共查询到18条相似文献,搜索用时 78 毫秒
1.
视频加密是数字版权管理常用的技术.提出一种基于国产密码SM4算法的视频加密方法,对经过编码的视频文件进行I帧数据提取,并运用SM4加密算法进行加密.该方法可以降低加密运算强度,达到保护视频版权的目的. 相似文献
2.
针对当前视频数据易复制、易篡改等特征,为了保护视频数据的安全,提出了一种基于H.264/AVC视频编码标准的视频加密方案.利用流密码加密简单、运算速度快等优点,采用高级加密标准(AES)的密码反馈模式(CFB)对H.264/AVC标准的序列参数集(SPS)、图像参数集(PPS)中能加密的语法元素和Ⅰ帧的码流进行加密.针对不同视频应用所需求的安全级别不同,在宏块级别选取一定数量的宏块进行选择性加密,得到安全级别可分的加密方案.最后,从算法的安全性、实时性、压缩率等方面进行分析.实验结果表明,该算法达到了视频内容安全的要求,满足实时性,并且减少了加密数据量. 相似文献
3.
4.
H.264是一个面向未来IP和无线网络的视频编码标准,应用范围越来越广泛,因而安全加密技术逐步成为研究的热点。论文针对H.264的特点,提出一种利用数据加密标准DES的输出反馈模式OFB对H.264少量视频数据进行加密的算法,所选取的数据来自于DCT变换后的DC及部分AC系数。理论分析和实验结果表明,该算法选择加密部分视频数据,减小了加密的数据量,从而降低了加密系统的计算复杂度,具有较快的加解密速度,提高了实时性和安全性,且适合于移动多媒体、无线多媒体网络的数据流的安全传送。 相似文献
5.
设计了一种视频加密传输设备,利用HDMI或USB接口接收外部摄像机或DV机视频数据流,对视频流数据进行编码,再经过加密处理后,通过4G移动网络将加密压缩的视频流数据传送至服务端。当服务器远端有设备连接时,能接收并播放视频数据。该传输设备软件实现了视频采集编码、4G移动网络、数据加密、TCP/IP协议传输数据等模块,与远端服务器通过私有协议发送加密数据,验证了各模块的工作性能以及可靠性。 相似文献
6.
实时视频采集、存储和处理,已在各领域得到广泛应用。文中介绍了基于FPGA的视频采集系统设计的总体框架,并阐述了其中的设计流程,利用混沌信号对数据进行加密提高视频数据的安全性。在DE2平台下验证实,文中设计的FPGA视频采集系统完成了对实时视频进行混沌加密,实验结果表明,设计达到了初定的目标,加密的性能和效果能满足应用需要。 相似文献
7.
希望设计一套自动化,智能化,高效率的视频版权认证系统,系统总体采用了五层结构,设计了帧内数据的采样方法和由帧内采样数据构成的采样值数组,对该采样值数组进行哈希变换,求得了基本特征值,将得到的值组织成了四树权帧顺序寻址多层哈希树,将该哈希树与其他数据一起组织成了数据区块,本区块包含着前一数据区块的加密哈希值和当前时间戳,计算本数据区块的哈希值,将其加密存储在本区块的最后的数据位置,形成了数据区块链,对封面、封底区块进行加密,对整个数据打包,形成视频节目自动版权证书,论述了容错机制. 相似文献
8.
9.
10.
11.
随着多媒体技术的不断发展,视频信息安全愈发受到人们的关注。为解决视频信息的安全问题,提出了一种基于现场可编程门阵列(FPGA)技术的超混沌视频加密方法。在加密过程中,一方面FPGA控制数字摄像头实现实时彩色视频信息的采集;另一方面,在计算机密钥指令下,利用FPGA使超混沌系统产生有效的伪随机序列,实现对所采集视频信息的数据和地址的双重超混沌加密。给出了具体的超混沌视频加密算法和设计流程以及FPGA实现结果。安全性分析表明,明密文主观视觉对比显著不同,密钥空间大,视频图像统计特性的相关性弱,说明基于FPGA的超混沌视频加密系统加密效果良好可靠。 相似文献
12.
13.
在视频点播等应用中,为了刺激消费者购买高质量的视频,需要对视频进行特别的感知加密,使视频加密后仍然部分可见。该文提出一种Context-based Adaptive Binary Arithmetic Coding (CABAC)的视觉质量可控的快速感知加密算法。利用2D超混沌系统生成的流密码对重要的语法元素和敏感的编码元素异或加密。加密内容包括运动矢量差的符号位、非零系数符号位和语法元素significant_coeff_flag。分析及实验结果表明,提出的感知加密算法对码率无影响,编码时间仅增加7左右,视频质量随着质量因子的改变而变化,满足视频感知加密的应用需求。 相似文献
14.
Security video communication is a challenging task, especially for wireless video applications. An efficient security multimedia system on embedded platform is designed. By analyzing the hardware architecture and resource, the efficient DSP-based H.264/AVC coding is studied by efficient video coding techniques and system optimizing implementation.To protect the confidentiality and integrity of media information, a novel security mechanism is presented, which includes user identify authentication and a perceptual video encryption algorithm based on exploiting the special feature of entropy coding in H.264. Experimental results show that the proposed hardware framework has high performance and achieves a better balance between security and efficiency. The proposed security mechanism can achieve high security and low complexity cost, and has a little effect on the compression ratio and transmission bandwidth. What’s more, encoding and encryption at the same time, the performance of data process can meet real-time application. 相似文献
15.
As cloud storage becomes more popular, concerns about data leakage have been increasing. Encryption techniques can be used to protect privacy of videos stored in the cloud. However, the recently proposed sketch attack for encrypted H.264/AVC video, which is based on the macroblock bitstream size (MBS), can generate the outline images of both intra-frames and inter-frames from a video encrypted by most existing encryption schemes; thus, the protection of the original video may be considered a failure. In this paper, a novel selective encryption scheme for H.264/AVC video with improved visual security is presented. Two different scrambling strategies that do not destroy the format compatibility are proposed to change the relative positions between macroblocks in intra-frames and inter-frames respectively, which in turn substantially distort the sketched outline images so that they do not disclose meaningful information. Moreover, the sign bits of non-zero DCT coefficients are encrypted to contribute to the visual security of our scheme, and an adaptive encryption key related to the intra prediction mode and the DCT coefficient distribution of each frame is employed to provide further security. The experimental results show that our encryption scheme can achieve a better visual scrambling effect with a small adverse impact on the video file size. Furthermore, the security analysis demonstrates that our scheme can successfully resist the MBS sketch attack compared with other related schemes. The proposed method is also proven secure against some other known attacks. 相似文献
16.
17.
This paper considers the use of selective encryption systems for compressed video data that can support transcoding of the encrypted bit-streams without the need for decryption and re-encryption. The focus is on the use of the H.264 video codec. However, the concepts can be easily extended to any video coding standard.I-frame encryption encrypts only the intra frames, making it suitable for use with modified interframe transcoders that operate only on P and B frames. These interframe transcoders are found to offer improved performance for un-encrypted data, due to the temporal propagation of the higher quality of I-frames. The operations of both interframe open loop transcoding and Fast Pixel Domain Transcoding (FPDT) are unaffected by I-frame encryption yielding identical results. However, the lack of I-frame data causes a significant drift problem when I-frame encryption is used with a more complete Cascaded Pixel Domain Transcoder (CPDT). A modified CPDT is proposed, called Intra Block Copy (IBC) transcoding, which offers improved performance at the expense of a reduced range of possible output bitrates.Sign bit encryption systems such as Real-time Video Encryption Algorithm (RVEA) offer improved security compared to I-frame encryption. However transcoding this data can result in some sign bits being omitted causing a loss of cipher synchronization. A novel sign bit encryption technique called Synchronous Video Encryption Algorithm (SVEA) is proposed that preserves the cipher synchronization. While the operation of open loop transcoding systems is unaffected, the encryption interferes with the drift compensation in the more complex transcoders, leading to reduced performance. 相似文献
18.
《Journal of Visual Communication and Image Representation》2014,25(2):487-498
It is an assumption that selective encryption does not strongly protect confidentiality owing to the partial visibility of some video data. This is because, though encryption keys may be difficult to derive, an enhanced version of selectively encrypted video sequence might be found from knowledge of the unencrypted parts of the sequence. An efficient selective encryption method for syntax elements of H.264 encoded video was recently proposed at the entropy coding stage of an H.264 encoder. Using this recent scheme as an example, the purpose of this paper is a comprehensive cryptanalysis of selectively encrypted H.264 bit-streams to contradict the previous assumption that selective encryption is vulnerable. The novel cryptanalysis methods presented in this paper analyze the ability of an attacker to improve the quality of the encrypted video stream to make it watchable. The conclusion is drawn that if the syntax elements for selective encryption are chosen using statistical and structural characteristics of the video, then the selective encryption method is secure. The cryptanalysis is performed by taking into account the probability distribution of syntax elements within the video sequence, the relationship of syntax elements with linear regression analysis and the probability of successfully attacking them in order to enhance the visual quality. The results demonstrate the preservation of distorted video quality even after considering many possible attacks on: the whole video sequence; each video frame; and on small video segments known as slices. 相似文献