Real-time video monitoring encryption and authentication method

An encryption authentication and real-time video technology, applied in the field of video processing, can solve the problems of low video security, ignoring the safe storage of video frame data, and the speed cannot meet real-time encryption and decryption, so as to prevent tampering and forgery, facilitate decryption and viewing, Guaranteed authenticity and anti-tampering effects

Inactive Publication Date: 2015-05-06
XIAN SUANIER ELECTRONICS TECH
View PDF6 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At this stage, the security of video data storage mostly depends on the security verification of the transmission process, ignoring the safe storage of video frame data, which makes the video security not high. Due to the security problems in the storage of video frame data, the aut

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Real-time video monitoring encryption and authentication method
  • Real-time video monitoring encryption and authentication method
  • Real-time video monitoring encryption and authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be further described below in conjunction with the accompanying drawings.

[0035] see figure 1 , which is a structural diagram of a real-time video surveillance encryption authentication method proposed by the present invention;

[0036] like figure 1 Shown, a kind of real-time video surveillance encryption authentication method comprises the following steps:

[0037] Encode the original video to form video frame data;

[0038] Calculate the hash value of the video frame data to obtain the video hash value;

[0039] Encrypt the video frame data to form an encrypted file containing the key stream;

[0040] Store and transmit encrypted files and video hash values.

[0041] Further, encoding the original video to form video frame data specifically includes: converting the original video into video frame data through a video data amplifier and a video encoder.

[0042] Further, the video hash value uses the SM3 hash chip to calculate the ha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a real-time video monitoring encryption and authentication method. The real-time video monitoring encryption and authentication method comprises the following steps: coding an original video to form video frame data; performing hash value computation on the video frame data to obtain a video hash value; encrypting the video frame data to form an encrypted file including key stream; storing and transmitting the encrypted file and the video hash value. The real-time video monitoring encryption and authentication method can be used for completing high-speed encryption protection on the original video data, completing integrity authentication to prevent distorting and forging video by hash value comparing, and realizing remotely checking wireless transmission of a data spanning platform.

Description

technical field [0001] The invention relates to the field of video processing, in particular to a real-time video monitoring encryption authentication method. Background technique [0002] With the rapid development of mobile communication network technology, especially the wide application of mobile phones and personal digital assistants, users need to save and communicate more and more video information, which makes the security of video information more prominent. When the convenience comes, the security issue of protecting personal privacy is also more and more paid attention to by people. [0003] At this stage, the security of video data storage mostly depends on the security verification of the transmission process, ignoring the safe storage of video frame data, which makes the video security not high. Due to the security problems in the storage of video frame data, the authenticity of the video cannot be guaranteed. and integrity. Most of the safe video surveillanc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04N19/46H04N19/89H04N7/18
CPCH04N7/18
Inventor 周威王博李诺
Owner XIAN SUANIER ELECTRONICS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products