CN114827671B - Streaming media encryption transmission method based on hardware fingerprint - Google Patents

Streaming media encryption transmission method based on hardware fingerprint Download PDF

Info

Publication number
CN114827671B
CN114827671B CN202210276315.3A CN202210276315A CN114827671B CN 114827671 B CN114827671 B CN 114827671B CN 202210276315 A CN202210276315 A CN 202210276315A CN 114827671 B CN114827671 B CN 114827671B
Authority
CN
China
Prior art keywords
streaming media
fingerprint
data
encryption
media data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210276315.3A
Other languages
Chinese (zh)
Other versions
CN114827671A (en
Inventor
兰雨晴
张腾怀
余丹
邢智涣
王丹星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Standard Intelligent Security Technology Co Ltd
Original Assignee
China Standard Intelligent Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Standard Intelligent Security Technology Co Ltd filed Critical China Standard Intelligent Security Technology Co Ltd
Priority to CN202210276315.3A priority Critical patent/CN114827671B/en
Publication of CN114827671A publication Critical patent/CN114827671A/en
Application granted granted Critical
Publication of CN114827671B publication Critical patent/CN114827671B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4405Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/63Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
    • H04N21/643Communication protocols
    • H04N21/6437Real-time Transport Protocol [RTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The embodiment of the invention discloses a streaming media encryption transmission method based on hardware fingerprints, and relates to the technical field of streaming media transmission. The method comprises the following steps: fingerprint encryption is carried out on original streaming media data acquired by the camera equipment based on hardware fingerprints of the camera equipment; and transmitting the finally encrypted streaming media data to a target receiving end. The invention can encrypt and transmit the streaming media data, effectively improves the security of the streaming media data and avoids the condition that information is leaked.

Description

Streaming media encryption transmission method based on hardware fingerprint
Technical Field
The invention belongs to the technical field of streaming media transmission, and particularly relates to a streaming media encryption transmission method based on hardware fingerprints.
Background
With the increasing popularity of the Internet, data transmitted over networks has not been limited to text and graphics, but has gradually transitioned to multimedia formats such as sound and video. Streaming is a new concept that has emerged over the Internet in recent years, and is very widely defined, mainly referring to the technical overview of transmitting multimedia data over a network. Streaming media refers to media formats, such as audio, video or multimedia files, that are continuously played in real time over a network using streaming technology. With the development of network technology, streaming media is widely applied, such as voice trembling, real-time monitoring video, real-time conference, etc.
At present, streaming media collection devices such as cameras use unified standards (for example: real-time transport protocol (RTP), real-time streaming protocol (RTSP)) or SDK for transmission when transmitting code streams, and streaming media file formats are relatively single, for example, chang Yongge is as follows: RA real-time sound; the RM real-time video or audio real-time media are disclosed in the standard and file format, when the streaming media data is transmitted in the network, the streaming media data can be intercepted maliciously, the streaming media code stream can be successfully stolen and information leakage is caused by simple decoding, and the security of the streaming media data transmission is not high.
Disclosure of Invention
In view of this, the embodiment of the invention provides a streaming media encryption transmission method based on hardware fingerprints, which is used for solving the problem of low security of the existing streaming media transmission method. The invention can encrypt and transmit the streaming media data, effectively improves the security of the streaming media data and avoids the condition that information is leaked.
The embodiment of the invention provides a streaming media encryption transmission method based on hardware fingerprints, which comprises the following steps:
fingerprint encryption is carried out on original streaming media data acquired by the camera equipment based on hardware fingerprints of the camera equipment;
and transmitting the finally encrypted streaming media data to a target receiving end.
In an optional embodiment, after the fingerprint encryption is performed on the original streaming media data acquired by the image capturing device based on the hardware fingerprint of the image capturing device, before the final encrypted streaming media data is transmitted to the target receiving end, the method further includes:
calculating the overlapping rate of the original streaming media data and the fingerprint encryption data obtained after the fingerprint encryption;
judging whether the overlapping rate of the original streaming media data and the fingerprint encryption data is not more than a preset threshold value;
and if the overlapping rate of the original streaming media data and the fingerprint encryption data is not greater than a preset threshold value, taking the fingerprint encryption data as final encrypted streaming media data, and then executing the step of transmitting the final encrypted streaming media data to a target receiving end.
In an optional embodiment, after determining whether the overlapping ratio of the original streaming media data and the fingerprint encrypted data is not greater than a preset threshold, the method further includes:
if the overlapping rate of the original streaming media data and the fingerprint encryption data is larger than a preset threshold value, transmitting and encrypting the fingerprint encryption data according to a preset encryption algorithm to obtain transmission encryption data;
and taking the transmission encrypted data as final encrypted streaming media data, and then executing the step of transmitting the final encrypted streaming media data to a target receiving end.
In an optional embodiment, the encrypting the fingerprint encrypted data according to a preset encryption algorithm includes:
and carrying out transmission encryption on the fingerprint encryption data in a mode of disturbing the data sequence.
In an optional embodiment, the fingerprint encrypting the original streaming media data collected by the image capturing device based on the hardware fingerprint of the image capturing device includes:
fingerprint encryption is carried out on the original streaming media data acquired by the camera equipment according to the following first formula:
Figure BDA0003555874640000021
wherein ,
Figure BDA0003555874640000022
representing binary form fingerprint encryption data after fingerprint encryption of the original streaming media data; (B) 2 Representing the original streaming media data in binary form; (ID) 2 Binary form data representing a hardware fingerprint of the image pickup apparatus;>>representing a right shift symbol; />
Figure BDA0003555874640000023
Representing a cyclic shift left symbol; len []Representing the number of data bits for obtaining the binary number in brackets; />
Figure BDA0003555874640000024
Representing bitwise exclusive or; sum []Representing the numerical summation of the values on each bit of the binary number in brackets;
the calculating the overlapping rate of the original streaming media data and the fingerprint encrypted data obtained after the fingerprint encryption comprises the following steps:
calculating the overlapping rate of the original streaming media data and the fingerprint encryption data according to the following second formula:
Figure BDA0003555874640000031
wherein η represents the overlapping rate of the original streaming media data and the fingerprint encrypted data;
Figure BDA0003555874640000032
representing a bitwise nor;
the step of transmitting and encrypting the fingerprint encrypted data according to a preset encryption algorithm comprises the following steps:
and carrying out transmission encryption on the fingerprint encryption data according to the following third formula:
Figure BDA0003555874640000033
wherein ,
Figure BDA0003555874640000034
representing transmission encrypted data in binary form; />
Figure BDA0003555874640000035
The representation will->
Figure BDA0003555874640000036
The data bits of the middle data are binary data formed by sequentially extracting the numerical values of even digits and placing the numerical values at the back of all the numerical values of odd digits.
In an alternative embodiment, the preset threshold is 0.5.
In an alternative embodiment, before fingerprint encrypting the original streaming media data collected by the image capturing device based on the hardware fingerprint of the image capturing device, the method further includes:
a hardware fingerprint of the image capturing apparatus is extracted based on an image captured by the image capturing apparatus.
In an optional embodiment, the extracting the hardware fingerprint of the image capturing apparatus based on the image captured by the image capturing apparatus includes:
a hardware fingerprint of the image capturing apparatus is extracted from an image captured by the image capturing apparatus based on a photo response unevenness analysis or a metric learning method.
According to the streaming media encryption transmission method based on the hardware fingerprints, the original streaming media data acquired by the camera equipment is subjected to fingerprint encryption based on the hardware fingerprints of the camera equipment, and then the encrypted streaming media data are transmitted to the target receiving end.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flowchart of an embodiment of a streaming media encryption transmission method based on a hardware fingerprint according to an embodiment of the present invention;
fig. 2 is a flowchart of an embodiment of a streaming media encryption transmission method based on hardware fingerprints according to an embodiment of the present invention.
Detailed Description
Embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
It should be understood that the described embodiments are merely some, but not all, embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Fig. 1 is a flowchart of an embodiment of a streaming media encryption transmission method based on hardware fingerprints according to an embodiment of the present invention. Referring to fig. 1, the method includes the following steps S101-S102:
s101: and fingerprint encryption is carried out on the original streaming media data acquired by the image pickup equipment based on the hardware fingerprint of the image pickup equipment.
In this embodiment, the hardware fingerprint of the image capturing apparatus refers to an apparatus feature or a unique apparatus identification that can be used to uniquely identify the image capturing apparatus. At the time of camera production, the hardware fingerprint is strongly bound and unique to the device. And carrying out fingerprint encryption on the original streaming media data by using the hardware fingerprint to obtain encrypted streaming media data. When the target receiving end decrypts the encrypted stream media data, the corresponding stream media code stream can be decrypted only through the hardware fingerprint, so that even if the stream media code stream is stolen, a thief does not know a decryption algorithm and cannot decode the code stream content, and the security of the stream media data is ensured.
Preferably, before the present step S101, a hardware fingerprint acquisition step of the image capturing apparatus may further be included: a hardware fingerprint of the image capturing apparatus is extracted based on an image captured by the image capturing apparatus. Preferably, the step may extract a hardware fingerprint of the image capturing apparatus from an image captured by the image capturing apparatus based on a photo response unevenness analysis or a metric learning method.
In this embodiment, the hardware fingerprint information of the camera device is written into the captured image, and the target receiving end can obtain the hardware fingerprint of the camera device at the streaming media transmitting end through the image response non-uniformity analysis or measurement learning method, so as to perform decryption work and play the streaming media synchronously.
S102: and transmitting the finally encrypted streaming media data to a target receiving end.
In this embodiment, the target receiving end may store the hardware fingerprint of the current image capturing device and the encryption algorithm thereof in advance, and when the encrypted streaming media data sent by the current image capturing device is received, the streaming media data may be decrypted according to the prestored hardware fingerprint and the encryption algorithm, and in the whole network transmission process, the streaming media data is encrypted, and the hardware fingerprint and the encryption algorithm are not exposed in the transmission process, thereby ensuring the security of the streaming media data.
According to the streaming media encryption transmission method based on the hardware fingerprints, the original streaming media data acquired by the image pickup equipment is subjected to fingerprint encryption based on the hardware fingerprints of the image pickup equipment, and then the encrypted streaming media data is transmitted to the target receiving end, and as the equipment hardware fingerprints comprise inherent, harder-to-tamper and unique information, even if streaming media code streams are stolen, a thief cannot know the equipment hardware fingerprints and decryption algorithms, and cannot decode the code stream contents, so that the security of the streaming media data is effectively improved, and the situation that the information is leaked is avoided.
Fig. 2 is a flowchart of an embodiment of a streaming media encryption transmission method based on hardware fingerprints according to an embodiment of the present invention. Referring to fig. 2, the method includes the following steps S201 to S207:
s201: and fingerprint encryption is carried out on the original streaming media data acquired by the image pickup equipment based on the hardware fingerprint of the image pickup equipment.
Preferably, this step S201 includes: fingerprint encryption is carried out on the original streaming media data acquired by the camera equipment according to the following first formula:
Figure BDA0003555874640000051
wherein ,
Figure BDA0003555874640000052
representing binary form fingerprint encryption data after fingerprint encryption of the original streaming media data; (B) 2 Representing the original streaming media data in binary form; (ID) 2 Binary form data representing a hardware fingerprint of the image pickup apparatus;>>representing a right shift symbol; />
Figure BDA0003555874640000053
Representing a cyclic shift left symbol; len []Representing the number of data bits for obtaining the binary number in brackets; />
Figure BDA0003555874640000054
Representing bitwise exclusive or; sum []Indicating that the numerical summation is performed on the value at each bit of the binary number in brackets.
In this embodiment, assume (B) 2 =1011,(ID) 2 =1100, then
Figure BDA0003555874640000061
Figure BDA0003555874640000062
Figure BDA0003555874640000063
The streaming media code stream is encrypted once according to the hardware strong binding and unique hardware fingerprint carried by the camera, and then the streaming media code stream is encrypted by utilizing a reliable encryption algorithm and a special key, so that the convenience of encryption and decryption is ensured, and meanwhile, the streaming media code stream and the camera can be stably bound together through the unique hardware fingerprint.
S202: and calculating the overlapping rate of the original streaming media data and the fingerprint encryption data obtained after the fingerprint encryption.
Preferably, the overlapping ratio of the original streaming media data and the fingerprint encrypted data is calculated according to the following second formula:
Figure BDA0003555874640000064
wherein η represents the overlapping rate of the original streaming media data and the fingerprint encrypted data;
Figure BDA0003555874640000065
representing a bitwise exclusive nor.
In this embodiment, according to the second formula, assume (B) 2 =1011,
Figure BDA0003555874640000066
Then
Figure BDA0003555874640000067
Obtaining the overlapping rate of the encrypted code stream and the original code stream according to the code stream encrypted by adopting the hardware fingerprint and the original code stream to be transmitted by the camera, and further knowing the encryption degree, wherein the greater the value eta, the worse the encryption performance and the worse the security; otherwise, the better the safety. According to this value, the streaming media data with poor encryption can be subjected to subsequent processing (such as re-encryption), thereby ensuring the security of the code stream encryption.
S203: and judging whether the overlapping rate of the original streaming media data and the fingerprint encryption data is not larger than a preset threshold value, if so, executing S204, otherwise, executing S205.
In this embodiment, the preset threshold is 0.5, and when η is less than or equal to 0.5, it is indicated that the streaming media code stream data directly encrypted by using the hardware fingerprint has good encryption degree, and the streaming media code stream data can be directly transmitted to the target receiving end; when eta is more than 0.5, the encryption degree of the stream media code stream data directly encrypted by using the hardware fingerprint is poor, and the stream media code stream data needs to be encrypted again, so that the security of the encrypted stream media code stream data is ensured.
S204: the fingerprint encrypted data is taken as final encrypted streaming media data, and S207 is performed.
S205: and carrying out transmission encryption on the fingerprint encryption data according to a preset encryption algorithm to obtain transmission encryption data.
As an alternative embodiment, this step S205 includes: and carrying out transmission encryption on the fingerprint encrypted data in a mode of disturbing the data sequence to obtain transmission encrypted data. Preferably, this step S205 includes: and carrying out transmission encryption on the fingerprint encryption data according to the following third formula:
Figure BDA0003555874640000071
wherein ,
Figure BDA0003555874640000072
representing transmission encrypted data in binary form; />
Figure BDA0003555874640000073
The representation will->
Figure BDA0003555874640000074
The data bits of the middle data are binary data formed by sequentially extracting the numerical values of even digits and placing the numerical values at the back of all the numerical values of odd digits.
In the present embodiment, if
Figure BDA0003555874640000075
The overlapping rate of the streaming media code stream directly encrypted through the hardware fingerprint and the original code stream is low, the transmission encryption is carried out without wasting the calculation power of a CPU, and the data encrypted through the hardware fingerprint is directly transmitted; if->
Figure BDA0003555874640000076
The stream media code stream directly encrypted by the hardware fingerprint has higher overlapping rate with the original code stream, and the data encrypted by the hardware fingerprint needs to be encrypted and transmitted after being scrambled in sequence so as to ensure the security of data encryption. According to the condition of the overlapping rate of the hardware fingerprint encryption code stream and the original code stream, when the overlapping rate is lower, the hardware fingerprint encryption is reliable without re-encryption, so that the calculation power of a CPU is reduced, and the encryption transmission decryption efficiency of a system is improved; when the overlapping rate is higher, the hardware fingerprint encryption is unreliable, and then the data encrypted by the hardware fingerprint is encrypted and transmitted after being scrambled in sequence, so that the security of the data encryption is ensured.
S206: and taking the transmission encrypted data as the final encrypted streaming media data.
S207: and transmitting the finally encrypted streaming media data to a target receiving end.
According to the streaming media encryption transmission method based on the hardware fingerprints, fingerprint encryption is carried out on original streaming media data acquired by the image capturing equipment based on the hardware fingerprints of the image capturing equipment, then the overlapping rate of the original code stream and the encrypted code stream is judged, when the overlapping rate is low, the encryption is reliable, encryption is not needed again, when the overlapping rate is high, the encryption is unreliable, encryption transmission is carried out after the data encrypted by the hardware fingerprints are in a disordered order, and finally the encrypted streaming media code stream is issued to a target receiving end. The method not only ensures the security of the stream media code stream, but also can effectively improve the execution efficiency of the system.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the spirit or scope of the invention. Thus, it is intended that the present invention also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof. The foregoing is merely illustrative of the present invention, and the present invention is not limited thereto, and any changes or substitutions easily contemplated by those skilled in the art within the scope of the present invention should be included in the present invention. Therefore, the protection scope of the invention is subject to the protection scope of the claims.

Claims (4)

1. The stream media encryption transmission method based on the hardware fingerprint is characterized by comprising the following steps:
fingerprint encryption is carried out on original streaming media data acquired by the camera equipment based on hardware fingerprints of the camera equipment;
transmitting the finally encrypted streaming media data to a target receiving end;
after the original streaming media data collected by the image capturing device is fingerprint-encrypted based on the hardware fingerprint of the image capturing device, before the final encrypted streaming media data is transmitted to the target receiving end, the method further comprises the following steps:
calculating the overlapping rate of the original streaming media data and the fingerprint encryption data obtained after the fingerprint encryption;
judging whether the overlapping rate of the original streaming media data and the fingerprint encryption data is not more than a preset threshold value;
if the overlapping rate of the original streaming media data and the fingerprint encryption data is not greater than a preset threshold value, the fingerprint encryption data is used as final encrypted streaming media data, and then the step of transmitting the final encrypted streaming media data to a target receiving end is executed;
after judging whether the overlapping rate of the original streaming media data and the fingerprint encryption data is not greater than a preset threshold value, the method further comprises the following steps:
if the overlapping rate of the original streaming media data and the fingerprint encryption data is larger than a preset threshold value, transmitting and encrypting the fingerprint encryption data according to a preset encryption algorithm to obtain transmission encryption data;
the step of transmitting the final encrypted streaming media data to a target receiving end is then executed by taking the transmission encrypted data as the final encrypted streaming media data;
the step of transmitting and encrypting the fingerprint encrypted data according to a preset encryption algorithm comprises the following steps:
transmitting and encrypting the fingerprint encrypted data in a mode of disturbing the data sequence;
the fingerprint encryption of the original streaming media data acquired by the image pickup device based on the hardware fingerprint of the image pickup device comprises the following steps:
fingerprint encryption is carried out on the original streaming media data acquired by the camera equipment according to the following first formula:
Figure FDA0003940695510000011
wherein ,
Figure FDA0003940695510000012
representing binary form fingerprint encryption data after fingerprint encryption of the original streaming media data; (B) 2 Representing the original streaming media data in binary form; (ID) 2 Binary form data representing a hardware fingerprint of the image pickup apparatus;>>representing a right shift symbol; />
Figure FDA0003940695510000013
Representing a cyclic shift left symbol; len []Representing the number of data bits for obtaining the binary number in brackets; />
Figure FDA0003940695510000021
Representing bitwise exclusive or; sum []Representing the numerical summation of the values on each bit of the binary number in brackets;
the calculating the overlapping rate of the original streaming media data and the fingerprint encrypted data obtained after the fingerprint encryption comprises the following steps:
calculating the overlapping rate of the original streaming media data and the fingerprint encryption data according to the following second formula:
Figure FDA0003940695510000022
wherein η represents the overlapping rate of the original streaming media data and the fingerprint encrypted data;
Figure FDA0003940695510000023
representing a bitwise nor;
the step of transmitting and encrypting the fingerprint encrypted data according to a preset encryption algorithm comprises the following steps:
and carrying out transmission encryption on the fingerprint encryption data according to the following third formula:
Figure FDA0003940695510000024
wherein ,
Figure FDA0003940695510000025
representing transmission encrypted data in binary form; />
Figure FDA0003940695510000026
The representation will->
Figure FDA0003940695510000027
The data bits of the middle data are binary data formed by sequentially extracting the numerical values of even digits and placing the numerical values at the back of all the numerical values of odd digits.
2. The method for encrypted transmission of streaming media based on hardware fingerprints according to claim 1, wherein the preset threshold is 0.5.
3. The method for encrypting and transmitting streaming media based on hardware fingerprints according to any one of claims 1 to 2, further comprising, before the original streaming media data acquired by the image capturing apparatus is fingerprint-encrypted based on the hardware fingerprint of the image capturing apparatus:
a hardware fingerprint of the image capturing apparatus is extracted based on an image captured by the image capturing apparatus.
4. The streaming media encryption transmission method based on hardware fingerprints according to claim 3, wherein the extracting the hardware fingerprint of the image capturing apparatus based on the image captured by the image capturing apparatus includes:
a hardware fingerprint of the image capturing apparatus is extracted from an image captured by the image capturing apparatus based on a photo response unevenness analysis or a metric learning method.
CN202210276315.3A 2022-03-21 2022-03-21 Streaming media encryption transmission method based on hardware fingerprint Active CN114827671B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210276315.3A CN114827671B (en) 2022-03-21 2022-03-21 Streaming media encryption transmission method based on hardware fingerprint

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210276315.3A CN114827671B (en) 2022-03-21 2022-03-21 Streaming media encryption transmission method based on hardware fingerprint

Publications (2)

Publication Number Publication Date
CN114827671A CN114827671A (en) 2022-07-29
CN114827671B true CN114827671B (en) 2023-04-25

Family

ID=82531512

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210276315.3A Active CN114827671B (en) 2022-03-21 2022-03-21 Streaming media encryption transmission method based on hardware fingerprint

Country Status (1)

Country Link
CN (1) CN114827671B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102004872A (en) * 2010-10-27 2011-04-06 杨莹 Fingerprint encryption-based identity authentication system and implementation method thereof
CN109040853A (en) * 2018-09-04 2018-12-18 国微集团(深圳)有限公司 A kind of digital stream media fingerprints watermark protection method and device
CN110659535A (en) * 2018-06-28 2020-01-07 厦门本能管家科技有限公司 Private key generation method and system based on fingerprint identification
CN113766317A (en) * 2021-03-08 2021-12-07 京东城市(北京)数字科技有限公司 Video transmission method, video transmission device, electronic equipment and storage medium

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108449563B (en) * 2018-02-01 2020-07-10 厦门星宸科技有限公司 Method and system for encrypting and decrypting audio and video
CN109639691B (en) * 2018-12-19 2021-11-12 世纪龙信息网络有限责任公司 Method and device for monitoring data encryption, computer equipment and storage medium
US20200272748A1 (en) * 2019-02-26 2020-08-27 Gopro, Inc. Methods and apparatus for validating media content
CN110324143B (en) * 2019-05-24 2022-03-11 平安科技(深圳)有限公司 Data transmission method, electronic device and storage medium
CN111093097A (en) * 2019-12-20 2020-05-01 北京云享智胜科技有限公司 Stream media data encryption and decryption method and device, electronic equipment and storage medium
CN113420307B (en) * 2021-06-28 2023-03-28 未鲲(上海)科技服务有限公司 Ciphertext data evaluation method and device, computer equipment and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102004872A (en) * 2010-10-27 2011-04-06 杨莹 Fingerprint encryption-based identity authentication system and implementation method thereof
CN110659535A (en) * 2018-06-28 2020-01-07 厦门本能管家科技有限公司 Private key generation method and system based on fingerprint identification
CN109040853A (en) * 2018-09-04 2018-12-18 国微集团(深圳)有限公司 A kind of digital stream media fingerprints watermark protection method and device
CN113766317A (en) * 2021-03-08 2021-12-07 京东城市(北京)数字科技有限公司 Video transmission method, video transmission device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN114827671A (en) 2022-07-29

Similar Documents

Publication Publication Date Title
CN112600665B (en) Hidden communication method, device and system based on block chain and encryption technology
JP2015512589A (en) Method and apparatus for authenticating video content
KR20150011362A (en) Method, device, and system for implementing media data processing
Xiong et al. High-capacity reversible data hiding for encrypted multimedia data with somewhat homomorphic encryption
Bhole et al. Steganography over video file using Random Byte Hiding and LSB technique
WO2017198069A1 (en) Streaming media file processing method and apparatus
Hu et al. Asymmetric fingerprinting based on 1-out-of-n oblivious transfer
Yang et al. Efficient Secure Data Provenance Scheme in Multimedia Outsourcing and Sharing.
Cao et al. A Privacy‐Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking‐Based Data Auditing
Jia-Fa et al. A steganalysis method in the DCT domain
JP2009540645A (en) Encoding device and detection device
Sharma et al. Adaptive steganographic algorithm using cryptographic encryption RSA algorithms
EP3910959A1 (en) Systems and methods for identifying a content receiving device
CN111988639B (en) Video encryption and decryption method based on cryptographic algorithm and reversible steganography
CN114827671B (en) Streaming media encryption transmission method based on hardware fingerprint
CN113051592A (en) File encryption method and device, electronic equipment and storage medium
Ramya et al. Steganography based data hiding for security applications
CN115643105B (en) Federal learning method and device based on homomorphic encryption and depth gradient compression
Aldabagh Proposed Hybrid Algorithm for Image Steganography in Text Security Using Fish Algorithm
CN110380843B (en) Information processing method and related equipment
Apau et al. Enhancing data security using video steganography, RSA and Huffman code algorithms with LSB insertion
Abhinav et al. An improved reversible data hiding on encrypted images by selective pixel flipping technique
Hasso Steganography in video files
CN114390318A (en) User data encryption and decryption method and device and electronic equipment
CN110381342B (en) Information processing method and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant