CN115802106A - Video encryption transmission method and device, electronic equipment and storage medium - Google Patents

Video encryption transmission method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN115802106A
CN115802106A CN202211429226.4A CN202211429226A CN115802106A CN 115802106 A CN115802106 A CN 115802106A CN 202211429226 A CN202211429226 A CN 202211429226A CN 115802106 A CN115802106 A CN 115802106A
Authority
CN
China
Prior art keywords
video data
sub
encrypted
blocks
video
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211429226.4A
Other languages
Chinese (zh)
Inventor
白宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Youme Information Technology Co ltd
Original Assignee
Shanghai Youme Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Youme Information Technology Co ltd filed Critical Shanghai Youme Information Technology Co ltd
Priority to CN202211429226.4A priority Critical patent/CN115802106A/en
Publication of CN115802106A publication Critical patent/CN115802106A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The application discloses a video encryption transmission method and device, electronic equipment and a storage medium, and relates to the technical field of communication. Acquiring video data to be encrypted in a video conference; dividing the video data to be encrypted into N blocks based on a random number N to obtain N blocks of sub-video data, wherein the random number N is acquired every preset time length; determining M blocks of sub-video data to be encrypted and T blocks of sub-video data not to be encrypted in the N blocks of sub-video data based on the random number N; based on various encryption algorithms, encrypting each piece of sub-video data in the M pieces of sub-video data to obtain M pieces of encrypted sub-video data; and transmitting the M encrypted sub-video data and the T sub-video data to a receiving end of the video conference. Therefore, the sub-video data after being blocked are encrypted through various encryption algorithms, and the safety of video data encryption transmission in the video conference is improved.

Description

Video encryption transmission method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to a video encryption transmission method and apparatus, an electronic device, and a storage medium.
Background
With the development of network communication technology, network bandwidth is wider and faster, and more enterprises can select online video conferences. However, the malicious third party can crack the conference content, illegally acquire the conference content, steal the secrets of other enterprises and seriously affect the benefits of other enterprises. In order to solve the problem that a malicious third party steals video data, the video data is often encrypted at present. In the related art, all video data are usually encrypted by using only one encryption algorithm, and the single encryption algorithm may cause a problem of low security of the video data in the encryption transmission process.
Disclosure of Invention
In view of this, the present application provides a video encryption transmission method, an apparatus, an electronic device, and a storage medium.
In a first aspect, an embodiment of the present application provides a video encryption transmission method, where the method includes: acquiring video data to be encrypted in a video conference; dividing the video data to be encrypted into N blocks based on a random number N to obtain N blocks of sub-video data, wherein the random number N is a positive integer greater than 2 and is acquired every preset time length; determining M sub-video data to be encrypted and T sub-video data not to be encrypted in the N sub-video data based on the random number N, wherein M is a positive integer larger than 1, and T is a positive integer; encrypting each piece of sub-video data in the M pieces of sub-video data based on a plurality of encryption algorithms to obtain M pieces of encrypted sub-video data, wherein each piece of sub-video data is encrypted corresponding to one encryption algorithm in the plurality of encryption algorithms; and transmitting the M encrypted sub-video data and the T sub-video data to a receiving end of the video conference.
In a second aspect, an embodiment of the present application provides a video encryption transmission apparatus, where the apparatus includes: the device comprises a video data acquisition module, a video blocking module, an encryption sub-video data determining module, an encryption module and a video data transmission module. The video data acquisition module is used for acquiring video data to be encrypted in a video conference; the video blocking module is used for dividing the video data to be encrypted into N blocks based on a random number N to obtain N blocks of sub-video data, wherein the random number N is a positive integer greater than 2, and is acquired every preset time length; an encrypted sub-video data determining module, configured to determine, based on the random number N, M sub-video data to be encrypted in the N sub-video data blocks, and to divide T sub-video data that is not to be encrypted in the M sub-video data blocks, where M is a positive integer greater than 1, and T is a positive integer; the encryption module is used for encrypting each piece of sub-video data in the M pieces of sub-video data based on a plurality of encryption algorithms to obtain M pieces of encrypted sub-video data, wherein each piece of sub-video data is encrypted corresponding to one encryption algorithm in the plurality of encryption algorithms; and the video data transmission module is used for transmitting the M encrypted sub-video data and the T sub-video data to a receiving end of the video conference.
In a third aspect, an embodiment of the present application provides an electronic device, including: one or more processors; a memory; one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to perform the video encryption transmission method provided by the first aspect.
In a fourth aspect, an embodiment of the present application provides a computer-readable storage medium, where a program code is stored in the computer-readable storage medium, and the program code may be invoked by a processor to execute the video encryption transmission method provided in the first aspect.
In the scheme provided by the application, video data to be encrypted in a video conference are obtained, the video data to be encrypted are divided into N blocks based on a random number N, N blocks of sub-video data are obtained, wherein N is a positive integer greater than 2, and the random number N is obtained every preset time length; determining M sub-video data to be encrypted and T sub-video data not to be encrypted in the N sub-video data based on a random number N, wherein M is a positive integer larger than 1, and T is a positive integer; encrypting each piece of sub-video data in the M pieces of sub-video data based on a plurality of encryption algorithms to obtain M pieces of encrypted sub-video data, wherein each piece of sub-video data is encrypted corresponding to one encryption algorithm in the plurality of encryption algorithms; and transmitting the M encrypted sub-video data and the T sub-video data to a receiving end of the video conference. Therefore, the video to be encrypted in the video conference is blocked to obtain N blocks of sub-video data, and partial sub-video data in the N blocks of sub-video data are encrypted by using various encryption algorithms, so that the problems that the security in the video data transmission process is low and the content of the video conference is easy to steal due to the single encryption algorithm are solved, and the security of video data encryption transmission in the video conference is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 shows a schematic flowchart of a video encryption transmission method according to an embodiment of the present application.
Fig. 2 shows a schematic flowchart of a video encryption transmission method according to another embodiment of the present application.
Fig. 3 is a flow chart illustrating sub-steps of step S240 shown in fig. 2 in one embodiment.
Fig. 4 is a flow chart illustrating sub-steps of step S240 shown in fig. 2 in another embodiment.
Fig. 5 is a flow chart illustrating sub-steps of step S260 shown in fig. 2 in one embodiment.
Fig. 6 shows a schematic flow chart of a video encryption transmission method according to still another embodiment of the present application.
Fig. 7 is a flow chart illustrating sub-steps of step S640 shown in fig. 6 in an embodiment.
Fig. 8 is a block diagram of a video encryption transmission apparatus according to an embodiment of the present application.
Fig. 9 is a block diagram of an electronic device according to an embodiment of the present application, configured to execute a video encryption transmission method according to an embodiment of the present application.
Fig. 10 is a storage unit according to an embodiment of the present application, configured to store or carry program codes for implementing a video encryption transmission method according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application.
In the related technology of encryption transmission, all video data in a video conference are usually encrypted by using the same encryption algorithm, which causes a large amount of computation for encryption and decryption and consumes system resources, and only one encryption algorithm is used, which results in weak encryption strength and easy cracking by a third party, and further results in low security of video data encryption transmission and easy stealing by the third party.
In view of the above problems, the inventors propose a video encryption transmission method, a video encryption transmission apparatus, an electronic device, and a storage medium, which can obtain a plurality of pieces of sub-video data by blocking a video to be encrypted in a video conference, and encrypt the plurality of pieces of sub-video data by using a plurality of encryption algorithms. This is described in detail below.
Referring to fig. 1, fig. 1 is a flowchart illustrating a video encryption transmission method according to an embodiment of the present application. The video encryption transmission method provided by the embodiment of the present application will be described in detail below with reference to fig. 1. The video encryption transmission method can comprise the following steps:
step S110: and acquiring video data to be encrypted in the video conference.
In this embodiment, the video data to be encrypted may be audio data and video data generated during a video conference. In practical application, with the improvement of network communication technology, more and more enterprises or government departments select online video conferences, and because the content of the video conferences may relate to enterprise confidentiality or government confidentiality, the security of the video conferences can be improved by acquiring video data generated in the video conferences and encrypting the video data, and the risk that the conference content in the video conferences is maliciously stolen by a third party is reduced.
Step S120: dividing the video data to be encrypted into N blocks based on a random number N to obtain N blocks of sub-video data, wherein the random number N is a positive integer greater than 2, and is acquired every preset time length.
In this embodiment, after video data to be encrypted in a video conference is acquired, the video data can be blocked, and then the blocked sub-video data is encrypted by using multiple encryption algorithms, so that the complexity of the encryption process is increased by encrypting through the multiple encryption algorithms, and the security of the video conference is further improved.
Optionally, the video data to be encrypted is blocked, and the N blocks of sub-video data can be obtained by blocking according to the random number N. Wherein, N is a positive integer greater than 2, so as to ensure that at least 3 blocks of sub-video data are obtained after the encrypted video data are blocked; the random number N may be obtained every preset time, where the preset time may be 3 hours, 6 hours, or 12 hours, and this embodiment is not limited thereto.
Exemplarily, the random number N is acquired every 3 hours, and if the random number N acquired for the first time is 6, the video data to be encrypted is divided into 6 blocks, so as to obtain 6 sub-video data blocks; after three hours, if the random number N obtained for the second time is 10, dividing the video data to be encrypted into 10 blocks, and obtaining 10 blocks of sub-video data.
Step S130: and determining M sub-video data to be encrypted and T sub-video data not to be encrypted in the N sub-video data based on the random number N, wherein M is a positive integer larger than 1, and T is a positive integer.
In this embodiment, after the video data to be encrypted is blocked to obtain N blocks of sub-video data, M blocks of sub-video data that need to be encrypted in the N blocks of sub-video data and T blocks of sub-video data that do not need to be encrypted in the N blocks of sub-video data, except for the M blocks of sub-video data, may be determined based on the size of the random number N. For example, the larger the value of the random number N, the larger the number of blocks of sub-video data to be encrypted, the larger the value of M, and conversely, the smaller the number of blocks of sub-video data to be encrypted, the smaller the value of M. In this embodiment, the sub-video data after being partitioned is encrypted by multiple encryption algorithms, so that M is a positive integer greater than 1, and it can be understood that at least 2 sub-video data blocks of M sub-video data that need to be encrypted in N sub-video data blocks can be encrypted by using multiple algorithms; since the sub-video data after being partitioned is encrypted and not encrypted, T is a positive integer, which means that at least one sub-video data in the N sub-video data blocks does not need to be encrypted.
Step S140: and based on a plurality of encryption algorithms, encrypting each piece of sub-video data in the M pieces of sub-video data to obtain M pieces of encrypted sub-video data, wherein each piece of sub-video data is encrypted corresponding to one of the plurality of encryption algorithms respectively.
In this embodiment, the multiple encryption algorithms may be symmetric encryption algorithms or asymmetric encryption algorithms, and the encryption algorithms may be 2, 3 or 4, which is not limited in this embodiment. The symmetric Encryption Algorithm is an Encryption Algorithm using the same key for Encryption and decryption, and may include a Data Encryption Standard (DES) Algorithm, a Triple Data Encryption Algorithm (3 DES) Algorithm, a Blowfish Algorithm, an Advanced Encryption Standard (AES) Algorithm, and the like; the asymmetric encryption algorithm refers to an encryption algorithm using different keys for encryption and decryption, which is also called public-private key encryption, and encrypts data through a public key and a private key, and may include an RSA encryption algorithm, an elliptic curve encryption algorithm, an ElGamal encryption algorithm, and the like. In the embodiment, the video data generated in the video conference process is encrypted, so that the requirements on encryption and decryption speed are high, the calculation amount of the symmetric encryption algorithm is small, the encryption speed is high, the encryption efficiency is high, and the operation speed is higher than that of the asymmetric encryption algorithm.
In some embodiments, for each of the M blocks of sub-video data, any one of a plurality of encryption algorithms may be randomly selected for encryption, so as to obtain M blocks of encrypted sub-video data.
In other embodiments, the M pieces of sub-video data may be sequenced in time order, and labeled with corresponding digital tags, the sub-video data with the odd type of digital tag may be encrypted using the same encryption algorithm, and the sub-video data with the even type of digital tag may be encrypted using another encryption algorithm, so as to obtain M pieces of encrypted sub-video data.
In still other embodiments, when the number M of sub-video data to be encrypted is less than the type of encryption algorithm, any one of M encryption algorithms may be randomly selected from multiple encryption algorithms, and for each sub-video data in the M sub-video data, any one of the M encryption algorithms is randomly selected to be encrypted, so as to obtain M encrypted sub-video data.
Step S150: and transmitting the M encrypted sub-video data and the T sub-video data to a receiving end of the video conference.
In this embodiment, after M blocks of sub-video data are encrypted, M blocks of encrypted sub-video data and unencrypted T blocks of sub-video data are obtained, and further, the M blocks of encrypted sub-video data and unencrypted T blocks of sub-video data are transmitted to a receiving end of a video conference. Correspondingly, after the receiving end of the video conference receives the M encrypted sub-video data and the T unencrypted sub-video data, the M encrypted sub-video data are decrypted, and then the decrypted M video data and the T encrypted sub-video data are transcoded and played to receive the video conference content of the video conference sending end.
In this embodiment, a plaintext key of an encryption algorithm corresponding to the M blocks of sub-video data may be encrypted to obtain a ciphertext key, and a configuration file may be generated based on the M blocks of sub-video data and the corresponding ciphertext key. The configuration file may include the number of sub-video data to be encrypted, an encryption algorithm corresponding to each sub-video data to be encrypted, and a cipher text key corresponding to the encryption algorithm. The key of the encryption algorithm can be encrypted through a custom algorithm, wherein the custom algorithm can obtain the cipher text key by turning each digit in the key and subtracting 1 from each digit after turning. For example, a key corresponding to a DES algorithm for encrypting a block of sub-video data is 123456, each digit of the key is inverted to obtain 654321, and then 1 is subtracted from each inverted digit to obtain a final ciphertext key 543210. Correspondingly, after receiving the configuration file, the receiving end needs to decrypt the ciphertext key in the configuration file to obtain a plaintext key, and then uses the plaintext key to decrypt the corresponding encrypted sub-video data to obtain decrypted sub-video data. The security in the process of video data encryption transmission can be further improved by a mode of encrypting a plaintext key to obtain a ciphertext key.
In the embodiment, the video to be encrypted in the video conference is blocked to obtain N blocks of sub-video data, and a plurality of encryption algorithms are used to encrypt part of sub-video data in the N blocks of sub-video data, so that the problems that the security in the video data transmission process is low and the content of the video conference is easy to steal due to the single encryption algorithm are solved, and the security of video data encryption transmission in the video conference is improved.
Referring to fig. 2, fig. 2 is a schematic flowchart illustrating a video encryption transmission method according to another embodiment of the present application. The video encryption transmission method provided by the embodiment of the present application will be described in detail below with reference to fig. 2. The video encryption transmission method can comprise the following steps:
step S210: and acquiring video data to be encrypted in the video conference.
Step S220: dividing the video data to be encrypted into N blocks based on a random number N to obtain N blocks of sub-video data, wherein the random number N is a positive integer greater than 2, and the random number N is acquired every preset time length.
In the embodiment of the present application, steps S210 to S220 may refer to the contents of steps S110 to S120 in the foregoing embodiment, and are not described herein again.
Step S230: and determining the block number M of the sub-video data to be encrypted in the N blocks of sub-video data according to the size of the random number N.
In this embodiment, the block number M of the sub-video data to be encrypted may be determined by the size of the random number N, and the larger the value of the random number N is, the correspondingly larger the value of the block number M is, and vice versa, the smaller the value of the block number M is.
In some embodiments, when the random number N is not greater than the first threshold, taking a first fixed value as the number of blocks M of the sub video data to be encrypted; when the random number is larger than the first threshold and smaller than a second threshold, taking a second fixed numerical value as the block number M of the sub-video data to be encrypted; and when the random number is larger than the second threshold value, taking half of the numerical value of the random number N as the block number M of the sub-video data to be encrypted. It can be understood that when the number of the blocks of the video data to be encrypted is small, the sub-video data of a first fixed value is encrypted, and when the number of the blocks of the video data to be encrypted is medium, the sub-video data of a second fixed value is encrypted, wherein the second fixed value is greater than the first fixed value, and when the number of the blocks of the video data to be encrypted is large, the sub-video data of half of the number of the blocks is encrypted. Based on the method, the appropriate amount of the sub-video data after being blocked can be encrypted based on different block numbers, and the situation that when the block number is large, the block number of the encrypted sub-video data is too small, so that the safety is low is avoided, and the encryption speed of the encrypted data is also ensured when the encryption safety is high.
Illustratively, if the first threshold is 10, the first fixed value is 2, the second preset value is 30, and the second fixed value is 10. When the random number N is 5 and is smaller than a first threshold value 10, determining that the block number M of the sub-video data to be encrypted is 2; when the random number N is 20 and is larger than the first threshold and smaller than the second threshold, determining that the block number of the sub-video data to be encrypted is 10; when the random number N is 100 and is greater than the second threshold, half 50 of the value of the random number N is taken as the block number M of the sub-video data to be encrypted.
Step S240: and selecting the M blocks of sub-video data to be encrypted from the N blocks of sub-video data according to a preset selection rule.
In this embodiment, after the number M of sub-video data to be encrypted in the N blocks of sub-video data is determined, M blocks of sub-video data to be encrypted may be selected from the N blocks of sub-video data according to a preset selection rule. The preset selection rule may select M blocks of sub-video data to be encrypted according to the parity type of the random number N, or may select M blocks of sub-video data to be encrypted according to the number of the blocks M, which is not limited in this embodiment.
In some embodiments, referring to fig. 3, step S240 may include:
step S241A: and sequencing the N pieces of sub-video data according to the time sequence to obtain a first sequencing result.
In this embodiment, the video data generated in the video conference process all have the corresponding time, so that the N pieces of sub-video data can be sorted according to the time corresponding to each sub-video data and the time sequence thereof, and a first sorting result is obtained. In the first ordering result, the N sub-video data are all arranged according to the chronological order.
Step S242A: and acquiring a parity type of the random number N, wherein the parity type comprises an odd number type or an even number type.
In this embodiment, the selection manner of the M blocks of sub-video data to be encrypted may be determined by determining the parity type of the random number N, which may be understood as that the parity types of the random number N are different, and correspondingly, the manner of selecting the M blocks of sub-video data to be encrypted is also different.
Step S243A: and if the odd-even type is an odd type, taking the M blocks of sub-video data from the head and tail sub-video data in the first sequencing result.
In this embodiment, when the random number N is an odd type, M blocks of sub-video data may be taken from the head and tail sub-video data in the first sorting result. For example, when the random number N is 19 and the number of blocks M is 8, 4 blocks of sub-video data may be sequentially selected from the sub-video data at the head of the first ordering result, 4 blocks of sub-video data may be sequentially selected from the sub-video data at the tail of the first ordering result from back to front, and the 8 blocks of sub-video data collectively selected at the head and the tail may be used as 8 blocks of sub-video data to be encrypted; it is also possible to sequentially select 2 sub video data blocks from the first sub video data of the first ordering result, and sequentially select 6 sub video data blocks from the last sub video data to the last sub video data, which is not limited in this embodiment. The sequential fetching of sub-video data from the head of the first ordering result is equivalent to fetching from the first block of sub-video data, for example, fetching 4 blocks of sub-video data from the head of 19 blocks of sub-video data is equivalent to fetching the 1 st block of sub-video data, the 2 nd block of sub-video data, the 3 rd block of sub-video data and the 4 th block of sub-video data as the 4 blocks of sub-video data; and sequentially selecting 4 blocks of sub-video data from the rear to the front of the sub-video data at the tail of the first sequencing result, which is equivalent to taking 4 blocks of sub-video data from the last block of sub-video data to the front, for example, taking 4 blocks of sub-video data from the tail of 19 blocks of sub-video data, which is equivalent to taking 19 th block of sub-video data, 18 th block of sub-video data, 17 th block of sub-video data and 16 th block of sub-video data as the 4 blocks of sub-video data.
Step S244A: and if the parity type is an even number type, selecting the M blocks of sub-video data to be encrypted from the middle part in the first sequencing result.
In the present embodiment, when the random number N is of an even type, the M blocks of sub-video data to be encrypted may be arbitrarily taken from the middle portion in the first ordering result, i.e., M blocks of sub-video data may be taken from the N/2 th block of sub-video data. For example, when the random number N is 10 and the number of blocks M is 2, the middle two pieces of sub-video data may be taken as 2 pieces of sub-video data to be encrypted, that is, the 5 th piece of sub-video data and the 6 th piece of sub-video data in the first ordering result may be taken as 2 pieces of sub-video data to be encrypted; any 2 blocks of sub-video data except the two blocks of sub-video data at the head and the tail can also be taken as 2 blocks of sub-video data to be encrypted, for example, the 3 rd block of sub-video data and the 6 th block of sub-video data can be taken as 2 blocks of sub-video data to be encrypted.
Therefore, according to the difference of the parity types of the random number N, the modes for selecting the sub-video data to be encrypted are different, and the block number and the selection mode of the sub-video data to be encrypted can change along with the change of the random number N, so that the safety of the encrypted video data can be improved, and the risk of stealing the video data by a third party is reduced.
In other embodiments, referring to fig. 4, step S240 may include:
step S241B: and sequencing the N pieces of sub-video data according to the time sequence to obtain a second sequencing result.
In this embodiment, the video data generated in the video conference process all have the corresponding time, so that the N pieces of sub-video data can be sorted according to the time corresponding to each sub-video data and the time sequence thereof, and a second sorting result is obtained. In the second sorting result, the N sub-video data are all arranged according to the time sequence.
Step S242B: based on the value of M, a target number of spacer blocks is determined.
Step S243B: and sequentially selecting the M blocks of sub-video data to be encrypted from the N blocks of sub-video data according to the target interval block number.
In this embodiment, after determining the number M of blocks of the sub-video data that needs to be encrypted, the target number of inter blocks may be determined according to the value of M, where the larger the value of M, the smaller the target number of inter blocks, and vice versa. For example, if the value of the random number N is 30 and the value of the block number M is 5, the target interval block number may be 3 correspondingly, that is, 5 sub-video data to be encrypted are sequentially selected from 30 sub-video data every 3 sub-video data; if the value of the random number N is 30 and the value of the block number M is 10, the number of the target interval blocks is smaller than the number of the corresponding target interval blocks when the block number M is 5, and at this time, the number of the target interval blocks may be 1, that is, each 1 block of sub-video data, and 10 blocks of sub-video data to be encrypted are sequentially selected from the 30 blocks of sub-video data.
Therefore, the number of the target interval blocks is determined according to the size of the M numerical value, M pieces of sub-video data to be encrypted can be obtained at proper positions in N pieces of sub-video data, one piece of sub-video data is obtained at each interval of the target interval blocks to serve as the sub-video data to be encrypted, the number of the target interval blocks changes along with the change of the M numerical value and is not a fixed value, the encryption safety can be improved, and the risk of stealing the video data by a third party is reduced.
Step S250: and acquiring other sub-video data except the M sub-video data in the N sub-video data blocks as the T sub-video data which is not encrypted.
In this embodiment, after M blocks of sub-video data to be encrypted are selected according to a preset selection rule, other sub-video data except the M blocks of sub-video data in the N blocks of sub-video data may be obtained as the T blocks of sub-video data that are not encrypted. For example, when the random number N is 10 and the block number M is 2, and the 5 th block and the 6 th block of the 10 blocks of sub-video data are selected as the 2 blocks of sub-video data to be encrypted according to a preset selection rule, 8 blocks of sub-video data other than the 2 blocks of sub-video data to be encrypted in the 10 blocks of sub-video data may be obtained as T blocks of sub-video data that are not to be encrypted, that is, the block number T of the sub-video data that is not to be encrypted is 8 at this time.
Step S260: and based on a plurality of encryption algorithms, encrypting each piece of sub-video data in the M pieces of sub-video data to obtain M pieces of encrypted sub-video data, wherein each piece of sub-video data is encrypted corresponding to one of the plurality of encryption algorithms respectively.
In some embodiments, referring to fig. 5, step S260 may include:
step S261: and acquiring the variety quantity T of the multiple encryption algorithms.
In this embodiment, M blocks of sub-video data to be encrypted may be encrypted by multiple encryption algorithms, so that the number T of types of multiple encryption algorithms may be obtained first, and then the corresponding encryption algorithm may be selected to encrypt the M blocks of sub-video data according to the number T of types of multiple encryption algorithms.
Step S262: and judging whether the M is smaller than the type quantity T or not.
Step S263: if the M is smaller than the variety quantity T, M encryption algorithms are selected from the multiple encryption algorithms, and any one of the M encryption algorithms is randomly used for encrypting each piece of sub-video data in the M pieces of sub-video data to obtain M pieces of encrypted sub-video data.
In this embodiment, it may be determined whether the number M of blocks of the sub-video data to be encrypted is less than the number T of types of encryption algorithms, and if M is less than the number T of types, M types of encryption algorithms may be arbitrarily selected from the multiple types of encryption algorithms, or the multiple types of encryption algorithms may be sorted according to the difficulty of the algorithms to obtain corresponding sorting results, and the encryption algorithm with the highest difficulty of the algorithms in the sorting results is sequentially selected from the M types of encryption algorithms; and for each sub-video data in the M blocks of sub-video data, randomly encrypting by using any one of the M encryption algorithms.
Exemplarily, when the number of the types of the encryption algorithms T is 4 and the number M of the sub-video data to be encrypted is 2, the encryption algorithm (such as DES algorithm and AES algorithm) in 2 can be selected from the multiple encryption algorithms, the 2 blocks of sub-video data to be encrypted can be encrypted randomly by using the DES algorithm and AES algorithm, if the 2 blocks of sub-video data to be encrypted are respectively located at the head and the tail, the sub-video data to be encrypted located at the head can be encrypted by using the DES algorithm, the sub-video data to be encrypted located at the tail can be encrypted by using the AES algorithm, and then the 2 blocks of encrypted sub-video data can be obtained.
Step S264: if the M is not less than the variety quantity T, randomly encrypting each piece of sub-video data in the M pieces of sub-video data by using any one encryption algorithm in the multiple encryption algorithms to obtain M pieces of encrypted sub-video data.
In this embodiment, when M is not less than the category number T, for each block of sub-video data in the M blocks of sub-video data, any one of multiple encryption algorithms may be randomly used for encryption, so as to obtain M blocks of encrypted sub-video data.
Exemplarily, when the number T of the types of the encryption algorithms is 2, the 2 types of encryption algorithms may be a DES algorithm and an AES algorithm, and when the number M of the sub-video data to be encrypted is 6, for the 6 blocks of sub-video data to be encrypted, any one of the DES algorithm and the AES algorithm may be used for encryption, so as to obtain the 6 blocks of encrypted sub-video data.
Step S270: and transmitting the M encrypted sub-video data and the T sub-video data to a receiving end of the video conference.
In the embodiment of the present application, step S270 may refer to the content of step S150 in the foregoing embodiment, and is not described herein again.
In the embodiment, the video to be encrypted in the video conference is blocked to obtain N blocks of sub-video data, and a plurality of encryption algorithms are used to encrypt part of sub-video data in the N blocks of sub-video data, so that the problems that the security in the video data transmission process is low and the content of the video conference is easy to steal due to the single encryption algorithm are solved, and the security of video data encryption transmission in the video conference is improved.
Referring to fig. 6, fig. 6 is a flowchart illustrating a video encryption transmission method according to another embodiment of the present application. The video encryption transmission method provided by the embodiment of the present application will be described in detail below with reference to fig. 6. The video encryption transmission method can comprise the following steps:
step S610: and acquiring video data to be encrypted in the video conference.
Step S620: dividing the video data to be encrypted into N blocks based on a random number N to obtain N blocks of sub-video data, wherein N is a positive integer greater than 2, and the random number N is acquired every preset time length.
In the embodiment of the present application, steps S610 to S620 may refer to the contents of steps S110 to S120 in the foregoing embodiment, and are not described herein again.
Step S630: and acquiring the ratio of the random number N to the specified number.
In the present embodiment, the specified number may be preset, such as 150, 100, or 200, and the present embodiment does not limit this. The ratio of the random number N to the designated number is determined by the size of the random number N, and the larger the random number N is, the larger the ratio is, it can be understood that the size of the random number N is further quantized by obtaining the ratio of the random number N to the designated number, and the larger the ratio is, the larger the random number N is relative to the designated number is, and correspondingly, the larger the value of the block number M of the sub video data to be encrypted is determined to be.
Step S640: and determining the block number M of the sub video data to be encrypted in the N blocks of sub video data according to the ratio.
In this embodiment, the number M of sub-video data to be encrypted in the N blocks of sub-video data may be determined according to a ratio of the random number N to a specified number.
In some embodiments, referring to fig. 7, step S640 may include:
step S641: and judging whether the ratio is larger than a preset threshold value or not.
Step S642: and if the ratio is larger than the preset threshold, determining the specified number as the block number M of the sub-video data to be encrypted in the N blocks of sub-video data.
In this embodiment, it may be determined whether the ratio is greater than a preset threshold, and the number M of the corresponding sub video data to be encrypted is further determined according to different determination results. The preset threshold may be preset, such as 1, 1.5, or 2, and the present embodiment does not limit this.
In one embodiment, when the ratio is greater than a preset threshold, the specified number is determined as the number M of blocks of the sub video data to be encrypted. Illustratively, the random number N is 200, the designated number is 100, the preset threshold value is 1, and correspondingly, the ratio of the random number N to the designated number is 2, and since the ratio is greater than the preset threshold value, the designated number 100 may be determined as the number M of blocks of the sub video data to be encrypted.
Step S643: and if the ratio is not greater than the preset threshold, determining the product of the random number N and a preset ratio as the block number M of the sub-video data to be encrypted in the N blocks of sub-video data, wherein the numerical value of the preset ratio is less than 1.
In another embodiment, when the ratio is not greater than the preset threshold, the product of the random number N and the preset ratio is determined as the number M of sub-video data to be encrypted in the N blocks of sub-video data. The preset ratio may be preset, and a value of the preset ratio is smaller than 1, such as 0.3, 0.5, or 0.8, which is not limited in this embodiment.
Illustratively, the random number N is 50, the specified number is 100, the preset threshold value is 1, the preset ratio is 0.8, and correspondingly, the ratio of the random number N to the specified number is 0.5, since the ratio is smaller than the preset threshold value, the product of the random number N and the preset ratio is 40, and correspondingly, the product 40 is determined as the block number M of the sub video data to be encrypted in the N blocks of sub video data.
Therefore, the block number M of the sub-video data to be encrypted changes along with the change of the ratio, and the sub-video data with proper number can be taken for encryption according to the relation between the ratio and the preset threshold value, so that the problems of more encrypted blocks and slower encryption speed can be avoided while the encryption security is ensured.
Step S650: and selecting the M blocks of sub-video data to be encrypted from the N blocks of sub-video data according to a preset selection rule.
Step S660: and acquiring other sub-video data except the M sub-video data in the N sub-video data blocks as the T sub-video data which is not encrypted.
Step S670: and based on a plurality of encryption algorithms, encrypting each piece of sub-video data in the M pieces of sub-video data to obtain M pieces of encrypted sub-video data, wherein each piece of sub-video data is encrypted corresponding to one of the plurality of encryption algorithms respectively.
Step S680: and transmitting the M encrypted sub-video data and the T sub-video data to a receiving end of the video conference.
In the embodiment of the present application, steps S650 to S680 may refer to the contents of steps S240 to S270 in the foregoing embodiment, and are not described herein again.
In the embodiment, the video to be encrypted in the video conference is blocked to obtain N blocks of sub-video data, and a plurality of encryption algorithms are used to encrypt part of sub-video data in the N blocks of sub-video data, so that the problems that the security in the video data transmission process is low and the content of the video conference is easy to steal due to the single encryption algorithm are solved, and the security of video data encryption transmission in the video conference is improved.
Referring to fig. 8, a block diagram of a video encryption transmission apparatus 800 according to an embodiment of the present application is shown. The apparatus 800 may include: a video data acquisition module 810, a video blocking module 820, a determine encrypted sub-video data module 830, an encryption module 840, and a video data transmission module 850.
The video data obtaining module 810 is configured to obtain video data to be encrypted in a video conference.
The video blocking module 820 is configured to divide the video data to be encrypted into N blocks based on a random number N, so as to obtain N blocks of sub-video data, where the random number N is a positive integer greater than 2, and the random number N is obtained every preset time.
The encrypted sub-video data determining module 830 is configured to determine, based on the random number N, M sub-video data to be encrypted in the N sub-video data blocks, and T sub-video data that is not encrypted in the M sub-video data blocks, where M is a positive integer greater than 1, and T is a positive integer.
The encryption module 840 is configured to encrypt each piece of sub-video data in the M pieces of sub-video data based on multiple encryption algorithms to obtain M pieces of encrypted sub-video data, where each piece of sub-video data is encrypted according to one of the multiple encryption algorithms.
The video data transmission module 850 is configured to transmit the M encrypted sub-video data and the T sub-video data to a receiving end of the video conference.
In some implementations, the determine to encrypt the sub-video data module 830 may include: the device comprises an encryption block number determining unit, an encryption sub-video data selecting unit and a non-encryption sub-video data selecting unit. The encryption block number determining unit may be configured to determine, according to the size of the random number N, a block number M of sub video data to be encrypted in the N blocks of sub video data; the encrypted sub-video data selection unit may be configured to select, according to a preset selection rule, the M pieces of sub-video data to be encrypted from the N pieces of sub-video data; the unencrypted sub-video data selection unit may be configured to acquire, as the T-block sub-video data that is not encrypted, sub-video data other than the M-block sub-video data in the N-block sub-video data.
In other embodiments, the determine to encrypt sub-video data module 830 may also include: the device comprises a ratio acquisition unit, an encryption block number determination unit, an encryption sub-video data selection unit and a non-encryption sub-video data selection unit. The ratio obtaining unit may be configured to obtain a ratio of the random number N to a specified number; the encryption block number determining unit may be configured to determine, according to the ratio, a block number M of sub video data to be encrypted in the N blocks of sub video data; the encrypted sub-video data selection unit may be configured to select, according to a preset selection rule, the M pieces of sub-video data to be encrypted from the N pieces of sub-video data; the unencrypted sub-video data selection unit may be configured to acquire, as the T-block sub-video data that is not encrypted, sub-video data other than the M-block sub-video data in the N-block sub-video data.
In this embodiment, the encryption block number determination unit may include: the device comprises a judgment ratio subunit, a first encryption block number determining subunit and a second encryption block number determining subunit. The ratio determining subunit may be configured to determine whether the ratio is greater than a preset threshold. The first encryption block number determination subunit may be configured to determine, if the ratio is greater than the preset threshold, the specified number as the block number M of the sub video data to be encrypted in the N blocks of sub video data. The second encryption block number determination subunit may be configured to determine, if the ratio is not greater than the preset threshold, a product of the random number N and a preset ratio as a block number M of sub video data to be encrypted in the N blocks of sub video data, where a value of the preset ratio is less than 1.
In some embodiments, the encrypted sub-video data extracting unit may include: the device comprises a first sequencing subunit, an odd-even type acquisition subunit, a first selection subunit and a second selection subunit. The first ordering subunit may be configured to order the N sub-video data according to a time sequence, so as to obtain a first ordering result. The parity type acquiring subunit may be configured to acquire a parity type of the random number N, where the parity type includes an odd type or an even type. The first selecting sub-unit may be configured to, if the parity type is an odd type, take the M blocks of sub-video data from the head and tail sub-video data in the first ordering result. The second selecting subunit may be configured to arbitrarily select, from a middle portion of the first ordering result, the M blocks of sub-video data to be encrypted if the parity type is an even number type.
In other embodiments, the encrypted sub-video data extracting unit may further include: a second sorting subunit, a spacer block number determining subunit and a third selecting subunit. The second sorting subunit may be configured to sort the N sub-video data according to a temporal sequence, so as to obtain a second sorting result. The determine number of spacer blocks subunit may be configured to determine a target number of spacer blocks based on the value of M. The third selecting subunit may be configured to sequentially select, according to the target number of interval blocks, the M blocks of sub-video data to be encrypted from the N blocks of sub-video data.
In some implementations, the encryption module 840 can include: the device comprises an encryption algorithm type acquisition unit, a judgment unit, a first encryption unit and a second encryption unit. The encryption algorithm kind acquisition unit may be configured to acquire the number T of kinds of the plurality of encryption algorithms. The judging unit may be configured to judge whether M is smaller than the number of categories T. The first encryption unit may be configured to select M encryption algorithms from the multiple encryption algorithms if M is smaller than the category number T, and randomly encrypt each block of sub-video data in the M blocks of sub-video data using any one of the M encryption algorithms to obtain M blocks of encrypted sub-video data. And if the M is not less than the category number T, the second encryption unit randomly uses any one of the multiple encryption algorithms to encrypt each sub-video data in the M sub-video data to obtain M encrypted sub-video data.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described apparatuses and modules may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, the coupling between the modules may be electrical, mechanical or other type of coupling.
In addition, functional modules in the embodiments of the present application may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
To sum up, in the scheme provided by the embodiment of the application, the video to be encrypted in the video conference is blocked to obtain N blocks of sub-video data, and a plurality of encryption algorithms are used to encrypt part of sub-video data in the N blocks of sub-video data, so that the problems that the security is low in the video data transmission process due to the single encryption algorithm and the content of the video conference is easy to steal are solved, and the security of video data encryption transmission in the video conference is improved.
An electronic device provided by the present application will be described below with reference to the drawings.
Referring to fig. 9, fig. 9 shows a block diagram of an electronic device 900 according to an embodiment of the present application, and the electronic device 900 may perform the video encryption transmission method according to the embodiment of the present application.
The electronic device 900 in the embodiments of the present application may include one or more of the following components: a processor 901, a memory 902, and one or more applications, wherein the one or more applications may be stored in the memory 902 and configured to be executed by the one or more processors 901, the one or more programs configured to perform a method as described in the aforementioned method embodiments.
Processor 901 may include one or more processing cores. The processor 901 interfaces with various interfaces and circuitry throughout the electronic device 900 to perform various functions of the electronic device 900 and process data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 902 and invoking data stored in the memory 902. Alternatively, the processor 901 may be implemented in hardware using at least one of Digital Signal Processing (DSP), field-Programmable Gate Array (FPGA), and Programmable Logic Array (PLA). The processor 901 may integrate one or a combination of a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), a modem, and the like. The CPU mainly processes an operating system, a user interface, an application program and the like; the GPU is used for rendering and drawing display content; the modem is used to handle wireless communications. It is understood that the modem may be integrated into the processor 901, and implemented by a communication chip.
The Memory 902 may include a Random Access Memory (RAM) or a Read-Only Memory (Read-Only Memory). The memory 902 may be used to store instructions, programs, code, sets of codes, or sets of instructions. The memory 902 may include a stored program area and a stored data area, wherein the stored program area may store instructions for implementing an operating system, instructions for implementing at least one function (such as a touch function, a sound playing function, an image playing function, etc.), instructions for implementing various method embodiments described below, and the like. The storage data area may also store data created during use by the electronic device 900 (such as the various correspondences described above), and so on.
It can be clearly understood by those skilled in the art that, for convenience and simplicity of description, the specific working processes of the above-described devices and modules may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, the coupling or direct coupling or communication connection between the modules shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or modules may be in an electrical, mechanical or other form.
In addition, functional modules in the embodiments of the present application may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
Referring to fig. 10, a block diagram of a computer-readable storage medium according to an embodiment of the present application is shown. The computer-readable medium 1000 has stored therein program code that can be called by a processor to execute the method described in the above-described method embodiments.
The computer-readable storage medium 1000 may be an electronic memory such as a flash memory, an EEPROM (electrically erasable programmable read only memory), an EPROM, a hard disk, or a ROM. Alternatively, the computer-readable storage medium 1000 includes a non-transitory computer-readable storage medium. The computer readable storage medium 1000 has storage space for program code 1010 for performing any of the method steps of the method described above. The program code can be read from or written to one or more computer program products. The program code 1010 may be compressed, for example, in a suitable form.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not necessarily depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (10)

1. A method for encrypted transmission of video, the method comprising:
acquiring video data to be encrypted in a video conference;
dividing the video data to be encrypted into N blocks based on a random number N to obtain N blocks of sub-video data, wherein the random number N is a positive integer greater than 2 and is acquired every preset time length;
determining M sub-video data to be encrypted and T sub-video data not to be encrypted in the N sub-video data based on the random number N, wherein M is a positive integer larger than 1, and T is a positive integer;
encrypting each piece of sub-video data in the M pieces of sub-video data based on a plurality of encryption algorithms to obtain M pieces of encrypted sub-video data, wherein each piece of sub-video data is encrypted corresponding to one encryption algorithm in the plurality of encryption algorithms;
and transmitting the M encrypted sub-video data and the T sub-video data to a receiving end of the video conference.
2. The method according to claim 1, wherein the determining, based on the random number N, M sub-video data to be encrypted and T sub-video data not to be encrypted in the N sub-video data comprises:
determining the block number M of the sub-video data to be encrypted in the N blocks of sub-video data according to the size of the random number N;
selecting the M blocks of sub-video data to be encrypted from the N blocks of sub-video data according to a preset selection rule;
and acquiring other sub-video data except the M sub-video data in the N sub-video data blocks as the T sub-video data which is not encrypted.
3. The method according to claim 1, wherein the determining, based on the random number N, M sub-video data to be encrypted and T sub-video data not to be encrypted in the N sub-video data comprises:
acquiring the ratio of the random number N to the specified number;
determining the block number M of the sub video data to be encrypted in the N blocks of sub video data according to the ratio;
selecting the M sub-video data to be encrypted from the N sub-video data according to a preset selection rule;
and acquiring other sub-video data except the M sub-video data in the N sub-video data blocks as the T sub-video data which is not encrypted.
4. The method according to claim 3, wherein said determining the number M of blocks of sub-video data to be encrypted in the N blocks of sub-video data according to the ratio comprises:
judging whether the ratio is larger than a preset threshold value or not;
if the ratio is greater than the preset threshold, determining the specified number as the block number M of the sub-video data to be encrypted in the N blocks of sub-video data;
and if the ratio is not greater than the preset threshold, determining the product of the random number N and a preset ratio as the block number M of the sub-video data to be encrypted in the N blocks of sub-video data, wherein the numerical value of the preset ratio is less than 1.
5. The method according to claim 2 or 3, wherein said selecting the M blocks of sub-video data to be encrypted from the N blocks of sub-video data according to a preset selection rule comprises:
sequencing the N pieces of sub-video data according to the sequence of time to obtain a first sequencing result;
acquiring a parity type of the random number N, wherein the parity type comprises an odd number type or an even number type;
if the odd-even type is an odd type, taking the M blocks of sub-video data from the head and tail sub-video data in the first sequencing result;
and if the parity type is an even number type, selecting the M blocks of sub-video data to be encrypted from the middle part in the first sequencing result.
6. The method according to claim 2 or 3, wherein said selecting the M blocks of sub-video data to be encrypted from the N blocks of sub-video data according to a preset selection rule comprises:
sequencing the N pieces of sub-video data according to the sequence of time to obtain a second sequencing result;
determining a target number of spacer blocks based on the value of M;
and sequentially selecting the M blocks of sub-video data to be encrypted from the N blocks of sub-video data according to the target interval block number.
7. The method according to claim 1, wherein the encrypting each of the M blocks of sub-video data based on a plurality of encryption algorithms to obtain M blocks of encrypted sub-video data comprises:
acquiring the variety quantity T of the multiple encryption algorithms;
judging whether the M is smaller than the type quantity T or not;
if the M is smaller than the category number T, M encryption algorithms are selected from the multiple encryption algorithms, and any one of the M encryption algorithms is randomly used for encrypting each piece of sub-video data in the M pieces of sub-video data to obtain M pieces of encrypted sub-video data;
if the M is not less than the type quantity T, randomly using any one of the multiple encryption algorithms to encrypt each piece of sub-video data in the M pieces of sub-video data, and obtaining M pieces of encrypted sub-video data.
8. A video encryption transmission apparatus, characterized in that the apparatus comprises:
the video data acquisition module is used for acquiring video data to be encrypted in the video conference;
the video blocking module is used for dividing the video data to be encrypted into N blocks based on a random number N to obtain N blocks of sub-video data, wherein the random number N is a positive integer greater than 2, and is acquired every preset time length;
an encrypted sub-video data determining module, configured to determine, based on the random number N, M sub-video data to be encrypted in the N sub-video data blocks, and to divide T sub-video data that is not to be encrypted in the M sub-video data blocks, where M is a positive integer greater than 1, and T is a positive integer;
the encryption module is used for encrypting each piece of sub-video data in the M pieces of sub-video data based on a plurality of encryption algorithms to obtain M pieces of encrypted sub-video data, wherein each piece of sub-video data is encrypted corresponding to one encryption algorithm in the plurality of encryption algorithms;
and the video data transmission module is used for transmitting the M encrypted sub-video data and the T sub-video data to a receiving end of the video conference.
9. An electronic device, comprising:
one or more processors;
a memory;
one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to perform the method of any of claims 1-7.
10. A computer-readable storage medium, characterized in that a program code is stored in the computer-readable storage medium, which program code can be called by a processor to perform the method according to any of claims 1-7.
CN202211429226.4A 2022-11-15 2022-11-15 Video encryption transmission method and device, electronic equipment and storage medium Pending CN115802106A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211429226.4A CN115802106A (en) 2022-11-15 2022-11-15 Video encryption transmission method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211429226.4A CN115802106A (en) 2022-11-15 2022-11-15 Video encryption transmission method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115802106A true CN115802106A (en) 2023-03-14

Family

ID=85437897

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211429226.4A Pending CN115802106A (en) 2022-11-15 2022-11-15 Video encryption transmission method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115802106A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118018673A (en) * 2024-02-02 2024-05-10 北京富通亚讯网络信息技术有限公司 Video data transmission method, device, equipment and medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103457727A (en) * 2012-05-29 2013-12-18 华为技术有限公司 Method, device and system for processing media data
CN105208404A (en) * 2015-08-26 2015-12-30 北京新东方迅程网络科技有限公司 Video encryption and decryption method and device
CN108777803A (en) * 2018-06-05 2018-11-09 四川师范大学 Broadcasting and TV cloud platform video stream processing method, device, equipment and medium
CN114329555A (en) * 2021-12-28 2022-04-12 中国电信股份有限公司 Video file encryption processing method and device, storage medium and equipment
CN114449343A (en) * 2022-01-28 2022-05-06 北京百度网讯科技有限公司 Video processing method, device, equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103457727A (en) * 2012-05-29 2013-12-18 华为技术有限公司 Method, device and system for processing media data
CN105208404A (en) * 2015-08-26 2015-12-30 北京新东方迅程网络科技有限公司 Video encryption and decryption method and device
CN108777803A (en) * 2018-06-05 2018-11-09 四川师范大学 Broadcasting and TV cloud platform video stream processing method, device, equipment and medium
CN114329555A (en) * 2021-12-28 2022-04-12 中国电信股份有限公司 Video file encryption processing method and device, storage medium and equipment
CN114449343A (en) * 2022-01-28 2022-05-06 北京百度网讯科技有限公司 Video processing method, device, equipment and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118018673A (en) * 2024-02-02 2024-05-10 北京富通亚讯网络信息技术有限公司 Video data transmission method, device, equipment and medium

Similar Documents

Publication Publication Date Title
US9237008B2 (en) Encryption device, encryption method, and encryption program
JP4235174B2 (en) Encryption / decryption device, encryption device, decryption device, and transmission / reception device
CN106817358B (en) Encryption and decryption method and device for user resources
GB2526636A (en) Encoder, decoder and methods employing partial data encryption
CN111555880A (en) Data collision method and device, storage medium and electronic equipment
WO2022257612A1 (en) Video processing methods and apparatus, electronic device, and storage medium
KR20200115408A (en) Apparatus for performing quorum design on secret key and method thereof
EP3447963A1 (en) Method for protecting data
CN112054896B (en) White box encryption method, white box encryption device, terminal and storage medium
CN115802106A (en) Video encryption transmission method and device, electronic equipment and storage medium
US20230208615A1 (en) Online-Streamer Image Model File Transmission in Co-Hosting During Livestreaming
CN110012313B (en) Feedback switching encryption method based on double chaotic systems
CN115473722A (en) Data encryption method and device, electronic equipment and storage medium
JP4906800B2 (en) COMMUNICATION DEVICE, ENCRYPTED COMMUNICATION SYSTEM, COMMUNICATION METHOD, AND COMMUNICATION PROGRAM
CN113051592A (en) File encryption method and device, electronic equipment and storage medium
JPWO2015166701A1 (en) ENCRYPTION METHOD, PROGRAM, AND SYSTEM
CN114500006B (en) Query request processing method and device
CN115208570A (en) Encryption method and device based on dynamic replacement of secret key
Ajmera et al. Secure LSB Steganography over Modified Vigenère-AES Cipher and Modified Interrupt Key-AES Cipher
CN113411347B (en) Transaction message processing method and processing device
CN112637442B (en) Method and device for encrypting circulating images by cloud server and local end
CN115021919A (en) SSL negotiation method, device, equipment and computer readable storage medium
KR102160294B1 (en) Apparatus for performing quorum design on secret key and method thereof
CA2592703A1 (en) Communication system and communication method
CN116484407B (en) Data security protection method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination