Encrypted embedded video chaotic secret communication method after H.264 coding

A post-encoding encryption and secure communication technology, which is applied in the field of embedded video chaotic secure communication, can solve problems such as insufficient security and efficiency, difficult design, and reduced encoding compression rate, so as to improve real-time performance, security, and real-time performance And the effect of high security and increasing the unique solution distance

Active Publication Date: 2016-07-20
GUANGDONG UNIV OF TECH
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. After chaotic encryption, the correlation of the original video is disrupted, resulting in a greatly reduced encoding and compression efficiency of H.264, and the amount of encoded video data is large. Whether H.264 hardware encoding or software encoding is used, the encrypted video The transmission rate via Ethernet is not high enough; the image data volume in RGB format is much larger than the I frame or P frame data volume after H.264 compression. 264 compressed to KB level
The amount of encrypted data is large, and the encryption takes a long time;
[0005] 2. The encoding efficiency is low. The H.264 encoder relies on the spatial correlation of the image to compress to obtain I frames, and relies on the temporal correlation between frames to compress to obtain P frames.
However, the spatial-temporal correlation of the encrypted RGB image pixels is disrupted, which seriously affects the efficiency of the encoder, which is reflected in the greatly reduced encoding compression rate;
[0006] 3. Low transmission efficiency
The low compression efficiency of H.264 leads to a large amount of data in the H.264 video signal. When the network transmission bandwidth is constant, the transmission frame rate decreases;
[0007] 4. Only the encryption method of position scrambling can be used, and the size of video pixels cannot be encrypted. Otherwise, due to the quantization in H.264, the receiving end will not be able to decrypt correctly even if the key matches. The original video, but only the encryption method of position scrambling, the statistical characteristics are not good, and the security performance is not high
[0010] 2. Low operating efficiency
The execution speed of software is much lower than tha

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypted embedded video chaotic secret communication method after H.264 coding
  • Encrypted embedded video chaotic secret communication method after H.264 coding
  • Encrypted embedded video chaotic secret communication method after H.264 coding

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0043] Example

[0044] see figure 1 , the method of the present invention comprises the following steps: camera captures video, JPEG decoding of video image, RGB format to YUV420 format conversion, H.264 hardware encoding, chaotic stream cipher encryption, chaotic scrambling encryption of pixel position, network transmission, wide area network transmission , network reception, chaotic anti-scrambling decryption of pixel positions, chaotic stream cipher decryption, successful decoding of H.264 hardware under key matching conditions, conversion from YUV420 format to RGB format, decrypted video display, key mismatch conditions After the H.264 hardware decoding fails, the communication between the sending end and the receiving end stops, and the original video signal cannot be decrypted.

[0045] 1. At the sending end, the operation mode of four cores and four threads is adopted, and the sequence of H.264 hardware encoding and chaotic encryption is followed. The specific operat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encrypted embedded video chaotic secret communication method after H.264 coding. The encrypted embedded video chaotic secret communication method comprises the following steps of S1, at a transmitting end, performing H.264 hardware coding, chaotic flow password encryption, pixel-position chaotic scrambling encryption, network transmission and wide-area network transmission on video data; and S2, at a receiving end, receiving encrypted video data through the network, finishing pixel-position chaotic descrambling decryption and chaotic flow cipher decryption, realizing H.264 hardware decoding on the condition that a password matches, and stopping communication between the transmitting end and the receiving end after H.264 hardware decoding failure on the condition that password mismatching occurs. The encrypted embedded video chaotic secret communication method has double encryptions, namely chaotic flow password encryption and chaotic position scrambling encryption. The double encryptions are performed after H.264 coding compression. The encrypted embedded video chaotic secret communication method has advantages of realizing no damage of original video correlation, improving coding efficiency, reducing data redundancy, and realizing high real-time performance and high safety of an encryption system.

Description

technical field [0001] The invention relates to video security communication technology in multimedia communication, in particular to an embedded video chaos security communication method encrypted after H.264 encoding. Background technique [0002] In video chaotic secure communication, there are currently two chaotic encryption methods widely used by people: [0003] The first way is to encrypt first and then perform H.264 or HEVC encoding and compression. The characteristic of this encryption method is that it is more convenient to deal with at the technical level, but it has the following shortcomings: [0004] 1. After chaotic encryption, the correlation of the original video is disrupted, resulting in a greatly reduced encoding and compression efficiency of H.264, and the amount of encoded video data is large. Whether H.264 hardware encoding or software encoding is used, the encrypted video The transmission rate via Ethernet is not high enough; the image data volume i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04N19/46H04N21/2347H04N21/4405
CPCH04N19/46H04N21/2347H04N21/4405
Inventor 陈平张晓扬禹思敏
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products