CN108881953B - Video encryption method and device - Google Patents

Video encryption method and device Download PDF

Info

Publication number
CN108881953B
CN108881953B CN201810700751.2A CN201810700751A CN108881953B CN 108881953 B CN108881953 B CN 108881953B CN 201810700751 A CN201810700751 A CN 201810700751A CN 108881953 B CN108881953 B CN 108881953B
Authority
CN
China
Prior art keywords
key
image
gray
array
video file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810700751.2A
Other languages
Chinese (zh)
Other versions
CN108881953A (en
Inventor
周大程
孟超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Galaxy Vr Technology Beiijng Co ltd
Original Assignee
Galaxy Vr Technology Beiijng Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Galaxy Vr Technology Beiijng Co ltd filed Critical Galaxy Vr Technology Beiijng Co ltd
Priority to CN201810700751.2A priority Critical patent/CN108881953B/en
Publication of CN108881953A publication Critical patent/CN108881953A/en
Application granted granted Critical
Publication of CN108881953B publication Critical patent/CN108881953B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4408Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The invention discloses a video encryption method and device, and relates to the technical field of computers. One embodiment of the method comprises: receiving a video file, extracting an image of one frame of the video file, and dividing the image to move a boundary to obtain an offset array and an offset image; acquiring a corresponding gray level array according to the offset array so as to encrypt the gray level data; converting the encrypted gray array into an image to be covered on the shifted image so as to generate a new image; and when all frames of the video file have corresponding new images, generating a new video file. The embodiment can solve the technical problem that no VR video is encrypted in the prior art.

Description

Video encryption method and device
Technical Field
The invention relates to the technical field of computers, in particular to a video encryption method and device.
Background
At present, more and more people watch VR video, experience the effect of watching that VR video brought. Therefore, the production, distribution and popularization of the VR video are greatly promoted. The VR video refers to a video actually recorded in a field environment by people using a professional VR photography function.
In the process of implementing the invention, the inventor finds that at least the following problems exist in the prior art: at present, except for an encryption scheme of a common video, no special encryption technology for a VR video exists.
Disclosure of Invention
In view of this, embodiments of the present invention provide a video encryption method and apparatus, which can solve the technical problem in the prior art that no VR video is encrypted.
To achieve the above object, according to an aspect of the embodiments of the present invention, there is provided a video encryption method, including receiving a video file, extracting an image of one frame of the video file, dividing the image to move a boundary, and obtaining an offset array and an offset image; acquiring a corresponding gray level array according to the offset array so as to encrypt the gray level data; converting the encrypted gray array into an image to be covered on the shifted image so as to generate a new image; and when all frames of the video file have corresponding new images, generating a new video file.
Optionally, encrypting the grayscale data includes:
obtaining at least two random numbers by using a random number generator, and adding the at least two random numbers into a preset preparation key set;
and selecting one prepared key as a formal key from the prepared key set, and encrypting the gray array by the formal key.
Optionally, each provisioning key is ordered in a set of provisioning keys, each provisioning key having its corresponding sequence number;
encrypting the gray data, further comprising:
acquiring a serial number of a prepared key as a formal key;
and setting the serial number of the formal key at the forefront of the encrypted gray array.
Optionally, the method further comprises:
and updating the serial number corresponding to the prepared key in the prepared key set in preset time.
Optionally, the method further comprises:
and obtaining at least two random numbers by using the random number generator for multiple times, and adding the at least two random numbers into a preset prepared key set so as to update the prepared key set.
In addition, according to an aspect of the embodiments of the present invention, there is provided a video encryption apparatus, including a segmentation module, configured to receive a video file, extract an image of one frame of the video file, segment the image to move a boundary, and obtain an offset array and an offset image; the encryption module is used for obtaining a corresponding gray array according to the offset array so as to encrypt the gray data; converting the encrypted gray array into an image to be covered on the shifted image so as to generate a new image; and the generating module is used for generating a new video file when all frames of the video file have corresponding new images.
Optionally, the encrypting module encrypts the grayscale data, including:
obtaining at least two random numbers by using a random number generator, and adding the at least two random numbers into a preset preparation key set;
and selecting one prepared key as a formal key from the prepared key set, and encrypting the gray array by the formal key.
Optionally, each provisioning key is ordered in a set of provisioning keys, each provisioning key having its corresponding sequence number;
the encryption module encrypts the gray data, and further comprises:
acquiring a serial number of a prepared key as a formal key;
and setting the serial number of the formal key at the forefront of the encrypted gray array.
Optionally, the encryption module is further configured to:
and updating the serial number corresponding to the prepared key in the prepared key set in preset time.
Optionally, the encryption module is further configured to:
and obtaining at least two random numbers by using the random number generator for multiple times, and adding the at least two random numbers into a preset prepared key set so as to update the prepared key set.
According to another aspect of the embodiments of the present invention, there is also provided an electronic device, including:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the method of any of the video encryption embodiments described above.
According to another aspect of the embodiments of the present invention, there is also provided a computer readable medium, on which a computer program is stored, which when executed by a processor, implements the method of any of the above-described video encryption embodiments.
Further effects of the above-mentioned non-conventional alternatives will be described below in connection with the embodiments.
Drawings
The drawings are included to provide a better understanding of the invention and are not to be construed as unduly limiting the invention. Wherein:
fig. 1 is a schematic diagram of a main flow of a video encryption method according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a main flow of a video encryption method according to a referential embodiment of the present invention;
fig. 3 is a schematic diagram of main blocks of a video encryption apparatus according to an embodiment of the present invention;
FIG. 4 is an exemplary system architecture diagram in which embodiments of the present invention may be employed;
fig. 5 is a schematic block diagram of a computer system suitable for use in implementing a terminal device or server of an embodiment of the invention.
Detailed Description
Exemplary embodiments of the present invention are described below with reference to the accompanying drawings, in which various details of embodiments of the invention are included to assist understanding, and which are to be considered as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
Fig. 1 is a method for video security according to an embodiment of the present invention, and as shown in fig. 1, the video encryption method includes:
step S101, receiving a video file, extracting an image of one frame, and dividing the image to move a boundary to obtain an offset array and an offset image.
Wherein the shifted image is an image finally obtained after being subjected to at least two segmentations and shifts.
And S102, acquiring a corresponding gray array according to the offset array so as to encrypt the gray data.
Preferably, at least two random numbers are obtained by the random number generator and added to the preset preliminary key set. And then, selecting one prepared key from the prepared key set as a formal key, and encrypting the gray array through the formal key. Further, at least two random numbers are obtained by using the random number generator for multiple times and added into a preset prepared key set so as to update the prepared key set.
Preferably, each provisioning key is ordered in a set of provisioning keys, each provisioning key having its corresponding sequence number.
Further, when the gray data is encrypted, a serial number of a spare key serving as a main key may be acquired, and the serial number of the main key may be set at the forefront of the encrypted gray array.
Furthermore, at a preset time, the serial numbers corresponding to the spare keys in the spare key set are updated.
And step S103, converting the encrypted gray array into an image and covering the image on the shifted image to generate a new image.
And step S104, when all frames of the video file have corresponding new images, generating a new video file.
Fig. 2 is a video encryption method according to a referential embodiment of the present invention, and as shown in fig. 2, the video encryption method may include:
step S201, receiving a video file, extracting an image of one frame, dividing the image into two blocks, moving a boundary of the division, and recording an offset.
Step S202, repeat step S201 until obtaining the offset array [ a1, a2, a3. ], and save the offset image.
In an embodiment, an offset array [ a1, a2, a3. ], wherein if a1<0, it indicates a left shift or indicates an upward shift; if a1>0, this indicates a rightward movement or a downward movement.
It should be noted that, before encrypting and decrypting the video file, the moving direction sequence, that is, the moving direction in the offset array, is set in advance. For example: the order of presetting the moving direction is as follows: left, right, up, down, left, right … ….
It should be noted that, before encrypting and decrypting the video file, a sequential splitting manner is preset, for example: the preset sequential segmentation mode is as follows: a middle longitudinal split, a right middle longitudinal split, a left middle longitudinal split, and a leftmost middle transverse split … ….
Preferably, a division number may be set, for example, 15 times, so as to obtain an array including 15 numbers.
Preferably, for storage convenience, the value of each datum in the offset array is between 0 and 62.
Step S203, obtaining a corresponding gray array according to the offset array.
As an example, the percentage b of the shift amount to the entire width of the shifted image after each shift needs to be calculated and saved. The specific calculation can then be given by the following formula:
the percentage of the offset to the entire width of the shifted image ═ constant [ (offset-half of maximum offset)/half of maximum offset ] } constant
Wherein, the constant can be 20%.
For example: each data value in the offset array is between 0 and 62, then the offset is 20% of the total width of the image after the offset, b, [ (a-31)/31], where 0 represents a shift of-20% (left or up shift), 31 represents no change, and 62 represents a shift of 20% (right or down shift).
Further, each movement can be represented by a pixel whose gray scale represents the percentage b of the movement. For example: the percentage b is between 0 and 62, and the gray value of one pixel point can be represented as a number between 0 and 62, so that the percentage b of the offset and the whole width of the offset image can be represented by one pixel point.
Preferably, the gray data can be represented by 64-level gray or 256-level gray according to different formats of video.
Step S204, at least two random numbers are obtained by the random number generator and added into a preset preparation key set.
For example: 64 random numbers may be generated.
In step S205, one spare key is selected as a formal key in the spare key set, and a serial number of the spare key is obtained.
Wherein each provisioning key is ordered in the set of provisioning keys, i.e., each provisioning key has its corresponding sequence number.
And S206, encrypting the gray array through the formal key.
Preferably, an AES encryption algorithm is employed. The AES Encryption algorithm is Advanced Encryption Standard (AES) in cryptography, also called Rijndael Encryption method, and is a block Encryption Standard adopted by the federal government in the united states.
Step S207, the serial number of the formal key is set at the forefront of the encrypted gray array, and then stored as a rectangular image.
For example, the following steps are carried out: the serial number of the formal key is 20 (20 th), if the gray scale of the point in the set rectangular image has 64 levels, the gray scale of the 1 st point is 20 (serial number), the gray scale of the 2 nd point is the first gray scale data of the encrypted gray scale array, and so on, the rectangular image size is 16x 1.
Step S208, overlay the rectangular image to the upper left part of the shifted image to generate a new image.
As an example, the first row of pixels at the upper end of the rectangular image may be overlaid with the first row of pixels at the upper end of the shifted image, and the first pixel at the first row at the upper end of the rectangular image may be overlaid with the first pixel at the first row at the upper end of the shifted image. For example: the rectangular image size is: 30 x 1, then the first 30 pixels of the first row at the top of the shifted image are covered.
Step S209 determines whether all frames of the video file have been encrypted, if so, step S210 is performed, otherwise, step S201 is returned to.
Step S210, generating a new video file according to a new image corresponding to each frame and publishing the new video file.
In an embodiment, the image proportion of each frame of the new video is distorted, which can seriously affect the viewing experience, especially when the VR video is viewed, so that the VR video is well encrypted. It should be noted that the video encryption method of the present invention can also be applied to commonly used videos.
As another example, step S204 and step S205 may be performed multiple times to update the provisioning keys in the provisioning key set. Furthermore, the serial numbers corresponding to the spare keys in the spare key set can be updated, for example, the keys are replaced every 3 seconds, so that the situation that the key is easy to crack when a single key is used is prevented.
Fig. 3 is a video encryption apparatus according to an embodiment of the present invention, and as shown in fig. 3, the video encryption apparatus 300 includes a segmentation module 301, an encryption module 302, and a generation module 303. The segmentation module 301 receives a video file, extracts an image of one frame, and segments the image to move a boundary, thereby obtaining an offset array and an offset image. The encryption module 302 obtains a corresponding gray array according to the offset array to encrypt the gray data; and converting the encrypted gray array into an image to be covered on the shifted image so as to generate a new image. The generating module 303 generates a new video file when all frames of the video file have corresponding new images.
It should be noted that, in the implementation of the video encryption apparatus of the present invention, details have been described in the above video encryption method, and therefore, the repeated description is not repeated here.
Fig. 4 shows an exemplary system architecture 400 to which the video encryption method or video encryption apparatus of the present invention may be applied.
As shown in fig. 4, the system architecture 400 may include terminal devices 401, 402, 403, a network 404, and a server 405. The network 404 serves as a medium for providing communication links between the terminal devices 401, 402, 403 and the server 405. Network 404 may include various types of connections, such as wire, wireless communication links, or fiber optic cables, to name a few.
A user may use terminal devices 401, 402, 403 to interact with a server 405 over a network 404 to receive or send messages or the like. The terminal devices 401, 402, 403 may have installed thereon various communication client applications, such as shopping-like applications, web browser applications, search-like applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only).
The terminal devices 401, 402, 403 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 405 may be a server providing various services, such as a background management server (for example only) providing support for shopping websites browsed by users using the terminal devices 401, 402, 403. The backend management server may analyze and perform other processing on the received data such as the product information query request, and feed back a processing result (for example, target push information, product information — just an example) to the terminal device.
It should be noted that the video encryption method provided by the embodiment of the present invention is generally executed by the server 405, and accordingly, the video encryption apparatus is generally disposed in the server 405.
It should be understood that the number of terminal devices, networks, and servers in fig. 4 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Referring now to FIG. 5, shown is a block diagram of a computer system 500 suitable for use with a terminal device implementing an embodiment of the present invention. The terminal device shown in fig. 5 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present invention.
As shown in fig. 5, the computer system 500 includes a Central Processing Unit (CPU)501 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)502 or a program loaded from a storage section 508 into a Random Access Memory (RAM) 503. In the RAM503, various programs and data necessary for the operation of the system 500 are also stored. The CPU501, ROM 502, and RAM503 are connected to each other via a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
To the I/O interface 505, AN input section 506 including a keyboard, a mouse, and the like, AN output section 507 including a keyboard such as a Cathode Ray Tube (CRT), a liquid crystal display (L CD), and the like, a speaker, and the like, a storage section 508 including a hard disk and the like, and a communication section 509 including a network interface card such as a L AN card, a modem, and the like, the communication section 509 performs communication processing via a network such as the internet, a drive 510 is also connected to the I/O interface 505 as necessary, a removable medium 511 such as a magnetic disk, AN optical disk, a magneto-optical disk, a semiconductor memory, and the like is mounted on the drive 510 as necessary, so that a computer program read out therefrom is mounted into the storage section 508 as necessary.
In particular, according to the embodiments of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 509, and/or installed from the removable medium 511. The computer program performs the above-described functions defined in the system of the present invention when executed by the Central Processing Unit (CPU) 501.
It should be noted that the computer readable medium shown in the present invention can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present invention, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present invention, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The modules described in the embodiments of the present invention may be implemented by software or hardware. The described modules may also be provided in a processor, which may be described as: a processor includes a partitioning module, an encryption module, and a generation module. Wherein the names of the modules do not in some cases constitute a limitation of the module itself.
As another aspect, the present invention also provides a computer-readable medium that may be contained in the apparatus described in the above embodiments; or may be separate and not incorporated into the device. The computer readable medium carries one or more programs which, when executed by a device, cause the device to comprise: receiving a video file, extracting an image of one frame of the video file, and dividing the image to move a boundary to obtain an offset array and an offset image; acquiring a corresponding gray level array according to the offset array so as to encrypt the gray level data; converting the encrypted gray array into an image to be covered on the shifted image so as to generate a new image; and when all frames of the video file have corresponding new images, generating a new video file.
According to the technical scheme of the embodiment of the invention, the technical problem that no VR video is encrypted in the prior art can be solved.
The above-described embodiments should not be construed as limiting the scope of the invention. Those skilled in the art will appreciate that various modifications, combinations, sub-combinations, and substitutions can occur, depending on design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (8)

1. A method for video encryption, comprising:
receiving a video file, extracting an image of one frame of the video file, and dividing the image to move a boundary to obtain an offset array and an offset image;
acquiring a corresponding gray level array according to the offset array so as to encrypt the gray level data; wherein encrypting the gray scale data comprises:
obtaining at least two random numbers by using a random number generator, and adding the at least two random numbers into a preset preparation key set; selecting a prepared key as a formal key from the prepared key set, and encrypting the gray array through the formal key;
converting the encrypted gray array into an image to be covered on the shifted image so as to generate a new image;
and when all frames of the video file have corresponding new images, generating a new video file.
2. The method of claim 1, wherein each preliminary key is ordered in a set of preliminary keys, each preliminary key having its corresponding sequence number;
encrypting the gray data, further comprising:
acquiring a serial number of a prepared key as a formal key;
and setting the serial number of the formal key at the forefront of the encrypted gray array.
3. The method of claim 2, further comprising:
and updating the serial number corresponding to the prepared key in the prepared key set in preset time.
4. The method of claim 1, further comprising:
and obtaining at least two random numbers by using the random number generator for multiple times, and adding the at least two random numbers into a preset prepared key set so as to update the prepared key set.
5. A video encryption apparatus, comprising:
the segmentation module is used for receiving the video file, extracting the image of one frame of the video file, segmenting the image to move a boundary, and obtaining an offset array and an offset image;
the encryption module is used for obtaining a corresponding gray array according to the offset array so as to encrypt the gray data; converting the encrypted gray array into an image to be covered on the shifted image so as to generate a new image; wherein, the encryption module encrypts the gray data, including:
obtaining at least two random numbers by using a random number generator, and adding the at least two random numbers into a preset preparation key set; selecting a prepared key as a formal key from the prepared key set, and encrypting the gray array through the formal key;
and the generating module is used for generating a new video file when all frames of the video file have corresponding new images.
6. The apparatus of claim 5, wherein each provisioning key is ordered in a set of provisioning keys, each provisioning key having its corresponding sequence number;
the encryption module encrypts the gray data, and further comprises:
acquiring a serial number of a prepared key as a formal key;
and setting the serial number of the formal key at the forefront of the encrypted gray array.
7. The apparatus of claim 6, wherein the encryption module is further configured to:
and updating the serial number corresponding to the prepared key in the prepared key set in preset time.
8. The apparatus of claim 5, wherein the encryption module is further configured to:
and obtaining at least two random numbers by using the random number generator for multiple times, and adding the at least two random numbers into a preset prepared key set so as to update the prepared key set.
CN201810700751.2A 2018-06-29 2018-06-29 Video encryption method and device Active CN108881953B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810700751.2A CN108881953B (en) 2018-06-29 2018-06-29 Video encryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810700751.2A CN108881953B (en) 2018-06-29 2018-06-29 Video encryption method and device

Publications (2)

Publication Number Publication Date
CN108881953A CN108881953A (en) 2018-11-23
CN108881953B true CN108881953B (en) 2020-07-31

Family

ID=64297481

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810700751.2A Active CN108881953B (en) 2018-06-29 2018-06-29 Video encryption method and device

Country Status (1)

Country Link
CN (1) CN108881953B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114390318B (en) * 2022-01-25 2022-12-02 南京曹操云控网络科技有限公司 User data encryption and decryption method and device and electronic equipment

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101489123A (en) * 2008-01-15 2009-07-22 中国科学院软件研究所 Digital video content fast protection and deprotection method
CN102156751A (en) * 2011-04-26 2011-08-17 深圳市迅雷网络技术有限公司 Method and device for extracting video fingerprint
CN105208404A (en) * 2015-08-26 2015-12-30 北京新东方迅程网络科技有限公司 Video encryption and decryption method and device
CN105830134A (en) * 2013-12-16 2016-08-03 来特荣国际有限公司 Method and device for compressing and expanding image intended for encrypted communication, program, and storage medium
CN105848010A (en) * 2016-03-31 2016-08-10 天津大学 Mobile device video watermark embedding and extracting method based on block combination
CN105933101A (en) * 2016-03-31 2016-09-07 东南大学 Fully homomorphic encryption public key compression method based on parameter high power offset
CN106131603A (en) * 2016-08-23 2016-11-16 北京永信至诚科技股份有限公司 A kind of video broadcasting method based on dynamic dictionary and system
CN106254895A (en) * 2016-07-21 2016-12-21 重庆科技学院 A kind of for audio frequency and video Mp4 file encryption decryption system
CN106407824A (en) * 2016-09-28 2017-02-15 重庆第二师范学院 Image encryption method and device
CN108173640A (en) * 2017-12-11 2018-06-15 上海高顿教育培训有限公司 The character string symmetric cryptography and decryption method of a kind of high security

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8214655B2 (en) * 2002-03-29 2012-07-03 Kabushiki Kaisha Toshiba Data structure of multimedia file format, encrypting method and device thereof, and decrypting method and device thereof

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101489123A (en) * 2008-01-15 2009-07-22 中国科学院软件研究所 Digital video content fast protection and deprotection method
CN102156751A (en) * 2011-04-26 2011-08-17 深圳市迅雷网络技术有限公司 Method and device for extracting video fingerprint
CN105830134A (en) * 2013-12-16 2016-08-03 来特荣国际有限公司 Method and device for compressing and expanding image intended for encrypted communication, program, and storage medium
CN105208404A (en) * 2015-08-26 2015-12-30 北京新东方迅程网络科技有限公司 Video encryption and decryption method and device
CN105848010A (en) * 2016-03-31 2016-08-10 天津大学 Mobile device video watermark embedding and extracting method based on block combination
CN105933101A (en) * 2016-03-31 2016-09-07 东南大学 Fully homomorphic encryption public key compression method based on parameter high power offset
CN106254895A (en) * 2016-07-21 2016-12-21 重庆科技学院 A kind of for audio frequency and video Mp4 file encryption decryption system
CN106131603A (en) * 2016-08-23 2016-11-16 北京永信至诚科技股份有限公司 A kind of video broadcasting method based on dynamic dictionary and system
CN106407824A (en) * 2016-09-28 2017-02-15 重庆第二师范学院 Image encryption method and device
CN108173640A (en) * 2017-12-11 2018-06-15 上海高顿教育培训有限公司 The character string symmetric cryptography and decryption method of a kind of high security

Also Published As

Publication number Publication date
CN108881953A (en) 2018-11-23

Similar Documents

Publication Publication Date Title
CN108965098B (en) Message pushing method, device, medium and electronic equipment based on online live broadcast
CN111815738B (en) Method and device for constructing map
CN111191255A (en) Information encryption processing method, server, terminal, device and storage medium
KR101437843B1 (en) Font processing method for maintaining document layout, and computer-readable recording medium with font processing program for the same
CN111339206A (en) Data sharing method and device based on block chain
CN113656713B (en) Network resource processing method, device and system
CN111161072A (en) Block chain-based random number generation method, equipment and storage medium
CN108881953B (en) Video encryption method and device
CN108882029B (en) Video decryption method and device
CN116010678B (en) Method, device and equipment for inquiring trace
CN111949678A (en) Method and device for processing non-accumulation indexes across time windows
CN111030930B (en) Decentralized network data fragment transmission method, device, equipment and medium
CN109657481B (en) Data management method and device
CN111131270B (en) Data encryption and decryption method and device, electronic equipment and storage medium
CN112242978B (en) Method and device for processing data
CN113284174A (en) Method and device for processing pictures
CN115982109B (en) Data synchronization method, device, electronic equipment and computer readable medium
CN110633273A (en) Authority management method and device
CN110619218B (en) Method and apparatus for generating information
CN113473179B (en) Video processing method, device, electronic equipment and medium
CN114692100A (en) Digital watermark adding and extracting method and device, electronic equipment and readable medium
CN113822783A (en) Watermark adding method and device
CN114565871A (en) Video processing method and device
CN113127504A (en) Business data display method and device
CN113449228A (en) Page rendering method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant