Video encryption method incompatible with video coding based on chaotic cryptography theory

A technology of video coding and chaotic ciphers, which is applied in the direction of secure communication through chaotic signals, selective content distribution, digital transmission systems, etc., can solve problems such as inability to play, and achieve the effect of enhancing security and resisting violent attacks

Active Publication Date: 2019-10-25
SHANGHAI GOLDEN BRIDGE INFOTECH CO LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technology of the present invention solves the problem: overcomes the deficiencies of the prior art, provides a video encryption method based on chaotic cipher theory that is not compatible with video coding, and encrypts the video stream as ordinary image data, and is compatible with the encryption algorithm of video coding Compared with the sensitive information in the selectively encrypted video, the security is enhanced; the high-dimensional chaotic encryption is adopted, which can resist exhaustive attacks; the encrypted image is automatically synthesized into the video, which improves the traditional incompatible video encoding encryption algorithm. disadvantages of playing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Video encryption method incompatible with video coding based on chaotic cryptography theory
  • Video encryption method incompatible with video coding based on chaotic cryptography theory
  • Video encryption method incompatible with video coding based on chaotic cryptography theory

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] In order to better understand the present invention, some basic concepts are firstly explained.

[0016] 1. Logistic mapping:

[0017] Logistic mapping is a classic model for studying the behavior of complex systems such as dynamical systems, chaos, and fractals, and iterates repeatedly according to the following equation (1):

[0018] x(t+1)=μx(t)(1-x(t)) (1)

[0019] t is the iterative time step, in order to ensure that the x(t) obtained by any number of iterations is always in [0, 1], then μ∈[0,4].

[0020] 2. Arnold Cat mapping

[0021] In mathematics, the Arnold Cat map is named after Vladimir Arnold, who demonstrated its effect in the 1960s using images of cats, hence the name. The Arnold Cat transformation is used to shuffle the pixel value position of the color image, but cannot change the value of the image pixel. That is, the pixel position is transformed by Arnold Cat mapping, and the image is encrypted by scrambling. Equation (2) is used for image encry...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a video encryption method incompatible with video coding based on a chaotic cryptography theory. The method comprises steps of dividing a video file into a video stream and anaudio stream: regarding the video stream as frames of image, encrypting based on 2D Arnold Cat mapping, a DNA encoding technology and a Lorenz hyperchaotic system, and adopting different encryption methods for Y, Cb and Cr channels of the image; using logistic mapping for audio stream encryption. A video stream is regarded as common image data to be encrypted, and compared with an encryption algorithm compatible with video coding to selectively encrypt sensitive information in a video, the security is enhanced; high-dimensional chaotic encryption is adopted, so that exhaustion attacks can beresisted; and the encrypted images are automatically synthesized into a video, so that the defect that the video cannot be played after being encrypted by a traditional incompatible video coding encryption algorithm is overcome. According to the method, various attacks such as strong attacks, statistical attacks and related attacks can be effectively resisted.

Description

technical field [0001] The invention relates to a video encryption method incompatible with video encoding based on the theory of chaotic cryptography, which belongs to the field of video encryption. Background technique [0002] With the vigorous development of computer technology and network technology, multimedia data is becoming more and more popular and applied in the network and daily life. However, due to the openness and anonymity of the network, video streams such as digital TV, video-on-demand, and video calls are easily attacked by humans. The security of video files has always been a research focus and difficulty in recent years. [0003] According to whether the encryption algorithm is compatible with the video encoding process, the existing video encryption algorithms are divided into two types: one is the encryption algorithm that is not compatible with video encoding, and the other is the encryption algorithm that is compatible with video encoding. On the ba...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N21/233H04N21/234H04N21/2343H04N21/2347H04N21/439H04N21/44H04N21/4402H04N21/4408H04L9/00
CPCH04L9/001H04N21/2335H04N21/23418H04N21/234309H04N21/23473H04N21/4398H04N21/44008H04N21/440218H04N21/4408
Inventor 陈力赵博汪昕蒋尚秀金鑫
Owner SHANGHAI GOLDEN BRIDGE INFOTECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products