Nothing Special   »   [go: up one dir, main page]

CN104602015A - Real-time video monitoring encryption and authentication method - Google Patents

Real-time video monitoring encryption and authentication method Download PDF

Info

Publication number
CN104602015A
CN104602015A CN201410853399.8A CN201410853399A CN104602015A CN 104602015 A CN104602015 A CN 104602015A CN 201410853399 A CN201410853399 A CN 201410853399A CN 104602015 A CN104602015 A CN 104602015A
Authority
CN
China
Prior art keywords
video
hash value
real
frame data
authentication method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410853399.8A
Other languages
Chinese (zh)
Inventor
周威
王博
李诺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Mashed Garlic Electronics Technology Ltd
Original Assignee
Xi'an Mashed Garlic Electronics Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xi'an Mashed Garlic Electronics Technology Ltd filed Critical Xi'an Mashed Garlic Electronics Technology Ltd
Priority to CN201410853399.8A priority Critical patent/CN104602015A/en
Publication of CN104602015A publication Critical patent/CN104602015A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a real-time video monitoring encryption and authentication method. The real-time video monitoring encryption and authentication method comprises the following steps: coding an original video to form video frame data; performing hash value computation on the video frame data to obtain a video hash value; encrypting the video frame data to form an encrypted file including key stream; storing and transmitting the encrypted file and the video hash value. The real-time video monitoring encryption and authentication method can be used for completing high-speed encryption protection on the original video data, completing integrity authentication to prevent distorting and forging video by hash value comparing, and realizing remotely checking wireless transmission of a data spanning platform.

Description

A kind of real-time video monitoring encryption and authentication method
Technical field
The present invention relates to field of video processing, be specifically related to a kind of real-time video monitoring encryption and authentication method.
Background technology
Along with the fast development of mobile communication network technology; particularly mobile phone; the extensive use of personal digital assistant; user needs preservation to get more and more with the video information exchanged; the safety problem of video information is highlighted more; when the facility that enjoyment video communication technology brings, the safety issue of protection individual privacy is also more and more subject to people's attention.
Present stage relies on the safety verification of transmitting procedure mostly to video data storage security, have ignored the safe storage to video requency frame data, make the fail safe of video not high, because the storage of video requency frame data exists safety problem, the authenticity and integrity of video cannot be ensured.Present stage safety video monitoring mostly by wire signal transmission, and speed cannot meet the requirement of real-time encryption and decryption.The development of present stage Internet of Things cannot be met.
In sum, how to carry out safe storage to video requency frame data, it is current problem demanding prompt solution that the speed of raising real-time encryption and decryption enables user carry out remote access by mobile terminal.
Summary of the invention
The deficiency that the present invention exists according to above-mentioned prior art, a kind of real-time video monitoring encryption and authentication method is provided, for being encrypted storage to video requency frame data, prevent distorting and forgery original video, ensure the fail safe of video data, and encryption and decryption speed is fast, meets the demand of data cross-platform wireless transmission and long-range real time inspection.
For solving the problem, the technical solution used in the present invention is: a kind of real-time video monitoring encryption and authentication method, comprises the following steps:
Original video is encoded, forms video requency frame data;
Carry out hash value to video requency frame data to calculate, obtain video hash value;
Video requency frame data is encrypted, forms the encrypt file comprising key stream;
Encrypt file and video hash value are carried out storing and transmitting.
Further, described original video is encoded, and forms video requency frame data, specifically comprises: original video is converted to video requency frame data by video data amplifier and video encoder.
Further, described video hash value adopts SM3 hash chip to carry out the calculating of hash value to video requency frame data.
Further, to be describedly encrypted video requency frame data, to form the encrypt file comprising key stream, specifically comprise: video requency frame data is encrypted by Zu Chongzhi stream cipher machine, the video requency frame data of encryption forms encrypt file.
Further, described Zu Chongzhi stream cipher machine is using the initialization vector of the initial key of 128 and 128 as input, and the key stream exporting a string 32 words is encrypted video requency frame data.
Further, described encrypt file and video hash value are carried out storing and transmitting, specifically comprise: encrypt file and video hash value are by data wire stored in read-only storage, and encrypt file and video hash value feeding wireless network card carry out wireless transmission simultaneously.
Further, described encrypt file is carried out storing and transmitting after, also comprise: decryption verification.
Further, described decryption verification specifically comprises: be decrypted the encrypt file of transmission, again calculates sm3 Hash Value, and contrast with the hash value of original video the video data of deciphering.
This video-unit utilizes hardware FPGA to design in conjunction with common camera and a kind ofly portablely, high performance completes real-time photography encryption system, have more following advantage compared with video-unit in the past:
1, complete the high-speed encryption of original video data is protected; After view data is real-time transmitted to our encryption chip by the original video data of Real-time Collection after amplifier and Video coding, Zu Chongzhi stream cipher arithmetic is utilized to be encrypted video, test speed can meet more than one second 33 frame, meets the requirement of real-time video.When calling if any judicial demand, then carry out the deciphering of Zu Chongzhi algorithm, reduction original video.The initial key of Zu Chongzhi algorithm and initial vector value be the fixed chip of agreement write in advance by both party.
2, integrity verification prevents distorting and forgery video; We carry out SM3 hash algorithm to video and calculate hash value, then SM3 Hash Value is again calculated at the video of receiving terminal to deciphering, whether whether then contrast HASH unanimously just can check video through distorting, the operations such as forgery, well ensure that authenticity and the tamper-resistance properties of video record.
3, achieve that data cross-platform wireless transmission is long-range checks; After video monitoring data is collected, encryption completes, is directly sent on server by wireless network card and stores, be convenient to the police or the long-range deciphering of personnel that has permission is checked.
Accompanying drawing explanation
Fig. 1 is a kind of real-time video monitoring encryption and authentication method structure chart that the present invention proposes;
Fig. 2 is sm3 chip algorithm flow chart of the present invention;
Fig. 3 is sm3 chip internal circuits structure chart of the present invention;
Fig. 4 is sm3 chip interface circuit figure of the present invention;
Fig. 5 is the part circuit structure figure of the extension of message module of sm3 chip of the present invention;
Fig. 6 is the part circuit structure figure of the compression function module of sm3 chip of the present invention;
Fig. 7 is the part circuit structure figure of the Hash Value output module of sm3 chip of the present invention;
Fig. 8 is the internal circuit configuration figure of Zu Chongzhi stream cipher machine of the present invention;
Fig. 9 is the overall construction drawing of Zu Chongzhi stream cipher machine algorithm;
Figure 10 is linear feedback shift register cellular construction figure of the present invention;
Figure 11 is bit recombination function structure chart of the present invention;
Figure 12 is two S box storage node compositions of the present invention.
Embodiment
Below in conjunction with accompanying drawing, the present invention is further detailed.
See Fig. 1, it is a kind of real-time video monitoring encryption and authentication method structure chart that the present invention proposes;
As shown in Figure 1, a kind of real-time video monitoring encryption and authentication method, comprises the following steps:
Original video is encoded, forms video requency frame data;
Carry out hash value to video requency frame data to calculate, obtain video hash value;
Video requency frame data is encrypted, forms the encrypt file comprising key stream;
Encrypt file and video hash value are carried out storing and transmitting.
Further, described original video is encoded, and forms video requency frame data, specifically comprises: original video is converted to video requency frame data by video data amplifier and video encoder.
Further, described video hash value adopts SM3 hash chip to carry out the calculating of hash value to video requency frame data.
In the embodiment of the present invention, original video information uniquely obtains one group of hash value by SM3 hash chip.
Further, to be describedly encrypted video requency frame data, to form the encrypt file comprising key stream, specifically comprise: video requency frame data is encrypted by Zu Chongzhi stream cipher machine, the video requency frame data of encryption forms encrypt file.
Further, described Zu Chongzhi stream cipher machine is using the initialization vector of the initial key of 128 and 128 as input, and the key stream exporting a string 32 words is encrypted video requency frame data.
Further, described encrypt file and video hash value are carried out storing and transmitting, specifically comprise: encrypt file and video hash value are by data wire stored in read-only storage, and encrypt file and video hash value feeding wireless network card carry out wireless transmission simultaneously.
Further, described encrypt file is carried out storing and transmitting after, also comprise: decryption verification.
Further, described decryption verification specifically comprises: be decrypted the encrypt file of transmission, again calculates sm3 Hash Value, and contrast with the hash value of original video the video data of deciphering.
The video that the present invention again deciphers in decrypting process calculates SM3 Hash Value again, and whether whether then contrast HASH and video unanimously just can be checked through distorting, the operations such as forgery, well ensure that authenticity and the tamper-resistance properties of video record.
See Fig. 2 and Fig. 4, wherein Fig. 2 is sm3 chip algorithm flow chart of the present invention; Fig. 3 is sm3 chip internal circuits structure chart of the present invention; Fig. 4 is sm3 chip interface circuit figure of the present invention.
SM3 chip described in the embodiment of the present invention adopts hardware description language combiner circuit chip, and SM3 chip comprises iteration module, expansion module, compression module and Top-layer Design Method module.The course of work of SM3 chip is: start, and starts to read in initiation parameter and current video frame data m successively, carries out message filling, iteration, and expansion, compression, finally export Hash Value, and provide work complement mark position.
M message-length described above is l (l<2 64) bit, SM3 chip is through filling and Iteration Contraction, and generate Hash Value, Hash Value length is 256 bits.M message will complete the realization principle of filling and divide into groups on upper strata as follows:
Suppose that the length of message m is l bit.First bit " 1 " is added to the end of message, then add k " 0 ", k is the minimum nonnegative integer meeting l+1+k ≡ 448mod512.And then adding 64 Bit Strings, this Bit String is the binary representation of length l.Message m after filling ' bit length be the multiple of 512.
Such as: to message 011000010110001001100011, its length l=24, obtains Bit String through filling:
Then by Bit String obtained above, the msg_in pin sending into sm3 inputs, and when needing to export, load sets high, and reads hout pin after initialization completes; If continue to be fed into message calculate Hash Value; lbock sets to 0, re-enter message calculate Hash Value then put 1, clk be clock input, rstn is for resetting, ack_in is for exporting 0 when recalculating Hash Value, and continuing when calculating Hash Value is whether the initialization of output 1, hrdy representation module completes.
Fig. 5 is the part circuit structure figure of the extension of message module of sm3 chip of the present invention; Extension of message module is that the B that message divided into groups expands generation 132 word W0, W1 by the following method ..., W67, W0 ', W1 ' ..., W63 ', for compression function CF: specifically comprise:
A) B that message divided into groups is divided into 16 word W0, W1 ..., W15; This bus is read in and is then divided by input register address.
B) 16 to 67 word circulations produce:
W j←W j-16⊕W j-9⊕(W j-3<<<15))⊕(W j-13<<<7)⊕W j-6
Get W specific bit carry out some XORs again with next W XOR, above DATA0 and DATA correspondence Wj or Wj-k sel0 correspondence control pin.
Iterative process: to each 512bit grouping B iteration in the following manner:
V(i+1)=CF(V(i),B)
Wherein CF is compression function, and V (0) is that 256 bit initial values IV, B divide into groups for filling rear 512bit message,
Compression function: make A, B, C, D, E, F, G, H are 8 word registers, and SS1, SS2, TT1, TT2 are intermediate variable, compression function V i+1=CF (V (i), B).Computational process is as follows:
ABCDEFGH←V(i)
Below run 64 times:
SS1←((A<<<12)+E+(Tj<<<j))<<<7
SS2←SS1⊕(A<<<12)
TT1←FFj(A,B,C)+D+SS2+Wj′
TT2←GGj(E,F,G)+H+SS1+Wj
D←C
C←B<<<9
B←A
A←TT1
H←G
G←F<<<19
F←E
E←P0(TT2)
Note: P 0(X)=X ⊕ (X<<<9) ⊕ (X<<<17)
Boolean function:
In formula, X, Y, Z are word.
Be the part circuit structure figure of the compression function module of sm3 chip of the present invention see Fig. 6; Wherein complete the shift operation of shift operation data input in square module, also have a pin to be that state controls.
And2 represents that XOR is run 64 taken turns by said process.
Hash Value exports: last V (i+1) ← ABCDEFGH ⊕ V (i)
Wherein, word be stored as large end (big-endian) form.
ABCDEFGH←V(n)
Export the Hash Value y=ABCDEFGH of 256 bits.
Shown in Figure 7, be the part circuit structure figure of the Hash Value output module of sm3 chip of the present invention; Wherein left side fdre is the word register representing ABCDEFGH, to deposit C pin be clk ce is enable, D is data inputs, the module that word register and a upper VI are formed in the middle of 512bit feeding completes XOR, result is stored in an output register in the last upper right corner, then each clock exports 256bit Hash Value, corresponding red frame hout pin.
See Fig. 8 to Fig. 9, wherein Fig. 8 is the internal circuit configuration figure of Zu Chongzhi stream cipher machine of the present invention; Fig. 9 is the overall construction drawing of Zu Chongzhi stream cipher machine algorithm.
As shown in Figure 8 and Figure 9, described Zu Chongzhi stream cipher machine comprises: the linear feedback shift register (LFSR) of 16 sections of top layer, the bit recombination (BR) in intermediate layer and a nonlinear function F of bottom.
As shown in Figure 10, be linear feedback shift register cellular construction figure of the present invention; Described linear feedback shift register (LFSR) has the unit (s0 of 16 31, s1,, s15), each unit is one section of linear shift register, the inner unidirectional shift LD being connected to form 32 by 31 d type flip flops, wherein O is input, and Q is for exporting, and CE pin is Enable Pin, C is clock input, and each clock pulse displacement once.
Figure 11 is bit recombination function structure chart of the present invention; Intermediate layer extracts 128 from linear feedback shift register (LFSR) unit, and form the word of 4 32, wherein front 3 words use in the nonlinear function F of bottom, and the last character is for generation of key stream.Bit recombination module described in the embodiment of the present invention, 16 unit R esult above DATAA and DATAB correspondence export the Xi (i=0 of 32,1,2,3) the inside be simple displacement from or door 4 module counterlogics as follows: the height 16 namely getting different S combines:
1.X0=s15H||s14L;
2.X1=s11L||s9H;
3.X2=s7L||s5H;
4.X3=s2L||s0H。
Described nonlinear function F comprises mnemon R1 and the R2 of 2 32.That supposes F is input as X0, X1 and X2., and wherein X0, X1 and X2 are from the output of bit recombination, and then F exports the word W of 32, and the concrete logic of function F is as follows:
F(X0,X1,X2)
{1.
2.
3.W2=R2⊕X2;
4.R1=S(L1(W1L||W2H));
5.R2=S(L2(W2L||W1H)).}
In above-mentioned logical relation, L1 and L2 is linear transformation, is improved the processing speed of nonlinear function by S box.The S box of the employing in the embodiment of the present invention 32 × 32, the S box S of 32 × 32 is made up of the S box of 4 arranged side by side 8 × 8, that is, S=(S0, S1, S2, S3), S0=S2, S1=S3 here.Figure 12 is two S box storage node compositions of the present invention.
Suppose that x is one 8 inputs of S0 (or S1).X like this x=h||l write as two hexadecimal numbers, so show the output that entry that the capable and l row of h in 8-3 intersect is S0 (or S1).
Linear transformation L1 and L2 is the linear transformation of 32 to 32, and it is defined as follows:
L1(X)=X⊕(X<<<322)⊕(X<<<3210)⊕(X<<<3218)⊕(X<<<3224),
L2(X)=X⊕(X<<<328)⊕(X<<<3214)⊕(X<<<3222)⊕(X<<<3230)。
The implementation of Zu Chongzhi stream cipher machine is divided into two stages: initial phase and working stage.Initial phase is by key and initial vector IV initialization, and namely clock control password operation but do not produced output; Working stage is along with each clock pulse, all can produce the Z of the corresponding top level structure of output of 32 words.
The clock frequency of the Zu Chongzhi stream cipher machine that the embodiment of the present invention provides is determined according to chip internal clock frequency F, and initialization needs 32 clocks, and each clock can produce 32bit key stream, and throughput can reach: F*32=32FGbps.
In the embodiment of the present invention, after view data is real-time transmitted to encryption chip by the original video data of Real-time Collection after amplifier and Video coding, utilize Zu Chongzhi stream cipher arithmetic to be encrypted video, test speed can meet more than one second 33 frame, meets the requirement of real-time video.When calling if any judicial demand, then carry out the deciphering of Zu Chongzhi algorithm, reduction original video.The initial key of Zu Chongzhi algorithm and initial vector value be the fixed chip of agreement write in advance by both party.SM3 hash algorithm is carried out to video and calculates hash value, then SM3 Hash Value is again calculated at the video of receiving terminal to deciphering, whether whether then contrast HASH unanimously just can check video through distorting, the operations such as forgery, well ensure that authenticity and the tamper-resistance properties of video record.Directly be sent on server by wireless network card and store, the police or the personnel had permission can check in long-range deciphering.
By reference to the accompanying drawings the preferred embodiment for the present invention is explained in detail above, but the invention is not restricted to above-mentioned execution mode, in the ken that those of ordinary skill in the art possess, can also make a variety of changes under the prerequisite not departing from present inventive concept.Do not depart from the spirit and scope of the present invention and can make other changes many and remodeling.Should be appreciated that and the invention is not restricted to specific execution mode, scope of the present invention is defined by the following claims.

Claims (8)

1. a real-time video monitoring encryption and authentication method, is characterized in that, comprises the following steps:
Original video is encoded, forms video requency frame data;
Carry out hash value to video requency frame data to calculate, obtain video hash value;
Video requency frame data is encrypted, forms the encrypt file comprising key stream;
Encrypt file and video hash value are carried out storing and transmitting.
2. a kind of real-time video monitoring encryption and authentication method according to claim 1, it is characterized in that, described original video is encoded, and forms video requency frame data, specifically comprises: original video is converted to video requency frame data by video data amplifier and video encoder.
3. a kind of real-time video monitoring encryption and authentication method according to claim 1, is characterized in that, described video hash value adopts SM3 hash chip to carry out hash value to video requency frame data and calculates.
4. a kind of real-time video monitoring encryption and authentication method according to claim 1, it is characterized in that, described video requency frame data to be encrypted, form the encrypt file comprising key stream, specifically comprise: video requency frame data is encrypted by Zu Chongzhi stream cipher machine, the video requency frame data of encryption forms encrypt file.
5. a kind of real-time video monitoring encryption and authentication method according to claim 4, it is characterized in that, described Zu Chongzhi stream cipher machine is using the initialization vector of the initial key of 128 and 128 as input, and the key stream exporting a string 32 words is encrypted video requency frame data.
6. a kind of real-time video monitoring encryption and authentication method according to claim 1, it is characterized in that, described encrypt file and video hash value are carried out storing and transmitting, specifically comprise: encrypt file and video hash value can by data wire stored in read-only storages, and encrypt file and video hash value feeding wireless network card carry out wireless transmission simultaneously.
7. a kind of real-time video monitoring encryption and authentication method according to claim 1, is characterized in that, described encrypt file is carried out storing and transmitting after, also comprise: decryption verification.
8. a kind of real-time video monitoring encryption and authentication method according to claim 7, it is characterized in that, described decryption verification specifically comprises: be decrypted the encrypt file of transmission, again calculates sm3 Hash Value, and contrast with the hash value of original video the video data of deciphering.
CN201410853399.8A 2014-12-31 2014-12-31 Real-time video monitoring encryption and authentication method Pending CN104602015A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410853399.8A CN104602015A (en) 2014-12-31 2014-12-31 Real-time video monitoring encryption and authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410853399.8A CN104602015A (en) 2014-12-31 2014-12-31 Real-time video monitoring encryption and authentication method

Publications (1)

Publication Number Publication Date
CN104602015A true CN104602015A (en) 2015-05-06

Family

ID=53127454

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410853399.8A Pending CN104602015A (en) 2014-12-31 2014-12-31 Real-time video monitoring encryption and authentication method

Country Status (1)

Country Link
CN (1) CN104602015A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2539900A (en) * 2015-06-30 2017-01-04 Nokia Technologies Oy A method, an apparatus and a computer program product for machine learning
WO2017193949A1 (en) * 2016-05-11 2017-11-16 中兴通讯股份有限公司 Code stream tampering monitoring method and device and communication system
CN107465660A (en) * 2017-06-30 2017-12-12 武汉斗鱼网络科技有限公司 A kind of video flowing address method for authenticating and device
CN107483866A (en) * 2017-09-15 2017-12-15 赵立峰 A kind of monitoring video equipment and kinescope method
CN107908574A (en) * 2017-11-22 2018-04-13 深圳华中科技大学研究院 The method for security protection of solid-state disk data storage
CN107995384A (en) * 2017-11-23 2018-05-04 晨星半导体股份有限公司 Video tamper resistant method, video capture equipment and video verification method
CN108833415A (en) * 2018-06-21 2018-11-16 杭州安恒信息技术股份有限公司 A kind of security solution method and video monitoring system of video monitoring system
CN110730366A (en) * 2019-10-30 2020-01-24 杭州叙简科技股份有限公司 Bit operation-based lightweight video stream encryption and decryption method and encryption and decryption mechanism
CN111586076A (en) * 2020-05-26 2020-08-25 清华大学 Remote control and telemetry information tamper-proof encryption and decryption method and system based on mixed password
CN112291063A (en) * 2020-11-03 2021-01-29 西安万像电子科技有限公司 Image data transmission method and device and image data receiving method and device
CN118713940A (en) * 2024-08-30 2024-09-27 浙江中控研究院有限公司 Anti-replay method, equipment and storage medium for time-free industrial control network communication

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1663281A (en) * 2002-06-24 2005-08-31 皇家飞利浦电子股份有限公司 Method for generating hashes from a compressed multimedia content
CN101098478A (en) * 2006-06-29 2008-01-02 三星电子株式会社 Device and method for providing video stream with integrity
CN102737270A (en) * 2011-04-15 2012-10-17 航天信息股份有限公司 Security co-processor of bank smart card chip based on domestic algorithms
CN102761790A (en) * 2011-04-27 2012-10-31 航天信息股份有限公司 Digital-watermark-based digital copyright management method and device for IPTV terminals
CN103414686A (en) * 2013-07-08 2013-11-27 中国科学院软件研究所 Image data security transmission system with support of transparent transcoding
CN103813313A (en) * 2012-11-07 2014-05-21 中国科学院微电子研究所 Hardware implementation device and method for ZUChong algorithm

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1663281A (en) * 2002-06-24 2005-08-31 皇家飞利浦电子股份有限公司 Method for generating hashes from a compressed multimedia content
CN101098478A (en) * 2006-06-29 2008-01-02 三星电子株式会社 Device and method for providing video stream with integrity
CN102737270A (en) * 2011-04-15 2012-10-17 航天信息股份有限公司 Security co-processor of bank smart card chip based on domestic algorithms
CN102761790A (en) * 2011-04-27 2012-10-31 航天信息股份有限公司 Digital-watermark-based digital copyright management method and device for IPTV terminals
CN103813313A (en) * 2012-11-07 2014-05-21 中国科学院微电子研究所 Hardware implementation device and method for ZUChong algorithm
CN103414686A (en) * 2013-07-08 2013-11-27 中国科学院软件研究所 Image data security transmission system with support of transparent transcoding

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2539900A (en) * 2015-06-30 2017-01-04 Nokia Technologies Oy A method, an apparatus and a computer program product for machine learning
WO2017193949A1 (en) * 2016-05-11 2017-11-16 中兴通讯股份有限公司 Code stream tampering monitoring method and device and communication system
CN107370712A (en) * 2016-05-11 2017-11-21 中兴通讯股份有限公司 A kind of code stream distorts monitoring method, device and communication system
WO2019001083A1 (en) * 2017-06-30 2019-01-03 武汉斗鱼网络科技有限公司 Authentication method and device for video stream address
CN107465660A (en) * 2017-06-30 2017-12-12 武汉斗鱼网络科技有限公司 A kind of video flowing address method for authenticating and device
CN107465660B (en) * 2017-06-30 2019-11-15 武汉斗鱼网络科技有限公司 A kind of video flowing address method for authenticating and device
CN107483866A (en) * 2017-09-15 2017-12-15 赵立峰 A kind of monitoring video equipment and kinescope method
CN107908574A (en) * 2017-11-22 2018-04-13 深圳华中科技大学研究院 The method for security protection of solid-state disk data storage
CN107908574B (en) * 2017-11-22 2021-09-10 深圳华中科技大学研究院 Safety protection method for solid-state disk data storage
CN107995384A (en) * 2017-11-23 2018-05-04 晨星半导体股份有限公司 Video tamper resistant method, video capture equipment and video verification method
CN108833415A (en) * 2018-06-21 2018-11-16 杭州安恒信息技术股份有限公司 A kind of security solution method and video monitoring system of video monitoring system
CN110730366A (en) * 2019-10-30 2020-01-24 杭州叙简科技股份有限公司 Bit operation-based lightweight video stream encryption and decryption method and encryption and decryption mechanism
CN111586076A (en) * 2020-05-26 2020-08-25 清华大学 Remote control and telemetry information tamper-proof encryption and decryption method and system based on mixed password
CN111586076B (en) * 2020-05-26 2021-12-07 清华大学 Remote control and telemetry information tamper-proof encryption and decryption method and system based on mixed password
CN112291063A (en) * 2020-11-03 2021-01-29 西安万像电子科技有限公司 Image data transmission method and device and image data receiving method and device
CN112291063B (en) * 2020-11-03 2023-12-19 西安万像电子科技有限公司 Image data transmission method and device, and image data receiving method and device
CN118713940A (en) * 2024-08-30 2024-09-27 浙江中控研究院有限公司 Anti-replay method, equipment and storage medium for time-free industrial control network communication

Similar Documents

Publication Publication Date Title
CN104602015A (en) Real-time video monitoring encryption and authentication method
CN112232527B (en) Safe distributed federal deep learning method
US9819657B2 (en) Protection of memory interface
US9425961B2 (en) Method for performing an encryption of an AES type, and corresponding system and computer program product
CN103413109B (en) A kind of mutual authentication method of radio frequency identification system
WO2018168723A1 (en) Technology for authenticating device on network
CN107395368B (en) Digital signature method, decapsulation method and decryption method in media-free environment
US20030081769A1 (en) Non-algebraic method of encryption and decryption
TW201812638A (en) Storage design method of blockchain encrypted radio frequency chip
KR101393806B1 (en) Multistage physical unclonable function system
CN108780548A (en) Using Elliptic Curve Cryptography for Personal Device Security to Share Secrets
CN111314069B (en) Block chain-based shaking system and method, electronic device and storage medium
KR20060051957A (en) Encrypted data distributing method, encryption device, decryption device, encryption program and decryption program
CN107769910A (en) A kind of anti-side channel analysis DES means of defences and circuit based on Latch PUF
JP2008513811A (en) Calculation conversion method and system
CN108833117B (en) Private key storage and reading method and device and hardware equipment
CN108632031A (en) Key generating device and method, encryption device and method
CN107070896B (en) Safe and efficient block chain network customized login method and safe reinforcement system
CN107465508A (en) A kind of method, system and the equipment of software and hardware combining construction true random number
KR101631680B1 (en) Physically unclonable function circuit using S-box of AES algorithm
Devi et al. AES encryption and decryption standards
CN104125059A (en) Compound time varying password and time varying type data encryption method
Zhang et al. Fault attack on the authenticated cipher ACORN v2
KR101076747B1 (en) Method and apparatus for random accessible encryption and decryption by using a hierarchical tree structure of stream cipher module
Honge et al. A chaotic algorithm of image encryption based on dispersion sampling

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20150506