CN115002515A - Encrypted data transmission method and device - Google Patents

Encrypted data transmission method and device Download PDF

Info

Publication number
CN115002515A
CN115002515A CN202210845100.9A CN202210845100A CN115002515A CN 115002515 A CN115002515 A CN 115002515A CN 202210845100 A CN202210845100 A CN 202210845100A CN 115002515 A CN115002515 A CN 115002515A
Authority
CN
China
Prior art keywords
video frame
video
character
filling
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210845100.9A
Other languages
Chinese (zh)
Inventor
刘曼
张奇惠
刘家明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Wise Security Technology Co Ltd
Original Assignee
Guangzhou Wise Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Wise Security Technology Co Ltd filed Critical Guangzhou Wise Security Technology Co Ltd
Priority to CN202210845100.9A priority Critical patent/CN115002515A/en
Publication of CN115002515A publication Critical patent/CN115002515A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • H04N21/26613Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing keys in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4408Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The application discloses an encrypted data transmission method and device. The method comprises the steps of determining a target video frame containing a target object according to the content of a video frame in a video stream to be transmitted, splitting the video stream to be transmitted into a first video frame set and a second video frame set according to the target video frame, wherein the first video frame set comprises the target video frame; processing the first video frame set based on a preset messy code filling algorithm, encrypting the processed first video frame set through first encryption information to obtain a corresponding first video stream data packet, and encrypting the second video frame set through second encryption information to obtain a corresponding second video stream data packet; and sending the first video stream data packet and the second video stream data packet to a receiving end, wherein the receiving end is configured with a messy code decryption algorithm corresponding to the messy code filling algorithm, first decryption information corresponding to the first encryption information and second decryption information corresponding to the second encryption information.

Description

Encrypted data transmission method and device
Technical Field
The present application relates to the field of video streaming transmission technologies, and in particular, to an encrypted data transmission method and apparatus.
Background
With the rapid development of monitoring systems, monitoring cameras are installed in areas which are visible everywhere in life, so that things happening in corresponding areas can be monitored in real time. For example, a user can install a monitoring camera in a private living area, the monitoring camera transmits collected videos to a mobile phone of the user, and the user can remotely control the private living area.
The current surveillance video transmission method adopts a unique encryption algorithm to encrypt video frames, but privacy information of users may be involved in the video frames. The simple data encryption mode enables video frames to be cracked easily, so that video data are stolen, the safety of video data transmission cannot be guaranteed, and the privacy of users is leaked.
Disclosure of Invention
The application provides an encrypted data transmission method and device, which solve the problem that in the prior art, the privacy of a user is revealed because a video frame is cracked, ensure the security of video data transmission and avoid the privacy of the user from being revealed.
In a first aspect, the present application provides an encrypted data transmission method, including:
determining a target video frame containing a target object according to the content of a video frame in a video stream to be transmitted, and splitting the video stream to be transmitted into a first video frame set and a second video frame set according to the target video frame, wherein the first video frame set comprises the target video frame;
processing the first video frame set based on a preset messy code filling algorithm, encrypting the processed first video frame set through first encryption information to obtain a corresponding first video stream data packet, and encrypting the second video frame set through second encryption information to obtain a corresponding second video stream data packet;
and sending the first video stream data packet and the second video stream data packet to a receiving end, wherein the receiving end is configured with a messy code decryption algorithm corresponding to the messy code filling algorithm, first decryption information corresponding to the first encryption information and second decryption information corresponding to the second encryption information.
Optionally, the determining, according to content of a video frame in a video stream to be transmitted, a target video frame including a target object includes:
identifying the content in a first video frame according to the time stamp sequence of the video stream to be transmitted, and determining whether the first video frame contains a target object;
under the condition that the first video frame comprises a target object, identifying the content of a second video frame which is separated from the first video frame by a preset frame number, and determining whether the second video frame comprises the target object;
determining the first video frame, the second video frame and a third video frame therebetween as a target video frame if the second video frame contains the target object;
under the condition that the second video frame does not contain the target object, identifying the content of the third video frame according to the reverse order of the timestamps of the video stream to be transmitted, and determining whether the third video frame contains the target object;
in a case where the third video frame contains a target object, determining that the first video frame, the third video frame, and a video frame therebetween are the target video frame.
Optionally, the scrambling code filling algorithm includes filling character information and character filling rules;
correspondingly, the processing the first video frame set based on the preset scrambling code filling algorithm includes:
coding the first video frame set to obtain coding information of the first video frame set;
acquiring preset filling character information and a corresponding character filling rule, and combining the filling character information and the coding information of the first video frame set based on the character filling rule to obtain messy code character information of the first video frame set.
Optionally, the processing the first set of video frames based on a preset scrambling code filling algorithm includes:
circularly traversing a plurality of filling character information in a preset character list, and sequentially determining the filling character information corresponding to the target video frame according to the time stamp sequence of each target video frame in the first video frame set;
circularly traversing a plurality of character filling rules in a preset rule list, and sequentially determining the character filling rules corresponding to the target video frames according to the time stamp sequence of each target video frame in the first video frame set;
and merging the filling character information and the video character information of the corresponding target video frame based on the character filling rule to obtain the messy code character information of the target video frame.
Optionally, before the processing the first set of video frames based on the preset scrambling code filling algorithm, the method further includes:
updating the filling character information in the character list and the arrangement sequence of the character filling rules in the rule list at regular time;
and after the character list and the rule list are updated, sending an updating instruction to the receiving end so that the receiving end correspondingly updates the messy code decryption algorithm according to the updating instruction.
Optionally, the encrypting the processed first video frame set through the first encryption information to obtain a corresponding first video stream packet includes:
and processing the messy code character information through a Hash algorithm, and performing public key encryption on the messy code character information after the Hash processing through the first encryption information to obtain the first video stream data packet.
Optionally, the encrypting the second video frame set by the second encryption information to obtain a corresponding second video stream data packet includes:
and symmetrically encrypting the second video frame set through the second encryption information to obtain the second video stream data packet.
In a second aspect, the present application provides an encrypted data transmission apparatus, including:
the video frame classification module is configured to determine a target video frame containing a target object according to content of a video frame in a video stream to be transmitted, and split the video stream to be transmitted into a first video frame set and a second video frame set according to the target video frame, wherein the first video frame set comprises the target video frame;
the video stream encryption module is configured to process the first video frame set based on a preset messy code filling algorithm, encrypt the processed first video frame set through first encryption information to obtain a corresponding first video stream data packet, and encrypt the second video frame set through second encryption information to obtain a corresponding second video stream data packet;
a video stream transmission module configured to send the first video stream packet and the second video stream packet to a receiving end, where the receiving end is configured with a scrambling decryption algorithm corresponding to the scrambling filling algorithm, and first decryption information corresponding to the first encryption information and second decryption information corresponding to the second encryption information.
In a third aspect, the present application provides an encrypted data transmission apparatus, including:
one or more processors; a storage device storing one or more programs which, when executed by the one or more processors, cause the one or more processors to implement the encrypted data transmission method according to the first aspect.
In a fourth aspect, the present application provides a storage medium containing computer-executable instructions for performing the method of encrypted data transmission according to the first aspect when executed by a computer processor.
According to the method and the device, the content of each video frame in the video stream to be transmitted is identified, the target video frame containing the target object is screened out, the target video frame is determined to relate to a privacy picture, the target video frame is divided into a first video frame set, the rest video frames are divided into a second video frame set, and the first video frame set and the second video frame set are encrypted through different encryption methods respectively. The video character information of the first video frame set is disturbed through the messy code filling algorithm, the first video frame set after the messy code processing is encrypted through the first encryption information, the video cracking difficulty is greatly improved through double processing, and the risk that the privacy picture is stolen is reduced. The second video frame set is encrypted through the second encryption information, the video frames which do not relate to the privacy pictures are normally encrypted, the encryption cost and the decryption complexity are not additionally increased, the video encryption and decryption processing efficiency is guaranteed, and the safety of video stream transmission is improved.
Drawings
Fig. 1 is a flowchart of an encrypted data transmission method provided in an embodiment of the present application;
FIG. 2 is a flow chart of interval identification video frames provided by an embodiment of the present application;
fig. 3 is a flowchart of encoding and scrambling a first set of video frames according to an embodiment of the present disclosure;
fig. 4 is a flowchart of scrambling processing on a target video frame according to an embodiment of the present application;
FIG. 5 is a flow chart of updating a character list and a rule list provided by an embodiment of the present application;
fig. 6 is a schematic structural diagram of an encrypted data transmission apparatus according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of an encrypted data transmission device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, specific embodiments of the present application will be described in detail with reference to the accompanying drawings. It is to be understood that the specific embodiments described herein are merely illustrative of and not restrictive on the broad application. It should be further noted that, for the convenience of description, only some but not all of the relevant portions of the present application are shown in the drawings. Before discussing exemplary embodiments in more detail, it should be noted that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart may describe the operations (or steps) as a sequential process, many of the operations can be performed in parallel, concurrently or simultaneously. In addition, the order of the operations may be re-arranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figure. The processes may correspond to methods, functions, procedures, subroutines, and the like.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that embodiments of the application may be practiced in sequences other than those illustrated or described herein, and that the terms "first," "second," and the like are generally used herein in a generic sense and do not limit the number of terms, e.g., the first term can be one or more than one. In addition, "and/or" in the specification and claims means at least one of connected objects, a character "/" generally means that a preceding and succeeding related objects are in an "or" relationship.
The encrypted data transmission method provided in this embodiment may be executed by an encrypted data transmission device, where the encrypted data transmission device may be implemented in a software and/or hardware manner, and the encrypted data transmission device may be formed by two or more physical entities, or may be formed by one physical entity. The encrypted data transmission device may be, for example, a processor of a monitoring camera. The processor of the monitoring camera is installed with an application program that can execute the encrypted data transmission method, and therefore the encrypted data transmission device may also be the application program itself.
For convenience of understanding, the present embodiment will be described by taking a processor of the monitoring camera as an example of a main body for executing the encrypted data transmission method.
In one embodiment, a monitoring camera acquires videos of a private living area of a user, a processor acquires video streams acquired by the monitoring camera, symmetrically encrypts the video streams through secret key information, and transmits the encrypted video streams to a mobile phone client of the user. And after receiving the encrypted video stream, the mobile phone client decrypts the encrypted video stream through the corresponding key information to obtain the video stream acquired by the monitoring camera, so that the remote monitoring of the monitoring area is realized. If the encrypted video stream is stolen by the third-party equipment in the process of transmitting the encrypted video stream to the mobile phone client, the third-party equipment can acquire the video stream acquired by the monitoring camera because the symmetric encryption is easy to crack. If the video stream contains the privacy information, after the third-party equipment cracks the encrypted video stream, the third-party equipment can check the privacy information of the user, and the privacy information of the user is leaked. Therefore, the existing video stream encryption transmission method cannot guarantee the security of video data transmission, so that the video stream is easy to be stolen, and further the privacy of a user is revealed.
In order to solve the above problem, the present embodiment provides an encrypted data transmission method, which improves security of video stream transmission and avoids disclosure of user privacy on the premise of not additionally increasing encryption cost.
Fig. 1 is a flowchart of an encrypted data transmission method according to an embodiment of the present application. Referring to fig. 1, the encrypted data transmission method specifically includes:
s110, determining a target video frame containing a target object according to the content of the video frame in the video stream to be transmitted, and splitting the video stream to be transmitted into a first video frame set and a second video frame set according to the target video frame, wherein the first video frame set comprises the target video frame.
The video stream to be transmitted refers to a video stream which is prepared by a processor and sent to a mobile phone client of a user. For example, the monitoring camera acquires a video stream and then sends the video stream to the processor, and the processor encrypts the video stream and transmits the encrypted video stream to the mobile phone client of the user.
The target object refers to a picture related to private information, and the private information may be portrait information of a user and family, and the like. The target video frame is a video frame containing a privacy picture in a video stream to be transmitted. Exemplarily, the video stream to be transmitted includes a plurality of video frames, each video frame corresponds to a timestamp, and the video stream to be transmitted is composed of a plurality of video frames which are ordered according to a timestamp sequence. The video stream contains the privacy information of the user, namely the video frames in the video stream contain the privacy pictures, so that whether the video frames contain the privacy pictures or not can be determined by identifying the content of the video frames. According to the embodiment, the target video frames containing the privacy pictures are subjected to complex encryption, so that the cracking difficulty of the video stream is improved, the security of encrypted transmission of the video stream is improved, and the risk of privacy disclosure of a user is reduced.
In an embodiment, each video frame in the video stream to be transmitted can be quickly detected through the YOLO algorithm, and whether the video frame contains the target object is determined. Compared with other target detection algorithms, the YOLO algorithm has lower positioning accuracy but high detection speed, and the target object in the video frame can be quickly detected through the YOLO only by determining whether the video frame contains the target object without determining the position of the target object in the video frame, so that the target video frame in the video stream can be quickly screened out, and the encryption processing efficiency of the video stream is improved.
In this embodiment, the first set of video frames refers to a set of target video frames, and the second set of video frames refers to a set of video frames in the video stream to be transmitted, which do not relate to a privacy picture. Illustratively, the content of a video frame is identified frame by YOLO, it is determined whether the video frame contains a target object, if it is determined that the video frame contains the target object, the video frame is divided into a first set of video frames, and if it is determined that the video frame does not contain the target object, the video frame is divided into a second set of video frames. The embodiment divides the video frames which relate to the privacy pictures and do not relate to the privacy pictures into two different sets so as to perform encryption processing with different complexity degrees on the two different sets subsequently.
In another embodiment, the target object may generally appear in multiple adjacent video frames, i.e., if the target object is identified in video frame a, the target object may be detected in both the next one of video frame a and the next video frame. Therefore, the present embodiment proposes to detect the target object in the video frame at intervals, so as to reduce the number of frames for identifying the video frame as much as possible and improve the screening efficiency of the target video frame. Illustratively, fig. 2 is a flow chart of interval identification of video frames provided by an embodiment of the present application. As shown in fig. 2, the step of identifying the video frame at the interval specifically includes steps S1101 to S1105:
s1101, identifying the content in the first video frame according to the time stamp sequence of the video stream to be transmitted, and determining whether the first video frame contains the target object.
The first video frame refers to a video frame in a video stream to be transmitted, which is currently identified according to the time stamp sequence. Illustratively, a first video frame of the video stream to be transmitted is first subjected to YOLO target detection, and it is determined whether the first video frame includes a target object. And if the first video frame does not contain the target object, determining that the first video frame does not relate to the privacy picture, and dividing the first video frame into a second video frame set. And continuing to perform YOLO target detection on the second video frame until the video frame containing the target object is detected.
S1102, under the condition that the first video frame includes the target object, identifying the content of a second video frame spaced from the first video frame by a preset number of frames, and determining whether the second video frame includes the target object.
For example, assuming that the first video frame is detected to contain the target object, the YOLO target detection is performed on the second video frame spaced from the video frame by the preset number of frames according to the rule that the target object appears in a plurality of consecutive video frames, and it is determined whether the second video frame contains the target object. The preset frame number is an average frame number of a target object which is set according to experience and generally continuously appears in a video stream.
And S1103, under the condition that the second video frame contains the target object, determining that the first video frame, the second video frame and a third video frame between the first video frame and the second video frame are the target video frames.
For example, when it is detected that the second video frame contains the target object, it may be determined that the second video frame, the first video frame, and a third video frame between the first video frame and the second video frame all relate to a privacy picture, and thus the first video frame, the second video frame, and the third video frame may all be determined as the target video frame, and the target video frame may be divided into the first set of video frames.
And S1104, under the condition that the second video frame does not contain the target object, identifying the content of the third video frame according to the reverse order of the time stamps of the video stream to be transmitted, and determining whether the third video frame contains the target object.
Illustratively, when the second video frame does not contain the target object, the second video frame is divided into the second video frame set, so as to avoid subsequent repeated identification of the second video frame. And identifying the content of the third video frame according to the reverse order of the timestamps of the video stream to be transmitted, and if the third video frame does not contain the target object, dividing the third video frame into a second video frame set until the third video frame containing the target object is detected or the third video frame is completely transmitted.
S1105, under the condition that the third video frame contains the target object, determining the first video frame, the third video frame and the video frame between the first video frame and the third video frame as the target video frame.
For example, if it is detected that the third video frame contains the target object, it may be determined that the first video frame, the third video frame, and the video frame therebetween all relate to a privacy picture, and thus the first video frame, the third video frame, and the video frame therebetween may be determined as the target video frame, and the target video frame may be divided into the first set of video frames.
Further, the steps S1101-S1105 are repeatedly executed, and the set corresponding to the video frames of the set that are not divided yet in the video stream to be transmitted is determined until all the video frames in the video stream to be transmitted are traversed.
S120, processing the first video frame set based on a preset messy code filling algorithm, encrypting the processed first video frame set through first encryption information to obtain a corresponding first video stream data packet, and encrypting the second video frame set through second encryption information to obtain a corresponding second video stream data packet.
The messy code filling algorithm is used for disturbing the video character information of the target video frame, the target video frame after the messy code processing can be checked only through the corresponding messy code decryption algorithm, the cracking difficulty of the target video frame is improved, and the risk that the privacy picture is leaked is reduced. The first encryption information is a key used to encrypt the first set of video frames. The second encryption information is a key used to encrypt the second set of video frames.
In an embodiment, the scrambling code filling algorithm includes padding character information and a character filling rule, where the padding character information refers to character information filled into the video character information, and the character filling rule refers to a rule for filling the padding character information into the video character information, such as character head-to-tail splicing, character cross filling, and the like. For example, assuming that the padding character information is abc, the video character information of the target video frame is 123, and the character padding rule is character end-to-end splicing, the video character information of the target video frame after the scrambling code processing is 123 abc. If the character filling rule is character cross filling, the video character information of the target video frame after the scrambling code processing is 1a2b3 c. The messy code decryption algorithm corresponding to the messy code filling algorithm can be correspondingly determined according to the filling character information and the character filling rule. Therefore, when the mobile phone client of the user receives the video character information of the target video frame after the messy code, the messy code decryption algorithm can be determined based on the filling character information and the character filling rule, and the target video frame is obtained through the messy code decryption algorithm. It should be noted that the above padding character information and character padding rules are only examples, and the present embodiment does not limit specific padding character information and character padding rules.
In an embodiment, a padding character information and a character padding rule are configured in advance, and the video character information of each target video frame and the padding character information are combined through the character padding rule to obtain the video character information of each target video frame after scrambling code processing.
In another embodiment, to improve scrambling processing efficiency and video streaming efficiency, a first set of video frames is encoded into compressed packets, which are scrambled. Illustratively, fig. 3 is a flowchart of an encoding and scrambling process performed on a first set of video frames according to an embodiment of the present application. As shown in fig. 3, the step of encoding and scrambling the first set of video frames specifically includes S1201-S1202:
s1201, the first video frame set is coded to obtain coding information of the first video frame set.
S1202, acquiring preset filling character information and a corresponding character filling rule, and combining the filling character information and the coding information of the first video frame set based on the character filling rule to obtain messy code character information of the first video set.
The coding information is character information of a compressed packet corresponding to the first video frame set. Illustratively, the first set of video frames is encoded to encode the first set of video frames into a compressed packet, resulting in character information of the compressed packet. And combining the character information of the compressed packet with the filling character information according to the character filling rule to obtain the scrambled character information of the compressed packet, namely the first video frame set. The messy code character information is the character information obtained by messy code processing on the video character information of the target video frame or the character information of the compressed packet of the first video frame set. In this embodiment, when the mobile phone client of the user acquires the compressed packet after the scrambling code processing, the character information of the compressed packet is recovered through the corresponding scrambling code decryption algorithm, and the compressed packet is decoded to obtain the target video frame in the first video frame set.
In another embodiment, the processor is configured with a character list including a plurality of padding character information and a rule list including a plurality of character padding rules. Various filling character information and various character filling rules are matched to form various messy code filling algorithms, and messy code processing is carried out on different target video frames through different messy code filling algorithms, so that the cracking difficulty of the target video frames is improved. Illustratively, fig. 4 is a flowchart of scrambling code processing on a target video frame according to an embodiment of the present application. As shown in fig. 4, the step of scrambling the target video frame specifically includes S1203-S1205:
s1203, circularly traversing a plurality of filling character information in a preset character list, and sequentially determining filling character information corresponding to target video frames according to the time stamp sequence of each target video frame in the first video frame set.
Illustratively, table 1 is a list of characters provided in the embodiments of the present application.
TABLE 1
Serial number Filled character information
abc
efg
hij
Referring to table 1, the first padding character information "abc" in the character list is determined as the padding character information corresponding to the first target video frame in the first video frame set, the second padding character information "efg" in the character list is determined as the padding character information corresponding to the second target video frame in the first video frame set, and the third padding character information "hij" in the character list is determined as the padding character information corresponding to the third target video frame in the first video frame set. And when traversing the padding character information in the character list, traversing the character list from the beginning, and sequentially determining the padding character information of the remaining target video frames according to the time stamp sequence of each target video frame in the first video frame set until the first video frame set is traversed.
S1204, circularly traversing a plurality of character filling rules in a preset rule list, and sequentially determining the character filling rules corresponding to the target video frames according to the time stamp sequence of each target video frame in the first video frame set.
Illustratively, table 2 is a list of rules provided in embodiments of the present application.
TABLE 2
Serial number Character fill rules
Character end-to-end connection
Character cross merge
Referring to table 2, the first character padding rule "character end-to-end connection" in the rule list is determined as the character padding rule of the first target video frame in the first video frame set. And determining the second character filling rule 'character cross merge' in the rule list as the character filling rule of the second target video frame in the first video frame set. And when traversing the character filling rules in the rule list, traversing the character filling rules of the rule list from the beginning, and sequentially determining the character filling rules corresponding to the remaining target video frames according to the time stamp sequence of each target video frame in the first video frame set until the first video frame set is traversed.
And S1205, combining the filling character information and the video character information of the corresponding target video frame based on the character filling rule to obtain the messy code character information of the target video frame.
Illustratively, the filling character information "abc" is combined with the video character information of the first target video frame in the first video frame set through a character filling rule in which characters are connected end to obtain the scrambled character information of the first target video frame. The scrambling code processing process of other target video frames is the same as that described above.
In the embodiment, the combination of the messy code filling algorithm is changed by updating the sequence of the character filling information and the character filling rules in the character list and the rule list, so that the effect of updating the messy code filling algorithm is achieved. Illustratively, fig. 5 is a flowchart for updating a character list and a rule list provided in an embodiment of the present application. As shown in fig. 5, the step of updating the character list and the rule list specifically includes S1206-S1207:
and S1206, updating the arrangement sequence of the filling character information in the character list and the character filling rules in the rule list at regular time.
Illustratively, the fill character information and the character fill rules in the character list and the rule list are moved by different times to update the character fill rules corresponding to the fill character information. For example, the last pad character information in the character list is moved to the first, and the remaining pad character information is moved back once. The penultimate character fill rule in the fill list is moved to the first, the last character fill rule is moved to the second, and the remaining character fill rules are moved twice.
S1207, after the character list and the rule list are updated, an updating instruction is sent to the receiving end so that the receiving end can correspondingly update the messy code decryption algorithm according to the updating instruction.
The updating instruction is used for informing the mobile phone client side, and updating the character list and the rule list configured by the processor of the monitoring camera. When the mobile phone client determines that the character list and the rule list configured by the processor are updated, the locally stored character list and the locally stored rule list are updated according to the same list sequence replacement rule, so that the character list and the rule list of the mobile phone client are kept synchronous with the character list and the rule list of the processor. After the character list and the rule list are updated, the mobile phone client determines the messy code decryption algorithm of the corresponding target video frame according to the method of the processor for configuring the character filling information and the character filling rule of each target video frame. For example, the mobile phone client may determine that the first padding character information and the first character padding rule in the character list and the rule list are the padding character information and the character padding rule of the first target video frame in the first video frame set. And determining filling character information and a character filling rule of the first target video frame according to the locally cached character list and rule list, and determining a messy code decryption algorithm of the first target video frame. Similarly, the mobile phone client can calculate the random code decryption algorithm of other subsequent target video frames.
In the embodiment, the target video frames containing the privacy pictures are subjected to double encryption processing, so that the cracking difficulty of the target video frames is improved, and the leakage risk of the privacy pictures is reduced. In an embodiment, after scrambling the first video frame set, the scrambled first video frame set is symmetrically encrypted by the first encryption information to obtain a first video stream data packet. The first video frame set after scrambling may be a plurality of target video frames after scrambling, or may be a compressed packet after scrambling.
In another embodiment, the scrambled character information is processed through a hash algorithm, and public key encryption is performed on the hashed scrambled character information through the first encryption information, so that the first video stream data packet is obtained. It can be understood that the symmetric encryption is easy to break, so the scrambled first set of video frames is encrypted by a hash encryption algorithm which is more difficult to break. If the third-party equipment steals the first video stream data packet after the hash encryption, the third-party equipment cannot easily break the first video stream data packet because the third-party equipment does not have the hash decryption library, and the safety of video stream transmission is ensured.
In an embodiment, the second set of video frames is symmetrically encrypted by the second encryption information, so as to obtain a second video stream data packet. Illustratively, because the video frames in the second video frame set do not contain privacy pictures, even if the video frames are stolen and cracked by a third-party device, information harmful to a user cannot be obtained, the second video frame set can be encrypted by adopting the simplest encryption mode, the encryption cost is saved, and the encryption efficiency of the video stream is improved.
S130, the first video stream data packet and the second video stream data packet are sent to a receiving end, and the receiving end is configured with a messy code decryption algorithm corresponding to the messy code filling algorithm, first decryption information corresponding to the first encryption information and second decryption information corresponding to the second encryption information.
The receiving end refers to a terminal device, such as a mobile phone client, used by a user to obtain a monitoring video. Illustratively, a first video stream data packet obtained by performing double encryption processing on the first video frame set and a second video stream data packet obtained by performing simple encryption processing on the second video frame set are transmitted to the mobile phone client. If the first video stream data packet is stolen by the third-party equipment in the transmission process, the third-party equipment needs to perform hash decryption on the first video stream data packet and recover the first video frame set subjected to code scrambling processing. And no matter the hash decryption or the messy code recovery is not easy to realize, so the double encryption mechanism greatly improves the security of video stream transmission.
The first decryption information and the first encryption information are a pair of public key and private key, and the second decryption information and the second encryption information are a pair of public key and private key. Illustratively, after receiving the first video stream packet and the second video stream packet, the mobile phone client decrypts the second video stream packet through the locally stored second decryption information, so as to obtain a second video frame set. The first video stream data packet is decrypted through the locally stored first decryption information to obtain hash character information, and the character information corresponding to the hash character information is inquired through a locally stored hash decryption library to obtain the messy code character information of the first video frame set. And determining a corresponding messy code decryption algorithm through the character filling rule and the filling character information of the first video frame set, and recovering the video character information of each target video frame in the first video frame set through the messy code decryption algorithm. And sequencing the target video frame in the first video frame set and the video frame in the second video frame set according to the timestamp of the video frame to obtain a corresponding video stream.
In summary, according to the encrypted data transmission method provided by the embodiment of the application, the target video frame containing the target object is screened out by identifying the content of each video frame in the video stream, the target video frame is determined to relate to a privacy picture, the target video frame is divided into the first video frame set, the remaining video frames are divided into the second video frame set, and the first video frame set and the second video frame set are encrypted by different encryption methods respectively. The video character information of the first video frame set is disturbed through the messy code filling algorithm, the first video frame set after the messy code processing is encrypted through the first encryption information, the video cracking difficulty is greatly improved through double processing, and the risk that the privacy picture is stolen is reduced. The second video frame set is encrypted through the second encryption information, the video frames which do not relate to the privacy pictures are normally encrypted, the encryption cost and the decryption complexity are not additionally increased, the video encryption and decryption processing efficiency is guaranteed, and the safety of video stream transmission is improved.
On the basis of the foregoing embodiments, fig. 6 is a schematic structural diagram of an encrypted data transmission apparatus according to an embodiment of the present application. Referring to fig. 6, the encrypted data transmission apparatus provided in this embodiment specifically includes: a video frame classification module 21, a video stream encryption module 22 and a video stream transmission module 23.
The video frame classification module is configured to determine a target video frame containing a target object according to content of a video frame in a video stream to be transmitted, and split the video stream to be transmitted into a first video frame set and a second video frame set according to the target video frame, wherein the first video frame set comprises the target video frame;
the video stream encryption module is configured to process a first video frame set based on a preset messy code filling algorithm, encrypt the processed first video frame set through first encryption information to obtain a corresponding first video stream data packet, and encrypt a second video frame set through second encryption information to obtain a corresponding second video stream data packet;
the video stream transmission module is configured to send the first video stream data packet and the second video stream data packet to a receiving end, and the receiving end is configured with a messy code decryption algorithm corresponding to the messy code filling algorithm, first decryption information corresponding to the first encryption information and second decryption information corresponding to the second encryption information.
On the basis of the above embodiment, the video frame classification module includes: the first identification unit is configured to identify the content in the first video frame according to the time stamp sequence of the video stream to be transmitted, and determine whether the target object is contained in the first video frame; a second recognition unit configured to recognize, in a case where the first video frame includes the target object, a content of a second video frame spaced from the first video frame by a preset number of frames, and determine whether the second video frame includes the target object; a first classification unit configured to determine, in a case where the second video frame contains the target object, the first video frame, the second video frame, and a third video frame therebetween as the target video frame; a third identifying unit, configured to identify the content of the third video frame according to the reverse order of the timestamps of the video stream to be transmitted and determine whether the third video frame contains the target object or not, in the case that the second video frame does not contain the target object; and the second classification unit is configured to determine the first video frame, the third video frame and the video frame between the first video frame and the third video frame as the target video frame when the third video frame contains the target object.
On the basis of the embodiment, the messy code filling algorithm comprises filling character information and character filling rules; correspondingly, the video stream encryption module comprises: the set encoding unit is configured to encode the first video frame set to obtain encoding information of the first video frame set; the first messy code processing unit is configured to acquire preset filling character information and a corresponding character filling rule, and merge the filling character information and the coding information of the first video frame set based on the character filling rule to obtain messy code character information of the first video frame set.
On the basis of the above embodiment, the video stream encryption module includes: the device comprises a filling character information determining unit, a character information acquiring unit and a character information processing unit, wherein the filling character information determining unit is configured to circularly traverse a plurality of filling character information in a preset character list and sequentially determine filling character information corresponding to a target video frame according to the time stamp sequence of each target video frame in a first video frame set; the character filling rule determining unit is configured to cycle through a plurality of character filling rules in a preset rule list, and sequentially determine the character filling rules corresponding to the target video frames according to the time stamp sequence of each target video frame in the first video frame set; and the second messy code processing unit is configured to merge the filling character information and the video character information of the corresponding target video frame based on the character filling rule to obtain the messy code character information of the target video frame.
On the basis of the above embodiment, the video stream encryption transmission apparatus further includes: the list updating module is configured to update the filling character information in the character list and the arrangement sequence of the character filling rules in the rule list in a timing mode before the first video frame set is processed based on a preset messy code filling algorithm; and the updating instruction sending module is configured to send an updating instruction to the receiving terminal after the character list and the rule list are updated so that the receiving terminal correspondingly updates the messy code decryption algorithm according to the updating instruction.
On the basis of the above embodiment, the video stream encryption module includes: and the Hash encryption unit is configured to process the messy code character information through a Hash algorithm and perform public key encryption on the messy code character information after the Hash processing through the first encryption information to obtain a first video stream data packet.
On the basis of the above embodiment, the video stream encryption module includes: and the symmetric encryption unit is configured to symmetrically encrypt the second video frame set through the second encryption information to obtain a second video stream data packet.
In the foregoing, the encrypted data transmission device provided in this embodiment of the present application screens out a target video frame including a target object by identifying content of each video frame in a video stream, determines that the target video frame relates to a privacy picture, divides the target video frame into a first video frame set, and divides remaining video frames into a second video frame set, so as to encrypt the first video frame set and the second video frame set respectively by using different encryption methods. The video character information of the first video frame set is disturbed through the messy code filling algorithm, the first video frame set after the messy code processing is encrypted through the first encryption information, the video cracking difficulty is greatly improved through double processing, and the risk that the privacy picture is stolen is reduced. The second video frame set is encrypted through the second encryption information, the video frames which do not relate to the privacy pictures are normally encrypted, the encryption cost and the decryption complexity are not additionally increased, the video encryption and decryption processing efficiency is guaranteed, and the safety of video stream transmission is improved.
The encrypted data transmission device provided by the embodiment of the application can be used for executing the encrypted data transmission method provided by the embodiment, and has corresponding functions and beneficial effects.
Fig. 7 is a schematic structural diagram of an encrypted data transmission apparatus provided in an embodiment of the present application, and referring to fig. 7, the encrypted data transmission apparatus includes: a processor 31, a memory 32, a communication device 33, an input device 34, and an output device 35. The number of processors 31 in the encrypted data transmission apparatus may be one or more, and the number of memories 32 in the encrypted data transmission apparatus may be one or more. The processor 31, the memory 32, the communication device 33, the input device 34, and the output device 35 of the encrypted data transmission apparatus may be connected by a bus or other means.
The memory 32 is a computer-readable storage medium that can be used to store software programs, computer-executable programs, and modules, such as program instructions/modules corresponding to the encrypted data transmission method according to any embodiment of the present application (for example, the video frame classification module 21, the video stream encryption module 22, and the video stream transmission module 23 in the encrypted data transmission apparatus). The memory 32 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function; the storage data area may store data created according to use of the device, and the like. Further, the memory 32 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some examples, the memory may further include memory located remotely from the processor, and these remote memories may be connected to the device over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The communication device 33 is used for data transmission.
The processor 31 executes various functional applications of the device and data processing by executing software programs, instructions, and modules stored in the memory 32, that is, implements the above-described encrypted data transmission method.
The input device 34 may be used to receive entered numeric or character information and to generate key signal inputs relating to user settings and function controls of the apparatus. The output device 35 may include a display device such as a display screen.
The encrypted data transmission device provided by the embodiment can be used for executing the encrypted data transmission method provided by the embodiment, and has corresponding functions and beneficial effects.
Embodiments of the present application also provide a storage medium containing computer-executable instructions, which when executed by a computer processor, are configured to perform an encrypted data transmission method, the encrypted data transmission method including: determining a target video frame containing a target object according to the content of a video frame in a video stream to be transmitted, and splitting the video stream to be transmitted into a first video frame set and a second video frame set according to the target video frame, wherein the first video frame set comprises the target video frame; processing the first video frame set based on a preset messy code filling algorithm, encrypting the processed first video frame set through first encryption information to obtain a corresponding first video stream data packet, and encrypting the second video frame set through second encryption information to obtain a corresponding second video stream data packet; and sending the first video stream data packet and the second video stream data packet to a receiving end, wherein the receiving end is configured with a messy code decryption algorithm corresponding to the messy code filling algorithm, first decryption information corresponding to the first encryption information and second decryption information corresponding to the second encryption information.
Storage medium-any of various types of memory devices or storage devices. The term "storage medium" is intended to include: mounting media such as CD-ROM, floppy disk, or tape devices; computer system memory or random access memory such as DRAM, DDR RAM, SRAM, EDO RAM, Lanbas (Rambus) RAM, etc.; non-volatile memory, such as magnetic media (e.g., hard disk or optical storage); registers or other similar types of memory elements, etc. The storage medium may also include other types of memory or combinations thereof. In addition, the storage medium may be located in a first computer system in which the program is executed, or may be located in a different second computer system connected to the first computer system through a network (such as the internet). The second computer system may provide program instructions to the first computer for execution. The term "storage medium" may include two or more storage media residing in different locations, e.g., in different computer systems connected by a network. The storage medium may store program instructions (e.g., embodied as a computer program) that are executable by one or more processors.
Of course, the storage medium provided in the embodiments of the present application contains computer-executable instructions, and the computer-executable instructions are not limited to the above encrypted data transmission method, and may also perform related operations in the encrypted data transmission method provided in any embodiments of the present application.
The encrypted data transmission device, the storage medium, and the apparatus provided in the foregoing embodiments may execute the encrypted data transmission method provided in any embodiment of the present application, and reference may be made to the encrypted data transmission method provided in any embodiment of the present application without detailed technical details described in the foregoing embodiments.
The foregoing is considered as illustrative only of the preferred embodiments of the invention and the principles of the technology employed. The present application is not limited to the particular embodiments described herein, and various obvious changes, adaptations and substitutions may be made by those skilled in the art without departing from the scope of the present application. Therefore, although the present application has been described in more detail with reference to the above embodiments, the present application is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present application, and the scope of the present application is determined by the scope of the claims.

Claims (8)

1. An encrypted data transmission method, comprising:
determining a target video frame containing a target object according to the content of a video frame in a video stream to be transmitted, and splitting the video stream to be transmitted into a first video frame set and a second video frame set according to the target video frame, wherein the first video frame set comprises the target video frame;
processing the first video frame set based on a preset messy code filling algorithm, encrypting the processed first video frame set through first encryption information to obtain a corresponding first video stream data packet, and encrypting the second video frame set through second encryption information to obtain a corresponding second video stream data packet; the messy code filling algorithm comprises filling character information and a character filling rule; coding the first video frame set to obtain coding information of the first video frame set; acquiring preset filling character information and a corresponding character filling rule, and combining the filling character information and the coding information of the first video frame set based on the character filling rule to obtain messy code character information of the first video frame set; or, circularly traversing a plurality of filling character information in a preset character list, and sequentially determining the filling character information corresponding to the target video frame according to the time stamp sequence of each target video frame in the first video frame set; circularly traversing a plurality of character filling rules in a preset rule list, and sequentially determining the character filling rules corresponding to the target video frames according to the time stamp sequence of each target video frame in the first video frame set; merging the filling character information and the video character information of the corresponding target video frame based on the character filling rule to obtain messy code character information of the target video frame;
and sending the first video stream data packet and the second video stream data packet to a receiving end, wherein the receiving end is configured with a messy code decryption algorithm corresponding to the messy code filling algorithm, first decryption information corresponding to the first encryption information and second decryption information corresponding to the second encryption information.
2. The encrypted data transmission method according to claim 1, wherein the determining a target video frame containing a target object according to contents of video frames in the video stream to be transmitted comprises:
identifying the content in a first video frame according to the time stamp sequence of the video stream to be transmitted, and determining whether the first video frame contains a target object;
under the condition that the first video frame comprises a target object, identifying the content of a second video frame which is separated from the first video frame by a preset frame number, and determining whether the second video frame comprises the target object;
determining the first video frame, the second video frame and a third video frame therebetween as a target video frame if the second video frame contains the target object;
under the condition that the second video frame does not contain the target object, identifying the content of the third video frame according to the reverse order of the timestamps of the video stream to be transmitted, and determining whether the third video frame contains the target object;
in a case where the third video frame contains a target object, determining the first video frame, the third video frame, and a video frame therebetween as the target video frame.
3. The encrypted data transmission method according to claim 1, further comprising, before the processing the first set of video frames based on a preset scrambling code filling algorithm:
updating the filling character information in the character list and the arrangement sequence of the character filling rules in the rule list at regular time;
and after the character list and the rule list are updated, sending an updating instruction to the receiving end so that the receiving end correspondingly updates the messy code decryption algorithm according to the updating instruction.
4. The encrypted data transmission method according to claim 1 or 3, wherein the encrypting the processed first video frame set by the first encryption information to obtain a corresponding first video stream packet comprises:
and processing the messy code character information through a Hash algorithm, and performing public key encryption on the messy code character information after the Hash processing through the first encryption information to obtain the first video stream data packet.
5. The method for transmitting encrypted data according to claim 1, wherein the encrypting the second set of video frames by using the second encryption information to obtain a corresponding second video stream data packet includes:
and symmetrically encrypting the second video frame set through the second encryption information to obtain the second video stream data packet.
6. An encrypted data transmission apparatus, comprising:
the video frame classification module is configured to determine a target video frame containing a target object according to content of a video frame in a video stream to be transmitted, and split the video stream to be transmitted into a first video frame set and a second video frame set according to the target video frame, wherein the first video frame set comprises the target video frame;
the video stream encryption module is configured to process the first video frame set based on a preset messy code filling algorithm, encrypt the processed first video frame set through first encryption information to obtain a corresponding first video stream data packet, and encrypt the second video frame set through second encryption information to obtain a corresponding second video stream data packet; the messy code filling algorithm comprises filling character information and a character filling rule; coding the first video frame set to obtain coding information of the first video frame set; acquiring preset filling character information and a corresponding character filling rule, and combining the filling character information and the coding information of the first video frame set based on the character filling rule to obtain messy code character information of the first video frame set; or, circularly traversing a plurality of filling character information in a preset character list, and sequentially determining the filling character information corresponding to the target video frame according to the time stamp sequence of each target video frame in the first video frame set; circularly traversing a plurality of character filling rules in a preset rule list, and sequentially determining the character filling rules corresponding to the target video frames according to the time stamp sequence of each target video frame in the first video frame set; merging the filling character information and the video character information of the corresponding target video frame based on the character filling rule to obtain messy code character information of the target video frame;
a video stream transmission module configured to send the first video stream data packet and the second video stream data packet to a receiving end, where the receiving end is configured with a scrambling code decryption algorithm corresponding to the scrambling code padding algorithm, first decryption information corresponding to the first encryption information, and second decryption information corresponding to the second encryption information.
7. An encrypted data transmission apparatus, comprising: one or more processors; a storage device storing one or more programs which, when executed by the one or more processors, cause the one or more processors to implement the encrypted data transmission method of any one of claims 1-5.
8. A storage medium containing computer-executable instructions for performing the method of encrypted data transmission according to any one of claims 1 to 5 when executed by a computer processor.
CN202210845100.9A 2022-07-19 2022-07-19 Encrypted data transmission method and device Pending CN115002515A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210845100.9A CN115002515A (en) 2022-07-19 2022-07-19 Encrypted data transmission method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210845100.9A CN115002515A (en) 2022-07-19 2022-07-19 Encrypted data transmission method and device

Publications (1)

Publication Number Publication Date
CN115002515A true CN115002515A (en) 2022-09-02

Family

ID=83021691

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210845100.9A Pending CN115002515A (en) 2022-07-19 2022-07-19 Encrypted data transmission method and device

Country Status (1)

Country Link
CN (1) CN115002515A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105591737A (en) * 2016-01-27 2016-05-18 浪潮(北京)电子信息产业有限公司 Data encryption, decryption and transmission methods and systems
CN108390887A (en) * 2018-03-16 2018-08-10 中影数字巨幕(北京)有限公司 A kind of cinematic data transmission method and device
CN110430446A (en) * 2019-07-26 2019-11-08 东软集团股份有限公司 Method for processing video frequency, device, equipment and computer readable storage medium
CN111031353A (en) * 2019-12-11 2020-04-17 上海乐相科技有限公司 Video encryption method and device
CN111277728A (en) * 2020-02-13 2020-06-12 浙江大华技术股份有限公司 Video detection method and device, computer-readable storage medium and electronic device
CN112311740A (en) * 2019-07-31 2021-02-02 深圳市云海物联科技有限公司 Data encryption method, data decryption method, terminal and storage medium
CN114915805A (en) * 2022-07-18 2022-08-16 广州万协通信息技术有限公司 Video stream transmission method based on double encryption mechanism and security chip device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105591737A (en) * 2016-01-27 2016-05-18 浪潮(北京)电子信息产业有限公司 Data encryption, decryption and transmission methods and systems
CN108390887A (en) * 2018-03-16 2018-08-10 中影数字巨幕(北京)有限公司 A kind of cinematic data transmission method and device
CN110430446A (en) * 2019-07-26 2019-11-08 东软集团股份有限公司 Method for processing video frequency, device, equipment and computer readable storage medium
CN112311740A (en) * 2019-07-31 2021-02-02 深圳市云海物联科技有限公司 Data encryption method, data decryption method, terminal and storage medium
CN111031353A (en) * 2019-12-11 2020-04-17 上海乐相科技有限公司 Video encryption method and device
CN111277728A (en) * 2020-02-13 2020-06-12 浙江大华技术股份有限公司 Video detection method and device, computer-readable storage medium and electronic device
CN114915805A (en) * 2022-07-18 2022-08-16 广州万协通信息技术有限公司 Video stream transmission method based on double encryption mechanism and security chip device

Similar Documents

Publication Publication Date Title
CN114915805B (en) Video stream transmission method based on double encryption mechanism and security chip device
CN107347058B (en) Data encryption method, data decryption method, device and system
CN104349135B (en) Monitoring server, method for processing data of monitoring server and monitoring system
CN109151508B (en) Video encryption method
CN106161383A (en) A kind of multimedia data encryption, the method and device of deciphering
US20190280865A1 (en) Systems and methods for secure storage and transmission of a data stream
CN105338323A (en) Video monitoring method and device
KR20120071556A (en) Image secure tansmission apparatus, image data reception apparatus, and key generation method therefor
WO2022257612A1 (en) Video processing methods and apparatus, electronic device, and storage medium
CN104519013A (en) Method and system for ensuring security of media stream, and device
CN102932650A (en) Methods, equipment and systems for protecting and verifying integrity of video data
US20140115326A1 (en) Apparatus and method for providing network data service, client device for network data service
WO2021196960A1 (en) Encrypted video call method and apparatus, and device and storage medium
CN115002515A (en) Encrypted data transmission method and device
CN115086718A (en) Video stream encryption method and device
CN104284237A (en) Video transmission method and system
CN112073175B (en) Data processing method, device and system and electronic equipment
CN115134080A (en) Data transmission method and device based on security encryption chip
US11019042B1 (en) Data assisted key switching in hybrid cryptography
KR101899554B1 (en) Security system for transmitting video data
WO2022016573A1 (en) Video monitoring analysis system and method
CN111757062A (en) Efficient and safe transmission method and system for video stream
CN112714358A (en) Video streaming media encryption and decryption transmission method and system
CN115225935B (en) Method and device for cross-encrypting bytes of video stream and audio stream
CN107483883B (en) Intelligent data interaction method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20220902

RJ01 Rejection of invention patent application after publication