CN114422652A - Large-angle imaging reconnaissance system - Google Patents

Large-angle imaging reconnaissance system Download PDF

Info

Publication number
CN114422652A
CN114422652A CN202210309517.3A CN202210309517A CN114422652A CN 114422652 A CN114422652 A CN 114422652A CN 202210309517 A CN202210309517 A CN 202210309517A CN 114422652 A CN114422652 A CN 114422652A
Authority
CN
China
Prior art keywords
fragments
encrypted
picture data
data
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210309517.3A
Other languages
Chinese (zh)
Other versions
CN114422652B (en
Inventor
陈志鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zhongke Feihong Technology Co ltd
Original Assignee
Beijing Zhongke Feihong Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zhongke Feihong Technology Co ltd filed Critical Beijing Zhongke Feihong Technology Co ltd
Priority to CN202210309517.3A priority Critical patent/CN114422652B/en
Publication of CN114422652A publication Critical patent/CN114422652A/en
Application granted granted Critical
Publication of CN114422652B publication Critical patent/CN114422652B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Facsimile Transmission Control (AREA)

Abstract

The application discloses wide-angle formation of image reconnaissance system includes: an acquisition unit configured to acquire original picture data; a storage unit configured to store the original picture data; an encryption unit configured to encrypt the original picture data; wherein the encryption unit comprises a splitting subunit and an encryption subunit; the segmentation subunit is configured to segment the picture in the original picture data to obtain a verification fragment and a fragment to be encrypted; the encryption subunit is configured to encrypt the to-be-encrypted fragments to obtain encrypted fragments; the reconnaissance system further comprises a sending unit configured to send the encryption fragments to a data receiver and send the verification fragments to a network side. The application realizes that after the picture is shot by the reconnaissance equipment, the picture is divided and encrypted and then the picture data is transmitted, so that the exposure of the picture data can be reduced, and the personal safety and the data safety of reconnaissance personnel are ensured.

Description

Large-angle imaging reconnaissance system
Technical Field
The application relates to the field of imaging reconnaissance, in particular to a large-angle imaging reconnaissance system.
Background
The combined type laser reconnaissance equipment is generally used in a reconnaissance system, and is handheld equipment integrating a low-illumination high-definition integrated camera, an infrared laser lighting system, a special multimedia processor, a high-resolution liquid crystal display and the like. The composite laser reconnaissance equipment has the functions of glass transmission monitoring, peeping prevention, day and night remote monitoring, real-time photographing, video recording, local playback, data export and the like.
In view of the above-mentioned related technologies, the inventor of the present application finds that at least the following technical problems exist in the process of implementing the technical solution of the invention in the embodiment of the present application: at present, reconnaissance personnel reconnaissance and evidence obtaining are carried out outdoors by using composite laser reconnaissance equipment, after evidence obtaining is completed, the composite laser reconnaissance equipment is taken back, photos and videos in the equipment are derived, then reconnaissance data can be obtained, and when the reconnaissance equipment is damaged in the moving process, or a storage chip is lost, the reconnaissance data can be lost, data leakage can be caused, and personal safety and data safety of the reconnaissance personnel are affected.
Disclosure of Invention
The embodiment of the application provides a wide-angle imaging reconnaissance system, has solved the technical problem that the data that reconnaissance equipment obtained among the prior art loses and influences reconnaissance personnel's personal safety, has realized after taking the picture with reconnaissance equipment, has cut apart the picture and has carried the picture data after encrypting, can reduce the exposure of picture data to guarantee reconnaissance personnel's personal safety and data security.
The embodiment of the application provides a wide-angle formation of image reconnaissance system, includes: an acquisition unit configured to acquire original picture data; a storage unit configured to store the original picture data; an encryption unit configured to encrypt the original picture data; wherein the encryption unit comprises a splitting subunit and an encryption subunit; the segmentation subunit is configured to segment the picture in the original picture data to obtain a verification fragment and a fragment to be encrypted; the encryption subunit is configured to encrypt the to-be-encrypted fragments to obtain encrypted fragments; the reconnaissance system further comprises: and the sending unit is configured to send the encrypted fragments to a data receiver and send the verification fragments to a network side, and the data receiver logs in the network side by using personal verification information to obtain the verification fragments and splices the decrypted encrypted fragments to obtain the original picture data.
Further, the encryption unit further comprises a fuzzy processing subunit, the fuzzy processing subunit is configured to perform fuzzy processing on the fragments to be encrypted by using a fuzzy processing tool, and the data receiver recovers the fragments to be encrypted after the fuzzy processing by using the fuzzy processing tool.
Further, the obfuscation tool is configured for use by the data recipient with personal authentication information.
Further, the encryption unit divides the picture in the original picture data in an off-line state, and encrypts the fragments to be encrypted in the off-line state.
Further, the sending unit is configured to send the encrypted fragments to a data receiver and send the verification fragments to a network side at the same time, and the data receiver verifies the encrypted fragments and the extended fragments by using the sending time stamps.
Further, dividing the picture in the original picture data into non-continuous frame pictures in the original picture data.
Further, the encryption of the original picture data is completed by an encryption chip in the reconnaissance device.
Further, the reconnaissance system is applied to a reconnaissance method, which comprises the following steps: acquiring original picture data; storing the original picture data; encrypting the original picture data; wherein the encrypting the original picture data comprises: segmenting the picture in the original picture data to obtain verification fragments and fragments to be encrypted, and encrypting the fragments to be encrypted to obtain encrypted fragments; carrying out fuzzy processing on the fragments to be encrypted by utilizing a fuzzy processing tool; the data receiver utilizes the fuzzy processing tool to restore the fragments to be encrypted after fuzzy processing; sending the encrypted fragments to a data receiver and sending the verification fragments to a network side; and the data receiver logs in a network side by utilizing the personal authentication information to obtain authentication fragments and splices the decrypted encryption fragments to obtain the original picture data.
The technical scheme provided in the embodiment of the application at least has the following technical effects or advantages:
1. the original picture data is divided, and the encrypted fragments are verified by the verification fragments obtained after division, so that a data receiver can safely obtain the original picture data, the original picture data can be locally stored, the original picture data can be encrypted, uploaded and sent in real time, and the data receiver decrypts the original picture data to obtain the original picture data, and therefore exposure of the original picture data can be reduced, and personal safety and data safety of reconnaissance personnel can be guaranteed.
2. Due to the fact that the fuzzy processing tool is utilized, the fuzzy processing tool is utilized to conduct fuzzy processing on the fragments to be encrypted, when the fragments to be encrypted need to be recovered, the fuzzy processing tool can be used for recovering, and the data receiver can use the personal verification information before the fuzzy processing tool is used, unnecessary personnel can be reduced from using the fuzzy processing tool, and data safety is further enhanced.
3. Because the encryption chip is used, the to-be-encrypted fragments can be encrypted in an off-line state, and the encrypted fragments are obtained, so that the encryption chip is used for encrypting in the off-line state, the damage of an external network to the encryption process can be reduced, the security in the encryption process can be further improved, and the data security is further improved.
Drawings
FIG. 1 is a schematic structural diagram of a wide-angle imaging reconnaissance system according to an embodiment of the present disclosure;
FIG. 2 is a schematic structural diagram of an encryption unit in a wide-angle imaging reconnaissance system according to an embodiment of the present disclosure;
fig. 3 is a flowchart of a method for wide angle imaging scout detection in an embodiment of the present application.
Fig. 4 is a flowchart illustrating steps of encrypting original picture data in a wide-angle imaging reconnaissance method according to an embodiment of the present application.
Detailed Description
The embodiment of the application discloses a large-angle imaging reconnaissance system, and solves the technical problem that in the prior art, the personal safety of reconnaissance personnel is affected due to the fact that data acquired by reconnaissance equipment is lost.
In view of the above technical problems, the technical solution provided by the present application has the following general idea:
the embodiment of the application provides a wide-angle imaging reconnaissance system, and the system comprises: an acquisition unit configured to acquire original picture data; a storage unit configured to store the original picture data; an encryption unit configured to encrypt the original picture data; a sending unit configured to send the encrypted fragments to a data receiver and send the verification fragments to a network side.
In order to make the above-mentioned basic system of the embodiments of the present application more comprehensible, specific embodiments of the present application are described in detail below with reference to the accompanying drawings.
Example one
Fig. 1 is a large-angle imaging reconnaissance system according to an embodiment of the present disclosure, which may be installed in a reconnaissance device, and a communication module may be provided to connect the reconnaissance system to a network side. The reconnaissance system comprises an acquisition unit, a storage unit, an encryption unit and a transmission unit, wherein,
an acquisition unit configured to acquire original picture data.
In specific implementation, the compound laser reconnaissance equipment can be used for reconnaissance of a reconnaissance target, the compound laser reconnaissance equipment is a handheld device which integrates a low-illumination high-definition integrated camera, an infrared laser lighting system, a special multimedia processor, a high-resolution liquid crystal display and the like, the compound laser reconnaissance equipment has a glass-transparent monitoring function, a peeping-proof function, a day and night remote monitoring function, real-time photographing and video recording, and a large number of reconnaissance pictures can be obtained by the compound laser reconnaissance equipment.
A storage unit configured to store the original picture data.
In specific implementation, a memory can be arranged in the reconnaissance equipment and used for storing a large number of reconnaissance pictures shot by the reconnaissance equipment, so that the reconnaissance equipment can be taken out of the memory and used for playback and viewing, and the memory arranged locally can realize rapid viewing of original picture data, so that reconnaissance personnel can rapidly reply the reconnaissance information and accelerate circulation of the information.
An encryption unit configured to encrypt the original picture data.
In a specific implementation, as shown in fig. 2, the encryption unit includes a splitting subunit, an encryption subunit, and a obfuscation processing subunit.
In a specific implementation, the dividing subunit is configured to divide the picture in the original picture data to obtain the verification fragment and the fragment to be encrypted, wherein when the picture in the original picture data is divided, a non-continuous-frame picture in the original picture data may be adopted, and the non-continuous-frame picture is utilized to further split the picture data, so that data security may be further improved. In addition, the fragments to be encrypted are used for subsequent encryption, the verification fragments are used for verifying the fragments to be encrypted after decryption by a data receiver, whether the decrypted fragments can be matched with the verification fragments or not is verified, if the fragments are matched, the picture is correct, and if the fragments cannot be matched, the picture is incorrect, so that the risk of being tampered exists.
In a specific implementation, the encryption subunit is configured to encrypt the to-be-encrypted fragment to obtain an encrypted fragment, where an encryption chip may be set in the reconnaissance device, and then the to-be-encrypted fragment is encrypted by using the encryption chip in an offline state to obtain the encrypted fragment, so that the encryption chip is used for encrypting in the offline state, which may reduce damage to an external network in an encryption process, and may further improve security in the encryption process, thereby further improving data security.
In a specific implementation, the obfuscation sub-unit is configured to obfuscate the to-be-encrypted fragment using an obfuscation tool. When the fragments to be encrypted need to be recovered, the fuzzy processing tool can be used for recovering, the fuzzy processing tool can be selected from one of various existing tools at present, and can be set to be used by a data receiver by utilizing personal authentication information before the fuzzy processing tool is used, and the personal authentication information can be login information which is registered by the data receiver and is provided with a password, and can also be registered and logged in through a mobile phone number so that the data receiver can conveniently use the fuzzy processing tool.
Because the existing fuzzy processing tools are diversified, and different types of fuzzy processing tools with different design languages exist, when picture data is stolen, a stealer can hardly judge which fuzzy processing tool is used to recover encrypted fragments, so that thousands of fuzzy processing tools need to be tried, and a large amount of time and energy are consumed, so that the data security can be ensured.
A sending unit configured to send the encrypted fragments to a data receiver and send the verification fragments to a network side.
In a specific implementation, a data receiver may obtain the authentication fragment by logging in a network using the personal authentication information, splice the decrypted encryption fragment, and obtain the original picture data.
In a specific implementation, the sending unit may send the verification fragment to the network disk side.
In the specific implementation, the encryption fragments can be sent to the data receiver and the verification fragments can be sent to the network side in real time and simultaneously, so that the data receiver can verify the encryption fragments and the verification fragments by using the sending time stamps. Because send the encryption piece simultaneously and verify the piece, consequently have the same transmission time stamp to when data receiver after receiving the encryption piece and verifying the piece, can observe the encryption piece and verify whether the transmission time stamp of piece is unanimous, and then can judge at the transmitting process, whether the problem has appeared, so that in time carry out data repair.
In summary, the original picture data is divided, and the encrypted fragments are verified by the verification fragments obtained after the division, so that a data receiver can safely obtain the original picture data, the original picture data can be locally stored, the original picture data can be encrypted, uploaded and sent in real time, and the data receiver decrypts to obtain the original picture data, thereby reducing exposure of the original picture data, performing fuzzy processing on the encrypted fragments by using a fuzzy processing tool, and making it difficult for a thief to determine which fuzzy processing tool is used for recovering the encrypted fragments, so as to ensure personal safety and data safety of a scout.
In order to make the embodiment of the present application better understood and realized by those skilled in the art, a reconnaissance method is described below with reference to fig. 3.
Example two
Referring to fig. 3, an embodiment of the present application provides a reconnaissance method, where the reconnaissance method includes:
s1, original picture data is acquired.
In a specific implementation, the reconnaissance target can be reconnaissance by the compound laser reconnaissance device.
S2, storing the original picture data.
In a specific implementation, the acquired raw picture data may be stored in a memory of the spy device.
S3, encrypting the original picture data.
In a specific implementation, as shown in fig. 4, encrypting the original picture data includes the following steps:
and S31, segmenting the picture in the original picture data to obtain verification fragments and fragments to be encrypted.
In specific implementation, a picture shot by a reconnaissance device can be segmented and divided, so that the picture is divided into two parts, wherein one part can be used as a verification fragment, the other part can be used as a fragment to be encrypted, the fragment to be encrypted is used for subsequent encryption, the verification fragment is used for verifying the fragment to be encrypted after decryption by a data receiver, whether the decrypted fragment can be matched with the verification fragment or not is verified, if the decrypted fragment and the verification fragment are matched, the picture is correct, and if the decrypted fragment and the verification fragment cannot be matched, the picture is incorrect and has a risk of being tampered, so that the data security can be improved.
In specific implementation, a non-continuous frame picture in original picture data can be adopted, and the picture data can be further split by utilizing the non-continuous frame picture, so that the data security can be further improved.
S32, encrypting the fragments to be encrypted to obtain encrypted fragments.
In specific implementation, an encryption chip can be arranged in the reconnaissance device, and then the encryption chip is used for encrypting the fragments to be encrypted in an off-line state, so that the encrypted fragments are obtained, and the security in the encryption process is improved.
And S33, performing fuzzy processing on the fragments to be encrypted by using a fuzzy processing tool.
In the specific implementation, as the fuzzy processing tools are diversified, when data is stolen, a stealer can hardly judge which fuzzy processing tool is used to recover the encrypted fragments, so that the data security can be ensured.
And S4, sending the encrypted fragments to a data receiver and sending the verification fragments to a network side.
In specific implementation, a data receiver logs in a network side by using personal authentication information to obtain authentication fragments and splices the decrypted encryption fragments to obtain original picture data.
Various changes and specific implementations of the high-angle imaging reconnaissance system in the first embodiment are also applicable to the high-angle imaging reconnaissance method in the present embodiment, and those skilled in the art can clearly know the high-angle imaging reconnaissance method in the present embodiment through the foregoing detailed description of the high-angle imaging reconnaissance system, so for the brevity of the description, detailed descriptions are omitted here.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create a system for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including an instruction system which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks. While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (8)

1. A large angle imaging reconnaissance system, comprising:
an acquisition unit configured to acquire original picture data;
a storage unit configured to store the original picture data;
an encryption unit configured to encrypt the original picture data; wherein the content of the first and second substances,
the encryption unit comprises a splitting subunit and an encryption subunit;
the segmentation subunit is configured to segment the picture in the original picture data to obtain a verification fragment and a fragment to be encrypted;
the encryption subunit is configured to encrypt the to-be-encrypted fragments to obtain encrypted fragments;
the reconnaissance system further comprises:
and the sending unit is configured to send the encrypted fragments to a data receiver and send the verification fragments to a network side, and the data receiver logs in the network side by using personal verification information to obtain the verification fragments and splices the decrypted encrypted fragments to obtain the original picture data.
2. The large angle imaging reconnaissance system of claim 1, wherein the encryption unit further comprises a obfuscation sub-unit configured to obfuscate the to-be-encrypted shards using an obfuscation tool, the obfuscated to-be-encrypted shards being recovered by the data receiver using the obfuscation tool.
3. The large angle imaging reconnaissance system of claim 2, wherein the blur processing tool is configured for use by the data receiver with personal authentication information.
4. The large angle imaging reconnaissance system of claim 1, wherein the encryption unit is configured to segment the picture in the original picture data off-line, and to encrypt the slice to be encrypted off-line.
5. The large angle imaging reconnaissance system of claim 1, wherein the transmitting unit is configured to simultaneously transmit the encryption shards to a data receiver and the verification shards to a network side, the data receiver verifying the encryption shards and the extension shards with a transmission time stamp.
6. The large angle imaging reconnaissance system of claim 1, wherein a picture in the raw picture data is segmented into non-consecutive frames of pictures in the raw picture data.
7. The large angle imaging reconnaissance system of claim 1, wherein the encrypting of the raw picture data is performed by an encryption chip in the reconnaissance device.
8. A high angle imaging reconnaissance system as claimed in any one of claims 1 to 7, wherein the reconnaissance system is applied to a reconnaissance method comprising:
acquiring original picture data;
storing the original picture data;
encrypting the original picture data; wherein the encrypting the original picture data comprises: segmenting the picture in the original picture data to obtain verification fragments and fragments to be encrypted, and encrypting the fragments to be encrypted to obtain encrypted fragments;
carrying out fuzzy processing on the fragments to be encrypted by utilizing a fuzzy processing tool; the data receiver utilizes the fuzzy processing tool to restore the fragments to be encrypted after fuzzy processing;
sending the encrypted fragments to a data receiver and sending the verification fragments to a network side; and the data receiver logs in a network side by utilizing the personal authentication information to obtain authentication fragments and splices the decrypted encryption fragments to obtain the original picture data.
CN202210309517.3A 2022-03-28 2022-03-28 Large-angle imaging reconnaissance system Active CN114422652B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210309517.3A CN114422652B (en) 2022-03-28 2022-03-28 Large-angle imaging reconnaissance system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210309517.3A CN114422652B (en) 2022-03-28 2022-03-28 Large-angle imaging reconnaissance system

Publications (2)

Publication Number Publication Date
CN114422652A true CN114422652A (en) 2022-04-29
CN114422652B CN114422652B (en) 2022-06-03

Family

ID=81263068

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210309517.3A Active CN114422652B (en) 2022-03-28 2022-03-28 Large-angle imaging reconnaissance system

Country Status (1)

Country Link
CN (1) CN114422652B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104598802A (en) * 2015-02-13 2015-05-06 北京京东尚科信息技术有限公司 Verification method and system based on puzzle
CN105141842A (en) * 2015-08-31 2015-12-09 广州市幸福网络技术有限公司 Tamper-proof license camera system and method
CN108377319A (en) * 2018-03-15 2018-08-07 北京顶象技术有限公司 picture transmission method and device
CN108924379A (en) * 2018-06-08 2018-11-30 安徽师范大学 A kind of digital image encryption method
US10404467B1 (en) * 2018-09-09 2019-09-03 Tyson York Winarski Blockchain digest augmention of media files including group-of-pictures video streams for MXF files

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104598802A (en) * 2015-02-13 2015-05-06 北京京东尚科信息技术有限公司 Verification method and system based on puzzle
CN105141842A (en) * 2015-08-31 2015-12-09 广州市幸福网络技术有限公司 Tamper-proof license camera system and method
CN108377319A (en) * 2018-03-15 2018-08-07 北京顶象技术有限公司 picture transmission method and device
CN108924379A (en) * 2018-06-08 2018-11-30 安徽师范大学 A kind of digital image encryption method
US10404467B1 (en) * 2018-09-09 2019-09-03 Tyson York Winarski Blockchain digest augmention of media files including group-of-pictures video streams for MXF files

Also Published As

Publication number Publication date
CN114422652B (en) 2022-06-03

Similar Documents

Publication Publication Date Title
EP3710974B1 (en) Method and arrangement for detecting digital content tampering
EP2832102B1 (en) Methods and systems for cryptographic access control of video
CN109218825B (en) Video encryption system
CN111274578B (en) Data safety protection system and method for video monitoring system
US8473757B2 (en) Protecting digital data such as images on a device with image acquisition capabilities
US20080137869A1 (en) Key Management System for Digital Cinema
CN109151508B (en) Video encryption method
CN106576098B (en) The authentication engine and crossfire crypto engine being shared in digital content protection framework
KR101804791B1 (en) realtime video encryption system and method thereof
CN102932650B (en) Video data integrity protection and verification method, equipment and system
CN105049877A (en) Encryption method and device for live and recorded broadcast interaction system
CN109274644A (en) A kind of data processing method, terminal and watermark server
CN111405223A (en) Video processing method, device and equipment
CN114390316A (en) Processing method and device for image acquisition synchronous encryption privacy protection
KR20160118117A (en) Apparatus and method for secure transmission of video data
EP3393123A1 (en) Digital forensic image verification system
CN114422652B (en) Large-angle imaging reconnaissance system
CN104284237A (en) Video transmission method and system
CN105279443A (en) Picture encrypting and decrypting methods and devices
US9965979B2 (en) Display system and encryption and decryption method thereof
KR20180065183A (en) Embedded module for secure CCTV camera image encryption
CN113595741B (en) Credible data chain generation system and method based on 5G law enforcement recorder
CN114153841A (en) Technical data encryption storage and viewing method
CN109120648B (en) A kind of anti-tamper verifying system of real-time monitoring data
CN111881438A (en) Method and device for carrying out biological feature recognition based on privacy protection and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant