CN114205624A - Video encryption method - Google Patents

Video encryption method Download PDF

Info

Publication number
CN114205624A
CN114205624A CN202111294635.3A CN202111294635A CN114205624A CN 114205624 A CN114205624 A CN 114205624A CN 202111294635 A CN202111294635 A CN 202111294635A CN 114205624 A CN114205624 A CN 114205624A
Authority
CN
China
Prior art keywords
video
encryption
dimensional array
domain information
encryption method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111294635.3A
Other languages
Chinese (zh)
Inventor
罗超
廖长明
敬志坚
庄永忠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Ding An Hua Wisdom Internet Of Things Co ltd
Original Assignee
Chengdu Ding An Hua Wisdom Internet Of Things Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Ding An Hua Wisdom Internet Of Things Co ltd filed Critical Chengdu Ding An Hua Wisdom Internet Of Things Co ltd
Priority to CN202111294635.3A priority Critical patent/CN114205624A/en
Publication of CN114205624A publication Critical patent/CN114205624A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/60Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using transform coding
    • H04N19/625Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using transform coding using discrete cosine transform [DCT]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/10Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
    • H04N19/102Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the element, parameter or selection affected or controlled by the adaptive coding
    • H04N19/103Selection of coding mode or of prediction mode
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/10Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
    • H04N19/102Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the element, parameter or selection affected or controlled by the adaptive coding
    • H04N19/13Adaptive entropy coding, e.g. adaptive variable length coding [AVLC] or context adaptive binary arithmetic coding [CABAC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/70Methods or arrangements for coding, decoding, compressing or decompressing digital video signals characterised by syntax aspects related to video coding, e.g. related to compression standards

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • Discrete Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Compression Or Coding Systems Of Tv Signals (AREA)

Abstract

The invention discloses a video encryption method, which relates to the field of data encryption and comprises the following steps that S1 generates a pseudo-random number sequence as an encryption key by using AES-CTR; s2, converting the time domain information of the video to be encrypted into frequency domain information; s3, converting the two-dimensional matrix of the syntax element DCT coefficient sign in the video into a one-dimensional array by adopting a coefficient scanning mode; s4 entropy coding the one-dimensional array by CABAC method, and encrypting the Coefsign of the trailing coefficient of the one-dimensional array, wherein the encryption of the DCT coefficient sign is expressed as
Figure DDA0003336086040000011
S5 obtaining an encrypted video; the time domain information is converted into the frequency domain information through discrete cosine transform, the quality of the video is guaranteed while the video is compressed, meanwhile, the trailing coefficients of the one-dimensional array are encrypted, the definition of the video frame is enhanced after encryption, the overall contour of the image cannot be influenced, slight interference is caused to the content of the reconstructed video, and the safety of image data is effectively guaranteed.

Description

Video encryption method
Technical Field
The invention relates to the field of data encryption, in particular to a video encryption method.
Background
With the advent of the 5G, the Internet of things and the big data era, intelligentization and digitization have penetrated all aspects of people's life, and massive images and videos generated in the process contain a large amount of private information. If the image and video data are directly transmitted and shared on the internet without protection, privacy information can be revealed. The disclosure of information not only compromises individual privacy, but can also seriously jeopardize the interests of individuals and even groups, and conventional video image encryption techniques include global encryption techniques and selective encryption techniques. The global encryption technology is used for encrypting the whole image, can effectively guarantee the safety of the image, but has high complexity and low efficiency. With the exponential growth of image data, a large amount of data needs to be encrypted, and the global encryption method has obvious limitations and cannot meet the requirement of rapid expansion of the image data volume. The selective encryption only encrypts the interested area, and does not process other areas, so that the safety of the image data cannot be effectively guaranteed.
Disclosure of Invention
The present invention is directed to a video encryption method to solve the above problems.
The invention realizes the purpose through the following technical scheme:
a video encryption method, comprising:
s1, generating a pseudo-random number sequence as an encryption key by using AES-CTR;
s2, converting the time domain information of the video to be encrypted into frequency domain information;
s3, converting the two-dimensional matrix of the syntax element DCT coefficient sign in the video into a one-dimensional array by adopting a coefficient scanning mode;
s4, entropy coding the one-dimensional array by CABAC method, and encrypting the one-dimensional arrayThe sign Coefsign of the trailing coefficient of a group is encrypted, the encryption of the sign of the DCT coefficient is expressed as
Figure BDA0003336086020000011
0≤Ki≤1;
And S5, obtaining the encrypted video.
The invention has the beneficial effects that: the time domain information is converted into the frequency domain information through discrete cosine transform, the quality of the video is guaranteed while the video is compressed, meanwhile, the trailing coefficients of the one-dimensional array are encrypted, the definition of the video frame is enhanced after encryption, the overall contour of the image cannot be influenced, slight interference is caused to the content of the reconstructed video, and the safety of image data is effectively guaranteed.
Drawings
FIG. 1 is a flow chart of a video encryption method of the present invention;
FIG. 2 is a video image to be encrypted;
FIG. 3 is a video image after encrypting syntax element DCT coefficient symbols;
fig. 4 is a video image with both syntax element DCT coefficient sign and luminance prediction model encrypted.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention. It is to be understood that the embodiments described are only a few embodiments of the present invention, and not all embodiments. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
In the description of the present invention, it is to be understood that the terms "upper", "lower", "inside", "outside", "left", "right", and the like, indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, or the orientations or positional relationships that the products of the present invention are conventionally placed in use, or the orientations or positional relationships that are conventionally understood by those skilled in the art, and are used for convenience of describing the present invention and simplifying the description, but do not indicate or imply that the devices or elements referred to must have a specific orientation, be constructed in a specific orientation, and be operated, and thus, should not be construed as limiting the present invention.
Furthermore, the terms "first," "second," and the like are used merely to distinguish one description from another, and are not to be construed as indicating or implying relative importance.
In the description of the present invention, it is also to be noted that, unless otherwise explicitly stated or limited, the terms "disposed" and "connected" are to be interpreted broadly, and for example, "connected" may be a fixed connection, a detachable connection, or an integral connection; can be mechanically or electrically connected; the connection may be direct or indirect via an intermediate medium, and may be a communication between the two elements. The specific meanings of the above terms in the present invention can be understood by those skilled in the art according to specific situations.
The following detailed description of embodiments of the invention refers to the accompanying drawings.
A video encryption method, comprising:
s1, generating a pseudo-random number sequence as an encryption key by using AES-CTR;
s2, converting time domain information of the video to be encrypted into frequency domain information by adopting discrete cosine transform, and setting high-frequency signals of the frequency domain information as zero;
s3, converting a two-dimensional matrix of syntax element DCT coefficient symbols in the video into a one-dimensional array by adopting a coefficient scanning mode, wherein the right side of the one-dimensional array is a trailing coefficient which comprises a high-frequency signal;
s4, entropy coding and encrypting the one-dimensional array by an encryption key in a CABAC mode, encrypting a Coefsign of a trailing coefficient of the one-dimensional array, respectively representing the positive and negative of the coefficient by adopting Coefsign ═ 1 and Coefsign ═ 0, and exchanging the positive and negative of the coefficient, wherein the encryption of the DCT coefficient sign is represented by
Figure BDA0003336086020000041
0≤Ki≤1;
And S5, obtaining the encrypted video.
The video encryption method further includes S0, encrypting a syntax element brightness prediction model in the video, where S0 is located between S1 and S2 or between S4 and S5, and S0 specifically includes:
a. the encoder establishes a 3-bit candidate prediction mode list according to adjacent coding units, wherein the candidate prediction mode list comprises 35 prediction modes, and the types of the prediction modes comprise plane, DC and angle prediction modes;
b. the encoder traverses all the prediction modes, and the optimal prediction mode with the minimum distortion cost is calculated;
c. judging whether the optimal prediction mode is in a candidate prediction mode list, if so, entering d, otherwise, entering e;
d. by means of encryption key pair list numbers IdxEncryption is performed, the encryption process is represented as En_Idx=(Idx+Ki) % 3, wherein KiRepresents a fragment of K in the pseudorandom sequence, 0 ≦ Ki≤3;
e. Scrambling the recorded optimal prediction model into a non-optimal prediction mode, recording the scrambled candidate list numbers by an encoder and establishing a new array, and recording the list numbers IdxCarrying out encryption by the process of
Figure BDA0003336086020000042
0≤KiLess than or equal to 31, wherein
Figure BDA0003336086020000043
Indicating an exclusive or operation.
The technical solution of the present invention is not limited to the limitations of the above specific embodiments, and all technical modifications made according to the technical solution of the present invention fall within the protection scope of the present invention.

Claims (8)

1. A video encryption method, comprising:
s1, generating a pseudo-random number sequence as an encryption key by using AES-CTR;
s2, converting the time domain information of the video to be encrypted into frequency domain information;
s3, converting the two-dimensional matrix of the syntax element DCT coefficient sign in the video into a one-dimensional array by adopting a coefficient scanning mode;
s4, entropy coding and encrypting the one-dimensional array by CABAC method, and encrypting the Coefsign of the trailing coefficient of the one-dimensional array, wherein the encryption of the DCT coefficient sign is expressed as
Figure FDA0003336086010000011
0≤Ki≤1;
And S5, obtaining the encrypted video.
2. The video encryption method according to claim 1, wherein a discrete cosine transform is used to convert time domain information of the video to be encrypted into frequency domain information in S2.
3. The video encryption method according to claim 2, further comprising setting the high frequency signal of the frequency domain information to zero at S2.
4. The video encryption method according to claim 3, wherein in S3, when converting the two-dimensional matrix into the one-dimensional array, trailing coefficients are provided on the right side of the one-dimensional array, and the trailing coefficients include high-frequency signals.
5. The video encryption method according to claim 1, wherein in S4, when the sign Coefsign of the trailing coefficient of the one-dimensional array is encrypted, Coefsign-1 and Coefsign-0 are used to respectively represent positive and negative of the coefficient, and then they are exchanged.
6. The video encryption method of claim 1, wherein the video encryption method further comprises encrypting a syntax element luma prediction model in the video at S0, wherein S0 is located between S1 and S2 or between S4 and S5.
7. The video encryption method according to claim 6, wherein S0 includes:
a. the encoder establishes a 3-bit candidate prediction mode list according to adjacent coding units, wherein the candidate prediction mode list comprises 35 prediction modes, and the types of the prediction modes comprise plane, DC and angle prediction modes;
b. the encoder traverses all the prediction modes, and the optimal prediction mode with the minimum distortion cost is calculated;
c. judging whether the optimal prediction mode is in a candidate prediction mode list, if so, entering d, otherwise, entering e;
d. to list number IdxEncryption is performed, the encryption process is represented as En_Idx=(Idx+Ki) % 3, wherein KiRepresents a fragment of K in the pseudorandom sequence, 0 ≦ Ki≤3;
e. Scrambling the recorded optimal prediction model into a non-optimal prediction mode, and comparing the list number IdxCarrying out encryption by the process of
Figure FDA0003336086010000021
Wherein
Figure FDA0003336086010000022
Indicating an exclusive or operation.
8. The video encryption method of claim 6, wherein in e, the encoder creates a new array to record the scrambled candidate list numbers.
CN202111294635.3A 2021-11-03 2021-11-03 Video encryption method Pending CN114205624A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111294635.3A CN114205624A (en) 2021-11-03 2021-11-03 Video encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111294635.3A CN114205624A (en) 2021-11-03 2021-11-03 Video encryption method

Publications (1)

Publication Number Publication Date
CN114205624A true CN114205624A (en) 2022-03-18

Family

ID=80646712

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111294635.3A Pending CN114205624A (en) 2021-11-03 2021-11-03 Video encryption method

Country Status (1)

Country Link
CN (1) CN114205624A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102843558A (en) * 2012-08-21 2012-12-26 中国电子科技集团公司第三十八研究所 H.264/AVC (Advanced Video Coding) compressed domain video encryption/decryption device and encryption/decryption method thereof
CN103826128A (en) * 2014-02-25 2014-05-28 宁波工程学院 Encryption domain H.264/AVC video reversible data hiding method
CN104038761A (en) * 2014-06-05 2014-09-10 宁波工程学院 Encrypted domain H.264/AVC video data hiding method based on CABAC binary string mapping
CN108322750A (en) * 2018-01-15 2018-07-24 宁波工程学院 Encrypted domain HEVC video data hidden methods based on residual error coefficient modulation
CN108833924A (en) * 2018-06-22 2018-11-16 东北大学 It is a kind of based on more security level video encryption algorithms H.265
CN109167999A (en) * 2018-09-04 2019-01-08 宁波工程学院 A kind of HEVC video-encryption and decryption method
CN110677694A (en) * 2019-10-15 2020-01-10 华南理工大学 Video encryption method for resisting contour attack
AU2020100421A4 (en) * 2020-03-19 2020-04-30 Yuming Fang A multi-level encryption scheme for H.265/HEVC based on syntax elements scrambling

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102843558A (en) * 2012-08-21 2012-12-26 中国电子科技集团公司第三十八研究所 H.264/AVC (Advanced Video Coding) compressed domain video encryption/decryption device and encryption/decryption method thereof
CN103826128A (en) * 2014-02-25 2014-05-28 宁波工程学院 Encryption domain H.264/AVC video reversible data hiding method
CN104038761A (en) * 2014-06-05 2014-09-10 宁波工程学院 Encrypted domain H.264/AVC video data hiding method based on CABAC binary string mapping
CN108322750A (en) * 2018-01-15 2018-07-24 宁波工程学院 Encrypted domain HEVC video data hidden methods based on residual error coefficient modulation
CN108833924A (en) * 2018-06-22 2018-11-16 东北大学 It is a kind of based on more security level video encryption algorithms H.265
CN109167999A (en) * 2018-09-04 2019-01-08 宁波工程学院 A kind of HEVC video-encryption and decryption method
CN110677694A (en) * 2019-10-15 2020-01-10 华南理工大学 Video encryption method for resisting contour attack
AU2020100421A4 (en) * 2020-03-19 2020-04-30 Yuming Fang A multi-level encryption scheme for H.265/HEVC based on syntax elements scrambling

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
WENYING WEN ET AL: "A multi-level approach with visual information for encrypted H.265/HEVC videos", pages 4, Retrieved from the Internet <URL:https://arxiv.org/pdf/2011.02620.pdf> *

Similar Documents

Publication Publication Date Title
Sirichotedumrong et al. Grayscale-based block scrambling image encryption using ycbcr color space for encryption-then-compression systems
Dalal et al. A survey on information hiding using video steganography
CN111050022B (en) High-security image transmission system and method
Mohanty et al. SBPG: secure better portable graphics for trustworthy media communications in the IoT
Abdmouleh et al. A novel selective encryption DWT-based algorithm for medical images
Zhang et al. Harnessing the hybrid cloud for secure big image data service
Elkamchouchi et al. New video encryption schemes based on chaotic maps
Wang et al. Anti-HEVC recompression video watermarking algorithm based on the all phase biorthogonal transform and SVD
Luo et al. Color transfer in visual cryptography
CN112839244B (en) Monitoring video grading encryption and decryption method and system based on code stream grade
Maurya et al. An extended visual cryptography technique for medical image security
Awadh et al. Hybrid information security system via combination of compression, cryptography, and image steganography
Yang et al. Efficient color image encryption by color-grayscale conversion based on steganography
Li et al. Medical images lossless recovery based on POB number system and image compression
Ahmad et al. Encryption-then-compression system for cloud-based medical image services
Sharma et al. A single watermark based scheme for both protection and authentication of identities
CN114205624A (en) Video encryption method
Jin et al. H. 264/AVC video encryption algorithm based on integer dynamic cross-coupling tent mapping model
Ruchaud et al. JPEG‐based scalable privacy protection and image data utility preservation
KR100381204B1 (en) The encoding and decoding method for a colored freeze frame
Ammous et al. Encryption of lossless coded videos
JP2004135254A (en) Image processing unit
Huang et al. A video steganography scheme based on post-quantum cryptography
JP2000307879A (en) Method and device for color image communication
Yan et al. Partial encryption of JPEG2000 images based on EBCOT

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination