Video conference confidentiality method based on chaotic encryption algorithm

A technology of video conference and security method, which is applied in the direction of secure communication through chaotic signals, video conference system, two-way working system, etc., and can solve the problem that the encryption system does not appear.

Inactive Publication Date: 2018-06-08
QINZHOU JINGTONG TECH CO LTD
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although in theory chaotic dynamics is considered to bring about a new revolution in cryptography, in real life, efficient and reliable encryption systems based on chaos have not appeared.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0012] A video conference security method based on a chaotic encryption algorithm. On the basis of a double chaotic sequence encryption algorithm with alternating segments and mutual scrambling, a high-precision digital method and Di2rectShow technology are used to develop an audio and video data encryption filter to form a video conference program by mechanism The encryption core of , is realized by the following steps: Build a P2P network structure with a custom CA mechanism. The specific implementation method is: (1) The creator of the meeting first creates a map identity control file, and adds the name of the map to be created, the name of the creator, and the name of the map. Identity (using the PeerIdentityCreate function), and the creator’s RSA public key (for verification of legal messages and security update of encryption module keys), and define a validity period for this file; (2) The file is transmitted by a third party, such as E2mail , sent to the participants who...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a video conference confidentiality method based on a chaotic encryption algorithm and belongs to the technical field of encryption. The method is mainly realized through the following steps: 1) construction of a P2P network structure having a customized CA mechanism; 2) audio and video collection / playback based on DirectShow; 3) realization of chaotic encryption / decryption Filters; and 4) realization of a chaotic encryption and decryption algorithm. By constructing the P2P network having the CA mechanism and developing an encryption layer using chaotic encryption and dynamic key mechanism, eavesdropping of conference content can be avoided effectively; implementation of scheme software proves that the chaotic encryption algorithm is practical and feasible; and underscheme design of overall encryption of a frame of AVI audio and video data stream, the fact that system audio and video can play smoothly can also prove that the chaotic encryption algorithm has speedadvantage in the encryption sequence generation and encryption process.

Description

technical field [0001] The invention relates to the technical field of encryption, in particular to a video conference security method based on a chaotic encryption algorithm. Background technique [0002] In 1990, L.M.Pecora and T.L.Carroll discovered chaos synchronization technology and proposed a secure communication scheme based on chaos synchronization. The research on chaos secure communication has become a hot topic in the field of international electronic communication[1]. Although in theory chaotic dynamics is considered to bring about a new revolution in cryptography, in real life, efficient and reliable encryption systems based on chaos have not appeared. Contents of the invention [0003] Aiming at the problems to be solved above, the present invention provides a video conference security method based on a chaotic encryption algorithm. [0004] For realizing the purpose of the present invention, the technical scheme adopted in the present invention is: [000...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04L29/08H04N7/15
CPCH04L9/001H04L63/0428H04N7/15
Inventor 不公告发明人
Owner QINZHOU JINGTONG TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products