Tamper-proof encryption method, detection method and device of encoding code stream
An encryption method and a detection method technology, which are applied to color TV parts, TV system parts, digital video signal modification, etc., can solve the problems of application restrictions, video distortion, etc., to meet encryption requirements, ensure no distortion, The effect of reducing the stream quality
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0054] see figure 1 , which is the flow chart of the first embodiment of the tamper-proof encryption method for the encoded code stream of the present application:
[0055] Step 101: Receive coded stream data.
[0056] The bit stream data in this embodiment of the present application may be video encoding bit stream data or audio encoding bit stream data. When the bit stream data is video coded bit stream data, usually the received bit stream data is the video bit stream data after encoding each frame of image respectively.
[0057] Step 102: Generate a check value by checking the coded stream data.
[0058] Specifically, check data with a preset length is selected from the coded code stream data according to preset rules, and a check data is checked using a preset check algorithm to obtain a check value. Among them, the preset rules can be flexibly set according to needs, for example, the first ten bytes of code stream data are used as check data, or the ten consecutive byte...
no. 2 example
[0069] see figure 2 , which is the flow chart of the second embodiment of the tamper-proof encryption method of the encoded code stream of the present application:
[0070] Step 201: Receive coded stream data.
[0071] The bit stream data in this embodiment of the present application may be video encoding bit stream data or audio encoding bit stream data. When the bit stream data is video coded bit stream data, usually the received bit stream data is the video bit stream data after encoding each frame of image respectively.
[0072] Step 202: Buffer the coded stream data.
[0073] Taking the video code stream as an example, buffering the coded code stream data can temporarily store the coded code stream of each frame of image, and encrypt the code stream data of each frame of image in the subsequent steps.
[0074] Step 203: Select check data with a preset length from the coded stream data according to preset rules.
[0075] Among them, the preset rules can be flexibly se...
no. 1 example
[0115] see Figure 4 , which is the block diagram of the first embodiment of the tamper-proof encryption device for the encoded code stream of the present application:
[0116] The encryption device includes: a receiving unit 410 , a verification unit 420 , a combination unit 430 , an encryption unit 440 and an encapsulation unit 450 .
[0117] Wherein, the receiving unit 410 is configured to receive coded stream data;
[0118] A verification unit 420, configured to generate a verification value by verifying the encoded code stream data;
[0119] Combining unit 430, configured to combine the verification value with a preset key according to a preset combination method to generate a new combined key;
[0120] An encryption unit 440, configured to encrypt the preset watermark information through the combined key to generate encrypted information;
[0121] The encapsulation unit 450 is configured to encapsulate the encrypted information and the coded stream data.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 