[go: up one dir, main page]

CN110446105A - Video-encryption, decryption method and device - Google Patents

Video-encryption, decryption method and device Download PDF

Info

Publication number
CN110446105A
CN110446105A CN201910894201.3A CN201910894201A CN110446105A CN 110446105 A CN110446105 A CN 110446105A CN 201910894201 A CN201910894201 A CN 201910894201A CN 110446105 A CN110446105 A CN 110446105A
Authority
CN
China
Prior art keywords
encrypted
target
data
video
region
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910894201.3A
Other languages
Chinese (zh)
Other versions
CN110446105B (en
Inventor
何冠有
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Netease Hangzhou Network Co Ltd
Original Assignee
Netease Hangzhou Network Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Netease Hangzhou Network Co Ltd filed Critical Netease Hangzhou Network Co Ltd
Priority to CN201910894201.3A priority Critical patent/CN110446105B/en
Publication of CN110446105A publication Critical patent/CN110446105A/en
Application granted granted Critical
Publication of CN110446105B publication Critical patent/CN110446105B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/44008Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving operations for analysing video streams, e.g. detecting features or characteristics in the video stream
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4402Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving reformatting operations of video signals for household redistribution, storage or real-time display
    • H04N21/440245Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving reformatting operations of video signals for household redistribution, storage or real-time display the reformatting operation being performed only on part of the stream, e.g. a region of the image or a time segment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4405Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
    • H04N21/44055Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption by partially decrypting, e.g. decrypting a video stream that has been partially encrypted
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Television Signal Processing For Recording (AREA)

Abstract

The embodiment of the present invention provides a kind of video-encryption, the method and device of decryption, encryption side can encrypt the region where each target to be encrypted in source video, so that decryption side is after getting encrypted video, the target to be decrypted adapted to can only be matched according to the user right of decryption side to be decrypted, it realizes and source video cut zone is encrypted, each user can only decrypt oneself relevant region, so that in the monitor video acquired in the important place of privacy, each target to be encrypted can not be seen in video by other users, while avoiding privacy leakage, monitoring may be implemented without dead angle.

Description

Video-encryption, decryption method and device
Technical field
The present invention relates to technical field of image processing more particularly to the method and devices of video-encryption, decryption.
Background technique
With the development of computer technology, field of video monitoring is comparatively fast developed.Video monitoring can make user with When get the video image of monitoring area everywhere.It is common, in order to guarantee that the video image in video monitoring is not let out arbitrarily Encipherment protection can be arranged for the video file in video monitoring in dew.
In the prior art, it will usually for the certain decrypted rights of video file whole installation, meet this in the permission of user When decrypted rights, which is integrally decrypted.
But the whole encryption of the prior art and the mode integrally decrypted, cause in practical application, compares in some privacies Important scene, such as toilet, hotel room etc. the considerations of for secret protection, generally can not install video monitoring and set It is standby, and then the place for causing these privacies important becomes monitoring dead angle.
Summary of the invention
The embodiment of the present invention provides the method and device of video-encryption, decryption, the partial region in video can be carried out Encipherment protection is kept away so that privacy area can be encrypted individually in the monitor video acquired in the important place of privacy While exempting from privacy leakage, monitoring may be implemented without dead angle.
First aspect of the embodiment of the present invention provides a kind of method of video-encryption, comprising:
Obtain source video;
Identify the target to be encrypted of at least one in the source video;
Determine the target to be encrypted corresponding region to be encrypted in source video video frame;
The corresponding region to be encrypted of the target to be encrypted is encrypted, target video is obtained.
Optionally, the target to be encrypted includes the first target to be encrypted and the second target to be encrypted;
It is described that the corresponding region to be encrypted of the target to be encrypted is encrypted, comprising:
Corresponding first region to be encrypted of the described first target to be encrypted is encrypted according to first key;
Corresponding second region to be encrypted of the second target to be encrypted according to the second key pair is encrypted.
Optionally, the determination target to be encrypted after corresponding region to be encrypted, is gone back in source video video frame Include:
The position of the mark of the target to be encrypted and the region to be encrypted in the source video video frame is write Enter record.
Optionally, described that the corresponding region to be encrypted of the target to be encrypted is encrypted, target video is obtained, is wrapped It includes:
For each region to be encrypted, the corresponding data in the region to be encrypted are encrypted, are added Data after close;
In the case where the encrypted data are greater than the corresponding data in the region to be encrypted, after the encryption Data in the first data replace the corresponding data in region to be encrypted described in the source video, and will be described encrypted The record is written in the second data in data, obtain include the record target video;Wherein, first data is big The size of small data corresponding equal to the region to be encrypted, second data are in the encrypted data except described the Remaining data outside one data.
It is optionally, described that the corresponding data in the region to be encrypted are encrypted, comprising:
Extract the corresponding data in the region to be encrypted;
It is the byte arrays of contiguous memory by the corresponding data arrangement in the region to be encrypted;
The byte arrays are encrypted using Encryption Algorithm.
Optionally, the target to be encrypted is face.
Second aspect of the embodiment of the present invention provides a kind of method of decryption of video, comprising:
Target video is obtained, the target video includes encryption data;The encryption data are as follows: to source video video frame What data corresponding to region to be encrypted were encrypted, the region to be encrypted includes at least to be encrypted in the source video Region where target;
Determine that target to be decrypted and the target to be decrypted are to be decrypted in the target video according to user right Region;
Data corresponding to the region to be decrypted are decrypted.
Optionally, the target video further includes record, and the record includes the mark of the object to be encrypted, Yi Jisuo State position of the region to be encrypted in source video video frame;
It is described according to user right determine target to be decrypted and the target to be decrypted in the target video to Decrypt region, comprising:
According to the mark of user identifier and the object to be encrypted of the record, target to be decrypted and described wait solve is determined To be decrypted region of the close target in the target video.
Optionally, the encryption data includes at least one first data;It is described for region to be encrypted described in each First data are as follows: in the data obtained after encrypting to data corresponding to the region to be encrypted, size of data is equal to institute State the data of region to be encrypted corresponding size of data in the source video.
Optionally, the record further includes at least one second data;For region to be encrypted described in each, described Two data are as follows: in the data obtained after being encrypted to data corresponding to the region to be encrypted, in addition to first data Remaining data.
Optionally, data corresponding to the region to be decrypted are decrypted, comprising:
Corresponding first data in the region to be decrypted second data corresponding with the region to be decrypted are spliced, Obtain continuous byte arrays;
The byte arrays are decrypted using decipherment algorithm;
Byte data after decryption is written in the target video.
Optionally, it is described data corresponding to the region to be decrypted are decrypted after, further includes:
Video after playing decryption, and/or, the video after saving decryption.
Optionally, the target to be encrypted is face.
The third aspect of the embodiment of the present invention provides a kind of device of video-encryption, comprising:
Source video obtains module, for obtaining source video;
Identification module, for identification at least one target to be encrypted in the source video;
Area determination module to be encrypted, for determining that the target to be encrypted is corresponding to be encrypted in source video video frame Region;
Target video obtains module, for encrypting to the corresponding region to be encrypted of the target to be encrypted, obtains mesh Mark video.
Optionally, the target to be encrypted includes the first target to be encrypted and the second target to be encrypted;
The target video obtains module and is specifically used for:
Corresponding first region to be encrypted of the described first target to be encrypted is encrypted according to first key;
Corresponding second region to be encrypted of the second target to be encrypted according to the second key pair is encrypted.
Optionally, further includes:
Logging modle, for regarding the mark of the target to be encrypted and the region to be encrypted in the source video Record is written in position in frequency frame.
Optionally, the target video obtains module and is specifically also used to:
For each region to be encrypted, the corresponding data in the region to be encrypted are encrypted, are added Data after close;
In the case where the encrypted data are greater than the corresponding data in the region to be encrypted, after the encryption Data in the first data replace the corresponding data in region to be encrypted described in the source video, and will be described encrypted The record is written in the second data in data, obtain include the record target video;Wherein, first data is big The size of small data corresponding equal to the region to be encrypted, second data are in the encrypted data except described the Remaining data outside one data.
Optionally, the target video obtains module and is specifically also used to:
Extract the corresponding data in the region to be encrypted;
It is the byte arrays of contiguous memory by the corresponding data arrangement in the region to be encrypted;
The byte arrays are encrypted using Encryption Algorithm.
Optionally, the target to be encrypted is face.
Fourth aspect of the embodiment of the present invention provides a kind of device of decryption of video, comprising:
Target video obtains module, and for obtaining target video, the target video includes encryption data;The encryption number According to are as follows: what data corresponding to the region to be encrypted to source video video frame were encrypted, the region to be encrypted is at least Including the region where target to be encrypted in the source video;;
Area determination module to be decrypted, for determining target to be decrypted and the target to be decrypted according to user right Region to be decrypted in the target video;
Deciphering module, for data corresponding to the region to be decrypted to be decrypted.
Optionally, the target video further includes record, and the record includes the mark of the object to be encrypted, Yi Jisuo State position of the region to be encrypted in source video video frame;
The area determination module to be decrypted is specifically used for:
According to the mark of user identifier and the object to be encrypted of the record, target to be decrypted and described wait solve is determined To be decrypted region of the close target in the target video.
Optionally, the encryption data includes at least one first data;It is described for region to be encrypted described in each First data are as follows: in the data obtained after encrypting to data corresponding to the region to be encrypted, size of data is equal to institute State the data of region to be encrypted corresponding size of data in the source video.
Optionally, the record further includes at least one second data;For region to be encrypted described in each, described Two data are as follows: in the data obtained after being encrypted to data corresponding to the region to be encrypted, in addition to first data Remaining data.
Optionally, deciphering module is specifically used for:
Corresponding first data in the region to be decrypted second data corresponding with the region to be decrypted are spliced, Obtain continuous byte arrays;
The byte arrays are decrypted using decipherment algorithm;
Byte data after decryption is written in the target video.
Optionally, further includes:
Processing module, for play decryption after video, and/or, save decryption after video.
Optionally, the target to be encrypted is face.
The 5th aspect of the embodiment of the present invention provides a kind of electronic equipment, comprising: processor, memory and computer journey Sequence;Wherein, the computer program is stored in the memory, and is configured as being executed by the processor, described Computer program includes for executing the instruction such as aforementioned first aspect or the described in any item methods of second aspect.
The 6th aspect of the embodiment of the present invention provides a kind of computer readable storage medium, the computer readable storage medium It is stored with computer program, the computer program is performed, and is realized such as any one of aforementioned first aspect or second aspect institute The method stated.
The embodiment of the present invention compared with the existing technology the utility model has the advantages that
The method and device of a kind of video-encryption, decryption is provided in the embodiment of the present invention, encryption side can be to source video In each target to be encrypted where region encrypted, can only basis so that decryption side is after getting encrypted video The target to be decrypted that the user right matching of decryption side adapts to is decrypted, that is, realizes and encrypt to source video cut zone, respectively User can only decrypt oneself relevant region, so that in the monitor video acquired in the important place of privacy, it is each to be added Close target can not be seen in video by other users, and while avoiding privacy leakage, monitoring may be implemented without dead angle.It is specific next It says, encryption side can identify at least one of source video target to be encrypted, determine that target to be encrypted exists after obtaining source video Corresponding region to be encrypted in source video video frame encrypts the corresponding region to be encrypted of the target to be encrypted, obtains mesh Mark video.It adapts to, after decryption side obtains the target video including encryption data, mesh to be decrypted is determined according to user right The region to be decrypted of mark and the target to be decrypted in the target video;Data corresponding to the region to be decrypted are carried out Decryption, the then available and matched video content of the user right.
Detailed description of the invention
Fig. 1 is the flow diagram of video encryption method provided in an embodiment of the present invention;
Fig. 2 is the interface schematic diagram of identification face provided in an embodiment of the present invention;
Fig. 3 is the interface schematic diagram of face encryption provided in an embodiment of the present invention;
Fig. 4 is the flow diagram of the method for decryption of video provided in an embodiment of the present invention;
Fig. 5 is the interface schematic diagram of decryption face provided in an embodiment of the present invention;
Fig. 6 is the structural schematic diagram of video-encryption device provided by the invention;
Fig. 7 is the structural schematic diagram of decryption of video device provided by the invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention is described, and shows So, described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Based on the reality in the present invention Example is applied, every other embodiment obtained by those of ordinary skill in the art without making creative efforts all belongs to In the scope of protection of the invention.
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all embodiments consistented with the present invention.On the contrary, they be only with it is such as appended The example of device and method being described in detail in claims, some aspects of the invention are consistent.
It will be appreciated that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Base Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts it is all its Its embodiment, shall fall within the protection scope of the present invention.
The term used in embodiments of the present invention is only to be not intended to be limiting merely for for the purpose of describing particular embodiments The present invention.In the embodiment of the present invention and the "an" of singular used in the attached claims, " described " and "the" It is also intended to including most forms, unless the context clearly indicates other meaning.
It should be appreciated that term "and/or" used herein is only a kind of incidence relation for describing affiliated partner, indicate There may be three kinds of relationships, for example, A and/or B, can indicate: individualism A, exist simultaneously A and B, individualism B these three Situation.In addition, character "/" herein, typicallys represent the relationship that forward-backward correlation object is a kind of "or".
It should be appreciated that description of the invention and claims and term " first " in above-mentioned attached drawing, " second ", " the Three ", the (if present)s such as " 4th " are to be used to distinguish similar objects, without for describing specific sequence or successive time Sequence.
Depending on context, word as used in this " if ", " if " can be construed to " ... when " or " when ... " or " in response to determination " or " in response to detection ".Similarly, context is depended on, phrase " if it is determined that " or " such as Fruit detection (condition or event of statement) " can be construed to " when determining " or " in response to determination " or " when detection (statement Condition or event) when " or " in response to detection (condition or event of statement) ".
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability Include, so that commodity or system including a series of elements not only include those elements, but also including not clear The other element listed, or further include for this commodity or the intrinsic element of system.In the feelings not limited more Under condition, the element that is limited by sentence "including a ...", it is not excluded that in the commodity or system for including the element also There are other identical elements.
The method and device of a kind of video-encryption, decryption is provided in the embodiment of the present invention, encryption side can be to source video In each target to be encrypted where region encrypted, can only basis so that decryption side is after getting encrypted video The target to be decrypted that the user right matching of decryption side adapts to is decrypted, that is, realizes and encrypt to source video cut zone, respectively User can only decrypt oneself relevant region, so that in the monitor video acquired in the important place of privacy, it is each to be added Close target can not be seen in video by other users, and while avoiding privacy leakage, monitoring may be implemented without dead angle.It is specific next It says, encryption side can identify at least one of source video target to be encrypted, determine that target to be encrypted exists after obtaining source video Corresponding region to be encrypted in source video video frame encrypts the corresponding region to be encrypted of the target to be encrypted, obtains mesh Mark video.It adapts to, after decryption side obtains the target video including encryption data, mesh to be decrypted is determined according to user right The region to be decrypted of mark and the target to be decrypted in the target video;Data corresponding to the region to be decrypted are carried out Decryption, the then available and matched video content of the user right.
The video encryption method of the embodiment of the present invention can be applied to terminal, terminal may include: mobile phone, tablet computer, The electronic equipments such as laptop, monitoring device.
The decryption of video method of the embodiment of the present invention can be applied to terminal, terminal may include: mobile phone, tablet computer, The electronic equipments such as laptop, desktop computer or server.
Source video described in the embodiment of the present invention can be using the picture pick-up devices such as camera record video file or Video flowing.
The embodiment of the present invention can be applied in the scene of real time monitoring, and exemplary, source video is monitor video, Ke Yi During monitoring device acquires monitor video, encryption, the decipherment algorithm of the embodiment of the present invention are carried out in monitoring of a recorded programme video, Then the content of monitored picture real-time display is relevant to the permission of the user of management and monitoring picture, exemplary, with mesh to be encrypted It is designated as face, if the user account, which only has, checks permission to A object into the user account table name of monitored picture, Then only have the face of A object that can show that the face of other who objects can not all be shown in monitored picture.Alternatively, The user account does not have the permission of checking to any object, then the video after encryption is shown in monitored picture, At least all faces can not be shown in video after decryption processing.
The embodiment of the present invention can be applied in the scene that the later period handles video file, exemplary, can be to existing Video file according to the embodiment of the present invention encryption method handle, it is subsequent for encrypted video be adapted to using this hair The decryption method of bright embodiment is decrypted.The embodiment of the present invention is not construed as limiting the scene of concrete application.
With reference to the accompanying drawing, it elaborates to some embodiments of the present invention.In the absence of conflict, following Feature in embodiment and embodiment can be combined with each other.
As shown in FIG. 1, FIG. 1 is the flow diagrams of video encryption method provided in an embodiment of the present invention.
This method can specifically include:
Step S101: source video is obtained.
In the embodiment of the present invention, source video can be compressed side real-time recording, be also possible to compressed side from local or net What end obtained, present invention implementation is not especially limited this.
When obtaining source video from local or net end, the corresponding mark of input source video according to demand can be, to obtain Source video is taken, source video can also be obtained at random, the present invention is not especially limit this.
Step S102: the target to be encrypted of at least one in the source video is identified.
In the embodiment of the present invention, target to be encrypted can be set according to actual application scenarios, such as mesh to be encrypted Mark may include: face, human body sensitive part or entire human body etc., and the embodiment of the present invention does not limit target to be encrypted specifically It is fixed.
In the embodiment of the present invention, arbitrary image recognition technology can be used, at least one of identification source video is to be added Close target, the embodiment of the present invention are not especially limited the specific method of identification.
Step S103: the target to be encrypted corresponding region to be encrypted in source video video frame is determined.
In the embodiment of the present invention, for each frame video frame in source video, the region to be encrypted in the video frame is at least Including the region where the target to be encrypted in video frame, thereby may be ensured that after treating encryption section and being encrypted, it is to be added Region where close target can not be shown.
It is appreciated that the target to be encrypted in video frame can have one or have multiple, each target correspondence to be encrypted Can be different object, illustratively, target to be encrypted can be the target comprising privacy content, be with target to be encrypted For face, in the embodiment of the present application, the corresponding region of each face can be determined as region to be encrypted.
Step S104: the corresponding region to be encrypted of the target to be encrypted is encrypted, target video is obtained.
In the embodiment of the present invention, when region to be encrypted corresponding to target to be encrypted encrypts, Encryption Algorithm it is specific Content can be set according to actual application scenarios, and the embodiment of the present invention is corresponding to encryption section is treated according to Encryption Algorithm The specific implementation that is encrypted of data be not construed as limiting.
In a kind of optional implementation of the embodiment of the present invention, the target to be encrypted include the first target to be encrypted and Second target to be encrypted;It is described that the corresponding region to be encrypted of the target to be encrypted is encrypted, comprising: according to first key Corresponding first region to be encrypted of described first target to be encrypted is encrypted;Second is to be encrypted according to the second key pair Corresponding second region to be encrypted of target is encrypted.
In the embodiment of the present invention, the particular content of first key and the second key can be true according to actual application scenarios Fixed, the present invention is not especially limit this.In the embodiment of the present invention, different encryptions is used to different targets to be encrypted Mode, so that user can only be according to the target area of permission confidential part in subsequent decryption.
It is exemplary, if there is multiple faces in source video, then when being encrypted to multiple faces, can be added using different Key spoon, for example, then adapting to face A and the different key encryption of face B, in decryption with the key of face A with regard to nothing Method decrypts the content of face B area, so as to realize the independent encryption to each personage.
As a kind of optional implementation of the embodiment of the present invention, the determination target to be encrypted is in source video video In frame after corresponding region to be encrypted, further includes: by the mark of the target to be encrypted and the region to be encrypted in institute State the position write-in record in source video video frame.
In the embodiment of the present invention, the mark for the target to be encrypted that each region to be encrypted includes and each region to be encrypted are existed Record is written in position in source video video frame, then when subsequent decryption, can according to the mark of the target to be encrypted in record with And position of each region to be encrypted in source video video frame determines corresponding decryption region.
It illustratively, can be according to face recognition algorithms etc. to source video video frame by taking target to be encrypted is face as an example In recognition of face, and the corresponding region of the face recognized is determined as region to be encrypted.The embodiment of the present invention knows face Other specific implementation is not construed as limiting.When carrying out recognition of face, face can also be divided, exemplary, the face of A personage Usually different from the face of B personage, and hence it is also possible to set different marks for different faces, each mark can be only One one face of mark, so that can determine corresponding decryption region according to the mark of face when subsequent decryption.
It is exemplary, as shown in Fig. 2, in a frame video image frame video can be partitioned into using depth learning technology Face A and face B in image, and the position of each face is recorded in record, record R are as follows: R=[' A':{ ' x0':354, ' y0':8,'x1':570,'y1':300},'B':{'x0':790,'y0':172,'x1':990,'y1':460}];Wherein ' X0':354, ' y0':8, ' x1':570, ' y1':300 be face A location information, ' x0':790, ' y0':172, ' x1': 990, ' y1':460 be face B location information.It is appreciated that the dotted box label in Fig. 2 is for illustrating the people identified Face can demarcate face using block diagram in practical application;Block diagram can not also be used to demarcate face, only known Not Chu face and face position.
It is described to the corresponding area to be encrypted of the target to be encrypted as a kind of optional implementation of the embodiment of the present invention Domain is encrypted, and target video is obtained, comprising: corresponding to the region to be encrypted for each region to be encrypted Data encrypted, obtain encrypted data;It is greater than the corresponding number in the region to be encrypted in the encrypted data In the case where, it is corresponding that region to be encrypted described in the source video is replaced using the first data in the encrypted data Data, and the record is written into the second data in the encrypted data, obtain include the record target Video;Wherein, the size of first data is equal to the size of the corresponding data in the region to be encrypted, and second data are In the encrypted data in addition to first data remaining data.
In the embodiment of the present invention, it is contemplated that encrypting the data of front and back, there is a strong possibility that property is is inconsistent, for example, by using non- In the case where symmetric cryptography, since there are message redundancy, encrypted data generally can be bigger than data before encrypting, if encryption Data afterwards are big, then encrypted data cannot be completed to write back in original video area (because a region can be loaded Data volume be it is determining, cannot greatly can not be small), therefore, can will be corresponding with original region in encrypted data The region to be encrypted in the identical first data write-in source video of size of data, it is corresponding to replace the region to be encrypted of this in source video Data, and the second data other than the first data out are written in record with certain format.
If being appreciated that encrypted data are identical as size of data before encrypting, encrypted number can be used According to data before encrypting are directly replaced, do not need that data are additionally written in record.
It is described to the corresponding number in the region to be encrypted as a kind of optional specific implementation of the embodiment of the present invention According to being encrypted, comprising: extract the corresponding data in the region to be encrypted;It is by the corresponding data arrangement in the region to be encrypted The byte arrays of contiguous memory;The byte arrays are encrypted using Encryption Algorithm.
In the embodiment of the present invention, by taking target to be encrypted is face as an example, each face can be generated a pair of of public key with Private key, then using Advanced Encryption Standard (advanced encryption sandard, AES) to as dotted line outlines in Fig. 2 Face A and face B are encrypted respectively, are written back in original video frame, and encrypted video effect frame can be such as Fig. 3 institute Show, the corresponding region face A and the corresponding region face B cannot normally be shown.It is appreciated that in the corresponding region face A and Mosaic, advertising information or any other letter different from face A and face B can also be shown in the corresponding region face B Breath, the present invention is not especially limit this.It should be noted that in practical application, because AES wants 16 bytes (Byte) it is aligned, therefore when using AES encryption, the integral multiple that the pixel in dotted line frame is 16Byte.
The embodiment of the present invention in the specific implementation, the corresponding data in region to be encrypted can be extracted after, by region to be encrypted Corresponding data arrangement is the byte arrays (bytes array) of contiguous memory, by byte arrays using the vector in AES secret Vec is encrypted with key key, it will be understood that vector v ec and key key can also be stored in record, in order to subsequent Decryption.
In a kind of optional implementation of the embodiment of the present invention, it is contemplated that record R is that all users can take, institute After it can also be encrypted to the data (such as vector and key of symmetric cryptography) of some sensitivities in record R or record R It is stored in target video, prevents the leakage of sensitive data in record.It is appreciated that some quick in decryption record R or record R The key of the data of sense can be and individually be handed down to decryption side.
In conclusion encryption side can encrypt the region where each target to be encrypted in source video, so that solution Close side can only match the target to be decrypted adapted to according to the user right of decryption side and be solved after getting encrypted video It is close, that is, it realizes and source video cut zone is encrypted, each user can only decrypt oneself relevant region, so that in privacy than heavier In monitor video acquired in the place wanted, each target to be encrypted can not be seen in video by other users, and privacy is avoided to let out While dew, monitoring may be implemented without dead angle.Specifically, encryption side can identify in source video after obtaining source video At least one target to be encrypted determines target to be encrypted corresponding region to be encrypted in source video video frame, to be encrypted to this The corresponding region to be encrypted of target is encrypted, and target video is obtained.It adapts to, obtains the mesh including encryption data in decryption side After marking video, the area to be decrypted of target to be decrypted and the target to be decrypted in the target video is determined according to user right Domain;Data corresponding to the region to be decrypted are decrypted, then the available and matched video content of the user right.
As shown in figure 4, Fig. 4 is the flow diagram of decryption of video method provided in an embodiment of the present invention.
This method can specifically include:
Step S201: target video is obtained, the target video includes encryption data;The encryption data are as follows: source is regarded What data corresponding to the region to be encrypted of frequency video frame were encrypted, the region to be encrypted is regarded including at least the source Region in frequency where target to be encrypted.
In the embodiment of the present invention, decompression side can obtain target video from local or net end, and exemplary, decompression side can root Target video is obtained from local or net end according to the corresponding mark of target video, target video can also be obtained at random, the present invention is real It applies example and this is not especially limited.
The particular content of target video encryption data and the mode of obtaining are referred to the record of the corresponding embodiment of Fig. 1, In This is repeated no more.
Step S202: determine target to be decrypted and the target to be decrypted in the target video according to user right In region to be decrypted.
In the embodiment of the present application, user right can be related to user identifier, and user identifier can be the people of user oneself Face mark, or the mark with user with associated other users.It is exemplary, in the scene of the real time monitoring of kindergarten, User can be parent, then manager's registration that parent can monitor to kindergarten sees real time monitoring by network.Monitoring system System is identified according to the face that the account of parent obtains the corresponding child of the parent, and the face mark of the child is then matched in record Know, the face of child is determined as target to be decrypted and the target to be decrypted in each frame video image in target video Region to be decrypted.After then decrypting, parent can only see that the face of oneself child, other faces all cannot in the video of decryption See, therefore parent can be allowed to understand the security situation of oneself child at any time, is also avoided that the privacy of other children is leaked.
In concrete application, it is also possible to which there are root user, root user is the super keepe in system, it has equivalent In the permission of operating system.Root user is decrypted, it can be all true by the whole encryption targets for including in target video It is set to target to be decrypted, and then the whole target to be decrypted in target video can be decrypted, the view completely shown Frequency file.
Step S203: data corresponding to the region to be decrypted are decrypted.
In the embodiment of the present invention, to decryption region data be decrypted when, decipherment algorithm be it is corresponding with Encryption Algorithm, The embodiment of the present invention is not especially limited decipherment algorithm.
As a kind of optional implementation of the embodiment of the present invention, the target video further includes record, the record packet Include the position of the mark and the region to be encrypted of the object to be encrypted in source video video frame;It is described according to user Permission determines the region to be decrypted of target to be decrypted and the target to be decrypted in the target video, comprising: according to The mark of the object to be encrypted of family mark and the record, determines target to be decrypted and the target to be decrypted in the mesh Mark the region to be decrypted in video.
It is exemplary, in the corresponding embodiment of Fig. 1, by the way of AES encryption for, when decryption, the encryption data Including at least one the first data;For region to be encrypted described in each, first data are as follows: to the region to be encrypted In the data that corresponding data obtain after being encrypted, it is right in the source video that size of data is equal to the region to be encrypted The data for the size of data answered;The record further includes at least one second data;For region to be encrypted described in each, institute State the second data are as follows: in the data obtained after encrypting to data corresponding to the region to be encrypted, except first number According to outer remaining data.It is described that data corresponding to the region to be decrypted are decrypted, comprising: by the region to be decrypted Corresponding first data second data corresponding with the region to be decrypted are spliced, and continuous byte arrays are obtained;Using The byte arrays are decrypted in decipherment algorithm;Byte data after decryption is written in the target video.
In the embodiment of the present invention, after being matched in record according to user identifier, for determining that target face is people's face B, The corresponding private key of face B can be obtained by safe channel (network such as encrypted), obtain making in Encryption Algorithm according to record R Corresponding first data of face B area and face B are recorded each frame image by key and vec in record Second data are spliced, and continuous byte arrays are arranged in, and decrypt the byte arrays according to key and vec, and will be after decryption Byte data is written in target video, then the video file after available decryption, exemplary, after Fig. 5 shows decryption The display effect of video image, face B can normally be shown, but face A cannot normally be shown.
As a kind of optional implementation of the embodiment of the present invention, it is described to data corresponding to the region to be decrypted into After row decryption, further includes: the video after playing decryption, and/or, the video after saving decryption.
In the embodiment of the present invention, the video after decryption can be played according to actual demand, or save the video after decryption, Or the video after playing and decrypting, the present invention is not especially limit this.
In conclusion provide the method and device of a kind of video-encryption, decryption in the embodiment of the present invention, encryption side can be with Region where each target to be encrypted in source video is encrypted, so that decryption side is after getting encrypted video, The target to be decrypted adapted to can only be matched according to the user right of decryption side to be decrypted, that is, realize to source video cut zone Encryption, each user can only decrypt oneself relevant region, so that in the monitor video acquired in the important place of privacy, Each target to be encrypted can not be seen in video by other users, and while avoiding privacy leakage, monitoring may be implemented without dead angle. Specifically, encryption side can identify at least one of source video target to be encrypted, determine to be encrypted after obtaining source video Target corresponding region to be encrypted in source video video frame encrypts the corresponding region to be encrypted of the target to be encrypted, Obtain target video.It adapts to, after decryption side obtains the target video including encryption data, is determined according to user right wait solve The region to be decrypted of close target and the target to be decrypted in the target video;To data corresponding to the region to be decrypted It is decrypted, then the available and matched video content of the user right.
Fig. 6 is the structural schematic diagram of one embodiment of device of video-encryption provided by the invention.As shown in fig. 6, this implementation Example provide device include:
Source video obtains module 31, for obtaining source video;
Identification module 32, for identification at least one target to be encrypted in the source video;
Area determination module 33 to be encrypted, for determining that the target to be encrypted is corresponding to be added in source video video frame Close region;
Target video obtains module 34, for encrypting to the corresponding region to be encrypted of the target to be encrypted, obtains Target video.
Optionally, the target to be encrypted includes the first target to be encrypted and the second target to be encrypted;
The target video obtains module and is specifically used for:
Corresponding first region to be encrypted of the described first target to be encrypted is encrypted according to first key;
Corresponding second region to be encrypted of the second target to be encrypted according to the second key pair is encrypted.
Optionally, further includes:
Logging modle, for regarding the mark of the target to be encrypted and the region to be encrypted in the source video Record is written in position in frequency frame.
Optionally, the target video obtains module and is specifically also used to:
For each region to be encrypted, the corresponding data in the region to be encrypted are encrypted, are added Data after close;
In the case where the encrypted data are greater than the corresponding data in the region to be encrypted, after the encryption Data in the first data replace the corresponding data in region to be encrypted described in the source video, and will be described encrypted The record is written in the second data in data, obtain include the record target video;Wherein, first data is big The size of small data corresponding equal to the region to be encrypted, second data are in the encrypted data except described the Remaining data outside one data.
Optionally, the target video obtains module and is specifically also used to:
Extract the corresponding data in the region to be encrypted;
It is the byte arrays of contiguous memory by the corresponding data arrangement in the region to be encrypted;
The byte arrays are encrypted using Encryption Algorithm.
Optionally, the target to be encrypted is face.
In conclusion provide the method and device of a kind of video-encryption, decryption in the embodiment of the present invention, encryption side can be with Region where each target to be encrypted in source video is encrypted, so that decryption side is after getting encrypted video, The target to be decrypted adapted to can only be matched according to the user right of decryption side to be decrypted, that is, realize to source video cut zone Encryption, each user can only decrypt oneself relevant region, so that in the monitor video acquired in the important place of privacy, Each target to be encrypted can not be seen in video by other users, and while avoiding privacy leakage, monitoring may be implemented without dead angle. Specifically, encryption side can identify at least one of source video target to be encrypted, determine to be encrypted after obtaining source video Target corresponding region to be encrypted in source video video frame encrypts the corresponding region to be encrypted of the target to be encrypted, Obtain target video.It adapts to, after decryption side obtains the target video including encryption data, is determined according to user right wait solve The region to be decrypted of close target and the target to be decrypted in the target video;To data corresponding to the region to be decrypted It is decrypted, then the available and matched video content of the user right.
Fig. 7 is the structural schematic diagram of one embodiment of device of decryption of video provided by the invention.As shown in fig. 7, this implementation Example provide device include:
Target video obtains module 41, and for obtaining target video, the target video includes encryption data;The encryption Data are as follows: what data corresponding to the region to be encrypted to source video video frame were encrypted, the region to be encrypted is extremely Less including the region where target to be encrypted in the source video;;
Area determination module 42 to be decrypted, for determining target to be decrypted and the mesh to be decrypted according to user right It is marked on the region to be decrypted in the target video;
Deciphering module 43, for data corresponding to the region to be decrypted to be decrypted.
Optionally, the target video further includes record, and the record includes the mark of the object to be encrypted, Yi Jisuo State position of the region to be encrypted in source video video frame;
The area determination module to be decrypted is specifically used for:
According to the mark of user identifier and the object to be encrypted of the record, target to be decrypted and described wait solve is determined To be decrypted region of the close target in the target video.
Optionally, the encryption data includes at least one first data;It is described for region to be encrypted described in each First data are as follows: in the data obtained after encrypting to data corresponding to the region to be encrypted, size of data is equal to institute State the data of region to be encrypted corresponding size of data in the source video.
Optionally, the record further includes at least one second data;For region to be encrypted described in each, described Two data are as follows: in the data obtained after being encrypted to data corresponding to the region to be encrypted, in addition to first data Remaining data.
Optionally, deciphering module is specifically used for:
Corresponding first data in the region to be decrypted second data corresponding with the region to be decrypted are spliced, Obtain continuous byte arrays;
The byte arrays are decrypted using decipherment algorithm;
Byte data after decryption is written in the target video.
Optionally, further includes:
Processing module, for play decryption after video, and/or, save decryption after video.
Optionally, the target to be encrypted is face.
In conclusion provide the method and device of a kind of video-encryption, decryption in the embodiment of the present invention, encryption side can be with Region where each target to be encrypted in source video is encrypted, so that decryption side is after getting encrypted video, The target to be decrypted adapted to can only be matched according to the user right of decryption side to be decrypted, that is, realize to source video cut zone Encryption, each user can only decrypt oneself relevant region, so that in the monitor video acquired in the important place of privacy, Each target to be encrypted can not be seen in video by other users, and while avoiding privacy leakage, monitoring may be implemented without dead angle. Specifically, encryption side can identify at least one of source video target to be encrypted, determine to be encrypted after obtaining source video Target corresponding region to be encrypted in source video video frame encrypts the corresponding region to be encrypted of the target to be encrypted, Obtain target video.It adapts to, after decryption side obtains the target video including encryption data, is determined according to user right wait solve The region to be decrypted of close target and the target to be decrypted in the target video;To data corresponding to the region to be decrypted It is decrypted, then the available and matched video content of the user right.
The device of video-encryption, decryption that various embodiments of the present invention provide can be used for executing such as aforementioned each corresponding embodiment Shown in method, implementation is identical as principle, repeats no more.
The embodiment of the present invention also provides a kind of electronic equipment, comprising: processor, memory and computer program;Wherein, The computer program is stored in the memory, and is configured as being executed by the processor, the computer journey Sequence includes the instruction for executing the method as described in any one of previous embodiment.
The embodiment of the present invention also provides a kind of computer readable storage medium, and the computer-readable recording medium storage has Computer program, the computer program are performed, and realize the method as described in any one of previous embodiment.
Those of ordinary skill in the art will appreciate that: realize that all or part of the steps of above-mentioned each method embodiment can lead to The relevant hardware of program instruction is crossed to complete.Program above-mentioned can be stored in a computer readable storage medium.The journey When being executed, execution includes the steps that above-mentioned each method embodiment to sequence;And storage medium above-mentioned include: ROM, RAM, magnetic disk or The various media that can store program code such as person's CD.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Pipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according to So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution The range of scheme.

Claims (17)

1. a kind of method of video-encryption, which is characterized in that the described method includes:
Obtain source video;
Identify the target to be encrypted of at least one in the source video;
Determine the target to be encrypted corresponding region to be encrypted in source video video frame;
The corresponding region to be encrypted of the target to be encrypted is encrypted, target video is obtained.
2. the method according to claim 1, wherein the target to be encrypted includes the first target to be encrypted and the Two targets to be encrypted;
It is described that the corresponding region to be encrypted of the target to be encrypted is encrypted, comprising:
Corresponding first region to be encrypted of the described first target to be encrypted is encrypted according to first key;
Corresponding second region to be encrypted of the second target to be encrypted according to the second key pair is encrypted.
3. according to the method described in claim 2, it is characterized in that, the determination target to be encrypted is in source video video frame In after corresponding region to be encrypted, further includes:
Note is written into the position of the mark of the target to be encrypted and the region to be encrypted in the source video video frame Record.
4. according to the method described in claim 3, it is characterized in that, described to the corresponding region to be encrypted of the target to be encrypted It is encrypted, obtains target video, comprising:
For each region to be encrypted, the corresponding data in the region to be encrypted are encrypted, after obtaining encryption Data;
In the case where the encrypted data are greater than the corresponding data in the region to be encrypted, the encrypted number is used The first data in replace the corresponding data in region to be encrypted described in the source video, and by the encrypted data In the second data the record is written, obtain include the record target video;Wherein, the size etc. of first data In the size of the corresponding data in the region to be encrypted, second data are in the encrypted data except first number According to outer remaining data.
5. according to the method described in claim 4, it is characterized in that, described add the corresponding data in the region to be encrypted It is close, comprising:
Extract the corresponding data in the region to be encrypted;
It is the byte arrays of contiguous memory by the corresponding data arrangement in the region to be encrypted;
The byte arrays are encrypted using Encryption Algorithm.
6. method according to claim 1-5, which is characterized in that the target to be encrypted is face.
7. a kind of decryption of video algorithm, which is characterized in that the described method includes:
Target video is obtained, the target video includes encryption data;The encryption data are as follows: to the to be added of source video video frame What data corresponding to close region were encrypted, the region to be encrypted includes at least target to be encrypted in the source video The region at place;
The area to be decrypted of target to be decrypted and the target to be decrypted in the target video is determined according to user right Domain;Data corresponding to the region to be decrypted are decrypted.
8. the record includes the method according to the description of claim 7 is characterized in that the target video further includes record The position of the mark of the object to be encrypted and the region to be encrypted in source video video frame;
It is described to determine that target to be decrypted and the target to be decrypted are to be decrypted in the target video according to user right Region, comprising:
According to the mark of user identifier and the object to be encrypted of the record, target to be decrypted and the mesh to be decrypted are determined It is marked on the region to be decrypted in the target video.
9. according to the method described in claim 8, it is characterized in that, the encryption data includes at least one first data;It is right In each region to be encrypted, first data are as follows: after being encrypted to data corresponding to the region to be encrypted In obtained data, size of data is equal to the data of region to be encrypted corresponding size of data in the source video.
10. according to the method described in claim 9, it is characterized in that, the record further includes at least one second data;For Each described region to be encrypted, second data are as follows: after being encrypted to data corresponding to the region to be encrypted To data in, the remaining data in addition to first data.
11. according to the method described in claim 10, it is characterized in that, being solved to data corresponding to the region to be decrypted It is close, comprising:
Corresponding first data in the region to be decrypted second data corresponding with the region to be decrypted are spliced, are obtained Continuous byte arrays;
The byte arrays are decrypted using decipherment algorithm;
Byte data after decryption is written in the target video.
12. according to the described in any item methods of claim 7-11, which is characterized in that described to corresponding to the region to be decrypted Data be decrypted after, further includes:
Video after playing decryption, and/or, the video after saving decryption.
13. according to the described in any item methods of claim 7-11, which is characterized in that the target to be encrypted is face.
14. a kind of device of video-encryption characterized by comprising
Source video obtains module, for obtaining source video;
Identification module, for identification at least one target to be encrypted in the source video;
Area determination module to be encrypted, for determining the target to be encrypted corresponding area to be encrypted in source video video frame Domain;
Target video obtains module, for encrypting to the corresponding region to be encrypted of the target to be encrypted, obtains target view Frequently.
15. a kind of device of decryption of video characterized by comprising
Target video obtains module, and for obtaining target video, the target video includes encryption data;The encryption data Are as follows: what data corresponding to the region to be encrypted to source video video frame were encrypted, the region to be encrypted is at least wrapped Include the region in the source video where target to be encrypted;;
Area determination module to be decrypted, for determining target to be decrypted and the target to be decrypted in institute according to user right State the region to be decrypted in target video;
Deciphering module, for data corresponding to the region to be decrypted to be decrypted.
16. a kind of electronic equipment characterized by comprising
Processor, memory and computer program;Wherein, the computer program is stored in the memory, and It is configured as being executed by the processor, the computer program includes as claimed in any one of claims 1 to 6 for executing The instruction of method;Or, the computer program includes for executing the instruction such as the described in any item methods of claim 7-13.
17. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer journey Sequence, the computer program are performed, and as the method according to claim 1 to 6 are realized, or, the computer program It is performed, realizes such as the described in any item methods of claim 7-13.
CN201910894201.3A 2019-09-20 2019-09-20 Video encryption and decryption method and device Active CN110446105B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910894201.3A CN110446105B (en) 2019-09-20 2019-09-20 Video encryption and decryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910894201.3A CN110446105B (en) 2019-09-20 2019-09-20 Video encryption and decryption method and device

Publications (2)

Publication Number Publication Date
CN110446105A true CN110446105A (en) 2019-11-12
CN110446105B CN110446105B (en) 2021-11-16

Family

ID=68440588

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910894201.3A Active CN110446105B (en) 2019-09-20 2019-09-20 Video encryption and decryption method and device

Country Status (1)

Country Link
CN (1) CN110446105B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111083424A (en) * 2019-11-25 2020-04-28 视联动力信息技术股份有限公司 Audio and video encryption transmission method and device, electronic equipment and storage medium
CN112800454A (en) * 2021-03-22 2021-05-14 北京焦点新干线信息技术有限公司 Case data processing method, related device and computer readable medium
CN113038089A (en) * 2021-05-21 2021-06-25 浙江宇视科技有限公司 Intelligent identification dynamic self-decoding processing method and device, electronic equipment and storage medium
CN113613040A (en) * 2021-10-11 2021-11-05 北京创米智汇物联科技有限公司 Video file encryption method, decryption method and key management method
CN114173332A (en) * 2022-02-09 2022-03-11 国网浙江省电力有限公司信息通信分公司 Data encryption transmission method and device suitable for 5G smart grid inspection robot
CN114911763A (en) * 2021-02-09 2022-08-16 安讯士有限公司 Apparatus and method for storing medium containing personal data and erasing personal data
CN114938465A (en) * 2022-07-25 2022-08-23 广州万协通信息技术有限公司 Encrypted data transmission method and device based on characteristic sequence
CN115633193A (en) * 2022-12-19 2023-01-20 吉林省信息技术研究所 Monitoring video encryption method and system
WO2025083979A1 (en) * 2023-10-17 2025-04-24 パナソニックIpマネジメント株式会社 Information processing device, information processing system, method, program, and recording medium

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070223697A1 (en) * 2004-05-27 2007-09-27 Sony Corporation Information Processing System And Information Processing Method For Use Therewith, Information Processing Apparatus And Information Processing Method For Use Therewith, And Program
CN101167361A (en) * 2005-04-25 2008-04-23 松下电器产业株式会社 Monitoring camera system, imaging device, and video display device
US20110075842A1 (en) * 2008-06-03 2011-03-31 Thales Method and System Making It Possible to Visually Encrypt the Mobile Objects Within A Compressed Video Stream
US20120159196A1 (en) * 2010-12-20 2012-06-21 Sony Corporation Information processing apparatus, information processing method, and program
CN102932634A (en) * 2012-11-15 2013-02-13 同方(深圳)云计算技术股份有限公司 Network video monitoring system, encryption/decryption method and device of video signal thereof
CN103914634A (en) * 2014-03-26 2014-07-09 小米科技有限责任公司 Image encryption method, image encryption device and electronic device
US20140192982A1 (en) * 2010-08-25 2014-07-10 Cable Television Laboratories, Inc. Transport of partially encrypted media
US8782392B1 (en) * 2011-04-11 2014-07-15 Google Inc. Privacy-protective data transfer and storage
CN106664460A (en) * 2014-06-20 2017-05-10 索尼公司 Information processing apparatus and information processing method
CN106971114A (en) * 2017-03-31 2017-07-21 联想(北京)有限公司 A kind of method and device of image security
CN107070649A (en) * 2017-03-02 2017-08-18 桂林电子科技大学 A kind of big file selective cryptographic method for reducing write-in
CN108989736A (en) * 2017-06-05 2018-12-11 中兴通讯股份有限公司 multimedia resource encryption method, device, system, storage medium and processor

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070223697A1 (en) * 2004-05-27 2007-09-27 Sony Corporation Information Processing System And Information Processing Method For Use Therewith, Information Processing Apparatus And Information Processing Method For Use Therewith, And Program
CN101167361A (en) * 2005-04-25 2008-04-23 松下电器产业株式会社 Monitoring camera system, imaging device, and video display device
US20110075842A1 (en) * 2008-06-03 2011-03-31 Thales Method and System Making It Possible to Visually Encrypt the Mobile Objects Within A Compressed Video Stream
US20140192982A1 (en) * 2010-08-25 2014-07-10 Cable Television Laboratories, Inc. Transport of partially encrypted media
US20120159196A1 (en) * 2010-12-20 2012-06-21 Sony Corporation Information processing apparatus, information processing method, and program
US8782392B1 (en) * 2011-04-11 2014-07-15 Google Inc. Privacy-protective data transfer and storage
CN102932634A (en) * 2012-11-15 2013-02-13 同方(深圳)云计算技术股份有限公司 Network video monitoring system, encryption/decryption method and device of video signal thereof
CN103914634A (en) * 2014-03-26 2014-07-09 小米科技有限责任公司 Image encryption method, image encryption device and electronic device
CN106664460A (en) * 2014-06-20 2017-05-10 索尼公司 Information processing apparatus and information processing method
CN107070649A (en) * 2017-03-02 2017-08-18 桂林电子科技大学 A kind of big file selective cryptographic method for reducing write-in
CN106971114A (en) * 2017-03-31 2017-07-21 联想(北京)有限公司 A kind of method and device of image security
CN108989736A (en) * 2017-06-05 2018-12-11 中兴通讯股份有限公司 multimedia resource encryption method, device, system, storage medium and processor

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
范若楠: "特定情况下视频加密算法研究", 《CNKI中国知网》 *

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111083424A (en) * 2019-11-25 2020-04-28 视联动力信息技术股份有限公司 Audio and video encryption transmission method and device, electronic equipment and storage medium
CN111083424B (en) * 2019-11-25 2023-04-07 视联动力信息技术股份有限公司 Audio and video encryption transmission method and device, electronic equipment and storage medium
CN114911763A (en) * 2021-02-09 2022-08-16 安讯士有限公司 Apparatus and method for storing medium containing personal data and erasing personal data
US11809598B2 (en) 2021-02-09 2023-11-07 Axis Ab Devices and methods for safe storage of media containing personal data and erasure of stored personal data
CN112800454A (en) * 2021-03-22 2021-05-14 北京焦点新干线信息技术有限公司 Case data processing method, related device and computer readable medium
CN113038089A (en) * 2021-05-21 2021-06-25 浙江宇视科技有限公司 Intelligent identification dynamic self-decoding processing method and device, electronic equipment and storage medium
CN113613040A (en) * 2021-10-11 2021-11-05 北京创米智汇物联科技有限公司 Video file encryption method, decryption method and key management method
CN114173332B (en) * 2022-02-09 2022-04-19 国网浙江省电力有限公司信息通信分公司 Data encryption transmission method and device suitable for 5G intelligent power grid inspection robot
CN114173332A (en) * 2022-02-09 2022-03-11 国网浙江省电力有限公司信息通信分公司 Data encryption transmission method and device suitable for 5G smart grid inspection robot
CN114938465A (en) * 2022-07-25 2022-08-23 广州万协通信息技术有限公司 Encrypted data transmission method and device based on characteristic sequence
CN114938465B (en) * 2022-07-25 2022-10-18 广州万协通信息技术有限公司 Encrypted data transmission method and device based on characteristic sequence
CN115633193A (en) * 2022-12-19 2023-01-20 吉林省信息技术研究所 Monitoring video encryption method and system
WO2025083979A1 (en) * 2023-10-17 2025-04-24 パナソニックIpマネジメント株式会社 Information processing device, information processing system, method, program, and recording medium

Also Published As

Publication number Publication date
CN110446105B (en) 2021-11-16

Similar Documents

Publication Publication Date Title
CN110446105A (en) Video-encryption, decryption method and device
JP5269033B2 (en) Image privacy masking method and apparatus
TWI769753B (en) Image classification method and device for protecting data privacy
CN109657426A (en) A kind of data source tracing method based on digital signature and digital watermarking
US7536549B2 (en) Methods for generating a partially encrypted and compressed database and decrypting and decompressing the database
CN107809644B (en) A Double Encryption Method for Reversible Data Hiding of Encrypted Domain Image
GB2432035A (en) Method and apparatus for encrypting a data set
WO2007045818A1 (en) Methods and apparatus for encrypting, obfuscating and reconstructing datasets or objects
US20220084063A1 (en) Dynamic machine-readable codes
JP2019161643A (en) Tamper protection and video source identification for video processing pipeline
Sharma et al. Guess: genetic uses in video encryption with secret sharing
US7995748B2 (en) Method and apparatus for providing ecryption/decryption using two sequences of numbers
CN103765909A (en) Thwarting unauthorized content copying using media tracking code
Bálint Data Security Structure of a Students’ Attendance Register Based on Security Cameras and Blockchain Technology
CN102567657A (en) Digital work ownership authentication system and digital work ownership authentication method
Alenizi et al. A Review of Image Steganography Based on Multiple Hashing Algorithm.
Han et al. Inject stenography into cybersecurity education
JP3625354B2 (en) Unit device, decryption unit device, encryption unit device, encryption processing system, and encryption method
Mohammed A new approach to hide texts into images and audio files using steganography and cryptography techniques
KR102236897B1 (en) Video data protection system and method
Schmitz et al. Commutative Watermarking‐Encryption of Audio Data with Minimum Knowledge Verification
Amutha et al. A secured joint encrypted watermarking in medical image using block cipher algorithm
Murthy et al. Secure Data Hiding: A Comprehensive LSB-Based Steganography Framework With Cryptographic Enhancements
Halvi et al. A robust and secured cloud based distributed biometric system using symmetric key cryptography and microsoft cognitive API
Damsika et al. A novel mechanism for secure e-tendering in an open electronic network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant