A Video Encryption Method Against Contour Attack

An encryption method and video technology, which is applied in digital video signal modification, image communication, selective content distribution, etc. It can solve the problems that the encryption method has unsatisfactory visual effects, cannot resist MBS outline attack and traditional outline attack, and achieve superior visual encryption Effect, save format compatibility, effect of large key space

Active Publication Date: 2021-10-26
SOUTH CHINA UNIV OF TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] H.264 / AVC video encryption method based on encrypted intra prediction mode, motion vector difference and DCT coefficient proposed by Peng et al. (F.Peng, X.-q.Gong, M.Long, and X.-m. Sun, "A selective encryption scheme for protecting H.264 / AVC video in multimedia social network," Multimedia Tools and Applications, vol.76, no.3, pp.3235–3253, 2017) and Ding et al. based on changing DCT H.264 / AVC video encryption method of coefficient scan order (X.Ding, Y.Deng, G.Yang, Y.Song, D.He, and X.Sun, "Design of new scan orders for perceptual encryption of H.264 / AVC videos, "IET Information Security., vol.11, no.2, pp.55–65, 2017) are unable to resist MBS contour attacks and some traditional contour attacks on JPEG images
In addition, the visual effects of these encryption methods are not ideal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Video Encryption Method Against Contour Attack
  • A Video Encryption Method Against Contour Attack
  • A Video Encryption Method Against Contour Attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] The present invention will be further described below in conjunction with drawings and embodiments.

[0075] see Figure 1-4 , a kind of video encryption method for resisting profile attack, comprising:

[0076] S1, receive the video to be encrypted, and decode the bit stream of the video; the video to be encrypted is H.264 / AVC video, and for H.264 / AVC video files, it consists of a series of network abstractions Each network abstraction layer unit (NALU) includes a NAL header and a raw byte sequence load (RBSP), where the NALU of the video coding layer (VCL) type contains encoded video data, which can be Read out the required video corresponding information from it.

[0077] S2, obtaining the syntax element of each frame of video image after decoding; each frame of video image can be divided into I frame, P frame and B frame, and each frame can be divided into several macroblocks of 16×16 pixel size, A macroblock can be further divided into sub-macroblocks. Each cod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a video encryption method for resisting contour attacks, comprising: receiving a video to be encrypted, and decoding the bit stream of the video; dividing the macro block of the current frame into four areas, each area The macroblocks of each form a one-dimensional macroblock sequence; use the chaotic map to scramble the macroblock sequence; use 2D-LSCM to generate a chaotic sequence equal to the number of non-zero DCT coefficients in the current frame, and combine the chaotic sequence and the DCT coefficient The sign bit is encrypted by XOR operation; the syntactic elements of the macroblock changed by the encryption operation in the video to be encrypted are partially re-encoded to obtain the encrypted video bit stream, and the encryption is completed. Since the present invention implements encryption by using optimally designed macro block scrambling, it can effectively resist existing various types of contour attacks. At the same time, the encryption key of this method is related to the histogram of the number of non-zero DCT coefficients of the video frame to be encrypted, which can effectively resist the known plaintext attack.

Description

technical field [0001] The invention relates to the technical field of multimedia information security, in particular to a video encryption method for resisting contour attacks. Background technique [0002] With the advancement of digital video processing technology and the rapid development of the Internet, video, as a carrier containing rich information, has been widely used. Therefore, how to effectively protect the security and privacy of commercial or personal videos transmitted through open channels or stored in cloud storage platforms has attracted more and more attention. [0003] Video encryption is a common method for securing video content. The encryption algorithm can convert a plaintext video into a noise-like ciphertext video under the control of the key, so that only legitimate users with the key can obtain the original content of the video, while illegal users without the key can only obtain the original content of the video. Get cluttered and noisy conten...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04N21/2347H04N21/4408H04N21/266H04N19/46H04N19/70H04N19/176H04N19/625H04N19/88
CPCH04N21/2347H04N21/26613H04N21/4408H04N19/176H04N19/46H04N19/625H04N19/70H04N19/88
Inventor 何军辉赵扬
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products