obtain a video key encryption key, and then decrypting the video key encryption key ciphertext by using the video key encryption key to obtain a video encryption key;
s213, the video cipher text is decrypted by using the video encryption key to obtain the dark watermark video with the signature.
7. The method for supporting hierarchical security protection of ultra high definition video data according to claim 5, wherein a prompt alarm is given after the signature verification fails in step S22.
8. The method for supporting hierarchical security protection of ultra high definition video data according to claim 5 or 7, wherein the step S22 is to use a private key of a user to verify the signed dark watermark video.
9. The method for supporting hierarchical security protection of ultra high definition video data according to claim 5, wherein the step S23 comprises the following sub-steps:
s231, decoding the dark watermark video, and dividing the dark watermark video into video frames and audio data;
s232, finding out a region embedded with a bit sequence from a color channel appointed by a video frame, finding out the video frame embedded with the bit sequence in a middle-high frequency part after wavelet transformation, judging after extracting the bit sequence from all video frames containing watermarks, extracting original watermark information by adopting an error correction method after determining the bit sequence embedded in each video frame and extracting a synchronous code, and restoring the original video frame;
and S233, recoding the original video frame and the audio data to synthesize the original ultrahigh-definition video.
10. The method for supporting hierarchical security protection of ultra high definition video data according to claim 2 or 9, wherein the watermark information contains user unique information.
CN202010690802.5A 2020-07-17 2020-07-17 Method for supporting hierarchical security protection of ultra-high-definition video data Pending CN111770343A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010690802.5A CN111770343A (en) 2020-07-17 2020-07-17 Method for supporting hierarchical security protection of ultra-high-definition video data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010690802.5A CN111770343A (en) 2020-07-17 2020-07-17 Method for supporting hierarchical security protection of ultra-high-definition video data

Publications (1)

Publication Number Publication Date
CN111770343A true CN111770343A (en) 2020-10-13

Family

ID=72728352

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010690802.5A Pending CN111770343A (en) 2020-07-17 2020-07-17 Method for supporting hierarchical security protection of ultra-high-definition video data

Country Status (1)

Country Link
CN (1) CN111770343A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102547254A (en) * 2010-11-26 2012-07-04 中国科学院声学研究所 Method and system for digital video image copyright protection based on watermarks and encryption
CN102761790A (en) * 2011-04-27 2012-10-31 航天信息股份有限公司 Digital-watermark-based digital copyright management method and device for IPTV terminals
CN106611400A (en) * 2016-05-31 2017-05-03 四川用联信息技术有限公司 Reversible watermarking algorithm of ciphertext image
US20180144754A1 (en) * 2016-11-23 2018-05-24 Ati Technologies Ulc Video assisted digital audio watermarking
CN108882030A (en) * 2018-06-12 2018-11-23 成都三零凯天通信实业有限公司 A kind of monitor video classification encryption and decryption method and system based on time-domain information

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102547254A (en) * 2010-11-26 2012-07-04 中国科学院声学研究所 Method and system for digital video image copyright protection based on watermarks and encryption
CN102761790A (en) * 2011-04-27 2012-10-31 航天信息股份有限公司 Digital-watermark-based digital copyright management method and device for IPTV terminals
CN106611400A (en) * 2016-05-31 2017-05-03 四川用联信息技术有限公司 Reversible watermarking algorithm of ciphertext image
US20180144754A1 (en) * 2016-11-23 2018-05-24 Ati Technologies Ulc Video assisted digital audio watermarking
CN108882030A (en) * 2018-06-12 2018-11-23 成都三零凯天通信实业有限公司 A kind of monitor video classification encryption and decryption method and system based on time-domain information

Similar Documents

Publication Publication Date Title
Zhou et al. Secure reversible image data hiding over encrypted domain via key modulation
Holliman et al. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
US7870393B2 (en) Steganographic method and device
US6504941B2 (en) Method and apparatus for digital watermarking of images
US20160189325A1 (en) Method for reversible image data hiding
US7039189B1 (en) Stream continuity enforcement
US7111167B1 (en) Digital watermarks with values derived from remote platforms
JP2002510943A (en) Using and applying multiple transforms for secure digital watermarking
KR20070042511A (en) Systems and methods for digital content security
Thomas et al. Joint watermarking scheme for multiparty multilevel DRM architecture
Lin et al. Public-key-based optical image cryptosystem based on data embedding techniques
JP2005514717A (en) Generation of unique watermarks for receivers of multimedia multicast transmissions
Bianchi et al. TTP-free asymmetric fingerprinting based on client side embedding
CN111177666A (en) Forensic document anti-counterfeiting and anti-tampering method and system based on fragile watermark
JP5423512B2 (en) Broadcast data stream protection system, method, and user terminal identification program
Thomas et al. Advanced cryptographic steganography using multimedia files
CN111770343A (en) Method for supporting hierarchical security protection of ultra-high-definition video data
Lian et al. Lightweight secure multimedia distribution based on homomorphic operations
CN110475040B (en) Method and system for exchanging cipher watermarks based on modular operation
JP2005318068A (en) Electronic watermark embedding system of contents authentication data, and authentication system
van Rensburg et al. 3D object watermarking from data hiding in the homomorphic encrypted domain
Memon et al. Authentication techniques for multimedia content
Nehra et al. Review Paper On Image Based Steganography
Blackledge et al. Application of stochastic diffusion for hiding high fidelity encrypted images
Hachim et al. Cloud-based digital watermarking model for medical image integrity

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20201013