1271081 九、發明說明: 【發明所屬之技術領域】 本案係為-種數位資料串流傳送方法,尤指應用於網 路上之具加密功能之數位資料串流傳送方法。 % 【先前技術】 ^ 隨著電腦網路的普及以及高效率壓縮演算法的快速發 展’在電腦網路上傳送串流媒體(血隱_ media)變得 越來越普遍。而什麼是串流媒體(streaming media)技術 呢·配口第-圖所不之架構圖來說,就是影音串流伺服器 (Streaming Server)將—個影音播案分成一段段然後透 過電腦網路1〇傳送出去,而用戶端12 (clien〇便可以邊 下載邊看,觀看與下載的動作可以是同時進行的,使用者 • $必等整個難傳送完畢,就可即時連續不斷地觀賞,這 樣^旦大幅節省使用者等待的時間,也可以相當程度達到 ΡΝ*的效果。目月ί在用戶端12,較普遍的多媒體播放軟體、 有RealNetworks公司的Rea黯yer、Α_公司的 QuickTime Player 以及 Micr〇s〇ft 公司的 Wind龍 m他 Player (以下簡稱 ms WMV)。 串流媒體(streaming media)技術在進行傳輸前,檔 案需經過編碼及壓縮處理,並在用戶端收到後再進行解^ 及解壓縮處理,但是常用的影音壓縮方式就只有那麼幾種 6 1271081 而且是公開規格,例如JPEG/MPEG X/H.26X/MS WMV/RV 1〇等等。但因網際網路是開放的,如果有人從網路傳輸的 過程中攔取到檔案,然後從屈指可數的影音壓縮方式中用 旨试與錯誤(tryanderr〇r)的方式來猜出解碼方式,如此 便可很容易就可以把攔取到的串流資料解碼出來觀看。因 此在網際網路上傳送串流媒體(streaming media)是不 太有隱密性舆安全性的,有礙於利用網路傳輸安全監視晝 面或$它不容許被別人盜取之影音檔案等應用的發展。而 如何能改善此一缺失,便成為了發展本案的主要目的。 【發明内容] =案係為一種數位資料串流傳送方法,應用於網路上 之》第主機與一第二主機之間,該方法包含下列步驟: 該第-,機將一數位資料擋案進行一編石馬壓縮程序而產生 I 7數位射4壓縮髓’該編碼壓練序巾產生-個編碼壓 縮減集合;該第一主機將該編碼壓縮參數集合中之編碼 壓縮參數進行一加密處理,並將包含有經過加密處理之該 編碼壓縮參數集合之該數位資料壓縮檔案以串流方式透過 網路傳:¾到該第二主機;以及該第二主機接收以串流方式 傳达之包含有經過加密處理之該編碼壓縮參數华合之該數 位資料壓縮槽案後,將經過加密處理之_碼壓 合進打-解密處理而還原成該編碼塵縮參數华合, 該編碼壓縮參數集合對該數位資料壓縮檔案進行一解碼解 7 1271081, 壓縮程序,進而得回該數位資料槽案。 根據上述構想,本案所述之數位資料串流傳送方法, 其中該數位資料檔案係可為一數位影音檔案或一數位影像 檔案,而所進行之該編碼壓縮程序係可為一 MPEG編碼壓 縮程序或一 JPEG編碼壓縮程序。 根據上述構想’本案所述之數位資料串流傳送方法, 其中所產生之該編碼壓縮參數集合係為一直流值集合或是 一移動向量集合。 根據上述構想,本案所述之數位資料串流傳送方法, 其中該加密處理係包含下列步驟:取出該編碼壓縮參數集 合;以及利用一公開金鑰(PublicKey)對該編碼壓縮參數 集合進行加密而完成該經過加密處理之編碼壓縮參數集 合。 根據上述構想,本案所述之數位資料串流傳送方法, 其中該解密處理係包含下列步驟:取出該經過加密處理之 編碼壓縮參數集合;以及私密錢㈤遞一) 對該經過加密處理之編碼壓縮參數#合進行解密而還原成 該編碼壓縮參數集合。 根據上述構想,本案所述之數位資料串流傳送方法, 其:以串流方賴送之賴位:#料壓職案料—數位影 音貝料壓馳案,該帛二域邊對絲财彡音資料麵權 案進行該解碼解壓_序,便—邊減已解碼完成之該數 位影音資料壓縮檔案。 根據上述構想,本案所述之數位資料串流傳送方法, 8 8ι :,该加密處理係包含下列步驟:取出該編碼獅參數集 數,=及利用一私密金鑰(Private Key)對該編碼壓縮參 來口進行加密而完成該經過加密處理之編碼壓縮參數集 根據上述構想’本案所述之數位資料串流傳送方法, 繞該解密處理係包含下列步驟:取出該經過加密處理之 重焉參數集合,以及利用—私密金餘㈤vate Key) 好亥經過加岔處理之編碼壓縮參數集合進行解密而還原成 ^鵠碼壓縮參數集合。 本案之另—方面係為—種數位資料處理方法,應用於 2位資料檔案以及-第—主機與_第二主機之間,該方 2含下列步驟:該第—主機將該數位資料㈣進行-編 2縮程序而產生—數位龍壓縮槽案,該編碼壓縮程序 個編碼壓縮參數集合;該第—域將該編碼壓縮 2集合中之編碼壓縮參數進行—力禮處理,並將經過加 之该編碼壓縮參數集合連_數位資料壓縮檔案進 了4存或傳送;以及該第二主機得到該數位資料壓縮槽案 ,經過加蚊狀簡驢縮錄#錢,先將經過加穷 縮ί數集合進行—解密處理而還原成該編 二I數W ’再_該編碼壓縮參數集合對該數 =縮槽案進行一解碼解壓縮程序,進而得回該數位資料 根據上述構想,本案所述之數位資料處理方法, 該數位資料檐案係可為-數位影音槽案或—數位影像二 1271081 案,而所進行之該編碼壓縮程序係可為一 MPEG編碼壓縮 私序或一 jpeg編碼壓縮程序,至於所產生之該編碼壓縮 參數集合係為一直流值集合或是一移動向量集合。 【實施方式】 請參見第二圖,其係本案為改善習用手段缺失所發展 出來之一編碼壓縮加密-解碼解壓縮解密之第一較佳實施 例方法步驟流程示意圖,而為方便說明本案之技術精神, 本貝把例係以動晝專業團體(Moving picture Expert Group,簡稱MPEG)之編碼壓縮方法為主要骨幹,再加上 本案之主要技術特徵來進行說明。首先,電腦網路(本圖 未不出)上所連接之一第一主機(本圖未示出)將一數位 資料檔案(例如是一數位影音檔案)之一影像畫面(frame) 進行方塊(block)分割處理,進而產生許多8x8像素點大 _ 小的方塊,然後再針對每個方塊進行離散餘弦轉換 (Discrete Cosine Transform,簡稱 DCT)、量化(quantize) 以及鋸齒狀掃描(zigzag scan)之資料壓縮處理,之後再 進行掃描長度編碼(Run Length Encoding,簡稱RLE)以 及可變長度編碼(Variable Length Coding,簡稱VLC)而 形成一數位資料壓縮檔案後,便可將該數位資料壓縮構案 以串流方式透過電腦網路(例如網際網路)傳送到也連接 於電腦網路之一第二主機(本圖未示出)。而本實施例為能 使非預定之主機無法將攔取到的串流資料解碼出來觀看, 1271081 於是將於資料壓縮處理過程中相對應於每個方塊(bl〇ck) 所產生之每一直流值(Dc value)所形成之編碼壓縮參數 集合進打一加密處理。而該加密處理可利用私密金鑰 (Key)進行加逾、之對稱式加解密方法,或是利用公開金 錄(PubllcKey)與私密金鑰(Private Key)配對之不對稱 加解密加密處理,但因此等加密處理已屬成熟技術,本案 不再資述’但需強調的是,不同位置的方塊(bl〇ck)之直 流值(DC value)所利用之金鑰(Key)可隨不同位置的方 塊(block)而變化其值,如此可讓加密後之數位資料壓縮 槽案更不易被辨識。 而在第二主機接收到以串流方式傳送之包含有經過加 密處理之該編碼壓縮參數集合之該數位資料壓縮檔案後, 便可反向利用可變長度解碼(Variable Length Dec〇ding, 間稱VLD)、田長度解碼(Run Length Decoding,簡稱 RLD )、反鋸齒狀掃描(Ιην_ zigzag _ )、反量化(心咖 quantize )以及反離散餘弦轉換(inverse Discrete c〇sine1271081 IX. Description of the invention: [Technical field of invention] This case is a digital data stream transmission method, especially a digital data stream transmission method with encryption function applied to the network. % [Prior Art] ^ With the popularity of computer networks and the rapid development of high-efficiency compression algorithms, it has become more and more common to transmit streaming media (blood _ media) on computer networks. And what is the streaming media technology? The interface diagram is not the architecture map, the video streaming server (Streaming Server) will be a video broadcast into a segment and then through the computer network 1〇 is transmitted, and the client 12 (clien〇 can be viewed while downloading, the action of watching and downloading can be performed simultaneously, and the user • $ must wait until the whole is difficult to transfer, so that it can be continuously viewed continuously, so that Once the user's waiting time is greatly saved, the effect of ΡΝ* can be achieved to a considerable extent. On the client side 12, the more popular multimedia player software, RealNetworks' Rea黯yer, Α_Company's QuickTime Player and Micr〇s〇ft's Wind Dragon m Player (hereafter referred to as ms WMV). Streaming media technology before encoding, the file needs to be encoded and compressed, and then received after the user receives the solution. ^ and decompression processing, but the commonly used video compression methods are only a few 6 1271081 and are public specifications, such as JPEG/MPEG X/H.26X/MS WMV/RV 1〇, etc. Because the Internet is open, if someone intercepts the file from the network transmission process, and then uses the trial and error method to guess the decoding method from the few video compression methods. In this way, the intercepted streaming data can be easily decoded and viewed. Therefore, streaming media on the Internet is less confidential and secure, hindering the use of the network. Transmission security surveillance or it does not allow the development of applications such as video files that have been stolen by others. How to improve this deficiency has become the main purpose of the development of this case. [Summary] = Case is a digital data The streaming method is applied between the first host and the second host on the network, and the method comprises the following steps: the first, the machine performs a digital horse file compression program to generate an I 7 digit The encoding compression sniper generates a coding compression reduction set; the first host performs an encryption process on the coding compression parameter in the coding compression parameter set, and includes The digital data compression file of the encoded compression parameter set that has been encrypted is transmitted through the network in a streaming manner: to the second host; and the second host receives the streamed communication and includes the encrypted processing After the encoding compression parameter Huahe of the digital data compression slot case, the _code compression processed by the encryption process is combined into a decryption-decryption process to restore the encoded dust reduction parameter, and the coding compression parameter set compresses the digital data. The file performs a decoding solution 7 1271081, compresses the program, and then returns the digital data slot. According to the above concept, the digital data stream transmission method described in the present invention, wherein the digital data file can be a digital audio file or a digital image file, and the code compression program can be an MPEG code compression program or A JPEG encoding compression program. According to the above concept, the digital data stream transmission method of the present invention, wherein the generated compression parameter set is a set of continuous stream values or a set of motion vectors. According to the above concept, the digital data stream transmission method of the present invention, wherein the encryption processing comprises the steps of: taking out the code compression parameter set; and encrypting the code compression parameter set by using a public key (PublicKey) The encrypted compression encoded parameter set. According to the above concept, the digital data stream transmission method of the present invention, wherein the decryption processing comprises the steps of: taking out the encrypted compression parameter set of the encryption process; and private money (5) handing one) encoding compression of the encrypted processing The parameter # is decrypted and restored to the encoded compression parameter set. According to the above concept, the digital data stream transmission method described in the present case, which is based on the stagnation of the streamer: #料压职案-Digital audio and video shelling case, the second side of the field The audio data surface right case performs the decoding and decompression _ sequence, and the side-by-side subtracts the digital audio and video data compressed file that has been decoded. According to the above concept, the digital data stream transmission method described in the present invention, 8 8 ι :, the encryption processing system includes the following steps: taking out the number of the encoded lion parameter set, = and compressing the code by using a private key (Private Key) According to the above-mentioned concept of the digital data stream transmission method described in the above-mentioned concept, the encryption processing system includes the following steps: taking out the encrypted parameter set by the encryption processing. And the use of - private gold (5) vate Key) Hao Hai through the processing of the encoding compression parameter set to decrypt and restore to the ^ code compression parameter set. The other aspect of the present invention is a digital data processing method, which is applied to a 2-bit data file and between a -host and a second host. The party 2 includes the following steps: the first host performs the digital data (four) - encoding a program to generate a digital compression slot, the encoding compression program encodes a set of compression parameters; the first field encodes the encoding compression parameters in the encoded compression 2 set - and then adds The encoding compression parameter set is connected to the _ digital data compression file into 4 storage or transmission; and the second host obtains the digital data compression slot case, and after the mosquito-like simplification, the money is firstly added to the collection. Performing-decryption processing and restoring to the coded two I number W' again - the code compression parameter set is subjected to a decoding decompression process for the number = shrinking case, and then the digital data is obtained according to the above concept, the digital number described in the present case The data processing method, the digital data file system can be a digital video channel case or a digital image 21271081 case, and the code compression program can be an MPEG code compression private sequence or a The jpeg encoding compression program, as to the generated set of encoding compression parameters is a set of constant stream values or a set of moving vectors. [Embodiment] Please refer to the second figure, which is a schematic flow chart of the first preferred embodiment of the code compression compression-decoding decompression and decryption developed in the present invention to improve the conventional means, and the technology of the present invention is convenient for explanation. Spirit, Benbe's example is based on the coding compression method of the Moving Picture Expert Group (MPEG) as the main backbone, together with the main technical features of this case. First, a first host (not shown in the figure) connected to the computer network (not shown in the figure) blocks a frame of a digital data file (for example, a digital video file). Block) segmentation processing, which in turn generates a number of 8x8 pixel large _ small squares, and then discrete Discrete Cosine Transform (DCT), quantization (quantize) and zigzag scan data for each block After compression processing, and then performing Run Length Encoding (RLE) and Variable Length Coding (VLC) to form a digital data compression file, the digital data can be compressed into a string. The streaming mode is transmitted through a computer network (such as the Internet) to a second host (not shown in the figure) that is also connected to the computer network. In this embodiment, in order to enable the unscheduled host to decode the intercepted stream data for viewing, 1271081 will correspondingly correspond to each DC generated by each block (bl〇ck) during the data compression process. The set of coding compression parameters formed by the value (Dc value) is subjected to an encryption process. The encryption process may use a private key (Key) to add over, a symmetric encryption and decryption method, or an asymmetric encryption and decryption encryption process using a public account (PubllcKey) and a private key (Private Key), but Therefore, the encryption process is a mature technology, and the case is no longer described in the case. However, it should be emphasized that the key used by the DC value of the block (bl〇ck) at different positions can be used in different positions. Blocks change their values, which makes the encrypted digital data compression slot less recognizable. After the second host receives the serially compressed data file containing the encrypted compression parameter set, the variable length decoding (Variable Length Dec〇ding) can be reversed. VLD), Run Length Decoding (RLD), anti-aliased scanning (Ιην_ zigzag _ ), inverse quantization (heart quantize), and inverse discrete cosine conversion (inverse Discrete c〇sine)
Transform’簡稱IDCT)等解碼解壓縮程序,最後完成資 料重建(reconstruct)而得回該數位資料檔案。但其間必須 利用適當金鑰來對經過加密處理之該編碼壓縮參數集合進 行解密,進而得回相對應於每個方塊(bl〇ck)所產生之每 一直流值(DC value)。 而就是因為相對應於每個方塊(bl〇ck)所產生之直流 值(DC value)已被加密,因此需要適當金鑰來對其進行 解密,如此才能正確解回該數位資料檔案,所以即使透過 11 1271081 ,,傳=之串流資料被他人截取,在沒有適當金錄來進行 、:、况下所解碼出來之影像晝面將會模糊不清而無 法被有效辨識。如此便可有效改善習用手段之缺失,進而 達成本案之主要目的。 再凊芩見第三圖,其係本案為改善習用手段缺失所發 2出來之一編碼壓縮加密-解碼解壓縮解密之第二較佳實 =列方法步驟流程示意圖,本實施例與第一較佳實施例之 • *部,内容皆相同,不同處在於加密處理係改為應用於移 $向里之上,即對於在將影像晝面(frame)進行方塊(心成) 二副處理後所隨後進行之移動估測(M〇ti〇n㈤運 算程序中所產生之移動向量(Motion Vector)進行加密處 理。而该加密處理同樣可利用私密金鑰(Key)進行加密 之,稱式加解密方法,或是利用公開金鑰(Public Key)與 =袷金鑰(Private Key)配對之不對稱加解密加密處理。 ^強調的是,相對應於每個方塊之移動向量所形成之編碼 • 麵參數集合進行加密處理時,不同位置的方塊(block) 之移動向量(Motion Vector)所利用之金鑰(Key)可隨方 塊(block)的位置而變化其值,如此可讓加密後之數位資 料壓縮檔案更不易被辨識。 、 紅上所述,本案兩實施例皆可達到對在開放網路環境 中傳送得串流資料進行保密的目的,而且本案技術主要是 在壓縮域(compressed domain)進行加密,因此可以很有 效率的保護串流資料中某一段特別重要的資料,如果硬體 %境許可,甚至可以把整段串流資料全部保護。而本案所 12 1271081 舉之兩個例子,針對直流值與移動向量進行加密,就可以 在小計算量的硬體環境需求下達到保護整個#料流的目 的。所以即使當我們必須透過網路傳送一段需要保密的串 流貧料到遠端主機的時候,應用本案之技術手段,不但需 要加密的資料量很小,但仍可達到整段諸保護的目的。 而本案除了可顧於刪G格式外,㈣絲仍可應 用於 删/H篇MS WMV/RV料編碼壓縮格式巾。而不論 在網路傳料是齡於—般料齡上,本案之技術手段 皆可應用其上並達到功效之增進,而且本案手制硬體或 軟體的方式皆可實現。故但本·明得由熟f此技藝之人 士任施匠“為諸般修飾,料獨如附申料 欲保護者。 【圖式簡單說明】The decoding decompression program, such as Transform' (referred to as IDCT), finally completes the reconstruction of the data and returns the digital data file. However, the encrypted key set must be decrypted by the appropriate key to obtain the DC value corresponding to each block (bl〇ck). However, because the DC value corresponding to each block (bl〇ck) has been encrypted, an appropriate key is needed to decrypt it, so that the digital data file can be correctly decoded, so even Through 11 1271081, the streamed data is intercepted by others. In the absence of proper gold recording, the decoded image will be blurred and cannot be effectively identified. This can effectively improve the lack of customary means, and thus achieve the main purpose of the case. Referring to the third figure, it is a flow chart of the second preferred real-column method step of encoding compression encryption-decoding decompression and decryption, which is one of the two methods in the present invention. The * part of the preferred embodiment has the same content. The difference is that the encryption processing system is applied to the shifting of the inward direction, that is, after the second processing of the image frame (the heart) is performed. The subsequent motion estimation (Motion Vector generated in the M〇ti〇n (5) operation program is encrypted. The encryption processing can also be encrypted using a private key (Key). Or an asymmetric encryption and decryption encryption process using a public key (Public Key) and a = Private Key. ^ Emphasis is placed on the coding/surface parameters corresponding to the motion vectors of each block. When the collection is encrypted, the key used by the motion vector of the block at different positions can change its value with the position of the block, so that the encrypted digit can be made. The compressed file is more difficult to be identified. In the above, both embodiments of the present invention can achieve the purpose of keeping the streaming data transmitted in the open network environment confidential, and the technology of the present invention is mainly in the compressed domain. Encryption, so it can effectively protect a certain piece of data in the streaming data. If the hardware is allowed, the entire stream of data can be protected. In this case, 12 1271081, two examples, Encryption of DC values and motion vectors can achieve the goal of protecting the entire # stream in a small amount of hardware environment. So even when we have to transmit a stream of confidential materials that need to be kept secret to the far end through the network At the time of the host, the technical means of applying this case not only requires a small amount of data to be encrypted, but still achieves the purpose of the entire protection. In addition to the deletion of the G format, the case can still be applied to delete/H. The MS WMV/RV material encodes a compressed format towel, and the technical means of this case can be applied to it regardless of the age of the network material. The effect is improved, and the method of hand-made hardware or software can be realized in this case. Therefore, Ben Ming has to be a master of the craftsmanship of this skill, "for all kinds of modifications, it is expected to be attached to the applicant." Simple description of the schema]
…本案得藉由下列圖式及詳細朗,俾得—更深入 解: 編石馬 驟流 =圖,其係傳送串流媒體之制功能方塊架構圖。 第-圖,其係本案為改善f用手段缺失所發展出來之 壓縮加密解骑__之第—較佳實_方法步 程示意圖。 碥石馬 驟流 第三圖,其係本案為改善習用手段缺失所發展出來之 壓縮加密·解碼解壓縮解密之第二較佳實施例方法步 程示意圖。 13 1271081 【主要元件符號說明】 本案圖式中所包含之各元件列式如下: 電腦網路10 影音串流伺服器11 用戶端12... This case can be obtained from the following diagrams and detailed descriptions - a more in-depth explanation: 编石马 流流 = diagram, which is a functional block diagram of the transmission of streaming media. The first figure is a schematic diagram of the method of compressing and decrypting the __, which is developed in order to improve the use of f.碥石马流流 The third figure is a schematic diagram of the method of the second preferred embodiment of the compression encryption/decoding decompression and decryption developed in the present invention to improve the lack of conventional means. 13 1271081 [Description of main component symbols] The components included in the diagram of this case are listed as follows: Computer network 10 Video streaming server 11 User terminal 12
1414