Unlock instant, AI-driven research and patent intelligence for your innovation.

Tamper-proof encryption method, detection method and device of encoding code stream

An encryption method and a detection method technology, which are applied to color TV parts, TV system parts, digital video signal modification, etc., can solve the problems of application restrictions, video distortion, etc., to meet encryption requirements, ensure no distortion, The effect of reducing the stream quality

Active Publication Date: 2012-11-21
HANGZHOU HIKVISION DIGITAL TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the embodiments of the present application is to provide a tamper-proof encryption method, detection method and device for coded code streams, so as to solve the problem of video distortion and limited application when digital watermarks are used to protect video coded code streams against tampering in the prior art The problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Tamper-proof encryption method, detection method and device of encoding code stream
  • Tamper-proof encryption method, detection method and device of encoding code stream
  • Tamper-proof encryption method, detection method and device of encoding code stream

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0054] see figure 1 , which is the flow chart of the first embodiment of the tamper-proof encryption method for the encoded code stream of the present application:

[0055] Step 101: Receive coded stream data.

[0056] The bit stream data in this embodiment of the present application may be video encoding bit stream data or audio encoding bit stream data. When the bit stream data is video coded bit stream data, usually the received bit stream data is the video bit stream data after encoding each frame of image respectively.

[0057] Step 102: Generate a check value by checking the coded stream data.

[0058] Specifically, check data with a preset length is selected from the coded code stream data according to preset rules, and a check data is checked using a preset check algorithm to obtain a check value. Among them, the preset rules can be flexibly set according to needs, for example, the first ten bytes of code stream data are used as check data, or the ten consecutive byte...

no. 2 example

[0069] see figure 2 , which is the flow chart of the second embodiment of the tamper-proof encryption method of the encoded code stream of the present application:

[0070] Step 201: Receive coded stream data.

[0071] The bit stream data in this embodiment of the present application may be video encoding bit stream data or audio encoding bit stream data. When the bit stream data is video coded bit stream data, usually the received bit stream data is the video bit stream data after encoding each frame of image respectively.

[0072] Step 202: Buffer the coded stream data.

[0073] Taking the video code stream as an example, buffering the coded code stream data can temporarily store the coded code stream of each frame of image, and encrypt the code stream data of each frame of image in the subsequent steps.

[0074] Step 203: Select check data with a preset length from the coded stream data according to preset rules.

[0075] Among them, the preset rules can be flexibly se...

no. 1 example

[0115] see Figure 4 , which is the block diagram of the first embodiment of the tamper-proof encryption device for the encoded code stream of the present application:

[0116] The encryption device includes: a receiving unit 410 , a verification unit 420 , a combination unit 430 , an encryption unit 440 and an encapsulation unit 450 .

[0117] Wherein, the receiving unit 410 is configured to receive coded stream data;

[0118] A verification unit 420, configured to generate a verification value by verifying the encoded code stream data;

[0119] Combining unit 430, configured to combine the verification value with a preset key according to a preset combination method to generate a new combined key;

[0120] An encryption unit 440, configured to encrypt the preset watermark information through the combined key to generate encrypted information;

[0121] The encapsulation unit 450 is configured to encapsulate the encrypted information and the coded stream data.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a tamper-proof encryption method and a detection method and device of an encoding code stream. The encryption method comprises the following steps of: receiving encoded code stream data; generating a proof test value through verifying the encoded code stream data; combining the proof test value with a preset secret key according to a preset combination mode to generate a new combined secret key; encrypting preset watermark information through the combined secret key to generate encrypted information; and packaging the encrypted information and the encoded code stream data. In the embodiment of the invention, the bit position of the encoded code stream does not need to be modified, therefore, the code stream can be ensured not to be distorted whilethe code stream is encrypted; since the code stream per se is not changed, whereas the preset information is encrypted, the length of the encrypted information is not limited, and the quality of the code stream can not be lowered while the encryption demand is satisfied.

Description

technical field [0001] The present application relates to the technical field of digital processing, in particular to a tamper-proof encryption method, detection method and device for coded streams. Background technique [0002] Information hiding technology can hide a piece of secret information in multimedia digital information, and protect the multimedia digital information from tampering by detecting the secret information. Information hiding technology mainly includes steganographic technology, digital watermarking technology, visual cryptography technology, etc., among which digital watermarking technology has a wide range of applications. Digital watermarking technology usually embeds invisible watermark information in the content data. When the content data changes, the watermark information will also change accordingly, so that it can be identified whether the content data has been tampered with. Existing digital watermarks are divided into time domain digital wate...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N7/26H04N7/64H04N5/913H04N19/467H04N19/89H04N21/8358
Inventor 黄崇基俞海贾永华胡扬忠邬伟琪
Owner HANGZHOU HIKVISION DIGITAL TECH