TWI271081B - Digital data streaming transmission method under encryption - Google Patents

Digital data streaming transmission method under encryption Download PDF

Info

Publication number
TWI271081B
TWI271081B TW94135259A TW94135259A TWI271081B TW I271081 B TWI271081 B TW I271081B TW 94135259 A TW94135259 A TW 94135259A TW 94135259 A TW94135259 A TW 94135259A TW I271081 B TWI271081 B TW I271081B
Authority
TW
Taiwan
Prior art keywords
compression
digital data
parameter set
file
encrypted
Prior art date
Application number
TW94135259A
Other languages
Chinese (zh)
Other versions
TW200715799A (en
Inventor
Cheng-Jyh Chang
Ice Chieh
Original Assignee
Avermedia Tech Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Avermedia Tech Inc filed Critical Avermedia Tech Inc
Priority to TW94135259A priority Critical patent/TWI271081B/en
Application granted granted Critical
Publication of TWI271081B publication Critical patent/TWI271081B/en
Publication of TW200715799A publication Critical patent/TW200715799A/en

Links

Landscapes

  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Compression Or Coding Systems Of Tv Signals (AREA)

Abstract

In a digital data streaming transmission method applied to a network, a first host converts a digital data file into a digital compressed data file with a coding and compressing procedure. The coding and compressing procedure results in a coding and compressing parameter group. The first host performs an encryption operation of the coding and compressing parameters in the coding and compressing parameter group and then transmits the digital compressed data file including the coding and compressing parameter group under encryption to the second host via the network in a streaming manner. The second host receives the digital compressed data file and decrypts the coding and compressing parameter group into the original one which is then used in a decoding and decompressing procedure to recover the original digital data file.

Description

1271081 九、發明說明: 【發明所屬之技術領域】 本案係為-種數位資料串流傳送方法,尤指應用於網 路上之具加密功能之數位資料串流傳送方法。 % 【先前技術】 ^ 隨著電腦網路的普及以及高效率壓縮演算法的快速發 展’在電腦網路上傳送串流媒體(血隱_ media)變得 越來越普遍。而什麼是串流媒體(streaming media)技術 呢·配口第-圖所不之架構圖來說,就是影音串流伺服器 (Streaming Server)將—個影音播案分成一段段然後透 過電腦網路1〇傳送出去,而用戶端12 (clien〇便可以邊 下載邊看,觀看與下載的動作可以是同時進行的,使用者 • $必等整個難傳送完畢,就可即時連續不斷地觀賞,這 樣^旦大幅節省使用者等待的時間,也可以相當程度達到 ΡΝ*的效果。目月ί在用戶端12,較普遍的多媒體播放軟體、 有RealNetworks公司的Rea黯yer、Α_公司的 QuickTime Player 以及 Micr〇s〇ft 公司的 Wind龍 m他 Player (以下簡稱 ms WMV)。 串流媒體(streaming media)技術在進行傳輸前,檔 案需經過編碼及壓縮處理,並在用戶端收到後再進行解^ 及解壓縮處理,但是常用的影音壓縮方式就只有那麼幾種 6 1271081 而且是公開規格,例如JPEG/MPEG X/H.26X/MS WMV/RV 1〇等等。但因網際網路是開放的,如果有人從網路傳輸的 過程中攔取到檔案,然後從屈指可數的影音壓縮方式中用 旨试與錯誤(tryanderr〇r)的方式來猜出解碼方式,如此 便可很容易就可以把攔取到的串流資料解碼出來觀看。因 此在網際網路上傳送串流媒體(streaming media)是不 太有隱密性舆安全性的,有礙於利用網路傳輸安全監視晝 面或$它不容許被別人盜取之影音檔案等應用的發展。而 如何能改善此一缺失,便成為了發展本案的主要目的。 【發明内容] =案係為一種數位資料串流傳送方法,應用於網路上 之》第主機與一第二主機之間,該方法包含下列步驟: 該第-,機將一數位資料擋案進行一編石馬壓縮程序而產生 I 7數位射4壓縮髓’該編碼壓練序巾產生-個編碼壓 縮減集合;該第一主機將該編碼壓縮參數集合中之編碼 壓縮參數進行一加密處理,並將包含有經過加密處理之該 編碼壓縮參數集合之該數位資料壓縮檔案以串流方式透過 網路傳:¾到該第二主機;以及該第二主機接收以串流方式 傳达之包含有經過加密處理之該編碼壓縮參數华合之該數 位資料壓縮槽案後,將經過加密處理之_碼壓 合進打-解密處理而還原成該編碼塵縮參數华合, 該編碼壓縮參數集合對該數位資料壓縮檔案進行一解碼解 7 1271081, 壓縮程序,進而得回該數位資料槽案。 根據上述構想,本案所述之數位資料串流傳送方法, 其中該數位資料檔案係可為一數位影音檔案或一數位影像 檔案,而所進行之該編碼壓縮程序係可為一 MPEG編碼壓 縮程序或一 JPEG編碼壓縮程序。 根據上述構想’本案所述之數位資料串流傳送方法, 其中所產生之該編碼壓縮參數集合係為一直流值集合或是 一移動向量集合。 根據上述構想,本案所述之數位資料串流傳送方法, 其中該加密處理係包含下列步驟:取出該編碼壓縮參數集 合;以及利用一公開金鑰(PublicKey)對該編碼壓縮參數 集合進行加密而完成該經過加密處理之編碼壓縮參數集 合。 根據上述構想,本案所述之數位資料串流傳送方法, 其中該解密處理係包含下列步驟:取出該經過加密處理之 編碼壓縮參數集合;以及私密錢㈤遞一) 對該經過加密處理之編碼壓縮參數#合進行解密而還原成 該編碼壓縮參數集合。 根據上述構想,本案所述之數位資料串流傳送方法, 其:以串流方賴送之賴位:#料壓職案料—數位影 音貝料壓馳案,該帛二域邊對絲财彡音資料麵權 案進行該解碼解壓_序,便—邊減已解碼完成之該數 位影音資料壓縮檔案。 根據上述構想,本案所述之數位資料串流傳送方法, 8 8ι :,该加密處理係包含下列步驟:取出該編碼獅參數集 數,=及利用一私密金鑰(Private Key)對該編碼壓縮參 來口進行加密而完成該經過加密處理之編碼壓縮參數集 根據上述構想’本案所述之數位資料串流傳送方法, 繞該解密處理係包含下列步驟:取出該經過加密處理之 重焉參數集合,以及利用—私密金餘㈤vate Key) 好亥經過加岔處理之編碼壓縮參數集合進行解密而還原成 ^鵠碼壓縮參數集合。 本案之另—方面係為—種數位資料處理方法,應用於 2位資料檔案以及-第—主機與_第二主機之間,該方 2含下列步驟:該第—主機將該數位資料㈣進行-編 2縮程序而產生—數位龍壓縮槽案,該編碼壓縮程序 個編碼壓縮參數集合;該第—域將該編碼壓縮 2集合中之編碼壓縮參數進行—力禮處理,並將經過加 之该編碼壓縮參數集合連_數位資料壓縮檔案進 了4存或傳送;以及該第二主機得到該數位資料壓縮槽案 ,經過加蚊狀簡驢縮錄#錢,先將經過加穷 縮ί數集合進行—解密處理而還原成該編 二I數W ’再_該編碼壓縮參數集合對該數 =縮槽案進行一解碼解壓縮程序,進而得回該數位資料 根據上述構想,本案所述之數位資料處理方法, 該數位資料檐案係可為-數位影音槽案或—數位影像二 1271081 案,而所進行之該編碼壓縮程序係可為一 MPEG編碼壓縮 私序或一 jpeg編碼壓縮程序,至於所產生之該編碼壓縮 參數集合係為一直流值集合或是一移動向量集合。 【實施方式】 請參見第二圖,其係本案為改善習用手段缺失所發展 出來之一編碼壓縮加密-解碼解壓縮解密之第一較佳實施 例方法步驟流程示意圖,而為方便說明本案之技術精神, 本貝把例係以動晝專業團體(Moving picture Expert Group,簡稱MPEG)之編碼壓縮方法為主要骨幹,再加上 本案之主要技術特徵來進行說明。首先,電腦網路(本圖 未不出)上所連接之一第一主機(本圖未示出)將一數位 資料檔案(例如是一數位影音檔案)之一影像畫面(frame) 進行方塊(block)分割處理,進而產生許多8x8像素點大 _ 小的方塊,然後再針對每個方塊進行離散餘弦轉換 (Discrete Cosine Transform,簡稱 DCT)、量化(quantize) 以及鋸齒狀掃描(zigzag scan)之資料壓縮處理,之後再 進行掃描長度編碼(Run Length Encoding,簡稱RLE)以 及可變長度編碼(Variable Length Coding,簡稱VLC)而 形成一數位資料壓縮檔案後,便可將該數位資料壓縮構案 以串流方式透過電腦網路(例如網際網路)傳送到也連接 於電腦網路之一第二主機(本圖未示出)。而本實施例為能 使非預定之主機無法將攔取到的串流資料解碼出來觀看, 1271081 於是將於資料壓縮處理過程中相對應於每個方塊(bl〇ck) 所產生之每一直流值(Dc value)所形成之編碼壓縮參數 集合進打一加密處理。而該加密處理可利用私密金鑰 (Key)進行加逾、之對稱式加解密方法,或是利用公開金 錄(PubllcKey)與私密金鑰(Private Key)配對之不對稱 加解密加密處理,但因此等加密處理已屬成熟技術,本案 不再資述’但需強調的是,不同位置的方塊(bl〇ck)之直 流值(DC value)所利用之金鑰(Key)可隨不同位置的方 塊(block)而變化其值,如此可讓加密後之數位資料壓縮 槽案更不易被辨識。 而在第二主機接收到以串流方式傳送之包含有經過加 密處理之該編碼壓縮參數集合之該數位資料壓縮檔案後, 便可反向利用可變長度解碼(Variable Length Dec〇ding, 間稱VLD)、田長度解碼(Run Length Decoding,簡稱 RLD )、反鋸齒狀掃描(Ιην_ zigzag _ )、反量化(心咖 quantize )以及反離散餘弦轉換(inverse Discrete c〇sine1271081 IX. Description of the invention: [Technical field of invention] This case is a digital data stream transmission method, especially a digital data stream transmission method with encryption function applied to the network. % [Prior Art] ^ With the popularity of computer networks and the rapid development of high-efficiency compression algorithms, it has become more and more common to transmit streaming media (blood _ media) on computer networks. And what is the streaming media technology? The interface diagram is not the architecture map, the video streaming server (Streaming Server) will be a video broadcast into a segment and then through the computer network 1〇 is transmitted, and the client 12 (clien〇 can be viewed while downloading, the action of watching and downloading can be performed simultaneously, and the user • $ must wait until the whole is difficult to transfer, so that it can be continuously viewed continuously, so that Once the user's waiting time is greatly saved, the effect of ΡΝ* can be achieved to a considerable extent. On the client side 12, the more popular multimedia player software, RealNetworks' Rea黯yer, Α_Company's QuickTime Player and Micr〇s〇ft's Wind Dragon m Player (hereafter referred to as ms WMV). Streaming media technology before encoding, the file needs to be encoded and compressed, and then received after the user receives the solution. ^ and decompression processing, but the commonly used video compression methods are only a few 6 1271081 and are public specifications, such as JPEG/MPEG X/H.26X/MS WMV/RV 1〇, etc. Because the Internet is open, if someone intercepts the file from the network transmission process, and then uses the trial and error method to guess the decoding method from the few video compression methods. In this way, the intercepted streaming data can be easily decoded and viewed. Therefore, streaming media on the Internet is less confidential and secure, hindering the use of the network. Transmission security surveillance or it does not allow the development of applications such as video files that have been stolen by others. How to improve this deficiency has become the main purpose of the development of this case. [Summary] = Case is a digital data The streaming method is applied between the first host and the second host on the network, and the method comprises the following steps: the first, the machine performs a digital horse file compression program to generate an I 7 digit The encoding compression sniper generates a coding compression reduction set; the first host performs an encryption process on the coding compression parameter in the coding compression parameter set, and includes The digital data compression file of the encoded compression parameter set that has been encrypted is transmitted through the network in a streaming manner: to the second host; and the second host receives the streamed communication and includes the encrypted processing After the encoding compression parameter Huahe of the digital data compression slot case, the _code compression processed by the encryption process is combined into a decryption-decryption process to restore the encoded dust reduction parameter, and the coding compression parameter set compresses the digital data. The file performs a decoding solution 7 1271081, compresses the program, and then returns the digital data slot. According to the above concept, the digital data stream transmission method described in the present invention, wherein the digital data file can be a digital audio file or a digital image file, and the code compression program can be an MPEG code compression program or A JPEG encoding compression program. According to the above concept, the digital data stream transmission method of the present invention, wherein the generated compression parameter set is a set of continuous stream values or a set of motion vectors. According to the above concept, the digital data stream transmission method of the present invention, wherein the encryption processing comprises the steps of: taking out the code compression parameter set; and encrypting the code compression parameter set by using a public key (PublicKey) The encrypted compression encoded parameter set. According to the above concept, the digital data stream transmission method of the present invention, wherein the decryption processing comprises the steps of: taking out the encrypted compression parameter set of the encryption process; and private money (5) handing one) encoding compression of the encrypted processing The parameter # is decrypted and restored to the encoded compression parameter set. According to the above concept, the digital data stream transmission method described in the present case, which is based on the stagnation of the streamer: #料压职案-Digital audio and video shelling case, the second side of the field The audio data surface right case performs the decoding and decompression _ sequence, and the side-by-side subtracts the digital audio and video data compressed file that has been decoded. According to the above concept, the digital data stream transmission method described in the present invention, 8 8 ι :, the encryption processing system includes the following steps: taking out the number of the encoded lion parameter set, = and compressing the code by using a private key (Private Key) According to the above-mentioned concept of the digital data stream transmission method described in the above-mentioned concept, the encryption processing system includes the following steps: taking out the encrypted parameter set by the encryption processing. And the use of - private gold (5) vate Key) Hao Hai through the processing of the encoding compression parameter set to decrypt and restore to the ^ code compression parameter set. The other aspect of the present invention is a digital data processing method, which is applied to a 2-bit data file and between a -host and a second host. The party 2 includes the following steps: the first host performs the digital data (four) - encoding a program to generate a digital compression slot, the encoding compression program encodes a set of compression parameters; the first field encodes the encoding compression parameters in the encoded compression 2 set - and then adds The encoding compression parameter set is connected to the _ digital data compression file into 4 storage or transmission; and the second host obtains the digital data compression slot case, and after the mosquito-like simplification, the money is firstly added to the collection. Performing-decryption processing and restoring to the coded two I number W' again - the code compression parameter set is subjected to a decoding decompression process for the number = shrinking case, and then the digital data is obtained according to the above concept, the digital number described in the present case The data processing method, the digital data file system can be a digital video channel case or a digital image 21271081 case, and the code compression program can be an MPEG code compression private sequence or a The jpeg encoding compression program, as to the generated set of encoding compression parameters is a set of constant stream values or a set of moving vectors. [Embodiment] Please refer to the second figure, which is a schematic flow chart of the first preferred embodiment of the code compression compression-decoding decompression and decryption developed in the present invention to improve the conventional means, and the technology of the present invention is convenient for explanation. Spirit, Benbe's example is based on the coding compression method of the Moving Picture Expert Group (MPEG) as the main backbone, together with the main technical features of this case. First, a first host (not shown in the figure) connected to the computer network (not shown in the figure) blocks a frame of a digital data file (for example, a digital video file). Block) segmentation processing, which in turn generates a number of 8x8 pixel large _ small squares, and then discrete Discrete Cosine Transform (DCT), quantization (quantize) and zigzag scan data for each block After compression processing, and then performing Run Length Encoding (RLE) and Variable Length Coding (VLC) to form a digital data compression file, the digital data can be compressed into a string. The streaming mode is transmitted through a computer network (such as the Internet) to a second host (not shown in the figure) that is also connected to the computer network. In this embodiment, in order to enable the unscheduled host to decode the intercepted stream data for viewing, 1271081 will correspondingly correspond to each DC generated by each block (bl〇ck) during the data compression process. The set of coding compression parameters formed by the value (Dc value) is subjected to an encryption process. The encryption process may use a private key (Key) to add over, a symmetric encryption and decryption method, or an asymmetric encryption and decryption encryption process using a public account (PubllcKey) and a private key (Private Key), but Therefore, the encryption process is a mature technology, and the case is no longer described in the case. However, it should be emphasized that the key used by the DC value of the block (bl〇ck) at different positions can be used in different positions. Blocks change their values, which makes the encrypted digital data compression slot less recognizable. After the second host receives the serially compressed data file containing the encrypted compression parameter set, the variable length decoding (Variable Length Dec〇ding) can be reversed. VLD), Run Length Decoding (RLD), anti-aliased scanning (Ιην_ zigzag _ ), inverse quantization (heart quantize), and inverse discrete cosine conversion (inverse Discrete c〇sine)

Transform’簡稱IDCT)等解碼解壓縮程序,最後完成資 料重建(reconstruct)而得回該數位資料檔案。但其間必須 利用適當金鑰來對經過加密處理之該編碼壓縮參數集合進 行解密,進而得回相對應於每個方塊(bl〇ck)所產生之每 一直流值(DC value)。 而就是因為相對應於每個方塊(bl〇ck)所產生之直流 值(DC value)已被加密,因此需要適當金鑰來對其進行 解密,如此才能正確解回該數位資料檔案,所以即使透過 11 1271081 ,,傳=之串流資料被他人截取,在沒有適當金錄來進行 、:、况下所解碼出來之影像晝面將會模糊不清而無 法被有效辨識。如此便可有效改善習用手段之缺失,進而 達成本案之主要目的。 再凊芩見第三圖,其係本案為改善習用手段缺失所發 2出來之一編碼壓縮加密-解碼解壓縮解密之第二較佳實 =列方法步驟流程示意圖,本實施例與第一較佳實施例之 • *部,内容皆相同,不同處在於加密處理係改為應用於移 $向里之上,即對於在將影像晝面(frame)進行方塊(心成) 二副處理後所隨後進行之移動估測(M〇ti〇n㈤運 算程序中所產生之移動向量(Motion Vector)進行加密處 理。而该加密處理同樣可利用私密金鑰(Key)進行加密 之,稱式加解密方法,或是利用公開金鑰(Public Key)與 =袷金鑰(Private Key)配對之不對稱加解密加密處理。 ^強調的是,相對應於每個方塊之移動向量所形成之編碼 • 麵參數集合進行加密處理時,不同位置的方塊(block) 之移動向量(Motion Vector)所利用之金鑰(Key)可隨方 塊(block)的位置而變化其值,如此可讓加密後之數位資 料壓縮檔案更不易被辨識。 、 紅上所述,本案兩實施例皆可達到對在開放網路環境 中傳送得串流資料進行保密的目的,而且本案技術主要是 在壓縮域(compressed domain)進行加密,因此可以很有 效率的保護串流資料中某一段特別重要的資料,如果硬體 %境許可,甚至可以把整段串流資料全部保護。而本案所 12 1271081 舉之兩個例子,針對直流值與移動向量進行加密,就可以 在小計算量的硬體環境需求下達到保護整個#料流的目 的。所以即使當我們必須透過網路傳送一段需要保密的串 流貧料到遠端主機的時候,應用本案之技術手段,不但需 要加密的資料量很小,但仍可達到整段諸保護的目的。 而本案除了可顧於刪G格式外,㈣絲仍可應 用於 删/H篇MS WMV/RV料編碼壓縮格式巾。而不論 在網路傳料是齡於—般料齡上,本案之技術手段 皆可應用其上並達到功效之增進,而且本案手制硬體或 軟體的方式皆可實現。故但本·明得由熟f此技藝之人 士任施匠“為諸般修飾,料獨如附申料 欲保護者。 【圖式簡單說明】The decoding decompression program, such as Transform' (referred to as IDCT), finally completes the reconstruction of the data and returns the digital data file. However, the encrypted key set must be decrypted by the appropriate key to obtain the DC value corresponding to each block (bl〇ck). However, because the DC value corresponding to each block (bl〇ck) has been encrypted, an appropriate key is needed to decrypt it, so that the digital data file can be correctly decoded, so even Through 11 1271081, the streamed data is intercepted by others. In the absence of proper gold recording, the decoded image will be blurred and cannot be effectively identified. This can effectively improve the lack of customary means, and thus achieve the main purpose of the case. Referring to the third figure, it is a flow chart of the second preferred real-column method step of encoding compression encryption-decoding decompression and decryption, which is one of the two methods in the present invention. The * part of the preferred embodiment has the same content. The difference is that the encryption processing system is applied to the shifting of the inward direction, that is, after the second processing of the image frame (the heart) is performed. The subsequent motion estimation (Motion Vector generated in the M〇ti〇n (5) operation program is encrypted. The encryption processing can also be encrypted using a private key (Key). Or an asymmetric encryption and decryption encryption process using a public key (Public Key) and a = Private Key. ^ Emphasis is placed on the coding/surface parameters corresponding to the motion vectors of each block. When the collection is encrypted, the key used by the motion vector of the block at different positions can change its value with the position of the block, so that the encrypted digit can be made. The compressed file is more difficult to be identified. In the above, both embodiments of the present invention can achieve the purpose of keeping the streaming data transmitted in the open network environment confidential, and the technology of the present invention is mainly in the compressed domain. Encryption, so it can effectively protect a certain piece of data in the streaming data. If the hardware is allowed, the entire stream of data can be protected. In this case, 12 1271081, two examples, Encryption of DC values and motion vectors can achieve the goal of protecting the entire # stream in a small amount of hardware environment. So even when we have to transmit a stream of confidential materials that need to be kept secret to the far end through the network At the time of the host, the technical means of applying this case not only requires a small amount of data to be encrypted, but still achieves the purpose of the entire protection. In addition to the deletion of the G format, the case can still be applied to delete/H. The MS WMV/RV material encodes a compressed format towel, and the technical means of this case can be applied to it regardless of the age of the network material. The effect is improved, and the method of hand-made hardware or software can be realized in this case. Therefore, Ben Ming has to be a master of the craftsmanship of this skill, "for all kinds of modifications, it is expected to be attached to the applicant." Simple description of the schema]

…本案得藉由下列圖式及詳細朗,俾得—更深入 解: 編石馬 驟流 =圖,其係傳送串流媒體之制功能方塊架構圖。 第-圖,其係本案為改善f用手段缺失所發展出來之 壓縮加密解骑__之第—較佳實_方法步 程示意圖。 碥石馬 驟流 第三圖,其係本案為改善習用手段缺失所發展出來之 壓縮加密·解碼解壓縮解密之第二較佳實施例方法步 程示意圖。 13 1271081 【主要元件符號說明】 本案圖式中所包含之各元件列式如下: 電腦網路10 影音串流伺服器11 用戶端12... This case can be obtained from the following diagrams and detailed descriptions - a more in-depth explanation: 编石马 流流 = diagram, which is a functional block diagram of the transmission of streaming media. The first figure is a schematic diagram of the method of compressing and decrypting the __, which is developed in order to improve the use of f.碥石马流流 The third figure is a schematic diagram of the method of the second preferred embodiment of the compression encryption/decoding decompression and decryption developed in the present invention to improve the lack of conventional means. 13 1271081 [Description of main component symbols] The components included in the diagram of this case are listed as follows: Computer network 10 Video streaming server 11 User terminal 12

1414

Claims (1)

1271081 十、申請專利範圍: 1. 一種數位資料串流傳送方法,應用於網路上之一第一主 機與一第二主機之間,該方法包含下列步驟: 該第一主機將一數位資料檔案進行一編碼壓縮程序而 產生一數位資料壓縮檔案,該編碼壓縮程序中產生一個編 碼歷縮參數集合; 該第一主機將該編碼壓縮參數集合中之編碼壓縮參數 進行一加密處理,並將包含有經過加密處理之該編碼壓縮 參數集合之該數位資料壓縮檔案以串流方式透過網路傳送 到該第二主機;以及 該第二主機接收以串流方式傳送之包含有經過加密處 理之該編碼壓縮參數集合之該數位資料壓縮檔案後,將經 過加密處理之該編碼壓縮參數集合進行一解密處理而還原 成該編碼壓縮參數集合,並利用該編碼壓縮參數集合對該 數位資料壓縮檔案進行一解碼解壓縮程序,進而得回該數 位資料檔案。 2. 如申請專利範圍第1項所述之數位資料串流傳送方法, 其中該數位資料檔案係可為一數位影音檔案或一數位影像 檔案,而所進行之該編碼壓縮程序係可為一 MPEG編碼壓 縮程序或一 JPEG編碼壓縮程序。 3. 如申請專利範圍第2項所述之數位資料串流傳送方法, 其中所產生之該編碼壓縮參數集合係為一直流值集合或是 一移動向量集合。 15 1271081 4. 如申請專利範圍第1項所述之數位資料串流傳送方法, 其中該加密處理係包含下列步驟: 取出該編碼壓縮參數集合;以及 利用一公開金鑰(Public Key)對該編碼壓縮參數集合 進行加密而完成該經過加密處理之編碼壓縮參數集合。 5. 如申請專利範圍第1項所述之數位資料串流傳送方法, 其中該解密處理係包含下列步驟: 取出該經過加密處理之編碼壓縮參數集合;以及 鲁 利用一私密金錄(Private Key)對該經過加密處理之 編碼壓縮參數集合進行解密而還原成該編碼壓縮參數集 合。 6. 如申請專利範圍第1項所述之數位資料串流傳送方法, 其中以串流方式傳送之該數位資料壓縮檔案係為一數位影 音資料壓縮檔案,該第二主機邊對該數位影音資料壓縮檔 案進行該解碼解壓縮程序,便一邊播放已解碼完成之該數 位影音貢料壓縮樓案。 • 7.如申請專利範圍第1項所述之數位資料串流傳送方法, 其中該加密處理係包含下列步驟: 取出該編碼壓縮蒼數集合;以及 利用一私密金錄(Private Key)對該編碼壓縮參數集 合進行加密而完成該經過加密處理之編碼壓縮參數集合。 8.如申請專利範圍第1項所述之數位資料串流傳送方法, 其中該解密處理係包含下列步驟: 取出該經過加密處理之編碼壓縮參數集合;以及 16 1271081 利用一私密金錄(Private Key)對該經過加密處理之 編碼壓縮參數集合進行解密而還原成該編碼壓縮參數集 合。 9. 一種數位資料處理方法,應用於一數位資料檔案以及一 第一主機與一第二主機之間,該方法包含下列步驟: 該第一主機將該數位資料檔案進行一編碼壓縮程序而 產生一數位資料壓縮檔案,該編碼壓縮程序中產生一個編 碼壓縮參數集合; 該第一主機將該編碼壓縮參數集合中之編碼壓縮參數 進行一加密處理,並將經過加密處理之該編碼壓縮參數集 合連同該數位資料壓縮檔案進行儲存或傳送;以及 該第二主機得到該數位資料壓縮檔案與經過加密處理 之該編碼壓縮參數集合後,先將經過加密處理之該編碼壓 縮參數集合進行一解密處理而還原成該編碼壓縮參數集 合,再利用該編碼壓縮參數集合對該數位資料壓縮檔案進 行一解碼解壓縮程序,進而得回該數位資料檔案。 10. 如申請專利範圍第9項所述之數位資料處理方法,其中 該數位資料檔案係可為一數位影音檔案或一數位影像檔 案,而所進行之該編碼壓縮程序係可為一 MPEG編碼壓縮 程序或一 JPEG編碼壓縮程序,至於所產生之該編碼壓縮 參數集合係為一直流值集合或是一移動向量集合。 171271081 X. Patent application scope: 1. A digital data stream transmission method, which is applied between a first host and a second host on a network, the method comprising the following steps: the first host performs a digital data file a code compression program generates a digital data compression file, and the code compression program generates a code reduction parameter set; the first host performs an encryption process on the code compression parameter in the code compression parameter set, and includes an Encrypting the digital compressed data file of the encoded compression parameter set to be transmitted to the second host through a network in a streaming manner; and the second host receiving the encoded compression parameter including the encrypted processing transmitted in a streaming manner After the digital data is compressed, the encrypted compression parameter set is decrypted and restored into the encoded compression parameter set, and the digital compressed file is decoded and decompressed by using the encoded compression parameter set. The program, in turn, gets back the digital data file. 2. The digital data stream transmission method according to claim 1, wherein the digital data file can be a digital audio file or a digital video file, and the encoding compression program can be an MPEG. Encode compression program or a JPEG encoding compression program. 3. The digital data stream transmission method according to claim 2, wherein the generated compression parameter set is a set of continuous stream values or a set of motion vectors. The method of digital data stream transmission according to claim 1, wherein the encryption processing comprises the steps of: extracting the code compression parameter set; and using the public key (Public Key) to encode the code The compressed parameter set is encrypted to complete the encrypted compression encoded parameter set. 5. The digital data stream transmission method according to claim 1, wherein the decryption processing comprises the steps of: taking out the encrypted compression parameter set; and using a private key (Private Key) The encrypted encoded parameter set is decrypted and restored to the encoded compressed parameter set. 6. The digital data stream transmission method according to claim 1, wherein the digital data compression file transmitted by the stream is a digital audio and video compression file, and the second host side is the digital audio and video data. Compressing the file to perform the decoding and decompressing program, and playing the digital audio and video tributary compression project that has been decoded. 7. The digital data stream transmission method according to claim 1, wherein the encryption processing comprises the steps of: extracting the encoded compressed number set; and using a private key (Private Key) to encode the code The compressed parameter set is encrypted to complete the encrypted compression encoded parameter set. 8. The digital data stream transmission method according to claim 1, wherein the decryption processing comprises the steps of: extracting the encrypted compression parameter set; and 16 1271081 using a private key (Private Key) And decrypting the encrypted compression parameter set to be restored to the encoded compression parameter set. A digital data processing method, applied to a digital data file and a first host and a second host, the method comprising the following steps: the first host performs a code compression process on the digital data file to generate a a digital data compression file, wherein the encoding compression program generates a coding compression parameter set; the first host performs an encryption process on the coding compression parameter in the coding compression parameter set, and the encoded compression parameter set that is encrypted and processed The digital data compression file is stored or transmitted; and the second host obtains the digital data compression file and the encrypted compression parameter set, and then decrypts the encrypted compression parameter set to be decrypted into The encoding compression parameter set, and then using the encoding compression parameter set to perform a decoding and decompressing process on the digital data compression file, and then obtaining the digital data file. 10. The digital data processing method of claim 9, wherein the digital data file can be a digital audio file or a digital video file, and the encoding compression program can be an MPEG encoding compression. The program or a JPEG encoding compression program, wherein the generated set of encoding compression parameters is a set of continuous stream values or a set of moving vectors. 17
TW94135259A 2005-10-07 2005-10-07 Digital data streaming transmission method under encryption TWI271081B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW94135259A TWI271081B (en) 2005-10-07 2005-10-07 Digital data streaming transmission method under encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW94135259A TWI271081B (en) 2005-10-07 2005-10-07 Digital data streaming transmission method under encryption

Publications (2)

Publication Number Publication Date
TWI271081B true TWI271081B (en) 2007-01-11
TW200715799A TW200715799A (en) 2007-04-16

Family

ID=38430357

Family Applications (1)

Application Number Title Priority Date Filing Date
TW94135259A TWI271081B (en) 2005-10-07 2005-10-07 Digital data streaming transmission method under encryption

Country Status (1)

Country Link
TW (1) TWI271081B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8547900B2 (en) 2007-03-19 2013-10-01 Lg Electronics Inc. Method for processing radio protocol in mobile telecommunications system and transmitter of mobile telecommunications

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8547900B2 (en) 2007-03-19 2013-10-01 Lg Electronics Inc. Method for processing radio protocol in mobile telecommunications system and transmitter of mobile telecommunications
TWI427951B (en) * 2007-03-19 2014-02-21 Lg Electronics Inc Method for processing radio protocol in mobile telecommunications system and transmitter of mobile telecommunications
US8929298B2 (en) 2007-03-19 2015-01-06 Lg Electronics Inc. Method for processing radio protocol in mobile telecommunications systems and transmitter of mobile telecommunications
US9730104B2 (en) 2007-03-19 2017-08-08 Lg Electronics Inc. Method for processing radio protocol in mobile telecommunications system and transmitter of mobile telecommunications
US10244430B2 (en) 2007-03-19 2019-03-26 Lg Electronics Inc. Method for processing radio protocol in mobile telecommunications system and transmitter of mobile telecommunications
US10433206B2 (en) 2007-03-19 2019-10-01 Lg Electronics Inc. Method for processing radio protocol in mobile telecommunications system and transmitter of mobile telecommunications

Also Published As

Publication number Publication date
TW200715799A (en) 2007-04-16

Similar Documents

Publication Publication Date Title
Long et al. Separable reversible data hiding and encryption for HEVC video
Qian et al. Separable reversible data hiding in encrypted JPEG bitstreams
Zhang Separable reversible data hiding in encrypted image
US8731193B2 (en) Partial encryption using variable block sizes
US6725372B1 (en) Digital watermarking
JP3053610B2 (en) Method and apparatus for protecting copyrighted data in computer system
KR100736080B1 (en) Method and apparatus for managing rights of multi-layered multimedia stream by layer
US9350782B2 (en) Method and system for delivering media data
JP4128941B2 (en) Multimedia data encryption compression method and apparatus
Itier et al. Recompression of JPEG crypto-compressed images without a key
US10277656B2 (en) Method and system for delivering media data
US20110191587A1 (en) Media Processing Devices With Joint Encryption-Compression, Joint Decryption-Decompression, And Methods Thereof
Chuman et al. Image manipulation on social media for encryption-then-compression systems
WO2021072878A1 (en) Audio/video data encryption and decryption method and apparatus employing rtmp, and readable storage medium
Dufaux et al. Toward a secure JPEG
JP5437073B2 (en) Method and apparatus for managing keys and method and apparatus for acquiring keys
JP3283771B2 (en) Video transmission method
Chuman et al. Image manipulation specifications on social networking services for encryption-then-compression systems
KR20070121487A (en) Encoding and decoding apparatus having selective encryption function of h.264/avc multimedia contents and its method
TWI271081B (en) Digital data streaming transmission method under encryption
US7515711B2 (en) Methods and apparatuses for encrypting video and for decrypting video
JP2004040780A (en) Method of scrambling video signal and canceling scramble, system for performing the method, coder, decoder, broadcast server and data medium
Babel et al. Preserving data integrity of encoded medical images: the LAR compression framework
JP2010021931A (en) Video image transmitter and video image receiver
JP2005160018A (en) Image protection system and method

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees