CN104602015A - Real-time video monitoring encryption and authentication method - Google Patents
Real-time video monitoring encryption and authentication method Download PDFInfo
- Publication number
- CN104602015A CN104602015A CN201410853399.8A CN201410853399A CN104602015A CN 104602015 A CN104602015 A CN 104602015A CN 201410853399 A CN201410853399 A CN 201410853399A CN 104602015 A CN104602015 A CN 104602015A
- Authority
- CN
- China
- Prior art keywords
- video
- hash value
- real
- frame data
- authentication method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a real-time video monitoring encryption and authentication method. The real-time video monitoring encryption and authentication method comprises the following steps: coding an original video to form video frame data; performing hash value computation on the video frame data to obtain a video hash value; encrypting the video frame data to form an encrypted file including key stream; storing and transmitting the encrypted file and the video hash value. The real-time video monitoring encryption and authentication method can be used for completing high-speed encryption protection on the original video data, completing integrity authentication to prevent distorting and forging video by hash value comparing, and realizing remotely checking wireless transmission of a data spanning platform.
Description
Technical field
The present invention relates to field of video processing, be specifically related to a kind of real-time video monitoring encryption and authentication method.
Background technology
Along with the fast development of mobile communication network technology; particularly mobile phone; the extensive use of personal digital assistant; user needs preservation to get more and more with the video information exchanged; the safety problem of video information is highlighted more; when the facility that enjoyment video communication technology brings, the safety issue of protection individual privacy is also more and more subject to people's attention.
Present stage relies on the safety verification of transmitting procedure mostly to video data storage security, have ignored the safe storage to video requency frame data, make the fail safe of video not high, because the storage of video requency frame data exists safety problem, the authenticity and integrity of video cannot be ensured.Present stage safety video monitoring mostly by wire signal transmission, and speed cannot meet the requirement of real-time encryption and decryption.The development of present stage Internet of Things cannot be met.
In sum, how to carry out safe storage to video requency frame data, it is current problem demanding prompt solution that the speed of raising real-time encryption and decryption enables user carry out remote access by mobile terminal.
Summary of the invention
The deficiency that the present invention exists according to above-mentioned prior art, a kind of real-time video monitoring encryption and authentication method is provided, for being encrypted storage to video requency frame data, prevent distorting and forgery original video, ensure the fail safe of video data, and encryption and decryption speed is fast, meets the demand of data cross-platform wireless transmission and long-range real time inspection.
For solving the problem, the technical solution used in the present invention is: a kind of real-time video monitoring encryption and authentication method, comprises the following steps:
Original video is encoded, forms video requency frame data;
Carry out hash value to video requency frame data to calculate, obtain video hash value;
Video requency frame data is encrypted, forms the encrypt file comprising key stream;
Encrypt file and video hash value are carried out storing and transmitting.
Further, described original video is encoded, and forms video requency frame data, specifically comprises: original video is converted to video requency frame data by video data amplifier and video encoder.
Further, described video hash value adopts SM3 hash chip to carry out the calculating of hash value to video requency frame data.
Further, to be describedly encrypted video requency frame data, to form the encrypt file comprising key stream, specifically comprise: video requency frame data is encrypted by Zu Chongzhi stream cipher machine, the video requency frame data of encryption forms encrypt file.
Further, described Zu Chongzhi stream cipher machine is using the initialization vector of the initial key of 128 and 128 as input, and the key stream exporting a string 32 words is encrypted video requency frame data.
Further, described encrypt file and video hash value are carried out storing and transmitting, specifically comprise: encrypt file and video hash value are by data wire stored in read-only storage, and encrypt file and video hash value feeding wireless network card carry out wireless transmission simultaneously.
Further, described encrypt file is carried out storing and transmitting after, also comprise: decryption verification.
Further, described decryption verification specifically comprises: be decrypted the encrypt file of transmission, again calculates sm3 Hash Value, and contrast with the hash value of original video the video data of deciphering.
This video-unit utilizes hardware FPGA to design in conjunction with common camera and a kind ofly portablely, high performance completes real-time photography encryption system, have more following advantage compared with video-unit in the past:
1, complete the high-speed encryption of original video data is protected; After view data is real-time transmitted to our encryption chip by the original video data of Real-time Collection after amplifier and Video coding, Zu Chongzhi stream cipher arithmetic is utilized to be encrypted video, test speed can meet more than one second 33 frame, meets the requirement of real-time video.When calling if any judicial demand, then carry out the deciphering of Zu Chongzhi algorithm, reduction original video.The initial key of Zu Chongzhi algorithm and initial vector value be the fixed chip of agreement write in advance by both party.
2, integrity verification prevents distorting and forgery video; We carry out SM3 hash algorithm to video and calculate hash value, then SM3 Hash Value is again calculated at the video of receiving terminal to deciphering, whether whether then contrast HASH unanimously just can check video through distorting, the operations such as forgery, well ensure that authenticity and the tamper-resistance properties of video record.
3, achieve that data cross-platform wireless transmission is long-range checks; After video monitoring data is collected, encryption completes, is directly sent on server by wireless network card and stores, be convenient to the police or the long-range deciphering of personnel that has permission is checked.
Accompanying drawing explanation
Fig. 1 is a kind of real-time video monitoring encryption and authentication method structure chart that the present invention proposes;
Fig. 2 is sm3 chip algorithm flow chart of the present invention;
Fig. 3 is sm3 chip internal circuits structure chart of the present invention;
Fig. 4 is sm3 chip interface circuit figure of the present invention;
Fig. 5 is the part circuit structure figure of the extension of message module of sm3 chip of the present invention;
Fig. 6 is the part circuit structure figure of the compression function module of sm3 chip of the present invention;
Fig. 7 is the part circuit structure figure of the Hash Value output module of sm3 chip of the present invention;
Fig. 8 is the internal circuit configuration figure of Zu Chongzhi stream cipher machine of the present invention;
Fig. 9 is the overall construction drawing of Zu Chongzhi stream cipher machine algorithm;
Figure 10 is linear feedback shift register cellular construction figure of the present invention;
Figure 11 is bit recombination function structure chart of the present invention;
Figure 12 is two S box storage node compositions of the present invention.
Embodiment
Below in conjunction with accompanying drawing, the present invention is further detailed.
See Fig. 1, it is a kind of real-time video monitoring encryption and authentication method structure chart that the present invention proposes;
As shown in Figure 1, a kind of real-time video monitoring encryption and authentication method, comprises the following steps:
Original video is encoded, forms video requency frame data;
Carry out hash value to video requency frame data to calculate, obtain video hash value;
Video requency frame data is encrypted, forms the encrypt file comprising key stream;
Encrypt file and video hash value are carried out storing and transmitting.
Further, described original video is encoded, and forms video requency frame data, specifically comprises: original video is converted to video requency frame data by video data amplifier and video encoder.
Further, described video hash value adopts SM3 hash chip to carry out the calculating of hash value to video requency frame data.
In the embodiment of the present invention, original video information uniquely obtains one group of hash value by SM3 hash chip.
Further, to be describedly encrypted video requency frame data, to form the encrypt file comprising key stream, specifically comprise: video requency frame data is encrypted by Zu Chongzhi stream cipher machine, the video requency frame data of encryption forms encrypt file.
Further, described Zu Chongzhi stream cipher machine is using the initialization vector of the initial key of 128 and 128 as input, and the key stream exporting a string 32 words is encrypted video requency frame data.
Further, described encrypt file and video hash value are carried out storing and transmitting, specifically comprise: encrypt file and video hash value are by data wire stored in read-only storage, and encrypt file and video hash value feeding wireless network card carry out wireless transmission simultaneously.
Further, described encrypt file is carried out storing and transmitting after, also comprise: decryption verification.
Further, described decryption verification specifically comprises: be decrypted the encrypt file of transmission, again calculates sm3 Hash Value, and contrast with the hash value of original video the video data of deciphering.
The video that the present invention again deciphers in decrypting process calculates SM3 Hash Value again, and whether whether then contrast HASH and video unanimously just can be checked through distorting, the operations such as forgery, well ensure that authenticity and the tamper-resistance properties of video record.
See Fig. 2 and Fig. 4, wherein Fig. 2 is sm3 chip algorithm flow chart of the present invention; Fig. 3 is sm3 chip internal circuits structure chart of the present invention; Fig. 4 is sm3 chip interface circuit figure of the present invention.
SM3 chip described in the embodiment of the present invention adopts hardware description language combiner circuit chip, and SM3 chip comprises iteration module, expansion module, compression module and Top-layer Design Method module.The course of work of SM3 chip is: start, and starts to read in initiation parameter and current video frame data m successively, carries out message filling, iteration, and expansion, compression, finally export Hash Value, and provide work complement mark position.
M message-length described above is l (l<2
64) bit, SM3 chip is through filling and Iteration Contraction, and generate Hash Value, Hash Value length is 256 bits.M message will complete the realization principle of filling and divide into groups on upper strata as follows:
Suppose that the length of message m is l bit.First bit " 1 " is added to the end of message, then add k " 0 ", k is the minimum nonnegative integer meeting l+1+k ≡ 448mod512.And then adding 64 Bit Strings, this Bit String is the binary representation of length l.Message m after filling ' bit length be the multiple of 512.
Such as: to message 011000010110001001100011, its length l=24, obtains Bit String through filling:
Then by Bit String obtained above, the msg_in pin sending into sm3 inputs, and when needing to export, load sets high, and reads hout pin after initialization completes; If continue to be fed into message calculate Hash Value; lbock sets to 0, re-enter message calculate Hash Value then put 1, clk be clock input, rstn is for resetting, ack_in is for exporting 0 when recalculating Hash Value, and continuing when calculating Hash Value is whether the initialization of output 1, hrdy representation module completes.
Fig. 5 is the part circuit structure figure of the extension of message module of sm3 chip of the present invention; Extension of message module is that the B that message divided into groups expands generation 132 word W0, W1 by the following method ..., W67, W0 ', W1 ' ..., W63 ', for compression function CF: specifically comprise:
A) B that message divided into groups is divided into 16 word W0, W1 ..., W15; This bus is read in and is then divided by input register address.
B) 16 to 67 word circulations produce:
W
j←W
j-16⊕W
j-9⊕(W
j-3<<<15))⊕(W
j-13<<<7)⊕W
j-6
Get W specific bit carry out some XORs again with next W XOR, above DATA0 and DATA correspondence Wj or Wj-k sel0 correspondence control pin.
Iterative process: to each 512bit grouping B iteration in the following manner:
V(i+1)=CF(V(i),B)
Wherein CF is compression function, and V (0) is that 256 bit initial values IV, B divide into groups for filling rear 512bit message,
Compression function: make A, B, C, D, E, F, G, H are 8 word registers, and SS1, SS2, TT1, TT2 are intermediate variable, compression function V
i+1=CF (V
(i), B).Computational process is as follows:
ABCDEFGH←V(i)
Below run 64 times:
SS1←((A<<<12)+E+(Tj<<<j))<<<7
SS2←SS1⊕(A<<<12)
TT1←FFj(A,B,C)+D+SS2+Wj′
TT2←GGj(E,F,G)+H+SS1+Wj
D←C
C←B<<<9
B←A
A←TT1
H←G
G←F<<<19
F←E
E←P0(TT2)
Note: P
0(X)=X ⊕ (X<<<9) ⊕ (X<<<17)
Boolean function:
In formula, X, Y, Z are word.
Be the part circuit structure figure of the compression function module of sm3 chip of the present invention see Fig. 6; Wherein complete the shift operation of shift operation data input in square module, also have a pin to be that state controls.
And2 represents that XOR is run 64 taken turns by said process.
Hash Value exports: last V (i+1) ← ABCDEFGH ⊕ V (i)
Wherein, word be stored as large end (big-endian) form.
ABCDEFGH←V(n)
Export the Hash Value y=ABCDEFGH of 256 bits.
Shown in Figure 7, be the part circuit structure figure of the Hash Value output module of sm3 chip of the present invention; Wherein left side fdre is the word register representing ABCDEFGH, to deposit C pin be clk ce is enable, D is data inputs, the module that word register and a upper VI are formed in the middle of 512bit feeding completes XOR, result is stored in an output register in the last upper right corner, then each clock exports 256bit Hash Value, corresponding red frame hout pin.
See Fig. 8 to Fig. 9, wherein Fig. 8 is the internal circuit configuration figure of Zu Chongzhi stream cipher machine of the present invention; Fig. 9 is the overall construction drawing of Zu Chongzhi stream cipher machine algorithm.
As shown in Figure 8 and Figure 9, described Zu Chongzhi stream cipher machine comprises: the linear feedback shift register (LFSR) of 16 sections of top layer, the bit recombination (BR) in intermediate layer and a nonlinear function F of bottom.
As shown in Figure 10, be linear feedback shift register cellular construction figure of the present invention; Described linear feedback shift register (LFSR) has the unit (s0 of 16 31, s1,, s15), each unit is one section of linear shift register, the inner unidirectional shift LD being connected to form 32 by 31 d type flip flops, wherein O is input, and Q is for exporting, and CE pin is Enable Pin, C is clock input, and each clock pulse displacement once.
Figure 11 is bit recombination function structure chart of the present invention; Intermediate layer extracts 128 from linear feedback shift register (LFSR) unit, and form the word of 4 32, wherein front 3 words use in the nonlinear function F of bottom, and the last character is for generation of key stream.Bit recombination module described in the embodiment of the present invention, 16 unit R esult above DATAA and DATAB correspondence export the Xi (i=0 of 32,1,2,3) the inside be simple displacement from or door 4 module counterlogics as follows: the height 16 namely getting different S combines:
1.X0=s15H||s14L;
2.X1=s11L||s9H;
3.X2=s7L||s5H;
4.X3=s2L||s0H。
Described nonlinear function F comprises mnemon R1 and the R2 of 2 32.That supposes F is input as X0, X1 and X2., and wherein X0, X1 and X2 are from the output of bit recombination, and then F exports the word W of 32, and the concrete logic of function F is as follows:
F(X0,X1,X2)
{1.
2.
3.W2=R2⊕X2;
4.R1=S(L1(W1L||W2H));
5.R2=S(L2(W2L||W1H)).}
In above-mentioned logical relation, L1 and L2 is linear transformation, is improved the processing speed of nonlinear function by S box.The S box of the employing in the embodiment of the present invention 32 × 32, the S box S of 32 × 32 is made up of the S box of 4 arranged side by side 8 × 8, that is, S=(S0, S1, S2, S3), S0=S2, S1=S3 here.Figure 12 is two S box storage node compositions of the present invention.
Suppose that x is one 8 inputs of S0 (or S1).X like this x=h||l write as two hexadecimal numbers, so show the output that entry that the capable and l row of h in 8-3 intersect is S0 (or S1).
Linear transformation L1 and L2 is the linear transformation of 32 to 32, and it is defined as follows:
L1(X)=X⊕(X<<<322)⊕(X<<<3210)⊕(X<<<3218)⊕(X<<<3224),
L2(X)=X⊕(X<<<328)⊕(X<<<3214)⊕(X<<<3222)⊕(X<<<3230)。
The implementation of Zu Chongzhi stream cipher machine is divided into two stages: initial phase and working stage.Initial phase is by key and initial vector IV initialization, and namely clock control password operation but do not produced output; Working stage is along with each clock pulse, all can produce the Z of the corresponding top level structure of output of 32 words.
The clock frequency of the Zu Chongzhi stream cipher machine that the embodiment of the present invention provides is determined according to chip internal clock frequency F, and initialization needs 32 clocks, and each clock can produce 32bit key stream, and throughput can reach: F*32=32FGbps.
In the embodiment of the present invention, after view data is real-time transmitted to encryption chip by the original video data of Real-time Collection after amplifier and Video coding, utilize Zu Chongzhi stream cipher arithmetic to be encrypted video, test speed can meet more than one second 33 frame, meets the requirement of real-time video.When calling if any judicial demand, then carry out the deciphering of Zu Chongzhi algorithm, reduction original video.The initial key of Zu Chongzhi algorithm and initial vector value be the fixed chip of agreement write in advance by both party.SM3 hash algorithm is carried out to video and calculates hash value, then SM3 Hash Value is again calculated at the video of receiving terminal to deciphering, whether whether then contrast HASH unanimously just can check video through distorting, the operations such as forgery, well ensure that authenticity and the tamper-resistance properties of video record.Directly be sent on server by wireless network card and store, the police or the personnel had permission can check in long-range deciphering.
By reference to the accompanying drawings the preferred embodiment for the present invention is explained in detail above, but the invention is not restricted to above-mentioned execution mode, in the ken that those of ordinary skill in the art possess, can also make a variety of changes under the prerequisite not departing from present inventive concept.Do not depart from the spirit and scope of the present invention and can make other changes many and remodeling.Should be appreciated that and the invention is not restricted to specific execution mode, scope of the present invention is defined by the following claims.
Claims (8)
1. a real-time video monitoring encryption and authentication method, is characterized in that, comprises the following steps:
Original video is encoded, forms video requency frame data;
Carry out hash value to video requency frame data to calculate, obtain video hash value;
Video requency frame data is encrypted, forms the encrypt file comprising key stream;
Encrypt file and video hash value are carried out storing and transmitting.
2. a kind of real-time video monitoring encryption and authentication method according to claim 1, it is characterized in that, described original video is encoded, and forms video requency frame data, specifically comprises: original video is converted to video requency frame data by video data amplifier and video encoder.
3. a kind of real-time video monitoring encryption and authentication method according to claim 1, is characterized in that, described video hash value adopts SM3 hash chip to carry out hash value to video requency frame data and calculates.
4. a kind of real-time video monitoring encryption and authentication method according to claim 1, it is characterized in that, described video requency frame data to be encrypted, form the encrypt file comprising key stream, specifically comprise: video requency frame data is encrypted by Zu Chongzhi stream cipher machine, the video requency frame data of encryption forms encrypt file.
5. a kind of real-time video monitoring encryption and authentication method according to claim 4, it is characterized in that, described Zu Chongzhi stream cipher machine is using the initialization vector of the initial key of 128 and 128 as input, and the key stream exporting a string 32 words is encrypted video requency frame data.
6. a kind of real-time video monitoring encryption and authentication method according to claim 1, it is characterized in that, described encrypt file and video hash value are carried out storing and transmitting, specifically comprise: encrypt file and video hash value can by data wire stored in read-only storages, and encrypt file and video hash value feeding wireless network card carry out wireless transmission simultaneously.
7. a kind of real-time video monitoring encryption and authentication method according to claim 1, is characterized in that, described encrypt file is carried out storing and transmitting after, also comprise: decryption verification.
8. a kind of real-time video monitoring encryption and authentication method according to claim 7, it is characterized in that, described decryption verification specifically comprises: be decrypted the encrypt file of transmission, again calculates sm3 Hash Value, and contrast with the hash value of original video the video data of deciphering.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410853399.8A CN104602015A (en) | 2014-12-31 | 2014-12-31 | Real-time video monitoring encryption and authentication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410853399.8A CN104602015A (en) | 2014-12-31 | 2014-12-31 | Real-time video monitoring encryption and authentication method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104602015A true CN104602015A (en) | 2015-05-06 |
Family
ID=53127454
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410853399.8A Pending CN104602015A (en) | 2014-12-31 | 2014-12-31 | Real-time video monitoring encryption and authentication method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104602015A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2539900A (en) * | 2015-06-30 | 2017-01-04 | Nokia Technologies Oy | A method, an apparatus and a computer program product for machine learning |
WO2017193949A1 (en) * | 2016-05-11 | 2017-11-16 | 中兴通讯股份有限公司 | Code stream tampering monitoring method and device and communication system |
CN107465660A (en) * | 2017-06-30 | 2017-12-12 | 武汉斗鱼网络科技有限公司 | A kind of video flowing address method for authenticating and device |
CN107483866A (en) * | 2017-09-15 | 2017-12-15 | 赵立峰 | A kind of monitoring video equipment and kinescope method |
CN107908574A (en) * | 2017-11-22 | 2018-04-13 | 深圳华中科技大学研究院 | The method for security protection of solid-state disk data storage |
CN107995384A (en) * | 2017-11-23 | 2018-05-04 | 晨星半导体股份有限公司 | Video tamper resistant method, video capture equipment and video verification method |
CN108833415A (en) * | 2018-06-21 | 2018-11-16 | 杭州安恒信息技术股份有限公司 | A kind of security solution method and video monitoring system of video monitoring system |
CN110730366A (en) * | 2019-10-30 | 2020-01-24 | 杭州叙简科技股份有限公司 | Bit operation-based lightweight video stream encryption and decryption method and encryption and decryption mechanism |
CN111586076A (en) * | 2020-05-26 | 2020-08-25 | 清华大学 | Remote control and telemetry information tamper-proof encryption and decryption method and system based on mixed password |
CN112291063A (en) * | 2020-11-03 | 2021-01-29 | 西安万像电子科技有限公司 | Image data transmission method and device and image data receiving method and device |
CN118713940A (en) * | 2024-08-30 | 2024-09-27 | 浙江中控研究院有限公司 | Anti-replay method, equipment and storage medium for time-free industrial control network communication |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1663281A (en) * | 2002-06-24 | 2005-08-31 | 皇家飞利浦电子股份有限公司 | Method for generating hashes from a compressed multimedia content |
CN101098478A (en) * | 2006-06-29 | 2008-01-02 | 三星电子株式会社 | Device and method for providing video stream with integrity |
CN102737270A (en) * | 2011-04-15 | 2012-10-17 | 航天信息股份有限公司 | Security co-processor of bank smart card chip based on domestic algorithms |
CN102761790A (en) * | 2011-04-27 | 2012-10-31 | 航天信息股份有限公司 | Digital-watermark-based digital copyright management method and device for IPTV terminals |
CN103414686A (en) * | 2013-07-08 | 2013-11-27 | 中国科学院软件研究所 | Image data security transmission system with support of transparent transcoding |
CN103813313A (en) * | 2012-11-07 | 2014-05-21 | 中国科学院微电子研究所 | Hardware implementation device and method for ZUChong algorithm |
-
2014
- 2014-12-31 CN CN201410853399.8A patent/CN104602015A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1663281A (en) * | 2002-06-24 | 2005-08-31 | 皇家飞利浦电子股份有限公司 | Method for generating hashes from a compressed multimedia content |
CN101098478A (en) * | 2006-06-29 | 2008-01-02 | 三星电子株式会社 | Device and method for providing video stream with integrity |
CN102737270A (en) * | 2011-04-15 | 2012-10-17 | 航天信息股份有限公司 | Security co-processor of bank smart card chip based on domestic algorithms |
CN102761790A (en) * | 2011-04-27 | 2012-10-31 | 航天信息股份有限公司 | Digital-watermark-based digital copyright management method and device for IPTV terminals |
CN103813313A (en) * | 2012-11-07 | 2014-05-21 | 中国科学院微电子研究所 | Hardware implementation device and method for ZUChong algorithm |
CN103414686A (en) * | 2013-07-08 | 2013-11-27 | 中国科学院软件研究所 | Image data security transmission system with support of transparent transcoding |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2539900A (en) * | 2015-06-30 | 2017-01-04 | Nokia Technologies Oy | A method, an apparatus and a computer program product for machine learning |
WO2017193949A1 (en) * | 2016-05-11 | 2017-11-16 | 中兴通讯股份有限公司 | Code stream tampering monitoring method and device and communication system |
CN107370712A (en) * | 2016-05-11 | 2017-11-21 | 中兴通讯股份有限公司 | A kind of code stream distorts monitoring method, device and communication system |
WO2019001083A1 (en) * | 2017-06-30 | 2019-01-03 | 武汉斗鱼网络科技有限公司 | Authentication method and device for video stream address |
CN107465660A (en) * | 2017-06-30 | 2017-12-12 | 武汉斗鱼网络科技有限公司 | A kind of video flowing address method for authenticating and device |
CN107465660B (en) * | 2017-06-30 | 2019-11-15 | 武汉斗鱼网络科技有限公司 | A kind of video flowing address method for authenticating and device |
CN107483866A (en) * | 2017-09-15 | 2017-12-15 | 赵立峰 | A kind of monitoring video equipment and kinescope method |
CN107908574A (en) * | 2017-11-22 | 2018-04-13 | 深圳华中科技大学研究院 | The method for security protection of solid-state disk data storage |
CN107908574B (en) * | 2017-11-22 | 2021-09-10 | 深圳华中科技大学研究院 | Safety protection method for solid-state disk data storage |
CN107995384A (en) * | 2017-11-23 | 2018-05-04 | 晨星半导体股份有限公司 | Video tamper resistant method, video capture equipment and video verification method |
CN108833415A (en) * | 2018-06-21 | 2018-11-16 | 杭州安恒信息技术股份有限公司 | A kind of security solution method and video monitoring system of video monitoring system |
CN110730366A (en) * | 2019-10-30 | 2020-01-24 | 杭州叙简科技股份有限公司 | Bit operation-based lightweight video stream encryption and decryption method and encryption and decryption mechanism |
CN111586076A (en) * | 2020-05-26 | 2020-08-25 | 清华大学 | Remote control and telemetry information tamper-proof encryption and decryption method and system based on mixed password |
CN111586076B (en) * | 2020-05-26 | 2021-12-07 | 清华大学 | Remote control and telemetry information tamper-proof encryption and decryption method and system based on mixed password |
CN112291063A (en) * | 2020-11-03 | 2021-01-29 | 西安万像电子科技有限公司 | Image data transmission method and device and image data receiving method and device |
CN112291063B (en) * | 2020-11-03 | 2023-12-19 | 西安万像电子科技有限公司 | Image data transmission method and device, and image data receiving method and device |
CN118713940A (en) * | 2024-08-30 | 2024-09-27 | 浙江中控研究院有限公司 | Anti-replay method, equipment and storage medium for time-free industrial control network communication |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104602015A (en) | Real-time video monitoring encryption and authentication method | |
CN112232527B (en) | Safe distributed federal deep learning method | |
US9819657B2 (en) | Protection of memory interface | |
US9425961B2 (en) | Method for performing an encryption of an AES type, and corresponding system and computer program product | |
CN103413109B (en) | A kind of mutual authentication method of radio frequency identification system | |
WO2018168723A1 (en) | Technology for authenticating device on network | |
CN107395368B (en) | Digital signature method, decapsulation method and decryption method in media-free environment | |
US20030081769A1 (en) | Non-algebraic method of encryption and decryption | |
TW201812638A (en) | Storage design method of blockchain encrypted radio frequency chip | |
KR101393806B1 (en) | Multistage physical unclonable function system | |
CN108780548A (en) | Using Elliptic Curve Cryptography for Personal Device Security to Share Secrets | |
CN111314069B (en) | Block chain-based shaking system and method, electronic device and storage medium | |
KR20060051957A (en) | Encrypted data distributing method, encryption device, decryption device, encryption program and decryption program | |
CN107769910A (en) | A kind of anti-side channel analysis DES means of defences and circuit based on Latch PUF | |
JP2008513811A (en) | Calculation conversion method and system | |
CN108833117B (en) | Private key storage and reading method and device and hardware equipment | |
CN108632031A (en) | Key generating device and method, encryption device and method | |
CN107070896B (en) | Safe and efficient block chain network customized login method and safe reinforcement system | |
CN107465508A (en) | A kind of method, system and the equipment of software and hardware combining construction true random number | |
KR101631680B1 (en) | Physically unclonable function circuit using S-box of AES algorithm | |
Devi et al. | AES encryption and decryption standards | |
CN104125059A (en) | Compound time varying password and time varying type data encryption method | |
Zhang et al. | Fault attack on the authenticated cipher ACORN v2 | |
KR101076747B1 (en) | Method and apparatus for random accessible encryption and decryption by using a hierarchical tree structure of stream cipher module | |
Honge et al. | A chaotic algorithm of image encryption based on dispersion sampling |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20150506 |