期刊文献+

H.264视频加密算法的研究及改进 被引量:8

Research and Improvement of the Video Encryption Algorithm for H.264
下载PDF
导出
摘要 本文提出将帧内、帧间预测模式置乱,量化系数与运动矢量加密相结合的H.264视频加密方法,试验表明此方法具有良好的加密效果,其算法复杂度低,对编码效率影响小,适合实时应用;在此基础上我们进一步提出了一套完整的视频加密系统,通过将二层序列密钥同步与告知机制相结合的方法实现了快速序列密钥同步,多用户访问控制,并扩大了序列密钥的产生空间,增加了系统的安全性. A new video encryption method which utilized Intra,Inter prediction mode scrambling,transform results and modon vector encryption is proposed in this paper based on the formers' research work. Test showed that this method exhibits nice security;moreover its computational complexity is rather low, has little impact on encoding efficiency and can be realized in real time environment. A video encrypfion system based on the algorithm is also put up, the fast synchronize of the su'eaming key and multiple user access is achieved by two-level synchronization and telling mechanism.
出处 《电子学报》 EI CAS CSCD 北大核心 2007年第9期1724-1727,共4页 Acta Electronica Sinica
基金 国家自然科学基金(No.60474035) 国家教育部博士点基金(No.20060359004)
关键词 视频加密 置乱 混沌随机序列 video encrypfion scrambling chaos pseudo sequence
  • 相关文献

参考文献1

二级参考文献10

  • 1Tang L.. Methods for encrypting an decrypting mpeg video data efficiently. In: Proceedings of ACM Multimedia'96, Boston United States, 1996, 219~229
  • 2Shi C.,Bhargava B.. An efficient MPEG video encryption algorithm. In: Proceedings of the 6th ACM International Multimedia Conference, Bristol, United Kingdom, 1998, 9: 381~386
  • 3Alattar A.M., Al-Regib G.I.. Improved selective encryption techniques for secure transmission of MPEG video bit-streams. In: Proceeding of ICIP, 1999, 4: 256~260
  • 4Wu Xiao-Ling, Moo Peter W.. Joint image/video compression and encryption via high-order conditional entropy coding of wavelet coefficient. In: Proceedings of IEEE International Conference on Multimedia Computing and Systems, Florence, Italy, 1999, 2: 908~912
  • 5Romeo, Romolotti G., Mattavelli M., Mlynek D.. Cryptosystem architectures for very high throughput multimedia encryption: The RPK solution. In: Proceedings of the 6th IEEE International Conference on Electronics, Circuits and Systems, Pafos, Cyprus, 1999, 261~264
  • 6Silva C.P.,Young A.M.. Introduction to chaos-based communications and signal processing. IEEE Proceedings of Aerospace, 2000, 1: 279~299
  • 7Robert Matthews. On the derivation of a "chaotic" encryption algorithm.Cryptologia. 1989, 8(1):29~41
  • 8Wheeler D.D., Matthews R.A.J. Supercomputer investigations of a chaotic encryption algorithm. Cryptologia, 1991, 15(2): 140~152
  • 9钟玉琢 乔秉新 祁卫.[D].北京:清华大学,1997.
  • 10Bruce.Schneier.Applied Cryptography Protocols,Algorithms, and Source Code in C. America: Wiley & Sons Inc, 1996

共引文献41

同被引文献109

引证文献8

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部