Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An encryption method based on H.264 video stream

An encryption method and video streaming technology, applied in the fields of digital video signal modification, television, analog security/charging system, etc., can solve the problems of great real-time influence, difficult real-time encoding, and changing statistical characteristics.

Inactive Publication Date: 2008-03-19
HEFEI UNIV OF TECH +1
View PDF2 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Its disadvantages are: (1) Since the information in each 4×4 unit is completely preserved, the attacker can use the inter-block correlation (such as edge continuity, color and texture similarity, etc.) to decipher; (2) The shuffling process changes The statistical characteristics of the adjacent block coefficients, and the position of the coefficients have changed greatly, so it has a great impact on the signal-to-noise ratio and compression ratio
The disadvantage is that the block-based video coding structure (such as H.264, MPEG-4, etc.) has a great impact on real-time performance, and it is difficult to perform real-time coding

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An encryption method based on H.264 video stream
  • An encryption method based on H.264 video stream

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The present invention utilizes the characteristics of 4*4 DCT transformation in H.264, and provides a new DCLSA algorithm by constructing a layered model of DCT coefficients.

[0046] An encryption method based on H.264 video stream:

[0047] 1. DCT coefficient hierarchical model

[0048] Before the model is established, during H.264 encoding, a frame of image is first selected to be divided into m (m≥1) slices, and each slice contains n (n≥1) macroblocks. Specifically, each macroblock is divided into 16 sub-blocks with 4×4 as the basic unit: Z m,n,0 ,Z m,n,1 ,…,Z m,n,15 , each sub-block contains 16 DCT coefficients, namely Z m,n,i ={C m,n,i,0 , C m,n,i,1 ,...,C m,n,i,15}(m≥1, n≥1, 0≤i≤15).

[0049] Step 1: Each 4×4 sub-block Z in the same macro block m,n,i The two-dimensional coefficient matrix contained in (m≥1, n≥1, 0≤i≤15) is mapped into a one-dimensional coefficient matrix, and the mapping function is Zigzag sorting, as shown in Figure 1.

[0050] Step 2:...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encryption method based on H.264 video streaming. During the H.264 coding, a frame of images is divided into m slices (m is more than or equal to 1), each slice contains n macro blocks (n is more than or equal to 1), each macro block is divided into 16 sub-blocks based on 4*4 as a basic unit: that is, Zm,n,0, Zm,n,1, Zm,n,15, and each sub-block contains 16 DCT coefficients, that is, Zm,n,i ={Cm,n,i, 0, Cm,n,i, 1, Cm,n,i,15} (m is more than or equal to 1, n is more than or equal to 1, i is more than or equal to 0 but less than or equal to 15); a DCT coefficient hierarchical model is established in correspondence to the macro block and then divided into a DC coefficient layer and other 15 AC coefficient layers; sequentially, each frame of image data is distributed with a key, that is, each layer is distributed with a key, if necessary, a plurality of layers share one key; each frame of image data is encrypted and the key sequence pointer resets to scramble layer after layer until the frame is completed. The invention has good safety and high compression ratio.

Description

technical field [0001] The invention belongs to an image transmission encryption method, in particular to an encryption method based on the H.264 video stream of the video coding standard. Background technique [0002] H.264 is a new-generation video coding standard jointly formulated by ITU-T and ISO / IEC, which can provide higher compression performance than H.263 and MPEG-4, and can save 30% to 50% when the image coding quality is the same. % bit rate. The excellent compression performance of the new standard makes it play an important role in various fields such as digital TV broadcasting, video real-time communication, network streaming media delivery, and multimedia short messages, and effectively promotes the rapid development of the multimedia industry. However, the extensiveness and convenience of video storage and transmission also cause some very difficult problems in the open network environment, such as illegal interception, information leakage, data tampering, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04N7/26H04N7/16H04N19/122H04N19/126H04N19/129H04N19/157H04N19/176
Inventor 蒋建国齐美彬王慧莉包先雨龙小泉李援詹曙夏娜吴从中张国富李小红
Owner HEFEI UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products