CN114390317B - Encryption method and system for streaming video - Google Patents

Encryption method and system for streaming video Download PDF

Info

Publication number
CN114390317B
CN114390317B CN202210054052.1A CN202210054052A CN114390317B CN 114390317 B CN114390317 B CN 114390317B CN 202210054052 A CN202210054052 A CN 202210054052A CN 114390317 B CN114390317 B CN 114390317B
Authority
CN
China
Prior art keywords
encrypted
key
block
byte
streaming video
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210054052.1A
Other languages
Chinese (zh)
Other versions
CN114390317A (en
Inventor
张鹏
高玉飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Diandunyun Network Technology Co ltd
Original Assignee
Shandong Diandunyun Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Diandunyun Network Technology Co ltd filed Critical Shandong Diandunyun Network Technology Co ltd
Priority to CN202210054052.1A priority Critical patent/CN114390317B/en
Publication of CN114390317A publication Critical patent/CN114390317A/en
Application granted granted Critical
Publication of CN114390317B publication Critical patent/CN114390317B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Abstract

The invention discloses an encryption method and an encryption system for streaming video, which are used for acquiring streaming video to be encrypted; dividing streaming video to be encrypted into a plurality of blocks according to a set byte number; generating a block key for each block; generating a corresponding key character based on each byte to be encrypted of the streaming video to be encrypted based on the block key; generating a random factor for each byte to be encrypted of the streaming video to be encrypted; obtaining a final key corresponding to each byte to be encrypted based on the key character and the random factor of each byte to be encrypted; adopting a final key corresponding to each byte to be encrypted to encrypt the corresponding byte of the streaming video to be encrypted; and encrypting all bytes to be encrypted in the streaming video. The video is compatible with various video formats, and can be encrypted and decrypted rapidly when being dragged at any position; the ciphertext generated by different data has stronger randomness and is not easy to collide with rules.

Description

Encryption method and system for streaming video
Technical Field
The invention relates to the technical field of video encryption, in particular to an encryption method and an encryption system for streaming video.
Background
The statements in this section merely relate to the background of the present disclosure and may not necessarily constitute prior art.
With the development of internet technology, video files are increasingly being applied and spread. Particularly, with the increase of bandwidth, more video files do not want to wait until downloading is completed, but need to be watched online and hopefully can be dragged to any position smoothly for playing. Meanwhile, content creators are urgent to need a video encryption method with high efficiency, safety and compatibility in various video formats, and the method can be used for scenes played in real-time streaming.
The existing encryption technology of video files mainly comprises the following categories:
1. by transforming the video frames, the technology relies on analysis and processing of video coding structures, has long encryption time and poor instantaneity, and has great limitation on compatibility of video formats.
2. Based on conventional encryption algorithms such as AES, most of them need to encrypt from the initial position of the file, and cannot support direct encryption of any position data, so that video streaming and dragging at any position cannot be supported; the method has low encryption speed and increased data volume after encryption, and is not suitable for encrypting massive video data.
3. Still others are encrypted based on exclusive or methods. In the exclusive or operation, if the key rule is simple and even one key is fixed, an attacker can easily search the rule of ciphertext data through inputting a large amount of data, and the security is not enough; the key rule is complex, for example, the ChaCha20 algorithm, the exclusive or key used for encryption of each byte is kept different, each group of keys is used up, a new group of keys can be recalculated, in the encryption process of a 64GB video file, more than 10 hundred million times of key conversion operation is needed, and the efficiency is low; particularly, since the calculation of the new key depends on the result of the previous group of keys, if the player directly drags to a certain position at the tail for playing, hundreds of millions of key transformations are performed to obtain the correct key of the position data, and a great deal of operations are consumed at this time, which causes a clip in dragging for playing and is not suitable for dragging for playing of video.
Disclosure of Invention
In order to solve the defects in the prior art, the invention provides an encryption method and an encryption system for streaming video; the invention aims to realize a rapid and safe encryption method in video streaming, which can be compatible with various video formats and can be used for rapidly encrypting and decrypting when a video is dragged at any position; the ciphertext generated by different data has stronger randomness and is not easy to collide with rules.
In a first aspect, the present invention provides a streaming video oriented encryption method;
an encryption method for streaming video, comprising:
acquiring streaming video to be encrypted; dividing streaming video to be encrypted into a plurality of blocks according to a set byte number;
generating a block key for each block; generating a corresponding key character based on each byte to be encrypted of the streaming video to be encrypted based on the block key;
generating a random factor for each byte to be encrypted of the streaming video to be encrypted; obtaining a final key corresponding to each byte to be encrypted based on the key character and the random factor of each byte to be encrypted;
adopting a final key corresponding to each byte to be encrypted to encrypt the corresponding byte of the streaming video to be encrypted; and encrypting all bytes to be encrypted in the streaming video.
In a second aspect, the present invention provides a streaming video oriented encryption system;
a streaming video oriented encryption system comprising:
an acquisition module configured to: acquiring streaming video to be encrypted; dividing streaming video to be encrypted into a plurality of blocks according to a set byte number;
a block key generation module configured to: generating a block key for each block; generating a corresponding key character based on each byte to be encrypted of the streaming video to be encrypted based on the block key;
a final key generation module configured to: generating a random factor for each byte to be encrypted of the streaming video to be encrypted; obtaining a final key corresponding to each byte to be encrypted based on the key character and the random factor of each byte to be encrypted;
an encryption module configured to: adopting a final key corresponding to each byte to be encrypted to encrypt the corresponding byte of the streaming video to be encrypted; and encrypting all bytes to be encrypted in the streaming video.
In a third aspect, the present invention also provides an electronic device, including:
a memory for non-transitory storage of computer readable instructions; and
a processor for executing the computer-readable instructions,
wherein the computer readable instructions, when executed by the processor, perform the method of the first aspect described above.
In a fourth aspect, the invention also provides a storage medium storing non-transitory computer readable instructions, wherein the instructions of the method of the first aspect are executed when the non-transitory computer readable instructions are executed by a computer.
In a fifth aspect, the invention also provides a computer program product comprising a computer program for implementing the method of the first aspect described above when run on one or more processors.
Compared with the prior art, the invention has the beneficial effects that:
the current video encryption method is mostly based on video frames and video structures, and is generally only suitable for specific video encapsulation formats and video coding, such as one or more of H264, H265 and WMV, TS, MP. The invention is independent of the related factors, and can be used for video files in any format and coding.
The method of the invention is only related to the offset and the file size of the encrypted data in the file, and the encryption of any byte is not related to other data in the video, so the method can encrypt and decrypt from any position, has high operation speed, occupies low calculation resource and has more real-time encryption under the scenes of video stream transmission, dragging and the like.
The block key in the encryption method is based on an external key, a file size, a block number and the like, and each group of block keys is difficult to find a rule by combining with an SHA256 algorithm; of course, if only 32 block key characters are used alternately, an attacker can possibly obtain a rule to solve the key characters after accumulating a large amount of template data, and in order to avoid the rule, the invention uses a random number as a random factor when each byte is encrypted and decrypted, and the block keys participate in encryption together. Because the random numbers have excellent randomness, the superposition can lead the encryption keys of each byte to be different, and the rule is extremely difficult to find through data analysis, so the encryption method has extremely strong security.
In the method, the number of the blocks is limited, so that after all the block keys are calculated at one time, the block keys can be stored by using a small storage space, and thus, each block key only needs to be calculated once in the encryption process of the whole file. Of course, the operation can also be performed when the playing of stream data starts each time, for example, a large video file of 64G, the player directly requests a certain block of data at the tail of the large video file after starting, at this time, the block key of the position block can be calculated only by performing iterative transformation of the block key for thousands of times from the initial key, and the calculated amount is not particularly large; and the calculation amount of the random factor is smaller. Therefore, when encrypting and decrypting the bytes at any position, only a small amount of calculation is needed, and the security and the encryption speed are both considered.
And the initial key is added with the file size to participate in the generation of the key, even if the keys transmitted from the outside are the same, files with different sizes have different encryption characteristics, and the cracking difficulty is increased to a certain extent.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention.
Fig. 1 is a flow chart of a method according to a first embodiment.
Detailed Description
It should be noted that the following detailed description is exemplary and is intended to provide further explanation of the invention. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs.
It is noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of exemplary embodiments according to the present invention. As used herein, unless the context clearly indicates otherwise, the singular forms also are intended to include the plural forms, and furthermore, it is to be understood that the terms "comprises" and "comprising" and any variations thereof are intended to cover non-exclusive inclusions, such as, for example, processes, methods, systems, products or devices that comprise a series of steps or units, are not necessarily limited to those steps or units that are expressly listed, but may include other steps or units that are not expressly listed or inherent to such processes, methods, products or devices.
Embodiments of the invention and features of the embodiments may be combined with each other without conflict.
All data acquisition in the embodiment is legal application of the data on the basis of meeting laws and regulations and agreements of users.
Example 1
The embodiment provides an encryption method for streaming video;
as shown in fig. 1, the streaming video-oriented encryption method includes:
s101: acquiring streaming video to be encrypted; dividing streaming video to be encrypted into a plurality of blocks according to a set byte number;
s102: generating a block key for each block; generating a corresponding key character based on each byte to be encrypted of the streaming video to be encrypted based on the block key;
s103: generating a random factor for each byte to be encrypted of the streaming video to be encrypted; obtaining a final key corresponding to each byte to be encrypted based on the key character and the random factor of each byte to be encrypted;
s104: adopting a final key corresponding to each byte to be encrypted to encrypt the corresponding byte of the streaming video to be encrypted; and encrypting all bytes to be encrypted in the streaming video.
Further, the step S101: acquiring streaming video to be encrypted; dividing streaming video to be encrypted into a plurality of blocks according to a set byte number; the method specifically comprises the following steps:
and dividing the streaming video to be encrypted according to each P megadata, defining each group of divided data as a block to obtain a plurality of blocks, and numbering all the blocks according to a time sequence, wherein the value of P is a positive number.
Illustratively, P has a value of 16.
It should be understood that, unlike a video transmission mode in which the entire video file needs to be downloaded and played, streaming video is "download-while-play", in which only a small amount of video data can be acquired from a server and then direct play can be started, and the player can drag to any location, directly request video frame data near the location, and directly play and drag switch from any location.
Further, the step S102: generating a block key for each block; the method specifically comprises the following steps:
each block uses the block key of the immediately previous block, the block number of the block, and a set of character strings to perform encryption operation together to obtain a set of Q-bit keys, and the Q-bit key is set as the block key K of the current block;
wherein the first block has no previous block, and the first block uses the initial key as the block key of the previous block.
The initial key is a Q-bit initial key, wherein the first M bits use the user-entered key and the last T bits use the total size of the video file.
Wherein, the value of Q is 256, the value of M is 192, the value of T is 64, and Q and M, T are positive integers.
The encryption operation may be an operation in the modes of SHA256, SHA128, MD5, etc.
Typically, 32 bits are an integer of 4 bytes, which can only represent files up to 4G. For large video files, it is typically necessary to store the file size in 8 bytes, i.e., a 64 bit integer. T is typically 64 and stores the size value of the total file.
Further, the step S102: generating a corresponding key character based on each byte to be encrypted of the streaming video to be encrypted based on the block key; the method specifically comprises the following steps:
dividing the block key K into a group according to each R bit to obtain S group key characters;
numbering the S group key characters with K0-K S-1;
when the data of the ith byte in the block is encrypted, the offset of the data of the ith byte in the block is divided by S to obtain remainder, and the obtained result N is used as the number of the key character, so that a key character K [ N ] is selected for the data of the ith byte.
Wherein, the value of R is 8. Wherein, the value of S is 32.R and S are both positive integers.
Further, the step S103: generating a random factor for each byte to be encrypted of the streaming video to be encrypted; the method specifically comprises the following steps:
multiplying the offset of the byte to be encrypted in the whole streaming video by the total length of the whole streaming video, and taking the product as the Seed of the random number generator; the random number generator generates a random number, which is a random factor X.
By way of example, in actual implementation the above calculations may be made directly using a pseudo-random number generator that is self-contained in a computer development language, such as a random number generator based on xoshiro128, linear congruence methods, or the like.
Further, the step S103: obtaining a final key corresponding to each byte to be encrypted based on the key character and the random factor of each byte to be encrypted; the method specifically comprises the following steps:
and carrying out exclusive OR processing on the KEY character K [ N ] of each byte to be encrypted and the random factor X of the current byte to be encrypted, and taking the exclusive OR processing result as a final KEY KEY of the byte to be encrypted.
Further, the step S104: encrypting the corresponding bytes of the streaming video to be encrypted by adopting a final key corresponding to each byte to be encrypted; the method specifically comprises the following steps:
and carrying out exclusive or processing on the corresponding bytes of the streaming video to be encrypted by adopting a final key corresponding to each byte to be encrypted, so as to obtain ciphertext data corresponding to the current byte to be encrypted.
Further, the method further comprises:
decryption processing is carried out by adopting the inverse process of the encryption method.
The decryption process of the video data is the inverse process of encryption, and the decrypted plaintext data can be obtained by repeating the encryption operation once.
The use of 256-bit keys, split into one block per 16MB, is a preferred embodiment and is not intended to limit the invention. Other bit number keys and other byte numbers are modified by a key transformation, and any modifications, equivalent substitutions, improvements, etc. within the spirit and principles of the present invention are intended to be included within the scope of the present invention.
Example two
The embodiment provides an encryption system for streaming video;
a streaming video oriented encryption system comprising:
an acquisition module configured to: acquiring streaming video to be encrypted; dividing streaming video to be encrypted into a plurality of blocks according to a set byte number;
a block key generation module configured to: generating a block key for each block; generating a corresponding key character based on each byte to be encrypted of the streaming video to be encrypted based on the block key;
a final key generation module configured to: generating a random factor for each byte to be encrypted of the streaming video to be encrypted; obtaining a final key corresponding to each byte to be encrypted based on the key character and the random factor of each byte to be encrypted;
an encryption module configured to: adopting a final key corresponding to each byte to be encrypted to encrypt the corresponding byte of the streaming video to be encrypted; and encrypting all bytes to be encrypted in the streaming video.
Here, the above-mentioned obtaining module, the block key generating module, the final key generating module, and the encrypting module correspond to steps S101 to S104 in the first embodiment, and the above-mentioned modules are the same as examples and application scenarios implemented by the corresponding steps, but are not limited to the disclosure in the first embodiment. It should be noted that the modules described above may be implemented as part of a system in a computer system, such as a set of computer-executable instructions.
The foregoing embodiments are directed to various embodiments, and details of one embodiment may be found in the related description of another embodiment.
The proposed system may be implemented in other ways. For example, the system embodiments described above are merely illustrative, such as the division of the modules described above, are merely a logical function division, and may be implemented in other manners, such as multiple modules may be combined or integrated into another system, or some features may be omitted, or not performed.
Example III
The embodiment also provides an electronic device, including: one or more processors, one or more memories, and one or more computer programs; wherein the processor is coupled to the memory, the one or more computer programs being stored in the memory, the processor executing the one or more computer programs stored in the memory when the electronic device is running, to cause the electronic device to perform the method of the first embodiment.
It should be understood that in this embodiment, the processor may be a central processing unit CPU, and the processor may also be other general purpose processors, digital signal processors DSP, application specific integrated circuits ASIC, off-the-shelf programmable gate array FPGA or other programmable logic device, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory may include read only memory and random access memory and provide instructions and data to the processor, and a portion of the memory may also include non-volatile random access memory. For example, the memory may also store information of the device type.
In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or by instructions in the form of software.
The method in the first embodiment may be directly implemented as a hardware processor executing or implemented by a combination of hardware and software modules in the processor. The software modules may be located in a random access memory, flash memory, read only memory, programmable read only memory, or electrically erasable programmable memory, registers, etc. as well known in the art. The storage medium is located in a memory, and the processor reads the information in the memory and, in combination with its hardware, performs the steps of the above method. To avoid repetition, a detailed description is not provided herein.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
Example IV
The present embodiment also provides a computer-readable storage medium storing computer instructions that, when executed by a processor, perform the method of embodiment one.
The above description is only of the preferred embodiments of the present invention and is not intended to limit the present invention, but various modifications and variations can be made to the present invention by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (8)

1. An encryption method for streaming video, comprising:
acquiring streaming video to be encrypted; dividing streaming video to be encrypted into a plurality of blocks according to a set byte number;
generating a block key for each block; generating a corresponding key character based on each byte to be encrypted of the streaming video to be encrypted based on the block key;
generating a random factor for each byte to be encrypted of the streaming video to be encrypted; obtaining a final key corresponding to each byte to be encrypted based on the key character and the random factor of each byte to be encrypted;
adopting a final key corresponding to each byte to be encrypted to encrypt the corresponding byte of the streaming video to be encrypted; encrypting all bytes to be encrypted in the streaming video;
generating a block key for each block; the method specifically comprises the following steps:
each block uses the block key of the immediately previous block, the block number of the block, and a set of character strings to perform encryption operation together to obtain a set of Q-bit keys, and the Q-bit key is set as the block key K of the current block;
wherein the first block has no previous block, and the first block uses the initial key as the block key of the previous block;
the initial key is a Q-bit initial key, wherein the first M bits use a key input by a user, and the last T bits use the total size of the video file;
generating a random factor for each byte to be encrypted of the streaming video to be encrypted; the method specifically comprises the following steps:
multiplying the offset of the byte to be encrypted in the whole streaming video by the total length of the whole streaming video, and taking the product as the Seed of the random number generator; the random number generator generates a random number, which is a random factor X.
2. The streaming video-oriented encryption method according to claim 1, wherein the streaming video to be encrypted is acquired; dividing streaming video to be encrypted into a plurality of blocks according to a set byte number; the method specifically comprises the following steps:
and dividing the streaming video to be encrypted according to each P megadata, defining each group of divided data as a block to obtain a plurality of blocks, and numbering all the blocks according to a time sequence, wherein the value of P is a positive number.
3. The streaming video oriented encryption method of claim 1, wherein each byte to be encrypted of the streaming video to be encrypted generates a corresponding key character based on the block key; the method specifically comprises the following steps:
dividing the block key K into a group according to each R bit to obtain S group key characters;
numbering the S group key characters with K0-K S-1;
when the data of the ith byte in the block is encrypted, the offset of the data of the ith byte in the block is divided by S to obtain remainder, and the obtained result N is used as the number of the key character, so that a key character K [ N ] is selected for the data of the ith byte.
4. The streaming video-oriented encryption method of claim 1, wherein a final key corresponding to each byte to be encrypted is obtained based on a key character and a random factor of each byte to be encrypted; the method specifically comprises the following steps:
and carrying out exclusive OR processing on the KEY character K [ N ] of each byte to be encrypted and the random factor X of the current byte to be encrypted, and taking the exclusive OR processing result as a final KEY KEY of the byte to be encrypted.
5. The streaming video-oriented encryption method of claim 1, wherein the corresponding bytes of the streaming video to be encrypted are encrypted using a final key corresponding to each byte to be encrypted; the method specifically comprises the following steps:
and carrying out exclusive or processing on the corresponding bytes of the streaming video to be encrypted by adopting a final key corresponding to each byte to be encrypted, so as to obtain ciphertext data corresponding to the current byte to be encrypted.
6. A streaming video oriented encryption system comprising:
an acquisition module configured to: acquiring streaming video to be encrypted; dividing streaming video to be encrypted into a plurality of blocks according to a set byte number;
a block key generation module configured to: generating a block key for each block; generating a corresponding key character based on each byte to be encrypted of the streaming video to be encrypted based on the block key;
a final key generation module configured to: generating a random factor for each byte to be encrypted of the streaming video to be encrypted; obtaining a final key corresponding to each byte to be encrypted based on the key character and the random factor of each byte to be encrypted;
an encryption module configured to: adopting a final key corresponding to each byte to be encrypted to encrypt the corresponding byte of the streaming video to be encrypted; encrypting all bytes to be encrypted in the streaming video;
generating a block key for each block; the method specifically comprises the following steps:
each block uses the block key of the immediately previous block, the block number of the block, and a set of character strings to perform encryption operation together to obtain a set of Q-bit keys, and the Q-bit key is set as the block key K of the current block;
wherein the first block has no previous block, and the first block uses the initial key as the block key of the previous block;
the initial key is a Q-bit initial key, wherein the first M bits use a key input by a user, and the last T bits use the total size of the video file;
generating a random factor for each byte to be encrypted of the streaming video to be encrypted; the method specifically comprises the following steps:
multiplying the offset of the byte to be encrypted in the whole streaming video by the total length of the whole streaming video, and taking the product as the Seed of the random number generator; the random number generator generates a random number, which is a random factor X.
7. An electronic device, comprising:
a memory for non-transitory storage of computer readable instructions; and
a processor for executing the computer-readable instructions,
wherein the computer readable instructions, when executed by the processor, perform the method of any of the preceding claims 1-5.
8. A storage medium, characterized by non-transitory storing computer-readable instructions, wherein the instructions of the method of any one of claims 1-5 are performed when the non-transitory computer-readable instructions are executed by a computer.
CN202210054052.1A 2022-01-18 2022-01-18 Encryption method and system for streaming video Active CN114390317B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210054052.1A CN114390317B (en) 2022-01-18 2022-01-18 Encryption method and system for streaming video

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210054052.1A CN114390317B (en) 2022-01-18 2022-01-18 Encryption method and system for streaming video

Publications (2)

Publication Number Publication Date
CN114390317A CN114390317A (en) 2022-04-22
CN114390317B true CN114390317B (en) 2024-03-19

Family

ID=81204599

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210054052.1A Active CN114390317B (en) 2022-01-18 2022-01-18 Encryption method and system for streaming video

Country Status (1)

Country Link
CN (1) CN114390317B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116962077B (en) * 2023-09-19 2023-12-19 哈尔滨工程大学三亚南海创新发展基地 Data encryption and decryption method based on data capacity and data transmission system

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104284208A (en) * 2014-10-23 2015-01-14 航天数字传媒有限公司 Method and system for conducting parallel encryption through AES-CBC algorithm
CN105337728A (en) * 2015-10-28 2016-02-17 济南知芯集成电路技术有限公司 Data encryption method and system
CN107172429A (en) * 2017-05-17 2017-09-15 西安文理学院 Scalable video stream encryption method based on network code
CN108173885A (en) * 2018-03-27 2018-06-15 国家基础地理信息中心 Data ciphering method, data decryption method and relevant apparatus
CN108768606A (en) * 2018-05-10 2018-11-06 深圳市汇星数字技术有限公司 The real-time encrypted method and system of Streaming Media based on transmission of video
CN109510703A (en) * 2018-11-23 2019-03-22 北京海泰方圆科技股份有限公司 A kind of data encryption/decryption method and device
CN110677694A (en) * 2019-10-15 2020-01-10 华南理工大学 Video encryption method for resisting contour attack
CN110730366A (en) * 2019-10-30 2020-01-24 杭州叙简科技股份有限公司 Bit operation-based lightweight video stream encryption and decryption method and encryption and decryption mechanism
CN111163164A (en) * 2019-12-27 2020-05-15 山东乾云启创信息科技股份有限公司 Cloud desktop secure transmission method and device based on Roc chip
CN111698238A (en) * 2020-06-05 2020-09-22 中国电力科学研究院有限公司 Management method, system and storage medium for terminal layer equipment key of power internet of things
CN112491532A (en) * 2020-12-03 2021-03-12 珠海格力电器股份有限公司 Video data encryption method and device, storage medium and electronic equipment
WO2021120831A1 (en) * 2019-12-20 2021-06-24 北京云享智胜科技有限公司 Streaming media data encryption method and apparatus, streaming media data decryption method and apparatus, electronic device and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100464584C (en) * 2006-11-21 2009-02-25 北京中星微电子有限公司 Video monitoring system and method for implementing signal encription

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104284208A (en) * 2014-10-23 2015-01-14 航天数字传媒有限公司 Method and system for conducting parallel encryption through AES-CBC algorithm
CN105337728A (en) * 2015-10-28 2016-02-17 济南知芯集成电路技术有限公司 Data encryption method and system
CN107172429A (en) * 2017-05-17 2017-09-15 西安文理学院 Scalable video stream encryption method based on network code
CN108173885A (en) * 2018-03-27 2018-06-15 国家基础地理信息中心 Data ciphering method, data decryption method and relevant apparatus
CN108768606A (en) * 2018-05-10 2018-11-06 深圳市汇星数字技术有限公司 The real-time encrypted method and system of Streaming Media based on transmission of video
CN109510703A (en) * 2018-11-23 2019-03-22 北京海泰方圆科技股份有限公司 A kind of data encryption/decryption method and device
CN110677694A (en) * 2019-10-15 2020-01-10 华南理工大学 Video encryption method for resisting contour attack
CN110730366A (en) * 2019-10-30 2020-01-24 杭州叙简科技股份有限公司 Bit operation-based lightweight video stream encryption and decryption method and encryption and decryption mechanism
WO2021120831A1 (en) * 2019-12-20 2021-06-24 北京云享智胜科技有限公司 Streaming media data encryption method and apparatus, streaming media data decryption method and apparatus, electronic device and storage medium
CN111163164A (en) * 2019-12-27 2020-05-15 山东乾云启创信息科技股份有限公司 Cloud desktop secure transmission method and device based on Roc chip
CN111698238A (en) * 2020-06-05 2020-09-22 中国电力科学研究院有限公司 Management method, system and storage medium for terminal layer equipment key of power internet of things
CN112491532A (en) * 2020-12-03 2021-03-12 珠海格力电器股份有限公司 Video data encryption method and device, storage medium and electronic equipment

Also Published As

Publication number Publication date
CN114390317A (en) 2022-04-22

Similar Documents

Publication Publication Date Title
CN113193950B (en) Data encryption method, data decryption method and storage medium
Avaroğlu et al. Hybrid pseudo-random number generator for cryptographic systems
RU2638639C1 (en) Encoder, decoder and method for encoding and encrypting input data
CN111310222B (en) File encryption method
CN111698576B (en) Information encryption method, decryption method, server, client, and medium
CN110061840A (en) Data ciphering method, device, computer equipment and storage medium
JP2012212138A (en) Encryption program, decryption program, encryption method, decryption method, system, and content generation method
CN110704854B (en) Stream type encryption method aiming at text data reserved format
CN112202754A (en) Data encryption method and device, electronic equipment and storage medium
EP1975779B1 (en) Encryption device using a pseudorandom number generator
JP4737334B2 (en) Encryption device, decryption device, encryption program, decryption program, and recording medium
US20200177380A1 (en) Seed key expansion method and its uses
CN108777803A (en) Broadcasting and TV cloud platform video stream processing method, device, equipment and medium
CN114390317B (en) Encryption method and system for streaming video
CN116488814A (en) FPGA-based data encryption secure computing method
CN116488794A (en) Method and device for realizing high-speed SM4 password module based on FPGA
JP6273226B2 (en) Encryption system, authentication system, encryption device, decryption device, authenticator generation device, verification device, encryption method, authentication method
CN110035327A (en) A kind of safe playback method
CN115632782A (en) Random number generation method, system and equipment based on SM4 counter mode
JP5489115B2 (en) Originality assurance device, originality assurance program, and recording medium for recording the program
KR101076681B1 (en) Encryption method for data and decryption method therefor
JP4287397B2 (en) Ciphertext generation apparatus, ciphertext decryption apparatus, ciphertext generation program, and ciphertext decryption program
CN114286130A (en) Video encryption method, video processing method and device and electronic equipment
JP6631989B2 (en) Encryption device, control method, and program
CN112954388A (en) Data file acquisition method and device, terminal equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant