CN115086718A - Video stream encryption method and device - Google Patents

Video stream encryption method and device Download PDF

Info

Publication number
CN115086718A
CN115086718A CN202210845074.XA CN202210845074A CN115086718A CN 115086718 A CN115086718 A CN 115086718A CN 202210845074 A CN202210845074 A CN 202210845074A CN 115086718 A CN115086718 A CN 115086718A
Authority
CN
China
Prior art keywords
video stream
transmitted
video
data packet
video data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210845074.XA
Other languages
Chinese (zh)
Inventor
张奇惠
王立峰
刘家明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Wise Security Technology Co Ltd
Original Assignee
Guangzhou Wise Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Wise Security Technology Co Ltd filed Critical Guangzhou Wise Security Technology Co Ltd
Priority to CN202210845074.XA priority Critical patent/CN115086718A/en
Publication of CN115086718A publication Critical patent/CN115086718A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • H04N21/26613Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing keys in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
    • H04N21/4408Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Abstract

The application discloses a video stream encryption method and device. According to the technical scheme, each video frame of the surveillance video stream to be transmitted is identified by acquiring the surveillance video stream to be transmitted, the surveillance video stream to be transmitted is processed based on a set randomization algorithm under the condition that the surveillance video stream to be transmitted contains target video frames, and the processed surveillance video stream to be transmitted is encrypted by using set encryption information to obtain a corresponding first video data packet; under the condition that the to-be-transmitted monitoring video stream does not contain the target video frame, directly encrypting the to-be-transmitted monitoring video stream by using set encryption information to obtain a corresponding second video data packet; and sending the first video data packet or the second video data packet to a receiving end. By adopting the technical means, the cracking difficulty of the monitoring video stream can be increased, the transmission safety of the monitoring video stream is improved, and further the privacy of a user is prevented from being easily revealed.

Description

Video stream encryption method and device
Technical Field
The present application relates to the field of video stream transmission technologies, and in particular, to a video stream encryption method and apparatus.
Background
At present, with the rapid development of monitoring systems, monitoring cameras are installed in areas which are visible everywhere in life, so that things happening in corresponding areas can be monitored in real time. For example, a user can install a monitoring camera in a private living area, the monitoring camera transmits collected videos to a mobile phone of the user, and the user can remotely control the private living area.
However, most of the conventional surveillance video transmission methods employ a unique encryption algorithm to encrypt video frames. Since the privacy information of the user may be involved in the video frame, the simple data encryption mode can easily crack the video frame, resulting in the theft of the video data. The security of video data transmission can not be guaranteed, and privacy of users is revealed.
Disclosure of Invention
The application provides a video stream encryption method and device, which can increase the cracking difficulty of a monitoring video stream, improve the transmission safety of the monitoring video stream, avoid the disclosure of user privacy and solve the technical problem that the user privacy is revealed because the existing monitoring video stream is cracked.
In a first aspect, the present application provides a video stream encryption method, including:
acquiring a surveillance video stream to be transmitted, identifying each video frame of the surveillance video stream to be transmitted, and judging whether the surveillance video stream to be transmitted contains a target video frame, wherein the target video frame contains a designated target;
processing the surveillance video stream to be transmitted based on a set randomization algorithm under the condition that the surveillance video stream to be transmitted contains the target video frame, and encrypting the processed surveillance video stream to be transmitted by using set encryption information to obtain a corresponding first video data packet; under the condition that the to-be-transmitted monitoring video stream does not contain the target video frame, directly encrypting the to-be-transmitted monitoring video stream by using set encryption information to obtain a corresponding second video data packet;
sending the first video data packet or the second video data packet to a receiving end, wherein the receiving end is configured with a de-randomization algorithm corresponding to the randomization algorithm and decryption information corresponding to the encryption information, and is used for decrypting the first video data packet by using the decryption information under the condition of receiving the first video data packet, performing de-randomization processing on the first video data packet based on the de-randomization algorithm, and restoring the monitoring video stream to be transmitted; and under the condition that the second video data packet is received, decrypting the second video data packet by using the decryption information to obtain the to-be-transmitted monitoring video stream.
Further, the identifying each video frame of the surveillance video stream to be transmitted and determining whether the surveillance video stream to be transmitted contains a target video frame includes:
inputting each video frame of the surveillance video stream to be transmitted into a pre-constructed target detection model for detection, and judging whether the surveillance video stream to be transmitted contains a target video frame or not based on an output result of the target detection model, wherein the target detection model is trained and constructed in advance according to a training data set constructed by the specified target.
Further, after inputting each video frame of the surveillance video stream to be transmitted into a pre-constructed target detection model for detection, and determining whether the surveillance video stream to be transmitted contains a target video frame based on an output result of the target detection model, the method further includes:
and updating the target video frame to the training data set, and iteratively training the target detection model based on the updated training data set.
Further, the processing the to-be-transmitted monitoring video stream based on the set randomization algorithm, and encrypting the processed to-be-transmitted monitoring video stream using the set encryption information to obtain the corresponding first video data packet includes:
segmenting the monitored video stream to be transmitted according to a set number of video frames to obtain a plurality of video data segments;
randomizing each video data segment by using a randomization algorithm based on a predefined original randomization seed to obtain a plurality of corresponding randomized data segments;
and packaging and encrypting each randomized data segment into a first video data packet by using set encryption information.
Further, the randomizing each of the video data segments based on the predefined original randomization seed using a randomization algorithm to obtain a plurality of randomized data segments, comprising:
and taking the original randomization seed as an input sample, circularly inputting the input sample into a pre-constructed n-level linear feedback shift register, randomizing data bits of the video data segment one by one based on the n-level linear feedback shift register and the input sample, and iteratively adjusting the input sample.
Further, the randomizing each of the video data segments using a randomizing algorithm based on a predefined original randomization seed, comprising:
randomizing the corresponding video data segment using a predefined different original randomization seed, which original randomization seed is predefined for each of the video data segments.
Further, still include:
and periodically inquiring a pre-constructed randomized seed catalog, selecting one randomized seed from the catalog to update into the original randomized seed, and synchronizing the updated original randomized seed to the receiving end.
In a second aspect, the present application provides a video stream encryption apparatus, comprising:
the identification module is used for acquiring the surveillance video stream to be transmitted, identifying each video frame of the surveillance video stream to be transmitted, and judging whether the surveillance video stream to be transmitted contains a target video frame, wherein the target video frame contains a designated target;
the encryption module is used for processing the surveillance video stream to be transmitted based on a set randomization algorithm under the condition that the surveillance video stream to be transmitted contains the target video frame, and encrypting the processed surveillance video stream to be transmitted by using set encryption information to obtain a corresponding first video data packet; under the condition that the to-be-transmitted monitoring video stream does not contain the target video frame, directly encrypting the to-be-transmitted monitoring video stream by using set encryption information to obtain a corresponding second video data packet;
a transmission module, configured to send the first video data packet or the second video data packet to a receiving end, where the receiving end is configured with a derandomization algorithm corresponding to the randomization algorithm and decryption information corresponding to the encryption information, and is configured to, in a case where the first video data packet is received, decrypt the first video data packet using the decryption information, perform derandomization processing on the first video data packet based on the derandomization algorithm, and restore the to-be-transmitted monitoring video stream; and under the condition that the second video data packet is received, decrypting the second video data packet by using the decryption information to obtain the to-be-transmitted monitoring video stream.
In a third aspect, the present application provides an electronic device comprising:
a memory and one or more processors;
the memory for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement the video stream encryption method of the first aspect.
In a fourth aspect, the present application provides a storage medium containing computer-executable instructions for performing the video stream encryption method according to the first aspect when executed by a computer processor.
The method comprises the steps of identifying each video frame of the surveillance video stream to be transmitted by acquiring the surveillance video stream to be transmitted, and judging whether the surveillance video stream to be transmitted contains a target video frame, wherein the target video frame contains a designated target; processing the surveillance video stream to be transmitted based on a set randomization algorithm under the condition that the surveillance video stream to be transmitted contains a target video frame, and encrypting the processed surveillance video stream to be transmitted by using set encryption information to obtain a corresponding first video data packet; under the condition that the to-be-transmitted monitoring video stream does not contain the target video frame, directly encrypting the to-be-transmitted monitoring video stream by using set encryption information to obtain a corresponding second video data packet; the method comprises the steps that a first video data packet or a second video data packet is sent to a receiving end, the receiving end is configured with a de-randomization algorithm corresponding to the randomization algorithm and decryption information corresponding to encryption information, and is used for decrypting the first video data packet by using the decryption information under the condition that the first video data packet is received, and carrying out de-randomization processing on the first video data packet based on the de-randomization algorithm to restore a monitoring video stream to be transmitted; and under the condition of receiving the second video data packet, decrypting the second video data packet by using the decryption information to obtain the monitoring video stream to be transmitted. By adopting the technical means, the target video frame detection is adopted to carry out video stream randomization processing and encryption transmission on the to-be-transmitted monitoring video stream containing the user privacy, so that the cracking difficulty of the monitoring video stream is increased, the transmission safety of the monitoring video stream is improved, and the user privacy is prevented from being easily revealed. Meanwhile, a conventional encryption transmission mode is adopted for the to-be-transmitted monitoring video stream which does not contain the user privacy information, so that the video encryption cost is not increased too much, and the video stream transmission safety is improved while the video stream transmission efficiency is ensured.
Drawings
Fig. 1 is a flowchart of a video stream encryption method according to an embodiment of the present application;
fig. 2 is a flowchart of an encryption process of a first video data packet according to a first embodiment of the present application;
fig. 3 is a schematic diagram of transmission of a first video data packet according to a first embodiment of the present application;
fig. 4 is a flowchart of processing a surveillance video stream to be transmitted according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a video stream encryption apparatus according to a second embodiment of the present application;
fig. 6 is a schematic structural diagram of an electronic device according to a third embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, specific embodiments of the present application are described in detail below with reference to the accompanying drawings. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting of the application. It should be further noted that, for the convenience of description, only some but not all of the relevant portions of the present application are shown in the drawings. Before discussing exemplary embodiments in more detail, it should be noted that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although a flowchart may describe the operations (or steps) as a sequential process, many of the operations can be performed in parallel, concurrently or simultaneously. In addition, the order of the operations may be re-arranged. The process may be terminated when its operations are completed, but may have additional steps not included in the figure. The processes may correspond to methods, functions, procedures, subroutines, and the like.
The first embodiment is as follows:
fig. 1 is a flowchart of a video stream encryption method according to an embodiment of the present application, where the video stream encryption method provided in this embodiment may be executed by a surveillance video stream privacy protection transmission device, where the surveillance video stream privacy protection transmission device may be implemented in a software and/or hardware manner, and the surveillance video stream privacy protection transmission device may be formed by two or more physical entities or may be formed by one physical entity. Generally, the surveillance video stream privacy protection transmission device may be a surveillance video processing server, a router, a computer, a camera with a processing module, or other computing device.
The following description will be given taking the surveillance video stream privacy protection transmission apparatus as an example of a main body for executing a video stream encryption method. Referring to fig. 1, the video stream encryption method specifically includes:
s110, acquiring the surveillance video stream to be transmitted, identifying each video frame of the surveillance video stream to be transmitted, and judging whether the surveillance video stream to be transmitted contains a target video frame, wherein the target video frame contains a designated target.
The video stream encryption method aims to detect and identify a to-be-transmitted monitoring video stream, judge whether the to-be-transmitted monitoring video stream contains privacy information of a user, and if so, adopt a more safe video encryption transmission mechanism to increase the difficulty of breaking and stealing video data and ensure the privacy safety of the user. For the to-be-transmitted monitoring video stream which does not contain the user privacy, a conventional video encryption transmission mechanism can be adopted, so that the increase of too much video encryption cost is avoided, and the safety of video stream transmission is improved while the transmission efficiency of the video stream is ensured.
Illustratively, in an actual surveillance video stream transmission scenario, a surveillance video stream to be transmitted refers to a video stream that a processor prepares to send to a user's mobile client. For example, the monitoring camera acquires a video stream and then sends the video stream to the processor, and the processor encrypts the video stream and then transmits the video stream to the mobile phone client of the user. And processing the surveillance video stream to be transmitted by adopting different encryption transmission mechanisms according to whether the surveillance video stream to be transmitted contains the target video frame of the specified target.
The designated target refers to a screen related to private information, and the private information may be portrait information of a user and family. The target video frame is a video frame containing a privacy picture in the transmission video stream. Illustratively, the surveillance video stream to be transmitted includes a plurality of video frames, each video frame corresponds to a timestamp, and the surveillance video stream to be transmitted is composed of a plurality of video frames which are ordered according to a timestamp sequence. The video stream contains the privacy information of the user, namely the video frames in the video stream contain the privacy pictures, so that whether the video frames contain the target video frames can be determined by identifying the content of the video frames. According to the embodiment, a relatively safer encryption transmission mechanism is carried out on the target video frame containing the privacy picture, so that the cracking difficulty of the monitoring video stream is improved, the encryption transmission safety of the monitoring video stream is further improved, and the risk of user privacy disclosure is reduced.
Specifically, when whether the surveillance video stream to be transmitted contains a target video frame or not is identified, each video frame of the surveillance video stream to be transmitted is input into a pre-constructed target detection model for detection, whether the surveillance video stream to be transmitted contains the target video frame or not is judged based on an output result of the target detection model, and the target detection model is trained and constructed in advance according to a training data set constructed by the specified target.
The target detection model may adopt a neural network model such as a YOLOv3 target detection model. In training the target detection model, a training data set is constructed by collecting image data containing a specified target (i.e., a user's portrait). And further designing a neural network structure and a loss function of the target detection model, and training network parameters of the target detection model by using the training data set labeled with the specified target. After the model training is completed, the model structure and parameters are saved for subsequent specified target detection to determine a target video frame.
The YOLOv3 target detection model mainly comprises a convolutional layer and a pooling layer, wherein the naming rule of the layer in the network comprises the category and the number appearing for the second time in the network, for example, conv8 represents the 8 th convolutional layer in the network, upsampling represents the upsampling layer in the network, the size of the output feature map of each layer in the network is represented as resolution width x resolution height x channel number, and rectangular frames and classifications of all targets in the image are finally obtained through a multi-layer convolution level pooling layer so as to complete the detection of the targets. The pooling layer is an image down-sampling operation, and although parameters of the convolution feature layer are reduced and the model operation speed is increased, semantic information loss is caused to the convolution feature map of the previous layer. The YOLOv3 target detection network considers the problem of computing resources, and the basic framework of the YOLOv3 target detection network in the embodiment of the application is tiny-dark net, the parameters of the YOLOv3 target detection network are only 4M, and the YOLOv3 target detection network is small in size and suitable for landing.
Based on the detection result of the target detection model, whether the monitored video stream to be transmitted contains a target video frame or not can be determined, namely whether the monitored video stream contains the specified user privacy information or not can be determined. And then, according to the detection result, a corresponding encryption mechanism is adaptively selected to encrypt and transmit the monitoring video stream.
Based on a Yolov3 target detection model, each video frame in the monitored video stream to be transmitted can be detected quickly, and whether the video frame contains the target video frame or not is determined. Compared with other target detection algorithms, the detection speed of the Yolov3 target detection model is high, and the scheme only needs to determine whether the video frame contains the target video frame and does not need to determine the position of the target video frame in the video frame, so that the target video frame in the video frame can be quickly detected through the Yolo, and then the target video frame in the video stream can be quickly screened out, so that the encryption processing efficiency of the video stream is improved.
Optionally, in an embodiment, the target video frame is further updated to the training data set, and the target detection model is iteratively trained based on the updated training data set. It can be understood that, for the identified target video frame, since the target video frame includes the specified target, in order to enable the target detection model to identify and detect the specified target more accurately and quickly, the target video frame is added into the training data set to perform iterative training of the target detection model, so that the detection accuracy and efficiency of the target detection model can be further improved, and the encryption transmission efficiency of the surveillance video stream is optimized.
S120, under the condition that the to-be-transmitted monitoring video stream contains the target video frame, processing the to-be-transmitted monitoring video stream based on a set randomization algorithm, and encrypting the processed to-be-transmitted monitoring video stream by using set encryption information to obtain a corresponding first video data packet; and under the condition that the to-be-transmitted monitoring video stream does not contain the target video frame, directly encrypting the to-be-transmitted monitoring video stream by using set encryption information to obtain a corresponding second video data packet.
Further, based on the target detection model, if it is determined that the to-be-transmitted surveillance video stream contains the target video frame, the to-be-transmitted surveillance video stream is encrypted by using the set encryption information after being randomized. Because the monitoring video stream to be transmitted is encrypted by using a simple encryption mode, once the key information is cracked, the data leakage situation occurs in the data transmission link, so that the data content is easily stolen, and the security of data transmission is influenced. Therefore, when a sending end sends a to-be-transmitted monitoring video stream containing user privacy information, firstly, randomization processing is performed on the to-be-transmitted monitoring video stream, further, data subjected to randomization processing is encrypted, and an encrypted data packet is defined as a first video data packet.
Referring to fig. 2, the encryption process of the first video data packet includes:
s1201, segmenting the monitored video stream to be transmitted according to a set number of video frames to obtain a plurality of video data segments;
s1202, randomizing each video data segment by using a randomizing algorithm based on a predefined original randomizing seed to obtain a plurality of corresponding randomized data segments;
s1203, packaging and encrypting each randomized data segment into a first video data packet by using set encryption information.
Specifically, the surveillance video stream to be transmitted is segmented into a plurality of video data segments according to the video frames of the surveillance video stream to be transmitted in a set number. The standard data amount of each video data segment is fixed. And for the part of the monitored video stream to be transmitted which does not meet the standard data volume, independently taking the part of the monitored video stream as a video data segment so as to complete the segmentation of the data.
It should be noted that, in the embodiment of the present application, by segmenting the video data segment, distributed processing of the data can be implemented, which avoids that a single to-be-transmitted monitoring video stream greatly affects data processing efficiency, and is also convenient for randomization processing of the data. And when the surveillance video stream to be transmitted is segmented, each video data segment contains mutual redundant common information, namely, mutually overlapped parts exist among all the video data segments, so that when a certain video data segment fails to be transmitted, restoration can be performed through the redundant common information of other video data segments, and the problem that the surveillance video stream to be transmitted is incomplete when a single video data segment is lost is solved.
Further, based on each video data segment, the embodiment of the present application performs randomization processing on the video data segments one by one. Wherein, the video data segment is randomized by using a randomization algorithm. The randomization algorithm uses a random function, and the return value of the random function directly or indirectly affects the execution flow or execution result of the algorithm. That is, a certain step or steps of the algorithm are under the control of fortune, that is, a certain step or steps of the algorithm in the running process involve a random decision, or a decision thereof depends on a random event. According to the embodiment of the application, various randomization processing algorithms can be adaptively selected according to actual data transmission requirements, and specific randomization processing algorithms are not fixedly limited, which is not described herein.
In the following, an implementation manner of randomizing video data segments according to the embodiment of the present application is provided. Wherein the video data segments are randomized based on an original randomization seed defined for each of the video data segments. And inputting each original randomized seed into the n-stage linear feedback shift register by defining an n-stage linear feedback shift register so as to calculate the randomized value of each data bit on the video data segment.
Specifically, when video data segments are processed in a randomization mode, the original randomization seeds serve as input samples, the input samples are circularly input into n levels of linear feedback shift registers which are constructed in advance, data bits of the video data segments are randomized one by one on the basis of the n levels of linear feedback shift registers and the input samples, and the input samples are adjusted in an iterative mode.
Before this, it is necessary to pre-define the n-order computation polynomial corresponding to the n-stage linear feedback shift register and pre-define the original randomized seed. In randomizing a video data segment, an original randomizing seed is first input to an n-stage linear feedback shift register as an original input sample of the n-stage linear feedback shift register. In the n-stage linear feedback shift register, at least one specific bit of the original randomized seed is subjected to exclusive-or operation based on an n-order computational polynomial to generate an output bit. It should be noted that, the present application is not limited to the specific value of the original randomized seed and the specific form of the computation polynomial, and may be freely set by the user, and it is only necessary that the order of the computation polynomial is the same as the order of the linear feedback shift register. The highest order of the computational polynomial represents the minimum randomized length.
For example, for a 16-stage linear feedback shift register, the 16-order computational polynomial freely set by the user may be "X16 + X7+ X2+ 1". Of course, the 16 th order computational polynomial may be "X16 + X12+ X6+ X5+ X4", etc. The main purpose of setting the computational polynomial is to: the number of bits in the original randomized seed that need to be xor-ed can be determined by calculating each of the other exponents of the polynomial except for the highest exponent. For example, if the computational polynomial is set to "X16 + X7+ X2+ 1", the original randomized seed is "0X 79E 5". After the original randomized seeds are input into each bit in the linear feedback shift register, the data of the 1 st bit, the 3 rd bit and the 8 th bit in the linear feedback shift register are selected, and then exclusive-or operation is carried out on the selected data to obtain an output bit. If the data of the 1 st bit, the 3 rd bit and the 8 th bit are 1, 1 and 1 respectively, after performing exclusive or operation on the three "1", the obtained output bit is "0".
Further, performing exclusive-or operation on the output bit and a data bit in the video data segment to obtain a random data bit; meanwhile, the original input sample is shifted to the MSB by one bit in the n-stage linear feedback shift register, and the output bit is fed back to the MSB of the original input sample, thereby obtaining a new randomized seed. For example, when the output bit is 0, the bit 0 is exclusive-ored with the data bit to be randomized. If the data bit to be randomized is 1, the result of the exclusive-or operation is 1, i.e. the random data bit is 1. The original input sample is then shifted one bit in the linear feedback shift register to the most significant bit MSB and the output bit 1 is fed back to the least significant bit of the original input sample, resulting in a new randomized seed.
And then, replacing the original randomized seed with a new randomized seed, and repeatedly executing the randomized processing step on new data bits in the video data segment to obtain new random data bits. By analogy, video data are segmented one by one, and each data bit on the video data segmentation is randomized one by one, so that the randomization of the monitoring video stream to be transmitted can be completed.
For example, if the video data is segmented into 8, 8 randomization seeds need to be set. And repeating the data randomization processing steps for each video data segment until all data bits are processed, thereby completing the data randomization processing. It should be noted that, according to the actual data processing requirement, the calculation polynomial, the number of segments of video data, and the randomization seed used in the randomization process may be adaptively set. Since the data is randomized in the transmission process, even a hacker steals the monitored video stream to be transmitted, the hacker cannot know the number of segments of the video data set by the user, the calculating polynomial used in the randomization process and the original randomized seed set by the user. Therefore, the original monitoring video stream to be transmitted cannot be obtained through randomization, so that the data transmission is safer and more reliable, and the condition that important data content of a user is stolen after a hacker steals the data is avoided.
It should be noted that, for each video data segment, the same original randomization seed may be used to randomize each of the video data segments. Therefore, the setting of the original randomized seeds can be facilitated, the situation that the number of the original randomized seeds configured correspondingly is too large due to too large splitting amount of the original to-be-transmitted monitoring video stream is avoided, and the data randomization processing efficiency is improved.
Optionally, the transmitting end may also randomize the corresponding video data segments using predefined different original randomization seeds, where the original randomization seeds are predefined for each of the video data segments. It can be understood that, for the case that the number of video data segments is small, an independent original randomized seed can be adaptively configured for each video data segment, so that the situation that data is easily restored due to leakage of a single randomized seed can be avoided, and the security of information transmission is improved.
After the video data segment randomization process is completed, as shown in fig. 3, the sending end 11 performs packet encryption on each randomized data segment generated in this way by using preset encryption information to obtain a first video data packet, and sends the first video data packet to the receiving end 12.
On the other hand, for the to-be-transmitted monitoring video stream not containing the target video frame, since the protection demand of the part of the video stream on the privacy of the user is low, in order to reduce the video encryption cost and improve the transmission efficiency of the video stream, the to-be-transmitted monitoring video stream can be encrypted by directly using the set encryption information to obtain the second video data packet.
According to whether the video content of the monitored video stream to be transmitted relates to the user privacy condition or not, different encryption transmission mechanisms are adaptively selected, so that the user privacy is not easily revealed, the security of the user privacy is improved, and the video encryption transmission efficiency and flexibility are improved.
Optionally, in an embodiment, the first video data packet and the second video data packet may be encrypted by using different encryption information, so that difficulty in breaking privacy of a user may be further improved. Even if the second encryption information of the second video data packet is cracked, the first encryption information of the first video data packet cannot be obtained. Therefore, the transmission safety of the monitoring video stream is further improved.
S130, the first video data packet or the second video data packet is sent to a receiving end, the receiving end is configured with a derandomization algorithm corresponding to the randomization algorithm and decryption information corresponding to the encryption information, and is used for decrypting the first video data packet by using the decryption information under the condition that the first video data packet is received, performing derandomization processing on the first video data packet based on the derandomization algorithm, and restoring the monitoring video stream to be transmitted; and under the condition of receiving the second video data packet, decrypting the second video data packet by using the decryption information to obtain the monitoring video stream to be transmitted.
Further, based on the processed first video data packet or the processed second video data packet, the processed first video data packet or the processed second video data packet can be sent to a corresponding receiving end (e.g., a mobile phone client of a corresponding user).
And corresponding to one end of the receiving end, when the video data packet is decrypted, if a second video data packet is received, directly using decryption information corresponding to the encryption information to decrypt, and acquiring the monitoring video stream. If the first video data packet is the first video data packet, the first video data packet needs to be aligned after being decrypted to perform de-randomization processing so as to restore and obtain the monitoring video stream. When the sending end sends the video data packet, the information identifier can be added in the data packet, so that the receiving end can determine whether the first video data packet or the second video data packet is currently received according to the information identifier, and then a corresponding decryption mechanism is selected to process the received video data packet.
When processing the first video data packet, the receiving end firstly decrypts the first video data packet by using the preset decryption information to obtain a plurality of randomized data segments. And further carrying out de-randomization processing on the randomized data segments, and restoring to obtain each video data segment.
And performing derandomization processing on each data bit of the randomized data segment based on an n-order computational polynomial corresponding to the n-stage linear feedback shift register. Before the derandomization process is the inverse operation of the randomization process, the receiving end also needs to configure a corresponding n-level computational polynomial and a corresponding original randomization seed for the derandomization process of the data. For the randomized data segment to be randomized, firstly, a plurality of specific bits of the original randomized seed are subjected to exclusive-or operation based on an n-order computational polynomial set by a user to generate an output bit. The output bit is then exclusive-ored with a corresponding bit in the randomized data segment, i.e., a corresponding data bit in the original data (i.e., the video data segment) is generated. And circularly performing the above operation on each bit in the randomized data segment, namely, derandomizing to obtain the original video data segment.
The original data content can be obtained by performing the derandomization operation on the randomized data segment after the randomization process. Therefore, even if the hacker steals the preset key information, the hacker cannot derandomize to obtain the original data, and the security of video data transmission is further improved.
Then, for each video data segment obtained by the derandomization processing and restoration, each video data segment needs to be merged into a surveillance video stream to be transmitted. And splicing all the video data in segments by screening out redundant common information parts, thereby obtaining the monitoring video stream to be transmitted. It can be understood that, since each video data segment packet includes the common information of the redundant portion, when the surveillance video stream to be transmitted is spliced, the redundant common information needs to be filtered out, and then the surveillance video stream to be transmitted is spliced.
Optionally, in the case that the video data segment is missing, the missing video data segment is restored based on the common information contained in each of the currently obtained video data segments. Because the video data segments contain corresponding redundant common information, for the lost video data segments, the common information of the other video data segments can be restored, so that the integrity of data transmission is guaranteed. The frequency of data retransmission is reduced, and the data transmission efficiency is improved.
In an embodiment, the sending end further periodically queries a pre-constructed randomized seed directory, selects one randomized seed from the pre-constructed randomized seed directory to update to the original randomized seed, and synchronizes the updated original randomized seed to the receiving end. It can be understood that by periodically updating the original randomized seed, the situation that the original randomized seed is easily cracked, which leads to the disclosure of the randomization processing algorithm, can be avoided. Therefore, the difficulty of stealing data is increased, and the safety of information transmission is improved.
In one embodiment, the sending end updates the encryption information every other set period, and configures the corresponding decryption information to the receiving end for encrypted transmission of the subsequent to-be-transmitted monitoring video stream. It will be appreciated that long term use of the same key information increases the chance that the key will be compromised. Therefore, the difficulty of key cracking is improved by periodically updating the key information, so that the difficulty of data stealing is increased, and the safety of information transmission is improved.
Optionally, in an embodiment, for the randomized data segments after the randomization process, before the first video data packet is generated by encryption, the sending end may further process each randomized data segment by using a scrambling code filling algorithm, so as to further improve the difficulty of cracking the user privacy information.
The random code filling algorithm is used for disturbing character information of the random data segments, and the random data segments after random code processing can be restored only through the corresponding random code decryption algorithm, so that the cracking difficulty of the user privacy is improved, and the risk of revealing privacy pictures is reduced. The messy code filling algorithm comprises filling character information and a character filling rule, wherein the filling character information refers to character information filled into the randomized data segment, and the character filling rule refers to a rule for filling the filling character information into the randomized data segment, such as character head-to-tail splicing, character cross filling and the like. For example, assuming that the padding character information is abc, the original character information of the randomized data segment is 123, and the character padding rule is character end-to-end concatenation, the character information of the randomized data segment after the scrambling code processing is 123 abc. If the character fill rule is character cross fill, the character information of the randomized data segment after scrambling is 1a2b3 c. The messy code decryption algorithm corresponding to the messy code filling algorithm can be correspondingly determined according to the filling character information and the character filling rule. Therefore, after the mobile phone client of the user receives the first video data packet after the messy code, the randomized data segment processed by the messy code is obtained by decrypting the first video data packet, and further, according to the character information of the randomized data segment, a messy code decryption algorithm can be determined based on the filling character information and the character filling rule, and the randomized data segment is restored through the messy code decryption algorithm. It should be noted that the above padding character information and character padding rules are only examples, and the present embodiment does not limit specific padding character information and character padding rules.
As shown in fig. 4, each video frame of the surveillance video stream to be transmitted is identified by obtaining the surveillance video stream to be transmitted, and whether the surveillance video stream to be transmitted includes a target video frame is determined, where the target video frame includes a designated target; processing the surveillance video stream to be transmitted based on a set randomization algorithm under the condition that the surveillance video stream to be transmitted contains a target video frame, and encrypting the processed surveillance video stream to be transmitted by using set encryption information to obtain a corresponding first video data packet; under the condition that the surveillance video stream to be transmitted does not contain the target video frame, directly encrypting the surveillance video stream to be transmitted by using set encryption information to obtain a corresponding second video data packet; the method comprises the steps that a first video data packet or a second video data packet is sent to a receiving end, the receiving end is configured with a de-randomization algorithm corresponding to the randomization algorithm and decryption information corresponding to encryption information, and is used for decrypting the first video data packet by using the decryption information under the condition that the first video data packet is received, and carrying out de-randomization processing on the first video data packet based on the de-randomization algorithm to restore a monitoring video stream to be transmitted; and under the condition that the second video data packet is received, decrypting the second video data packet by using the decryption information to obtain the monitoring video stream to be transmitted. By adopting the technical means, the target video frame detection is adopted to carry out video stream randomization processing and encryption transmission on the to-be-transmitted monitoring video stream containing the user privacy, so that the cracking difficulty of the monitoring video stream is increased, the transmission safety of the monitoring video stream is improved, and the user privacy is prevented from being easily revealed. Meanwhile, a conventional encryption transmission mode is adopted for the to-be-transmitted monitoring video stream which does not contain the user privacy information, so that the video encryption cost is not increased too much, and the video stream transmission safety is improved while the video stream transmission efficiency is ensured.
Example two:
based on the foregoing embodiments, fig. 5 is a schematic structural diagram of a video stream encryption apparatus according to a second embodiment of the present application. Referring to fig. 5, the video stream encryption apparatus provided in this embodiment specifically includes: an identification module 21, an encryption module 22 and a transmission module 23.
The identification module 21 is configured to obtain a surveillance video stream to be transmitted, identify each video frame of the surveillance video stream to be transmitted, and determine whether the surveillance video stream to be transmitted includes a target video frame, where the target video frame includes a designated target;
the encryption module 22 is configured to process the to-be-transmitted surveillance video stream based on a set randomization algorithm when the to-be-transmitted surveillance video stream includes the target video frame, and encrypt the processed to-be-transmitted surveillance video stream using set encryption information to obtain a corresponding first video data packet; under the condition that the to-be-transmitted monitoring video stream does not contain the target video frame, directly encrypting the to-be-transmitted monitoring video stream by using set encryption information to obtain a corresponding second video data packet;
the transmission module 23 is configured to send the first video data packet or the second video data packet to a receiving end, where the receiving end is configured with a derandomization algorithm corresponding to the randomization algorithm and decryption information corresponding to the encryption information, and is configured to decrypt the first video data packet using the decryption information under the condition that the first video data packet is received, perform derandomization processing on the first video data packet based on the derandomization algorithm, and restore the to-be-transmitted monitoring video stream; and under the condition of receiving the second video data packet, decrypting the second video data packet by using the decryption information to obtain the monitoring video stream to be transmitted.
Specifically, the identification module 21 is configured to input each video frame of the surveillance video stream to be transmitted into a pre-constructed target detection model for detection, and determine whether the surveillance video stream to be transmitted contains a target video frame based on an output result of the target detection model, where the target detection model is trained and constructed in advance according to a training data set constructed by the specified target.
Specifically, the identification module 21 is further configured to update the target video frame to the training data set, and iteratively train the target detection model based on the updated training data set.
Specifically, the encryption module 22 is configured to segment the to-be-transmitted surveillance video stream according to a set number of video frames to obtain a plurality of video data segments; randomizing each video data segment by using a randomization algorithm based on a predefined original randomization seed to obtain a plurality of corresponding randomized data segments; and packaging and encrypting each randomized data segment into a first video data packet by using set encryption information.
And taking the original randomized seed as an input sample, circularly inputting the input sample into a pre-constructed n-stage linear feedback shift register, randomizing data bits of the video data segment one by one based on the n-stage linear feedback shift register and the input sample, and iteratively adjusting the input sample. Randomizing the corresponding video data segment using a predefined different original randomization seed, which original randomization seed is predefined for each of the video data segments.
And selecting one randomized seed from the pre-constructed randomized seed catalog by periodically inquiring to update the original randomized seed, and synchronizing the updated original randomized seed to the receiving end.
In the above, by obtaining the surveillance video stream to be transmitted, each video frame of the surveillance video stream to be transmitted is identified, and whether the surveillance video stream to be transmitted contains a target video frame is determined, where the target video frame contains a designated target; processing the surveillance video stream to be transmitted based on a set randomization algorithm under the condition that the surveillance video stream to be transmitted contains a target video frame, and encrypting the processed surveillance video stream to be transmitted by using set encryption information to obtain a corresponding first video data packet; under the condition that the to-be-transmitted monitoring video stream does not contain the target video frame, directly encrypting the to-be-transmitted monitoring video stream by using set encryption information to obtain a corresponding second video data packet; the method comprises the steps that a first video data packet or a second video data packet is sent to a receiving end, the receiving end is configured with a de-randomization algorithm corresponding to the randomization algorithm and decryption information corresponding to encryption information, and is used for decrypting the first video data packet by using the decryption information under the condition that the first video data packet is received, and carrying out de-randomization processing on the first video data packet based on the de-randomization algorithm to restore a monitoring video stream to be transmitted; and under the condition of receiving the second video data packet, decrypting the second video data packet by using the decryption information to obtain the monitoring video stream to be transmitted. By adopting the technical means, the target video frame detection is adopted to carry out video stream randomization processing and encryption transmission on the to-be-transmitted monitoring video stream containing the user privacy, so that the cracking difficulty of the monitoring video stream is increased, the transmission safety of the monitoring video stream is improved, and the user privacy is prevented from being easily revealed. Meanwhile, a conventional encryption transmission mode is adopted for the to-be-transmitted monitoring video stream which does not contain the user privacy information, so that the video encryption cost is not increased too much, and the video stream transmission safety is improved while the video stream transmission efficiency is ensured.
The video stream encryption device provided by the second embodiment of the present application can be used to execute the video stream encryption method provided by the first embodiment, and has corresponding functions and beneficial effects.
Example three:
an embodiment of the present application provides an electronic device, and with reference to fig. 6, the electronic device includes: a processor 31, a memory 32, a communication module 33, an input device 34, and an output device 35. The number of processors in the electronic device may be one or more, and the number of memories in the electronic device may be one or more. The processor, memory, communication module, input device, and output device of the electronic device may be connected by a bus or other means.
The memory 32 is used as a computer-readable storage medium for storing software programs, computer-executable programs, and modules, such as program instructions/modules corresponding to the video stream encryption method according to any embodiment of the present application (for example, an identification module, an encryption module, and a transmission module in a video stream encryption apparatus). The memory can mainly comprise a program storage area and a data storage area, wherein the program storage area can store an operating system and an application program required by at least one function; the storage data area may store data created according to use of the device, and the like. Further, the memory may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some examples, the memory may further include memory located remotely from the processor, and these remote memories may be connected to the device over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The communication module 33 is used for data transmission.
The processor 31 executes various functional applications of the device and data processing by executing software programs, instructions and modules stored in the memory, so as to realize the video stream encryption method.
The input device 34 may be used to receive entered numeric or character information and to generate key signal inputs relating to user settings and function controls of the apparatus. The output device 35 may include a display device such as a display screen.
The electronic device provided above can be used to execute the video stream encryption method provided in the first embodiment above, and has corresponding functions and advantages.
Example four:
embodiments of the present application also provide a storage medium containing computer-executable instructions that when executed by a computer processor are configured to perform a video stream encryption method, the video stream encryption method comprising: acquiring a surveillance video stream to be transmitted, identifying each video frame of the surveillance video stream to be transmitted, and judging whether the surveillance video stream to be transmitted contains a target video frame, wherein the target video frame contains a designated target; processing the surveillance video stream to be transmitted based on a set randomization algorithm under the condition that the surveillance video stream to be transmitted contains the target video frame, and encrypting the processed surveillance video stream to be transmitted by using set encryption information to obtain a corresponding first video data packet; under the condition that the to-be-transmitted monitoring video stream does not contain the target video frame, directly encrypting the to-be-transmitted monitoring video stream by using set encryption information to obtain a corresponding second video data packet; sending the first video data packet or the second video data packet to a receiving end, wherein the receiving end is configured with a de-randomization algorithm corresponding to the randomization algorithm and decryption information corresponding to the encryption information, and is used for decrypting the first video data packet by using the decryption information under the condition of receiving the first video data packet, performing de-randomization processing on the first video data packet based on the de-randomization algorithm, and restoring the monitoring video stream to be transmitted; and under the condition of receiving the second video data packet, decrypting the second video data packet by using the decryption information to obtain the monitoring video stream to be transmitted.
Storage medium-any of various types of memory devices or storage devices. The term "storage medium" is intended to include: mounting media such as CD-ROM, floppy disk, or tape devices; computer system memory or random access memory such as DRAM, DDR RAM, SRAM, EDO RAM, Lanbas (Rambus) RAM, etc.; non-volatile memory such as flash memory, magnetic media (e.g., hard disk or optical storage); registers or other similar types of memory elements, etc. The storage medium may also include other types of memory or combinations thereof. In addition, the storage medium may be located in a first computer system in which the program is executed, or may be located in a different second computer system connected to the first computer system through a network (such as the internet). The second computer system may provide program instructions to the first computer for execution. The term "storage medium" may include two or more storage media residing in different locations, e.g., in different computer systems connected by a network. The storage medium may store program instructions (e.g., embodied as a computer program) that are executable by one or more processors.
Of course, the storage medium provided in this embodiment of the present application contains computer-executable instructions, and the computer-executable instructions are not limited to the video stream encryption method described above, and may also perform related operations in the video stream encryption method provided in any embodiment of the present application.
The video stream encryption device, the storage medium, and the electronic device provided in the foregoing embodiments may execute the video stream encryption method provided in any embodiment of the present application, and reference may be made to the video stream encryption method provided in any embodiment of the present application without detailed technical details described in the foregoing embodiments.
The foregoing is considered as illustrative of the preferred embodiments of the invention and the technical principles employed. The present application is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present application has been described in more detail with reference to the above embodiments, the present application is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present application, and the scope of the present application is determined by the scope of the claims.

Claims (10)

1. A method for encrypting a video stream, comprising:
acquiring a surveillance video stream to be transmitted, identifying each video frame of the surveillance video stream to be transmitted, and judging whether the surveillance video stream to be transmitted contains a target video frame, wherein the target video frame contains a designated target;
processing the surveillance video stream to be transmitted based on a set randomization algorithm under the condition that the surveillance video stream to be transmitted contains the target video frame, and encrypting the processed surveillance video stream to be transmitted by using set encryption information to obtain a corresponding first video data packet; under the condition that the to-be-transmitted monitoring video stream does not contain the target video frame, directly encrypting the to-be-transmitted monitoring video stream by using set encryption information to obtain a corresponding second video data packet;
sending the first video data packet or the second video data packet to a receiving end, wherein the receiving end is configured with a de-randomization algorithm corresponding to the randomization algorithm and decryption information corresponding to the encryption information, and is used for decrypting the first video data packet by using the decryption information under the condition of receiving the first video data packet, performing de-randomization processing on the first video data packet based on the de-randomization algorithm, and restoring the monitoring video stream to be transmitted; and under the condition of receiving the second video data packet, decrypting the second video data packet by using the decryption information to obtain the monitoring video stream to be transmitted.
2. The video stream encryption method according to claim 1, wherein the identifying each video frame of the monitored video stream to be transmitted and determining whether the monitored video stream to be transmitted contains a target video frame comprises:
inputting each video frame of the surveillance video stream to be transmitted into a pre-constructed target detection model for detection, and judging whether the surveillance video stream to be transmitted contains a target video frame or not based on an output result of the target detection model, wherein the target detection model is trained and constructed in advance according to a training data set constructed by the specified target.
3. The video stream encryption method according to claim 2, wherein after inputting each video frame of the surveillance video stream to be transmitted into a pre-constructed target detection model for detection and determining whether the surveillance video stream to be transmitted contains a target video frame based on an output result of the target detection model, the method further comprises:
and updating the target video frame to the training data set, and iteratively training the target detection model based on the updated training data set.
4. The video stream encryption method according to claim 1, wherein the processing the surveillance video stream to be transmitted based on the set randomization algorithm, and encrypting the processed surveillance video stream to be transmitted using the set encryption information to obtain the corresponding first video data packet, comprises:
segmenting the monitored video stream to be transmitted according to a set number of video frames to obtain a plurality of video data segments;
randomizing each video data segment by using a randomization algorithm based on a predefined original randomization seed to obtain a plurality of corresponding randomized data segments;
and packaging and encrypting each randomized data segment into a first video data packet by using set encryption information.
5. The video stream encryption method of claim 4, wherein randomizing each of the video data segments using a randomization algorithm based on a predefined original randomization seed, resulting in a corresponding plurality of randomized data segments, comprises:
and taking the original randomized seed as an input sample, circularly inputting the input sample into a pre-constructed n-stage linear feedback shift register, randomizing data bits of the video data segment one by one based on the n-stage linear feedback shift register and the input sample, and iteratively adjusting the input sample.
6. The video stream encryption method of claim 4, wherein said randomizing each of said video data segments using a randomization algorithm based on a predefined original randomization seed comprises:
randomizing the corresponding video data segment using a predefined different original randomization seed, which original randomization seed is predefined for each of the video data segments.
7. The video stream encryption method of claim 4, further comprising:
and periodically inquiring a pre-constructed randomized seed catalog, selecting one randomized seed from the catalog to update into the original randomized seed, and synchronizing the updated original randomized seed to the receiving end.
8. A video stream encryption apparatus, comprising:
the identification module is used for acquiring the surveillance video stream to be transmitted, identifying each video frame of the surveillance video stream to be transmitted, and judging whether the surveillance video stream to be transmitted contains a target video frame, wherein the target video frame contains a designated target;
the encryption module is used for processing the surveillance video stream to be transmitted based on a set randomization algorithm under the condition that the surveillance video stream to be transmitted contains the target video frame, and encrypting the processed surveillance video stream to be transmitted by using set encryption information to obtain a corresponding first video data packet; under the condition that the to-be-transmitted monitoring video stream does not contain the target video frame, directly encrypting the to-be-transmitted monitoring video stream by using set encryption information to obtain a corresponding second video data packet;
a transmission module, configured to send the first video data packet or the second video data packet to a receiving end, where the receiving end is configured with a derandomization algorithm corresponding to the randomization algorithm and decryption information corresponding to the encryption information, and is configured to, in a case where the first video data packet is received, decrypt the first video data packet using the decryption information, perform derandomization processing on the first video data packet based on the derandomization algorithm, and restore the to-be-transmitted monitoring video stream; and under the condition of receiving the second video data packet, decrypting the second video data packet by using the decryption information to obtain the monitoring video stream to be transmitted.
9. An electronic device, comprising:
a memory and one or more processors;
the memory for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement the video stream encryption method of any of claims 1-7.
10. A storage medium containing computer-executable instructions for performing the video stream encryption method of any one of claims 1-7 when executed by a computer processor.
CN202210845074.XA 2022-07-19 2022-07-19 Video stream encryption method and device Pending CN115086718A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210845074.XA CN115086718A (en) 2022-07-19 2022-07-19 Video stream encryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210845074.XA CN115086718A (en) 2022-07-19 2022-07-19 Video stream encryption method and device

Publications (1)

Publication Number Publication Date
CN115086718A true CN115086718A (en) 2022-09-20

Family

ID=83259506

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210845074.XA Pending CN115086718A (en) 2022-07-19 2022-07-19 Video stream encryption method and device

Country Status (1)

Country Link
CN (1) CN115086718A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117061711A (en) * 2023-10-11 2023-11-14 深圳市爱为物联科技有限公司 Video monitoring safety management method and system based on Internet of things

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150055775A1 (en) * 2013-08-20 2015-02-26 Electronics And Telecommunications Research Institute Image processing apparatus and operation method thereof
CN107633177A (en) * 2017-09-22 2018-01-26 苏州大成有方数据科技有限公司 A kind of file management method of graded encryption
CN108390887A (en) * 2018-03-16 2018-08-10 中影数字巨幕(北京)有限公司 A kind of cinematic data transmission method and device
CN108460790A (en) * 2018-03-29 2018-08-28 西南科技大学 A kind of visual tracking method based on consistency fallout predictor model
CN110517285A (en) * 2019-08-05 2019-11-29 西安电子科技大学 The minimum target following of large scene based on estimation ME-CNN network
CN110610456A (en) * 2019-09-27 2019-12-24 上海依图网络科技有限公司 Imaging system and video processing method
CN111600712A (en) * 2020-04-14 2020-08-28 陕西天泽中孚实业有限公司 Safety encryption processing system for geographic information data
CN111667505A (en) * 2020-04-30 2020-09-15 北京捷通华声科技股份有限公司 Method and device for tracking fixed object
CN112449102A (en) * 2019-09-03 2021-03-05 联发科技股份有限公司 Private image encryption method and device
CN113382013A (en) * 2021-06-21 2021-09-10 国网宁夏电力有限公司电力科学研究院 Data mining system based on energy big data
US20220019690A1 (en) * 2020-07-17 2022-01-20 Alipay (Hangzhou) Information Technology Co., Ltd. Image privacy protection method, apparatus and device
CN114640867A (en) * 2022-05-20 2022-06-17 广州万协通信息技术有限公司 Video data processing method and device based on video stream authentication

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150055775A1 (en) * 2013-08-20 2015-02-26 Electronics And Telecommunications Research Institute Image processing apparatus and operation method thereof
CN107633177A (en) * 2017-09-22 2018-01-26 苏州大成有方数据科技有限公司 A kind of file management method of graded encryption
CN108390887A (en) * 2018-03-16 2018-08-10 中影数字巨幕(北京)有限公司 A kind of cinematic data transmission method and device
CN108460790A (en) * 2018-03-29 2018-08-28 西南科技大学 A kind of visual tracking method based on consistency fallout predictor model
CN110517285A (en) * 2019-08-05 2019-11-29 西安电子科技大学 The minimum target following of large scene based on estimation ME-CNN network
CN112449102A (en) * 2019-09-03 2021-03-05 联发科技股份有限公司 Private image encryption method and device
CN110610456A (en) * 2019-09-27 2019-12-24 上海依图网络科技有限公司 Imaging system and video processing method
CN111600712A (en) * 2020-04-14 2020-08-28 陕西天泽中孚实业有限公司 Safety encryption processing system for geographic information data
CN111667505A (en) * 2020-04-30 2020-09-15 北京捷通华声科技股份有限公司 Method and device for tracking fixed object
US20220019690A1 (en) * 2020-07-17 2022-01-20 Alipay (Hangzhou) Information Technology Co., Ltd. Image privacy protection method, apparatus and device
CN113382013A (en) * 2021-06-21 2021-09-10 国网宁夏电力有限公司电力科学研究院 Data mining system based on energy big data
CN114640867A (en) * 2022-05-20 2022-06-17 广州万协通信息技术有限公司 Video data processing method and device based on video stream authentication

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117061711A (en) * 2023-10-11 2023-11-14 深圳市爱为物联科技有限公司 Video monitoring safety management method and system based on Internet of things

Similar Documents

Publication Publication Date Title
CN108664223B (en) Distributed storage method and device, computer equipment and storage medium
CN108768978B (en) SGX-based remote storage service method and system
US11349656B2 (en) Systems and methods for secure storage and transmission of a data stream
CN114915805B (en) Video stream transmission method based on double encryption mechanism and security chip device
CN107864129B (en) Method and device for ensuring network data security
CN112073444B (en) Data set processing method and device and server
CN112784823B (en) Face image recognition method, face image recognition device, computing equipment and medium
CN114640867A (en) Video data processing method and device based on video stream authentication
CN111741268B (en) Video transmission method, device, server, equipment and medium
CN114793184B (en) Security chip communication method and device based on third-party key management node
US20110154015A1 (en) Method For Segmenting A Data File, Storing The File In A Separate Location, And Recreating The File
CN115086718A (en) Video stream encryption method and device
CN107133517B (en) Data recovery method based on data encryption and calculation in memory
CN115134080B (en) Data transmission method and device based on security encryption chip
CN104284237A (en) Video transmission method and system
CN114650188A (en) Data secure transmission method and device based on proxy node
CN115114667A (en) Privacy information processing and classifying method and device for security chip
US20210120419A1 (en) A method for managing the reputation level of a communication device
CN114710693A (en) Video stream distributed transmission method and device
CN109711207B (en) Data encryption method and device
CN113726768A (en) Data transmission method and device, electronic equipment and readable storage medium
CN112511567A (en) Method and device for managing secret communication priority of intelligent security chip
JP6471136B2 (en) Data encryption system using security key
JP6943827B2 (en) Nodes, programs and methods to transfer data so that the request data source can be identified
CN115242548B (en) Private data directional encryption method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20220920

RJ01 Rejection of invention patent application after publication