CN114363011A - Ultra-high-definition video leakage-prevention sharing method - Google Patents

Ultra-high-definition video leakage-prevention sharing method Download PDF

Info

Publication number
CN114363011A
CN114363011A CN202111526909.7A CN202111526909A CN114363011A CN 114363011 A CN114363011 A CN 114363011A CN 202111526909 A CN202111526909 A CN 202111526909A CN 114363011 A CN114363011 A CN 114363011A
Authority
CN
China
Prior art keywords
sharing
video
key
gain
playing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111526909.7A
Other languages
Chinese (zh)
Inventor
张奇
戴云扬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZHEJIANG FEIYUE DIGITAL TECHNOLOGY CO LTD
Original Assignee
Zhejiang Jiai Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Jiai Network Technology Co ltd filed Critical Zhejiang Jiai Network Technology Co ltd
Priority to CN202111526909.7A priority Critical patent/CN114363011A/en
Publication of CN114363011A publication Critical patent/CN114363011A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The invention provides an ultra-high definition video leakage-prevention sharing method, which comprises the following steps: the method comprises the steps that a sharing end preprocesses a high-definition original video to generate a plurality of supplement layers and a plurality of sharing key groups, and the original video is simply encrypted after the supplement layers are removed to generate a gain layer and a gain key; secondly, the method comprises the following steps: the playing end accesses the sharing link of the video to perform identity authentication, purchases video playing permission, and opens downloading permission corresponding to the gain layer and the gain key of the video; thirdly, the method comprises the following steps: the playing end sends a playing instruction, the sharing end sends a sharing key group, and the sharing end detects whether the playing end downloads and decompresses the gain layer; fourthly: and the playing end loads the gain video, simultaneously calls the sharing key corresponding to the loading position time in the sharing key group and sends the sharing key to the sharing end, the sharing end opens the access authority of the supplement layer corresponding to the sharing key, and the playing end acquires and decompresses the supplement layer, overlaps the gain layer, restores and plays the original video. The method and the device can ensure that the sharing end shares the high-definition large-size video in real time, ensure that the playing end cannot obtain complete video information, and reduce the probability of IP (Internet protocol) leakage of the video.

Description

Ultra-high-definition video leakage-prevention sharing method
Technical Field
The invention relates to the technical field of ultra-high-definition video anti-leakage sharing, in particular to an ultra-high-definition video anti-leakage sharing method.
Background
At present, the data volume of high-resolution and large-size video images, especially DPX, EXR and the like widely adopted in the film and television industry is very large, the data volume of a very short video is possibly more than 1TB, a video file of more than 1 hour is often more than 30TB, the large data brings great pressure to remote cooperation, and the current public network cannot support real-time transmission of the large data.
Therefore, the data sharing method commonly adopted in the film and television industry is used for sharing and transmitting the video data to the needed collaborators in advance, and the collaborators play the video data locally. However, in the sharing process, the video data is completely sent to the collaborator, so that the risk is very high for the IP owner, and the sharing party cannot control the leakage condition of the collaborator, thereby causing a large amount of video IP leakage.
Disclosure of Invention
In view of the above, the present invention provides an ultra high definition video leakage prevention sharing method, which can ensure that a sharing end shares a high definition large-size video in real time, ensure that a playing end cannot obtain complete video information, and reduce the probability of video IP leakage.
In order to solve the technical problems, the invention adopts the technical scheme that:
an ultra-high definition video anti-leakage sharing method comprises the following steps: the method comprises the steps that a sharing end preprocesses a high-definition original video to generate a plurality of supplement layers which are small in memory and can be shared in real time and a plurality of sharing key groups which cannot completely decode one supplement layer, and after the original video is subjected to the supplement layer removal, a gain layer and a gain key which do not contain picture information and are large in memory are generated through encryption;
step two: the playing end accesses the sharing link of the original video to carry out identity authentication, purchases the playing authority of the original video, and opens the downloading authority of the gain layer and the gain key of the corresponding video;
step three: the playing end sends a playing instruction, the sharing end constructs a sharing channel for accessing the sharing key group in real time, and detects whether the playing end downloads and decompresses the gain layer to generate a gain video;
step four: and the playing end loads the gain video, shares the sharing key corresponding to the loading position time in the sharing key group to the sharing end, opens the access authority of the supplement layer corresponding to the sharing key, accesses and decompresses the supplement layer, overlaps the gain layer, and restores and plays the original video.
Further, the pretreatment process comprises the following steps: acquiring a video picture of each frame of an original video and corresponding time information, extracting RGB information and corresponding coordinate information of each pixel point of the video picture, converting all RGB information on the video picture and generating YUV picture data, and arranging the YUV picture data according to the time information sequence to generate a supplementary layer video;
the supplementary layer video is segmented and separately compressed and encrypted to generate a plurality of supplementary layers and a plurality of supplementary key groups.
Furthermore, the supplementary layer video comprises a plurality of time-continuous supplementary segments, and the supplementary key group comprises a plurality of shared keys corresponding to the supplementary segments one by one;
the shared key of each supplementary section is randomly selected from a plurality of supplementary key groups to generate a time-continuous shared key group.
Furthermore, each supplementary segment of the supplementary layer is not regularly re-encrypted and a plurality of new shared key groups are generated again.
Furthermore, the head end and the tail end of the sharing key corresponding to the time interval are overlapped, so that the continuity of video playing is ensured.
Further, the supplementary segment is encrypted by a high-density encryption algorithm such as AES.
Further, the process of removing the supplementary layer is as follows: each pixel point of the video picture corresponds to the corresponding YUV data through the time information and the coordinate information, the YUV data in the pixel point is removed, a gain picture without color and brightness is generated, the gain pictures are arranged in sequence according to the time information to generate a gain video, the gain video is subjected to lossless compression and then encryption processing, and a gain layer and a gain key are generated.
Further, a blockchain account is registered before the identity authentication of the playing end, and during the identity authentication and the purchase, the sharing end acquires the model information of the playing end, the blockchain account information of the playing end, the purchased video information and the purchase time period information.
Further, the sharing end builds a temporary block chain sharing channel, the playing end accesses the sharing key at the gain video loading position, shares the sharing key to the sharing end, and reads the sharing key and opens the corresponding access permission of the supplement layer;
and the playing end accesses the supplementary section corresponding to the sharing key and carries out decoding processing, and the YUV picture data is overlapped at the corresponding position of the gain video according to the time information and the coordinate information to restore and play the original video.
Furthermore, the opening time of the access right of the supplement layer is fixedly set, and the playing end calls a sharing key at fixed intervals;
and the time interval of the two times of calling by the playing end is smaller than the time interval set covered by the sharing key, so that the access authority of the supplement layer is kept open, and the access channel of the next time period is opened in time.
The invention has the advantages and positive effects that:
the method comprises the steps of splitting a high-definition original video into a supplementary video containing video information but not occupying an internal memory and a gain video occupying the internal memory but not containing picture information, segmenting the supplementary video to generate supplementary segments, and performing independent compression and encryption processing on the supplementary segments to generate supplementary layers and supplementary key groups, wherein each supplementary segment corresponds to a key. And randomly selecting a shared key from the plurality of supplementary key groups to form a shared key group. The method comprises the steps that a playing end downloads a gain video to the local in advance and decompresses the gain video, a sharing end shares a sharing key group to the playing end through a temporary block chain channel, the playing end accesses a sharing key corresponding to loading time at regular time and shares the sharing key to the sharing end, the sharing end opens access authority of a corresponding supplement layer according to the obtained sharing key to guarantee that the sharing end shares high-definition large-size videos in real time, the sharing key group and the supplement layer are real-time sharing files and do not need to be cached, the playing end cannot store the sharing key group and the supplement layer, the sharing key group is not a set of complete keys, all supplement segments cannot be decoded completely, the fact that the playing end cannot obtain complete video information is guaranteed, and the probability of video IP leakage is reduced.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
fig. 1 is an overall flowchart of an ultra-high definition video anti-leakage sharing method according to the present invention;
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It will be understood that when an element is referred to as being "secured to" another element, it can be directly on the other element or intervening elements may also be present. When a component is referred to as being "connected" to another component, it can be directly connected to the other component or intervening components may also be present. When a component is referred to as being "disposed on" another component, it can be directly on the other component or intervening components may also be present. The terms "vertical," "horizontal," "left," "right," and the like as used herein are for illustrative purposes only.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
As shown in fig. 1, the present invention provides an ultra high definition video leakage prevention sharing method, which includes the following steps: the sharing end preprocesses the ultrahigh-definition original video, and divides the high-definition video into a gain layer which does not contain image information and occupies a large amount of memory and a supplement layer which contains specific image information and does not occupy the memory. The sharing end sends the gain layer without the picture information to the playing end in advance, because the gain layer has a large memory and the time spent on downloading, decompressing and decoding is long, the playing end decompresses and decodes in advance, the memory of the supplement layer is small, and real-time sharing can be carried out, so that the continuity of video playing is not influenced.
Because the memory of the supplement layer is small, the real-time sharing of the supplement layer does not affect the fluency of video playing. When the supplementary layer is shared in real time, the downloading authority is closed, the playing end cannot download to the local, but can normally access, and the normal playing of the video is not influenced. The effect that the playing end cannot download the supplement layer is achieved, the leakage probability of the supplement layer is reduced, real-time sharing of high-definition large-size videos is achieved, and the playing end can control the playing of the playing end videos by controlling whether the supplement layer is shared or not (when the sharing end does not share the videos, an access channel or permission of the sharing layer is closed). The gain layer downloaded to the local by the playing end does not contain specific image information, even if leakage occurs, the influence is avoided, and the IP video leakage probability is reduced.
The method for acquiring the supplementary layer comprises the following steps: acquiring a video picture of each frame of an original video and corresponding time information, extracting RGB information of all pixel points in the video picture, wherein the RGB information comprises three primary color information of the pixel points, and simultaneously recording coordinate information of the corresponding pixel points. Converting RGB information acquired in each frame of video picture into YUV picture data, and arranging the YUV picture data of all frames according to the time information sequence to generate a supplementary video.
The method comprises the steps of segmenting a supplementary video to generate a supplementary segment, independently compressing and encrypting the supplementary segment to generate a supplementary layer and a supplementary key group, wherein the supplementary layer comprises a plurality of encrypted supplementary segments, the supplementary key group comprises a plurality of shared keys for decoding the corresponding supplementary segments, and each shared key can only decompress one supplementary video segment. I.e. the shared key only decodes the corresponding complementary segment. After the complementary video is compressed in multiple segments and encrypted separately, the first and second complementary key sets and the first and second complementary layers are generated (for example, two times of encryption, the encryption is performed more than twice in actual operation).
The first supplementary key group comprises a plurality of first shared keys, each supplementary segment in the first supplementary layer corresponds to a first shared key, the shared keys are randomly selected from the first supplementary key group and the second supplementary key group to generate a shared key group, and each shared key corresponds to different supplementary segments. And generating a plurality of shared key groups by using the same method so as to share the key groups to different fixed playing terminals.
And saving the first supplementary layer, the second supplementary layer and a plurality of shared key groups to a database. After the sharing end receives the playing instruction, the sharing end arbitrarily selects one sharing key group to share the sharing key group to the playing end, because the sharing key group occupies a small memory, the sharing key group can be shared in real time (namely, the playing end can access any position of the sharing key group at any time), and meanwhile, the downloading permission is closed, the sharing key group can be shared to the playing end, and the sharing key group cannot be locally stored in the playing end, so that the probability of leakage of the sharing key group is reduced. Even if the shared key group is leaked, because the group of keys acquired by the playing end is not a complete group of keys, the group of keys is formed by splitting a plurality of supplementary key groups, one supplementary layer cannot be completely decompressed, and a complete original video cannot be acquired.
In order to further reduce the leakage probability, the sharing end can independently encrypt the supplementary video after re-segmenting the supplementary video at irregular time and generate a new first supplementary layer, a new second supplementary layer, a new first supplementary key group and a new second supplementary key group. The sharing key groups received by the playing end are different when the video is played by the playing end each time. Preferably, the supplementary section is encrypted by an encryption algorithm with high security density such as AES and the like, so that the security effect is good.
The gain layer acquisition method comprises the following steps: acquiring a video picture of each frame of an original video and corresponding time information, corresponding the video picture to YUV picture data through the time information, and corresponding each pixel point in the video picture to YUV data of each pixel point in the YUV picture data through coordinate information. And each pixel point on the video picture is subjected to YUV data processing to generate a gain picture without color and brightness, the gain pictures are arranged according to a time information sequence to generate a gain video, the gain video is subjected to lossless compression and encryption processing to generate a gain layer and a gain key, and the gain layer and the gain key are stored in a database.
Step two: the sharing end puts in the sharing link related to the high-definition video through the video sharing platform, and the playing end can access the sharing link to complete authentication information and purchase playing permission of the original video. The playing end registers a block chain account through the video sharing platform in advance, and the block chain account is used for facilitating the sharing end to send a sharing key group to the playing end, so that secret sharing of the sharing key group is achieved.
The sharing end constructs a temporary block chain channel through a block chain account, shares the shared key group to the playing end through the temporary block chain channel, after the playing end finishes playing videos, the sharing end and the playing end are disconnected with the temporary block chain channel, meanwhile, the shared key group cannot be stored in the playing end (the mode is the same as that of a supplement layer, and the shared key group is shared in the mode of opening access authority but closing downloading authority), so that the playing end can be prevented from acquiring shared key group data. After the sharing end and the playing end are disconnected with the temporary block link channel, the block link containing the sharing key group forms a non-original link, so that the probability of leakage of the sharing key group is reduced, and secret sharing of the key is realized.
And the playing terminal sends the block chain account and the equipment model to the sharing terminal through the sharing link, performs identity authentication, and purchases playing permission of the original video after the identity authentication is completed, wherein the playing permission comprises limited time permission or permanent permission. For example: the playing end purchases the authority of watching the video for one month, and the playing end can watch the video within any time period within one month after the purchase is effective.
When the playing right is purchased, the sharing end acquires the block chain account information, the equipment number information, the playing right information and the video name information of the playing end. The block chain account information is used for facilitating the sharing end to construct a temporary block chain channel so as to share the sharing key group with the playing end. The device number information is used for facilitating the sharing end to open the access right to the fixed device. The video name information and the playing permission information are used for facilitating the sharing end to control the open time interval and the open video, so that the playing end can only have the permission to access and download the fixed video in the fixed time interval.
Step three: when a video is played, a playing end sends a playing instruction of the video to a sharing end through a device number, after the sharing end receives the playing instruction, the sharing end reads playing authority information of the corresponding video according to the device number, judges whether the device number has playing authority (whether the device number is in the time period range of the authority), and if not, the sharing end sends information reminding without the authority; if yes, sharing the sharing key group to the playing end in real time through the temporary block chain; the sharing end detects whether the playing end downloads the gain layer or not; if not, the sharing end sends a message prompt for downloading the gain layer; if yes, the sharing end detects whether the broadcast gain layer is decompressed into a gain video; if not, the sharing end sends a message prompt for decompressing the gain layer; if yes, the playing end starts to load the gain video.
Step four: when the playing end loads the gain video, the sharing key corresponding to the time of the loading position in the sharing key group is accessed and shared to the sharing end, the sharing end opens the access authority of the supplement layer corresponding to the sharing key, the playing end accesses the corresponding supplement section according to the sharing key and decompresses and decodes the supplement section to generate YUV picture data containing time information, and the sharing end superposes the YUV picture data and the gain video according to the time information, restores and plays the original video.
Because the shared key can only decode the supplemental layer in a certain time period in the supplemental layer, and a supplemental video segment corresponding to the time period of the shared key is generated, the data in the rest time periods of the supplemental layer cannot be decoded normally. The decoded supplementary segment is superposed on the corresponding time segment of the gain video, and the playing end normally plays. The supplementary layer occupies a small memory, has short reading and decrypting time and does not influence the real-time playing of the video even if temporarily loaded.
The first segment and the last segment of the time period corresponding to the sharing key are overlapped, when the gain video is played to the last segment of a certain sharing key containing time period (but not finished), the time of a playing point of the gain video enters the time period contained by the next sharing key, the playing end can simultaneously share the two sharing keys to the sharing end, and the sharing end simultaneously opens the access authority corresponding to the two supplement layers. The playing end can access and decode the next supplementary segment in advance to ensure the continuity of video playing and improve the playing effect of the video.
The time for opening the access right of the supplement layer once is set fixedly, so that the phenomenon that the content of the supplement layer is leaked due to overlong opening time can be avoided. The playing end calls the sharing key once at a fixed time interval, and the time interval between two times of calling of the playing end is smaller than the time interval covered by the sharing key, so that the access authority of the supplement layer is kept open, and meanwhile, the access channel of the next time interval is opened in time.
When the playing end plays the gain video in sequence, the playing end calls a time key once at a fixed time interval and sends the time key to the sharing end, and the interval time interval and the time interval far smaller than the time key corresponding time interval enable the supplement layer to keep an open state. When the playing end plays in a jump mode (namely the playing end fast forwards), the playing end calls the key once when the playing end jumps once, so that the sharing end can open the access authority of the corresponding supplement layer in time.
When the gain layer leaks, the gain layer does not contain too much picture information, pictures cannot be seen, and video information cannot be leaked. If the gain layer and the supplemental layer are simultaneously revealed, the video cannot be played because of no decoded key. The gain layer, the supplement layer and the sharing key group are simultaneously revealed, and the sharing key group is composed of different sharing keys in different supplement layers, so that the video cannot be opened completely, and the video revealing probability is effectively reduced.
The embodiments of the present invention have been described in detail, but the description is only for the preferred embodiments of the present invention and should not be construed as limiting the scope of the present invention. All equivalent changes and modifications made within the scope of the present invention should be covered by the present patent.

Claims (10)

1. An ultra-high definition video anti-leakage sharing method is characterized by comprising the following steps: the method comprises the steps that a sharing end preprocesses a high-definition original video to generate a plurality of supplement layers which are small in memory and can be shared in real time and a plurality of sharing key groups which cannot completely decode one supplement layer, and after the original video is subjected to the supplement layer removal, a gain layer and a gain key which do not contain picture information and are large in memory are generated through encryption;
step two: the playing end accesses the sharing link of the original video to carry out identity authentication, purchases the playing authority of the original video, and opens the downloading authority of the gain layer and the gain key of the corresponding video;
step three: the playing end sends a playing instruction, the sharing end constructs a sharing channel for accessing the sharing key group in real time, and detects whether the playing end downloads and decompresses the gain layer to generate a gain video;
step four: and the playing end loads the gain video, shares the sharing key corresponding to the loading position time in the sharing key group to the sharing end, opens the access authority of the supplement layer corresponding to the sharing key, accesses and decompresses the supplement layer, overlaps the gain layer, and restores and plays the original video.
2. The ultra high definition video anti-leakage sharing method according to claim 1, wherein the preprocessing comprises: acquiring a video picture of each frame of an original video and corresponding time information, extracting RGB information and corresponding coordinate information of each pixel point of the video picture, converting all RGB information on the video picture and generating YUV picture data, and arranging the YUV picture data according to the time information sequence to generate a supplementary layer video;
the supplementary layer video is segmented and separately compressed and encrypted to generate a plurality of supplementary layers and a plurality of supplementary key groups.
3. The ultra high definition video leakage prevention sharing method according to claim 2, wherein the complementary layer video includes a plurality of time-continuous complementary segments, and the complementary key group includes a plurality of shared keys corresponding to the complementary segments one to one;
the shared key of each supplementary section is randomly selected from a plurality of supplementary key groups to generate a time-continuous shared key group.
4. The ultra high definition video leakage prevention sharing method according to claim 3, wherein each supplementary segment of the supplementary layer is not processed by re-encryption at regular time, and new shared key groups are generated again.
5. The ultra high definition video leakage prevention sharing method according to claim 3, wherein the sharing key is overlapped with the head end and the tail end of the corresponding time period to ensure continuity of video playing.
6. The ultra high definition video leakage prevention sharing method according to claim 3, wherein the supplementary segment is encrypted by a high-density encryption algorithm such as AES.
7. The ultra high definition video anti-leakage sharing method according to claim 1, wherein the de-complementing layer processing procedure is: each pixel point of the video picture corresponds to the corresponding YUV data through the time information and the coordinate information, the YUV data in the pixel point is removed, a gain picture without color and brightness is generated, the gain pictures are arranged in sequence according to the time information to generate a gain video, the gain video is subjected to lossless compression and then encryption processing, and a gain layer and a gain key are generated.
8. The ultra-high-definition video leakage-prevention sharing method according to claim 1, wherein a blockchain account is registered before identity authentication of the playing terminal, and during identity authentication and purchase, the sharing terminal obtains model information of a device of the playing terminal, blockchain account information of the playing terminal, purchased video information and purchase time period information.
9. The ultra-high-definition video leakage-prevention sharing method according to claim 8, wherein the sharing end constructs a temporary blockchain sharing channel through blockchain account information of the playing end, the temporary blockchain sharing channel is used for the playing end to access a sharing key of a gain video loading position, the sharing key is shared to the sharing end, and the sharing end reads the sharing key and opens a corresponding supplement layer access right;
and the playing end accesses the supplementary section corresponding to the sharing key and carries out decoding processing, and the YUV picture data is overlapped at the corresponding position of the gain video according to the time information and the coordinate information to restore and play the original video.
10. The ultra high definition video leakage prevention sharing method according to claim 1, wherein an opening time of the supplemental layer access right is fixedly set, and the player invokes a sharing key at regular intervals;
and the time interval of the two times of calling by the playing end is smaller than the time interval set covered by the sharing key, so that the access authority of the supplement layer is kept open, and the access channel of the next time period is opened in time.
CN202111526909.7A 2021-12-13 2021-12-13 Ultra-high-definition video leakage-prevention sharing method Pending CN114363011A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111526909.7A CN114363011A (en) 2021-12-13 2021-12-13 Ultra-high-definition video leakage-prevention sharing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111526909.7A CN114363011A (en) 2021-12-13 2021-12-13 Ultra-high-definition video leakage-prevention sharing method

Publications (1)

Publication Number Publication Date
CN114363011A true CN114363011A (en) 2022-04-15

Family

ID=81098558

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111526909.7A Pending CN114363011A (en) 2021-12-13 2021-12-13 Ultra-high-definition video leakage-prevention sharing method

Country Status (1)

Country Link
CN (1) CN114363011A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1729668A (en) * 2002-12-20 2006-02-01 皇家飞利浦电子股份有限公司 Apparatus and method for processing streams
US20070217612A1 (en) * 2006-03-17 2007-09-20 Vincent So Method and system of key-coding a video
CN102546768A (en) * 2011-12-23 2012-07-04 深圳市同洲电子股份有限公司 Content sharing method, device and system
US20120195425A1 (en) * 2010-12-23 2012-08-02 Electronics And Telecommunications Research Institute Security video transmission apparatus, video data reception apparatus, and key generation method thereof
CN106034232A (en) * 2015-03-12 2016-10-19 北京智谷睿拓技术服务有限公司 Display control method and apparatus
CN111083530A (en) * 2019-12-30 2020-04-28 广东南方新媒体股份有限公司 DRM integration method, system, device and storage medium for Internet broadcast control platform
CN112995784A (en) * 2021-05-19 2021-06-18 杭州海康威视数字技术股份有限公司 Video data slice encryption method, device and system
CN113542877A (en) * 2021-07-13 2021-10-22 四川长虹网络科技有限责任公司 PVR resource sharing method, system, computer equipment and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1729668A (en) * 2002-12-20 2006-02-01 皇家飞利浦电子股份有限公司 Apparatus and method for processing streams
US20070217612A1 (en) * 2006-03-17 2007-09-20 Vincent So Method and system of key-coding a video
US20120195425A1 (en) * 2010-12-23 2012-08-02 Electronics And Telecommunications Research Institute Security video transmission apparatus, video data reception apparatus, and key generation method thereof
CN102546768A (en) * 2011-12-23 2012-07-04 深圳市同洲电子股份有限公司 Content sharing method, device and system
CN106034232A (en) * 2015-03-12 2016-10-19 北京智谷睿拓技术服务有限公司 Display control method and apparatus
CN111083530A (en) * 2019-12-30 2020-04-28 广东南方新媒体股份有限公司 DRM integration method, system, device and storage medium for Internet broadcast control platform
CN112995784A (en) * 2021-05-19 2021-06-18 杭州海康威视数字技术股份有限公司 Video data slice encryption method, device and system
CN113542877A (en) * 2021-07-13 2021-10-22 四川长虹网络科技有限责任公司 PVR resource sharing method, system, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
US20050281471A1 (en) Method and device for secure transmission of JPEG encoded images
US7457415B2 (en) Secure information distribution system utilizing information segment scrambling
US6668246B1 (en) Multimedia data delivery and playback system with multi-level content and privacy protection
US7702103B2 (en) Device for the transformation of MPEG 2-type multimedia and audiovisual contents into secured contents of the same type
US8565472B2 (en) Method, device and system for dynamically embedding watermark information into multimedia content
US8510654B2 (en) Techniques for shuffling video information
EP2151970B1 (en) Processing and supplying video data
US7428755B2 (en) Device that is used for secure diffusion controlled display private copying and management of and conditional access to MPEG-4-type audiovisual content rights
US10277656B2 (en) Method and system for delivering media data
KR100934306B1 (en) Device for the security of transmission, recording and screening of audiovisual program
US20180255308A1 (en) Video transmitting device and video playing device
WO2021072878A1 (en) Audio/video data encryption and decryption method and apparatus employing rtmp, and readable storage medium
US7327936B2 (en) Secured device for the processing of high-quality audiovisual works
US8903089B2 (en) Device for secure transmission recording and visualization of audiovisual programs
Puteaux et al. Rebuttal: On the security of reversible data hiding in encrypted images by MSB prediction
CN114363011A (en) Ultra-high-definition video leakage-prevention sharing method
CN109309846A (en) A kind of Video security play system and method based on dependable environment
US20080037782A1 (en) Reduction of channel change time for digital media devices using key management and virtual smart cards
FR2843517A1 (en) Scrambling system for audio-visual and multi-media data uses processor operating with data planes and vectors to scramble and decode data
CN108449600B (en) Transmission method and device of movie data
Tew et al. Joint selective encryption and data embedding technique in HEVC video
US10958989B2 (en) Framework for embedding data in encoded video
CN111698534B (en) Video processing method and device, electronic equipment and storage medium
JP2010068145A (en) Data transmitting device, data transmitting method, and data transmitting program, and data receiving device, data receiving method, and data receiving program, and data communication system
JPH1141583A (en) Moving image data processing unit, recording medium and processing method for moving image data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20230112

Address after: 312000 Room 2, Room 134, Building 4, Portal Living Room, Eyou Town, Cao'e Street, Shangyu District, Shaoxing City, Zhejiang Province

Applicant after: Zhejiang Feiyue Digital Technology Co.,Ltd.

Address before: 312000 office 2, No. 124, building 2, portal living room, eyou Town, Cao'e street, Shangyu District, Shaoxing City, Zhejiang Province

Applicant before: Zhejiang Jiai Network Technology Co.,Ltd.