Volume 41 Issue 1
Jan.  2015
Turn off MathJax
Article Contents
WANG Wei, HUANG Hao, XIE Changsheng, et al. Video encryption algorithm of content associated key[J]. Journal of Beijing University of Aeronautics and Astronautics, 2015, 41(1): 117-123. doi: 10.13700/j.bh.1001-5965.2014.0459(in Chinese)
Citation: WANG Wei, HUANG Hao, XIE Changsheng, et al. Video encryption algorithm of content associated key[J]. Journal of Beijing University of Aeronautics and Astronautics, 2015, 41(1): 117-123. doi: 10.13700/j.bh.1001-5965.2014.0459(in Chinese)

Video encryption algorithm of content associated key

doi: 10.13700/j.bh.1001-5965.2014.0459
  • Received Date: 28 Apr 2014
  • Publish Date: 20 Jan 2015
  • With the development of computer technology and video, display technology, there are new requirements of video encryption algorithm. A video content associated key concept was proposed and used in the encryption of video after the research of current video encryption algorithm's defects in video copyright protection technologies. The extraction algorithm which used the motion vector prediction residual as sensitive data extracted the sensitive data from the plaintext video. The extraction algorithm effectively destroyed the video quality within 10% sensitive data extraction ratio. In order to prove the effect of extraction algorithm, the video quality measurement algorithm of peak signal to noise ratio (PSNR) and structural similarity index measurement (SSIM) was used to assess encrypted videos with different video contents and parameters, and proved the performance by performance analysis and comparison with other algorithm. The experiment results show the validity and consistency of video encryption algorithm based on the content associated key.

     

  • loading
  • [1]
    Wang W,Huang H,Xie C S.A sensitive data extraction algorithm based on the content associated encryption technology for ICS[C]//Proceedings of 2012 Internation Workshop on Information Storage and 9th International Symposium on Optical Storage.Bellingham:SPIE,2013:87820T-1-87820T-7.
    [2]
    毕厚杰.新一代视频压缩编码标准-H.264/AVC[M].北京:人民邮电出版社,2002:84-89.Bi H J.A new generation of video compression coding standard H.264[M].Beijing:Posts & Telecom Press,2002:84-89(in Chinese).
    [3]
    Kalva H.The H.264 video coding standard[J].IEEE Multimedia,2006,13(4):86-90.
    [4]
    Wiegand T,Sullivan G J,Bjontegaard G,et al.Overview of the H.264/AVC video coding standard[J].IEEE Transactions on Circuits and Systems for Video Technology,2003,13(7):560-567.
    [5]
    郑翔,叶志远,周秉锋.JVT草案中的核心技术综述[J].软件学报,2004,15(1):58-68.Zheng X,Ye Z Y,Zhou B F.A survey on the core technology of JVT drafts[J].Journal of Software,2004,15(1):58-68(in Chinese).
    [6]
    姚晔,徐正全,杨志云.基于伪随机序列的宏块置乱视频加密方案[J].计算机工程,2005,31(20):162-164Yao Y,Xu Z Q,Yang Z Y,Macro block permutation video encryption approach based on pseudo-random sequence[J].Computer Engineering,2005,31(20):162-164(in Chinese).
    [7]
    王化丰,张桂香,邵勇.基于Logistic映射的混沌流密码设计[J].计算机工程,2007,33(10):164-168.Wang H F,Zhang G X,Shao Y.Design of chaotic stream cipher based on logistic mapping[J].Computer Engineering,2007,33(10):164-168(in Chinese).
    [8]
    Huynh-Thu Q,Ghanbari M.Scope of validity of PSNR in image/video quality assessment[J].Electronics Letters,2008,44(13):800-801.
    [9]
    Olsson S,Stroppiana M,Baina J.Objective methods for assessment of video quality:state of the art[J].IEEE Transactions on Broadcasting,1997,43(4):487-495.
    [10]
    Wang Z,Bovik A C,Sheikh H R,et al.Image quality assessment:from error visibility to structural similarity[J].IEEE Transactions on Image Processing,2004,13(4):600-612.
    [11]
    Winkler S,Mohandas P.The evolution of video quality measurement:from PSNR to hybrid metrics[J].IEEE Transactions on Broadcasting,2008,54(3):660-668.
    [12]
    Shyamprasad C,Vijay S,Martin R,et al.Objective video quality assessment methods:a classification, review, and performance comparison[J].IEEE Transactions on Broadcasting,2011,57(2):165-182.
    [13]
    Li S,Ma L,Ngab K N.Full-reference video quality assessment by decoupling detail losses and additive impairments[J].IEEE Transactions on Circuits and Systems for Video Technology,2012,22(7):1100-1112.
    [14]
    Li X J,Chen J F.Robust transmission of JPEG2000 encoded images over packet loss channels[C]//Proceedings of 2007 IEEE International Conference on Multimedia and Expo.Piscataway,NJ:IEEE,2007:947-950.
    [15]
    杨耀东.光盘授权播放内容加密算法研究[D].武汉:华中科技大学,2011.Yang Y D.Research on content encryption algorithm of Disc authentication system[D].Wuhan:Huazhong University of Science and Technology,2011(in Chinese)

  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views(1035) PDF downloads(646) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return