Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing digital fingerprint encrypted video multicast transmission

A digital fingerprint and multicast transmission technology, applied in the field of information security, can solve the problems of high system implementation cost, increased transmission bandwidth usage requirements, and inability to detect fingerprints by detectors.

Inactive Publication Date: 2013-06-12
GUANGDONG POLYTECHNIC NORMAL UNIV
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) The disadvantages of orthogonal fingerprints are: it is more effective for fingerprint applications with few users, but as the number of users increases, the complexity of fingerprint detection and tracking algorithms increases significantly, and the energy of fingerprints decreases significantly in collusion. make the detector unable to detect the fingerprint
[0006] (2) The disadvantage of correlation fingerprints is that if correlation is introduced in the design, even if the copy of the digital content is attacked by collusion, the energy of the relevant part in the fingerprint will not be significantly reduced
[0007] (3) Wade Trappe et al. combined the theory of combinatorial design and block coding (such as BIBD, etc.) to propose an anti-collusion code ACC. The ability to collusion attacks, but greatly increases the use of transmission bandwidth requirements
Therefore, the system implementation cost is higher

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing digital fingerprint encrypted video multicast transmission
  • Method for realizing digital fingerprint encrypted video multicast transmission
  • Method for realizing digital fingerprint encrypted video multicast transmission

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0092] The method for implementing digital fingerprint encrypted video multicast transmission of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0093] The invention realizes the video multicast transmission method of digital fingerprint encryption, including digital fingerprint encryption transmission and digital fingerprint encryption reception.

[0094] The encrypted transmission of the digital fingerprint comprises the following steps:

[0095] 1) The carrier source data of image and video is compressed by MPEG-2 standard to form MPEG-2 basic data S l ;

[0096] 2) Digital fingerprint data of images or videos Use the DGHM multi-wavelet transform tree for processing to form a multi-wavelet tree;

[0097] 3) According to the importance of digital fingerprints, different data of digital fingerprint image feature points are decomposed into different energy fingerprint vector bases And form digital fingerpri...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for realizing digital fingerprint encrypted video multicast transmission. The method comprises digital fingerprint encrypted transmission and digital fingerprint encrypted receiving. The digital fingerprint encrypted transmission comprises the following steps of: performing moving picture experts group-2 (MPEG-2) standard compression on carrier information source data of images and videos; processing image-based or video-based digital fingerprint data to finally form digital fingerprint data; deciding the energy magnitudes of digital fingerprint embedding and the relation of the energy magnitudes according to the probability of different branches of a tree structure to mutually generate collusion attack; processing by code division multiple access / time division multiple address (CDMA / TDMA) combined quadrature modulation to form blended data; enabling the blended data to form an encrypted data stream; and finally transmitting through a channel. The digital fingerprint encrypted receiving comprises the following steps of: deciphering and compressing according to a secret key K<m>, K<(i)>; recovering the information source data of the images and the videos; meanwhile, performing demodulation and processing on the information source data of the images and the videos, detecting the collusion attack generated among all levels of the tree structure by correlation functions to finally obtain the digital fingerprint data. The method for realizing the digital fingerprint encrypted video multicast transmission has the advantages that the safety is high; the communication cost is reduced; and meanwhile, the right and the validity of a system to track lawbreakers are enhanced.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to the technology of a method for realizing digital fingerprint encrypted video multicast transmission. Background technique [0002] Digital fingerprint video is the process of embedding fingerprint digital signals of different identifications into the video service signal given by the user, and the users are identified by using the bits with different meanings that appear. This kind of identification is also called fingerprint payload pay-load, which is usually realized through the process of robust digital watermark embedding. In digital rights management DRM text, the main purpose of fingerprint embedding and encryption is to protect video content from individual or collusive attacks. Among them, the collusion attack of digital video is the most important problem faced by its application. Therefore, the anti-collusion attack capability of digital video is an import...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04N21/2347H04N7/26H04N7/30H04N21/4405H04N19/467
Inventor 赵慧民朱立陈小玲
Owner GUANGDONG POLYTECHNIC NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products