A Video Encryption Method Based on Chaotic Cryptography Incompatible Video Coding

A technology of video coding and chaotic cipher, which is applied in the direction of secure communication through chaotic signals, selective content distribution, digital transmission system, etc., which can solve problems such as inability to play, and achieve the effect of enhancing security and resisting violent attacks

Active Publication Date: 2021-09-24
SHANGHAI GOLDEN BRIDGE INFOTECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technology of the present invention solves the problem: overcomes the deficiencies of the prior art, provides a video encryption method based on chaotic cipher theory that is not compatible with video coding, and encrypts the video stream as ordinary image data, and is compatible with the encryption algorithm of video coding Compared with the sensitive information in the selectively encrypted video, the security is enhanced; the high-dimensional chaotic encryption is adopted, which can resist exhaustive attacks; the encrypted image is automatically synthesized into the video, which improves the traditional incompatible video encoding encryption algorithm. disadvantages of playing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Video Encryption Method Based on Chaotic Cryptography Incompatible Video Coding
  • A Video Encryption Method Based on Chaotic Cryptography Incompatible Video Coding
  • A Video Encryption Method Based on Chaotic Cryptography Incompatible Video Coding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] In order to better understand the present invention, some basic concepts are firstly explained.

[0016] 1. Logistic mapping:

[0017] Logistic mapping is a classic model for studying the behavior of complex systems such as dynamical systems, chaos, and fractals, and iterates repeatedly according to the following equation (1):

[0018] x(t+1)=μx(t)(1-x(t)) (1)

[0019] t is the iterative time step, in order to ensure that the x(t) obtained by any number of iterations is always in [0, 1], then μ∈[0,4].

[0020] 2. Arnold Cat mapping

[0021] In mathematics, the Arnold Cat map is named after Vladimir Arnold, who demonstrated its effect in the 1960s using images of cats, hence the name. The Arnold Cat transformation is used to shuffle the pixel value position of the color image, but cannot change the value of the image pixel. That is, the pixel position is transformed by Arnold Cat mapping, and the image is encrypted by scrambling. Equation (2) is used for image encry...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a video encryption method based on chaotic cipher theory and incompatible video encoding, which divides video files into video streams and audio streams: the video stream is regarded as a frame of images, and the encryption is based on 2D Arnold Cat mapping and DNA encoding technology And the Lorenz hyperchaotic system, different encryption methods are used for the Y, Cb and Cr channels of the image; the audio stream encryption uses Logistic mapping. The video stream is encrypted as ordinary image data, which enhances security compared with the selective encryption of sensitive information in the video using an encryption algorithm compatible with video coding; high-dimensional chaotic encryption is used to resist exhaustive attacks; after encryption The image is automatically synthesized into a video, which improves the disadvantage that the traditional incompatible video encoding and encryption algorithm cannot play the video after being encrypted. The invention can effectively resist various attacks such as strong attack, statistical attack and related attack.

Description

technical field [0001] The invention relates to a video encryption method incompatible with video encoding based on the theory of chaotic cryptography, which belongs to the field of video encryption. Background technique [0002] With the vigorous development of computer technology and network technology, multimedia data is becoming more and more popular and applied in the network and daily life. However, due to the openness and anonymity of the network, video streams such as digital TV, video-on-demand, and video calls are easily attacked by humans. The security of video files has always been a research focus and difficulty in recent years. [0003] According to whether the encryption algorithm is compatible with the video encoding process, the existing video encryption algorithms are divided into two types: one is the encryption algorithm that is not compatible with video encoding, and the other is the encryption algorithm that is compatible with video encoding. On the ba...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04N21/233H04N21/234H04N21/2343H04N21/2347H04N21/439H04N21/44H04N21/4402H04N21/4408H04L9/00
CPCH04L9/001H04N21/2335H04N21/23418H04N21/234309H04N21/23473H04N21/4398H04N21/44008H04N21/440218H04N21/4408
Inventor 陈力赵博汪昕蒋尚秀金鑫
Owner SHANGHAI GOLDEN BRIDGE INFOTECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products