Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encrypted embedded video chaotic secret communication method after H.264 coding

A post-encoding encryption and secure communication technology, which is applied in the field of embedded video chaotic secure communication, can solve problems such as insufficient security and efficiency, difficult design, and reduced encoding compression rate, so as to improve real-time performance, security, and real-time performance And the effect of high security and increasing the unique solution distance

Active Publication Date: 2016-07-20
GUANGDONG UNIV OF TECH
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. After chaotic encryption, the correlation of the original video is disrupted, resulting in a greatly reduced encoding and compression efficiency of H.264, and the amount of encoded video data is large. Whether H.264 hardware encoding or software encoding is used, the encrypted video The transmission rate via Ethernet is not high enough; the image data volume in RGB format is much larger than the I frame or P frame data volume after H.264 compression. 264 compressed to KB level
The amount of encrypted data is large, and the encryption takes a long time;
[0005] 2. The encoding efficiency is low. The H.264 encoder relies on the spatial correlation of the image to compress to obtain I frames, and relies on the temporal correlation between frames to compress to obtain P frames.
However, the spatial-temporal correlation of the encrypted RGB image pixels is disrupted, which seriously affects the efficiency of the encoder, which is reflected in the greatly reduced encoding compression rate;
[0006] 3. Low transmission efficiency
The low compression efficiency of H.264 leads to a large amount of data in the H.264 video signal. When the network transmission bandwidth is constant, the transmission frame rate decreases;
[0007] 4. Only the encryption method of position scrambling can be used, and the size of video pixels cannot be encrypted. Otherwise, due to the quantization in H.264, the receiving end will not be able to decrypt correctly even if the key matches. The original video, but only the encryption method of position scrambling, the statistical characteristics are not good, and the security performance is not high
[0010] 2. Low operating efficiency
The execution speed of software is much lower than that of hardware, so the operating efficiency is low
The selective encryption scheme can only transplant the encryption algorithm based on the H.264 codec open source code, but cannot transplant the encryption algorithm based on the hardware codec circuit. Therefore, this scheme cannot utilize the hardware resources in the chip, and the encoding operation efficiency is low.
[0011] 3. The design is difficult
The H.264 encoding process is complicated, with many variables and branches. It is quite difficult to accurately encrypt the corresponding variables and decrypt them accurately;
[0012] 4. At present, mobile phones and other mobile terminals mainly use H.264 hardware encoding and compression, but it is still difficult to complete selective chaotic encryption on the basis of H.264 hardware encoding.
[0014] 1. The data size of each frame of video stream after H.264 compression is variable, so it is difficult to use a set of scrambling parameters for scrambling encryption, but it is impossible to use countless sets of scrambling parameters for encryption;
[0015] 2. The size of each frame of H.264 video stream must meet the requirements of extending into a regular m×n order matrix in units of 3 bytes, so as to meet the conditions of scrambling and encryption, and the video stream obtained by H.264 compression The length cannot be guaranteed to meet this requirement;
[0016] 3. Stream cipher encryption will destroy part of the data in the H.264 video stream during the self-synchronization process. Because of the strict syntax of H.264, even one bit of data damage will cause decoding failure and interrupt the normal video communication
There are security and efficiency deficiencies in encrypting first and then encoding

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypted embedded video chaotic secret communication method after H.264 coding
  • Encrypted embedded video chaotic secret communication method after H.264 coding
  • Encrypted embedded video chaotic secret communication method after H.264 coding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0044] see figure 1 , the method of the present invention comprises the following steps: camera captures video, JPEG decoding of video image, RGB format to YUV420 format conversion, H.264 hardware encoding, chaotic stream cipher encryption, chaotic scrambling encryption of pixel position, network transmission, wide area network transmission , network reception, chaotic anti-scrambling decryption of pixel positions, chaotic stream cipher decryption, successful decoding of H.264 hardware under key matching conditions, conversion from YUV420 format to RGB format, decrypted video display, key mismatch conditions After the H.264 hardware decoding fails, the communication between the sending end and the receiving end stops, and the original video signal cannot be decrypted.

[0045] 1. At the sending end, the operation mode of four cores and four threads is adopted, and the sequence of H.264 hardware encoding and chaotic encryption is followed. The specific operation steps at the s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encrypted embedded video chaotic secret communication method after H.264 coding. The encrypted embedded video chaotic secret communication method comprises the following steps of S1, at a transmitting end, performing H.264 hardware coding, chaotic flow password encryption, pixel-position chaotic scrambling encryption, network transmission and wide-area network transmission on video data; and S2, at a receiving end, receiving encrypted video data through the network, finishing pixel-position chaotic descrambling decryption and chaotic flow cipher decryption, realizing H.264 hardware decoding on the condition that a password matches, and stopping communication between the transmitting end and the receiving end after H.264 hardware decoding failure on the condition that password mismatching occurs. The encrypted embedded video chaotic secret communication method has double encryptions, namely chaotic flow password encryption and chaotic position scrambling encryption. The double encryptions are performed after H.264 coding compression. The encrypted embedded video chaotic secret communication method has advantages of realizing no damage of original video correlation, improving coding efficiency, reducing data redundancy, and realizing high real-time performance and high safety of an encryption system.

Description

technical field [0001] The invention relates to video security communication technology in multimedia communication, in particular to an embedded video chaos security communication method encrypted after H.264 encoding. Background technique [0002] In video chaotic secure communication, there are currently two chaotic encryption methods widely used by people: [0003] The first way is to encrypt first and then perform H.264 or HEVC encoding and compression. The characteristic of this encryption method is that it is more convenient to deal with at the technical level, but it has the following shortcomings: [0004] 1. After chaotic encryption, the correlation of the original video is disrupted, resulting in a greatly reduced encoding and compression efficiency of H.264, and the amount of encoded video data is large. Whether H.264 hardware encoding or software encoding is used, the encrypted video The transmission rate via Ethernet is not high enough; the image data volume i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04N19/46H04N21/2347H04N21/4405
CPCH04N19/46H04N21/2347H04N21/4405
Inventor 陈平张晓扬禹思敏
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products