Video encryption method for resisting contour attacks

An encryption method and video technology, which are applied in the fields of digital video signal modification, image communication, selective content distribution, etc., can solve the problems that the visual effect of the encryption method is not ideal and cannot resist MBS contour attack and traditional contour attack.

Active Publication Date: 2020-01-10
SOUTH CHINA UNIV OF TECH
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] H.264/AVC video encryption method based on encrypted intra prediction mode, motion vector difference and DCT coefficient proposed by Peng et al. (F.Peng, X.-q.Gong, M.Long, and X.-m. Sun, "A selective encryption scheme for protecting H.264/AVC video in multimedia social network," Multimedia Tools and Applications, vol.76, no.3, pp.3235–3253, 2017) and Ding et al. based on changing DCT H.264/

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Video encryption method for resisting contour attacks
  • Video encryption method for resisting contour attacks
  • Video encryption method for resisting contour attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] The present invention will be further described below in conjunction with drawings and embodiments.

[0075] see Figure 1-4 , a kind of video encryption method for resisting profile attack, comprising:

[0076] S1, receive the video to be encrypted, and decode the bit stream of the video; the video to be encrypted is H.264 / AVC video, and for H.264 / AVC video files, it consists of a series of network abstractions Each network abstraction layer unit (NALU) includes a NAL header and a raw byte sequence load (RBSP), where the NALU of the video coding layer (VCL) type contains encoded video data, which can be Read out the required video corresponding information from it.

[0077] S2, obtaining the syntax element of each frame of video image after decoding; each frame of video image can be divided into I frame, P frame and B frame, and each frame can be divided into several macroblocks of 16×16 pixel size, A macroblock can be further divided into sub-macroblocks. Each cod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a video encryption method for resisting contour attacks, which comprises the following steps of receiving a video to be encrypted, and decoding a bit stream of the video; dividing the macro block of the current frame into four regions, wherein the macro blocks in each region respectively form a one-dimensional macro block sequence; scrambling the macro block sequence by using chaotic mapping; using a 2D-LSCM for generating chaotic sequences with the number equal to that of non-zero DCT coefficients of the current frame, and conducting exclusive-OR operation encryption on the chaotic sequences and sign bits of the DCT coefficients; and performing partial recoding on syntax elements of the macro block changed by the encryption operation in the to-be-encrypted video toobtain an encrypted video bit stream, thereby finishing encryption. According to the invention, encryption is realized by using optimally designed macro block scrambling, so that various types of existing contour attacks can be effectively resisted. Meanwhile, the encryption key of the method is related to the non-zero DCT coefficient quantity histogram of the video frame to be encrypted, so thatthe known plaintext attack can be effectively resisted.

Description

technical field [0001] The invention relates to the technical field of multimedia information security, in particular to a video encryption method for resisting contour attacks. Background technique [0002] With the advancement of digital video processing technology and the rapid development of the Internet, video, as a carrier containing rich information, has been widely used. Therefore, how to effectively protect the security and privacy of commercial or personal videos transmitted through open channels or stored in cloud storage platforms has attracted more and more attention. [0003] Video encryption is a common method for securing video content. The encryption algorithm can convert a plaintext video into a noise-like ciphertext video under the control of the key, so that only legitimate users with the key can obtain the original content of the video, while illegal users without the key can only obtain the original content of the video. Get cluttered and noisy conten...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04N21/2347H04N21/4408H04N21/266H04N19/46H04N19/70H04N19/176H04N19/625H04N19/88
CPCH04N21/2347H04N21/26613H04N21/4408H04N19/176H04N19/46H04N19/625H04N19/70H04N19/88
Inventor 何军辉赵扬
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products