CN114205624A - Video encryption method - Google Patents
Video encryption method Download PDFInfo
- Publication number
- CN114205624A CN114205624A CN202111294635.3A CN202111294635A CN114205624A CN 114205624 A CN114205624 A CN 114205624A CN 202111294635 A CN202111294635 A CN 202111294635A CN 114205624 A CN114205624 A CN 114205624A
- Authority
- CN
- China
- Prior art keywords
- video
- encryption
- dimensional array
- domain information
- encryption method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/60—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using transform coding
- H04N19/625—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using transform coding using discrete cosine transform [DCT]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/10—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
- H04N19/102—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the element, parameter or selection affected or controlled by the adaptive coding
- H04N19/103—Selection of coding mode or of prediction mode
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/10—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
- H04N19/102—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the element, parameter or selection affected or controlled by the adaptive coding
- H04N19/13—Adaptive entropy coding, e.g. adaptive variable length coding [AVLC] or context adaptive binary arithmetic coding [CABAC]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/70—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals characterised by syntax aspects related to video coding, e.g. related to compression standards
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- Discrete Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Compression Or Coding Systems Of Tv Signals (AREA)
Abstract
The invention discloses a video encryption method, which relates to the field of data encryption and comprises the following steps that S1 generates a pseudo-random number sequence as an encryption key by using AES-CTR; s2, converting the time domain information of the video to be encrypted into frequency domain information; s3, converting the two-dimensional matrix of the syntax element DCT coefficient sign in the video into a one-dimensional array by adopting a coefficient scanning mode; s4 entropy coding the one-dimensional array by CABAC method, and encrypting the Coefsign of the trailing coefficient of the one-dimensional array, wherein the encryption of the DCT coefficient sign is expressed asS5 obtaining an encrypted video; the time domain information is converted into the frequency domain information through discrete cosine transform, the quality of the video is guaranteed while the video is compressed, meanwhile, the trailing coefficients of the one-dimensional array are encrypted, the definition of the video frame is enhanced after encryption, the overall contour of the image cannot be influenced, slight interference is caused to the content of the reconstructed video, and the safety of image data is effectively guaranteed.
Description
Technical Field
The invention relates to the field of data encryption, in particular to a video encryption method.
Background
With the advent of the 5G, the Internet of things and the big data era, intelligentization and digitization have penetrated all aspects of people's life, and massive images and videos generated in the process contain a large amount of private information. If the image and video data are directly transmitted and shared on the internet without protection, privacy information can be revealed. The disclosure of information not only compromises individual privacy, but can also seriously jeopardize the interests of individuals and even groups, and conventional video image encryption techniques include global encryption techniques and selective encryption techniques. The global encryption technology is used for encrypting the whole image, can effectively guarantee the safety of the image, but has high complexity and low efficiency. With the exponential growth of image data, a large amount of data needs to be encrypted, and the global encryption method has obvious limitations and cannot meet the requirement of rapid expansion of the image data volume. The selective encryption only encrypts the interested area, and does not process other areas, so that the safety of the image data cannot be effectively guaranteed.
Disclosure of Invention
The present invention is directed to a video encryption method to solve the above problems.
The invention realizes the purpose through the following technical scheme:
a video encryption method, comprising:
s1, generating a pseudo-random number sequence as an encryption key by using AES-CTR;
s2, converting the time domain information of the video to be encrypted into frequency domain information;
s3, converting the two-dimensional matrix of the syntax element DCT coefficient sign in the video into a one-dimensional array by adopting a coefficient scanning mode;
s4, entropy coding the one-dimensional array by CABAC method, and encrypting the one-dimensional arrayThe sign Coefsign of the trailing coefficient of a group is encrypted, the encryption of the sign of the DCT coefficient is expressed as0≤Ki≤1;
And S5, obtaining the encrypted video.
The invention has the beneficial effects that: the time domain information is converted into the frequency domain information through discrete cosine transform, the quality of the video is guaranteed while the video is compressed, meanwhile, the trailing coefficients of the one-dimensional array are encrypted, the definition of the video frame is enhanced after encryption, the overall contour of the image cannot be influenced, slight interference is caused to the content of the reconstructed video, and the safety of image data is effectively guaranteed.
Drawings
FIG. 1 is a flow chart of a video encryption method of the present invention;
FIG. 2 is a video image to be encrypted;
FIG. 3 is a video image after encrypting syntax element DCT coefficient symbols;
fig. 4 is a video image with both syntax element DCT coefficient sign and luminance prediction model encrypted.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention. It is to be understood that the embodiments described are only a few embodiments of the present invention, and not all embodiments. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
In the description of the present invention, it is to be understood that the terms "upper", "lower", "inside", "outside", "left", "right", and the like, indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, or the orientations or positional relationships that the products of the present invention are conventionally placed in use, or the orientations or positional relationships that are conventionally understood by those skilled in the art, and are used for convenience of describing the present invention and simplifying the description, but do not indicate or imply that the devices or elements referred to must have a specific orientation, be constructed in a specific orientation, and be operated, and thus, should not be construed as limiting the present invention.
Furthermore, the terms "first," "second," and the like are used merely to distinguish one description from another, and are not to be construed as indicating or implying relative importance.
In the description of the present invention, it is also to be noted that, unless otherwise explicitly stated or limited, the terms "disposed" and "connected" are to be interpreted broadly, and for example, "connected" may be a fixed connection, a detachable connection, or an integral connection; can be mechanically or electrically connected; the connection may be direct or indirect via an intermediate medium, and may be a communication between the two elements. The specific meanings of the above terms in the present invention can be understood by those skilled in the art according to specific situations.
The following detailed description of embodiments of the invention refers to the accompanying drawings.
A video encryption method, comprising:
s1, generating a pseudo-random number sequence as an encryption key by using AES-CTR;
s2, converting time domain information of the video to be encrypted into frequency domain information by adopting discrete cosine transform, and setting high-frequency signals of the frequency domain information as zero;
s3, converting a two-dimensional matrix of syntax element DCT coefficient symbols in the video into a one-dimensional array by adopting a coefficient scanning mode, wherein the right side of the one-dimensional array is a trailing coefficient which comprises a high-frequency signal;
s4, entropy coding and encrypting the one-dimensional array by an encryption key in a CABAC mode, encrypting a Coefsign of a trailing coefficient of the one-dimensional array, respectively representing the positive and negative of the coefficient by adopting Coefsign ═ 1 and Coefsign ═ 0, and exchanging the positive and negative of the coefficient, wherein the encryption of the DCT coefficient sign is represented by0≤Ki≤1;
And S5, obtaining the encrypted video.
The video encryption method further includes S0, encrypting a syntax element brightness prediction model in the video, where S0 is located between S1 and S2 or between S4 and S5, and S0 specifically includes:
a. the encoder establishes a 3-bit candidate prediction mode list according to adjacent coding units, wherein the candidate prediction mode list comprises 35 prediction modes, and the types of the prediction modes comprise plane, DC and angle prediction modes;
b. the encoder traverses all the prediction modes, and the optimal prediction mode with the minimum distortion cost is calculated;
c. judging whether the optimal prediction mode is in a candidate prediction mode list, if so, entering d, otherwise, entering e;
d. by means of encryption key pair list numbers IdxEncryption is performed, the encryption process is represented as En_Idx=(Idx+Ki) % 3, wherein KiRepresents a fragment of K in the pseudorandom sequence, 0 ≦ Ki≤3;
e. Scrambling the recorded optimal prediction model into a non-optimal prediction mode, recording the scrambled candidate list numbers by an encoder and establishing a new array, and recording the list numbers IdxCarrying out encryption by the process of0≤KiLess than or equal to 31, whereinIndicating an exclusive or operation.
The technical solution of the present invention is not limited to the limitations of the above specific embodiments, and all technical modifications made according to the technical solution of the present invention fall within the protection scope of the present invention.
Claims (8)
1. A video encryption method, comprising:
s1, generating a pseudo-random number sequence as an encryption key by using AES-CTR;
s2, converting the time domain information of the video to be encrypted into frequency domain information;
s3, converting the two-dimensional matrix of the syntax element DCT coefficient sign in the video into a one-dimensional array by adopting a coefficient scanning mode;
s4, entropy coding and encrypting the one-dimensional array by CABAC method, and encrypting the Coefsign of the trailing coefficient of the one-dimensional array, wherein the encryption of the DCT coefficient sign is expressed as0≤Ki≤1;
And S5, obtaining the encrypted video.
2. The video encryption method according to claim 1, wherein a discrete cosine transform is used to convert time domain information of the video to be encrypted into frequency domain information in S2.
3. The video encryption method according to claim 2, further comprising setting the high frequency signal of the frequency domain information to zero at S2.
4. The video encryption method according to claim 3, wherein in S3, when converting the two-dimensional matrix into the one-dimensional array, trailing coefficients are provided on the right side of the one-dimensional array, and the trailing coefficients include high-frequency signals.
5. The video encryption method according to claim 1, wherein in S4, when the sign Coefsign of the trailing coefficient of the one-dimensional array is encrypted, Coefsign-1 and Coefsign-0 are used to respectively represent positive and negative of the coefficient, and then they are exchanged.
6. The video encryption method of claim 1, wherein the video encryption method further comprises encrypting a syntax element luma prediction model in the video at S0, wherein S0 is located between S1 and S2 or between S4 and S5.
7. The video encryption method according to claim 6, wherein S0 includes:
a. the encoder establishes a 3-bit candidate prediction mode list according to adjacent coding units, wherein the candidate prediction mode list comprises 35 prediction modes, and the types of the prediction modes comprise plane, DC and angle prediction modes;
b. the encoder traverses all the prediction modes, and the optimal prediction mode with the minimum distortion cost is calculated;
c. judging whether the optimal prediction mode is in a candidate prediction mode list, if so, entering d, otherwise, entering e;
d. to list number IdxEncryption is performed, the encryption process is represented as En_Idx=(Idx+Ki) % 3, wherein KiRepresents a fragment of K in the pseudorandom sequence, 0 ≦ Ki≤3;
8. The video encryption method of claim 6, wherein in e, the encoder creates a new array to record the scrambled candidate list numbers.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111294635.3A CN114205624A (en) | 2021-11-03 | 2021-11-03 | Video encryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111294635.3A CN114205624A (en) | 2021-11-03 | 2021-11-03 | Video encryption method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114205624A true CN114205624A (en) | 2022-03-18 |
Family
ID=80646712
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111294635.3A Pending CN114205624A (en) | 2021-11-03 | 2021-11-03 | Video encryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114205624A (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102843558A (en) * | 2012-08-21 | 2012-12-26 | 中国电子科技集团公司第三十八研究所 | H.264/AVC (Advanced Video Coding) compressed domain video encryption/decryption device and encryption/decryption method thereof |
CN103826128A (en) * | 2014-02-25 | 2014-05-28 | 宁波工程学院 | Encryption domain H.264/AVC video reversible data hiding method |
CN104038761A (en) * | 2014-06-05 | 2014-09-10 | 宁波工程学院 | Encrypted domain H.264/AVC video data hiding method based on CABAC binary string mapping |
CN108322750A (en) * | 2018-01-15 | 2018-07-24 | 宁波工程学院 | Encrypted domain HEVC video data hidden methods based on residual error coefficient modulation |
CN108833924A (en) * | 2018-06-22 | 2018-11-16 | 东北大学 | It is a kind of based on more security level video encryption algorithms H.265 |
CN109167999A (en) * | 2018-09-04 | 2019-01-08 | 宁波工程学院 | A kind of HEVC video-encryption and decryption method |
CN110677694A (en) * | 2019-10-15 | 2020-01-10 | 华南理工大学 | Video encryption method for resisting contour attack |
AU2020100421A4 (en) * | 2020-03-19 | 2020-04-30 | Yuming Fang | A multi-level encryption scheme for H.265/HEVC based on syntax elements scrambling |
-
2021
- 2021-11-03 CN CN202111294635.3A patent/CN114205624A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102843558A (en) * | 2012-08-21 | 2012-12-26 | 中国电子科技集团公司第三十八研究所 | H.264/AVC (Advanced Video Coding) compressed domain video encryption/decryption device and encryption/decryption method thereof |
CN103826128A (en) * | 2014-02-25 | 2014-05-28 | 宁波工程学院 | Encryption domain H.264/AVC video reversible data hiding method |
CN104038761A (en) * | 2014-06-05 | 2014-09-10 | 宁波工程学院 | Encrypted domain H.264/AVC video data hiding method based on CABAC binary string mapping |
CN108322750A (en) * | 2018-01-15 | 2018-07-24 | 宁波工程学院 | Encrypted domain HEVC video data hidden methods based on residual error coefficient modulation |
CN108833924A (en) * | 2018-06-22 | 2018-11-16 | 东北大学 | It is a kind of based on more security level video encryption algorithms H.265 |
CN109167999A (en) * | 2018-09-04 | 2019-01-08 | 宁波工程学院 | A kind of HEVC video-encryption and decryption method |
CN110677694A (en) * | 2019-10-15 | 2020-01-10 | 华南理工大学 | Video encryption method for resisting contour attack |
AU2020100421A4 (en) * | 2020-03-19 | 2020-04-30 | Yuming Fang | A multi-level encryption scheme for H.265/HEVC based on syntax elements scrambling |
Non-Patent Citations (1)
Title |
---|
WENYING WEN ET AL: "A multi-level approach with visual information for encrypted H.265/HEVC videos", pages 4, Retrieved from the Internet <URL:https://arxiv.org/pdf/2011.02620.pdf> * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sirichotedumrong et al. | Grayscale-based block scrambling image encryption using ycbcr color space for encryption-then-compression systems | |
Dalal et al. | A survey on information hiding using video steganography | |
CN111050022B (en) | High-security image transmission system and method | |
Mohanty et al. | SBPG: secure better portable graphics for trustworthy media communications in the IoT | |
Abdmouleh et al. | A novel selective encryption DWT-based algorithm for medical images | |
Zhang et al. | Harnessing the hybrid cloud for secure big image data service | |
Elkamchouchi et al. | New video encryption schemes based on chaotic maps | |
Wang et al. | Anti-HEVC recompression video watermarking algorithm based on the all phase biorthogonal transform and SVD | |
Luo et al. | Color transfer in visual cryptography | |
CN112839244B (en) | Monitoring video grading encryption and decryption method and system based on code stream grade | |
Maurya et al. | An extended visual cryptography technique for medical image security | |
Awadh et al. | Hybrid information security system via combination of compression, cryptography, and image steganography | |
Yang et al. | Efficient color image encryption by color-grayscale conversion based on steganography | |
Li et al. | Medical images lossless recovery based on POB number system and image compression | |
Ahmad et al. | Encryption-then-compression system for cloud-based medical image services | |
Sharma et al. | A single watermark based scheme for both protection and authentication of identities | |
CN114205624A (en) | Video encryption method | |
Jin et al. | H. 264/AVC video encryption algorithm based on integer dynamic cross-coupling tent mapping model | |
Ruchaud et al. | JPEG‐based scalable privacy protection and image data utility preservation | |
KR100381204B1 (en) | The encoding and decoding method for a colored freeze frame | |
Ammous et al. | Encryption of lossless coded videos | |
JP2004135254A (en) | Image processing unit | |
Huang et al. | A video steganography scheme based on post-quantum cryptography | |
JP2000307879A (en) | Method and device for color image communication | |
Yan et al. | Partial encryption of JPEG2000 images based on EBCOT |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |