CN110582010A - Video/picture encryption transmission method and device, electronic equipment and storage medium - Google Patents
Video/picture encryption transmission method and device, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN110582010A CN110582010A CN201910939027.XA CN201910939027A CN110582010A CN 110582010 A CN110582010 A CN 110582010A CN 201910939027 A CN201910939027 A CN 201910939027A CN 110582010 A CN110582010 A CN 110582010A
- Authority
- CN
- China
- Prior art keywords
- video
- picture
- data
- privacy
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 56
- 230000005540 biological transmission Effects 0.000 title claims abstract description 31
- 238000012545 processing Methods 0.000 claims abstract description 60
- 230000015654 memory Effects 0.000 claims description 29
- 238000004590 computer program Methods 0.000 claims description 15
- 238000000605 extraction Methods 0.000 claims description 2
- 238000004422 calculation algorithm Methods 0.000 description 8
- 238000004891 communication Methods 0.000 description 4
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 241000283868 Oryx Species 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000001815 facial effect Effects 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/235—Processing of additional data, e.g. scrambling of additional data or processing content descriptors
- H04N21/2351—Processing of additional data, e.g. scrambling of additional data or processing content descriptors involving encryption of additional data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/266—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
- H04N21/26613—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing keys in general
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Theoretical Computer Science (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The application provides a video/picture encryption transmission method and device, electronic equipment and a storage medium. The video/picture encryption transmission method comprises the following steps: acquiring original data of a video or picture to be encrypted; extracting data of private parts needing to be protected in the video or picture to be encrypted; carrying out stream encryption processing on the data of the private part to obtain ciphertext data of a video or a picture; and carrying out privacy protection processing on the ciphertext data to obtain a privacy-protected video or picture.
Description
Technical Field
the present application relates to the field of video/picture security technologies, and in particular, to a video/picture encryption transmission method and apparatus, an electronic device, and a computer-readable storage medium.
Background
With the development of economy and the rapid development of the internet, people have higher and higher dependence on the internet, but the security problem of the internet is increasingly prominent, and the large-scale user information is frequently revealed due to malicious damage, hacking and the like.
Because people have high dependence on the internet and can not be used in an avoidable manner, in the transmission process of a communication link, privacy information is easy to leak in the encryption mode in the traditional link, and great potential safety hazards are brought, so that various technical means are required to be adopted for protecting the privacy information of people, including information such as characters, pictures and the like. The encryption methods of the prior art have not been able to meet the need for privacy protection.
disclosure of Invention
in view of this, the present application provides a video/picture encryption secure transmission method, apparatus, device and computer readable storage medium, which perform a mosaic process after performing a stream encryption process on video/picture content data, so as to avoid private data leakage and better protect private information.
In order to solve the above technical problem, in a first aspect, the present application provides a video/picture encryption secure transmission method, including: acquiring original data of a video or picture to be encrypted; extracting data of private parts needing to be protected in the video or picture to be encrypted; and encrypting the data of the private part to obtain ciphertext data of the video or the picture.
that is, after data of a private part in original data of a video or a picture is encrypted, the encryption may be in a stream encryption manner to adapt to streaming data of the video or the picture.
it should be noted that the original data of the video or the picture in the present application may also be other privacy information data, such as some text conversations, personal identity information, etc., and is not limited herein.
The data of the private parts in the present application may be defined according to the needs of an individual, for example, the private parts may be the face, clothing, or background information of a portrait photo, or may be the original data of an entire picture or a certain video.
The privacy protection processing in this application refers to a part for protecting privacy by further processing ciphertext data so that a picture or a video is blurred and illegible to achieve the purpose of protecting the video or the picture, and preferably, the privacy protection processing includes one or more of blurring processing, mosaic replacement, and scrambling processing.
In addition, the stream encryption in the present application is a symmetric encryption, and encrypts the data stream of the private part according to a stream encryption algorithm, where the stream encryption of the data of the private part may be the stream encryption of the data of the private part, or may be the block encryption of the data of the private part. The data stream encryption of the private part generates a random code stream by using an encryption algorithm and a secret key, and then generates a data stream of encrypted video or picture ciphertext data together with the data stream. The data block of the privacy part is encrypted to divide the original data of the video or the picture into data blocks (such as 64 bits) with fixed size, and the data blocks are processed by using the key. The stream cipher algorithm may include: rc4, oryx, seal, des, 3des, etc.
in a possible implementation of the first aspect, privacy protection processing is performed on ciphertext data after stream encryption to obtain a privacy-protected video or picture so as to destroy data of a privacy part in the video or picture, the picture subjected to privacy protection is encrypted first, and when the video or picture is played, a viewer can visually see that the picture is subjected to privacy processing, so that a phenomenon similar to screen-splash "messy codes" occurring when only the video or picture is encrypted during playing can be avoided, and the user may think that a video source, a device, a display or the like has a fault. In a possible implementation of the first aspect, the method further includes: and after carrying out privacy protection processing on the ciphertext data, sending the ciphertext data to the display end to display a privacy-protected video or picture. That is, the pictures or videos after privacy protection processing are blurred when displayed on the display side, where the display side may be a general-purpose client, a public-oriented public place, or a non-dedicated client device such as a terminal device used by an individual.
in a possible implementation of the first aspect, the method further includes: and storing the original data of the video or the picture to be encrypted. The original data of the video or the picture can be put into the extension field so as to be stored, and the original picture or the video can be conveniently obtained by professional management personnel through decryption when needed.
In a possible implementation of the first aspect, the method further includes: and acquiring a privacy-protected video or picture, and decrypting the data of the encrypted video or picture to obtain the original video or picture to be encrypted. That is, since the original data of the picture or video is stored, the original data of the desired picture or video can be obtained by means of decryption. The decryption may be performed by decrypting the encrypted symmetric key according to the private key of the user, and decrypting the original data with the symmetric key.
The video or picture encryption secure transmission device according to the embodiment of the second aspect of the application comprises:
The acquisition module is used for acquiring original data of a video or picture to be encrypted;
The extraction module is used for extracting data of private parts needing to be protected in the video or picture to be encrypted;
The encryption module is used for encrypting the data of the privacy part to obtain ciphertext data of the video or the picture, wherein the encryption module can be understood as a coder, the coder can comprise an algorithm for encryption, such as a private key and a symmetric key of the coder, and the encryption can be stream encryption.
As a preferred embodiment of the second aspect of the present application, the apparatus further comprises: the privacy processing module is used for carrying out privacy protection processing on the ciphertext data of the video or the picture to obtain the privacy-protected video or picture, wherein the privacy processing module can comprise a fuzzification processing module, a mosaic replacing module and a messy code processing module so as to realize fuzzification processing on the ciphertext data. As a preferred embodiment of the second aspect of the present application, the apparatus further comprises: and the sending module is used for carrying out privacy protection processing on the ciphertext data and then sending the ciphertext data to the display end to display a privacy-protected video or picture.
As a preferred embodiment of the second aspect of the present application, the video or picture encryption security transmission apparatus further includes: and the storage module is used for storing the original data of the video or the picture to be encrypted. The storage module can add an extension field into the original data of the video or the picture, and store the encrypted picture or the video data and the original picture or the video data separately, so that the original video or the picture can be obtained later.
in a possible implementation of the second aspect, the apparatus further includes: the decryption module obtains a privacy-protected video or picture and decrypts data of the encrypted video or picture to obtain an original video or picture to be encrypted, wherein the decryption module can be understood as a decoder, and the decoder comprises an algorithm for decryption, such as a private key and a symmetric key of the decoder.
An electronic device according to an embodiment of the third aspect of the present application includes: a processor; and a memory having computer program instructions stored therein,
Wherein, when the computer program instructions are executed by the processor, the processor is caused to execute the video or picture encryption secure transmission method of the first aspect.
Specifically, the execution steps of the processor have been described in detail in the embodiment of the first aspect, and reference may be made to the video or picture encryption secure transmission method in the embodiment of the first aspect, which is not described herein again.
according to the computer-readable storage medium of the embodiment of the fourth aspect of the present application, the computer-readable storage medium stores a computer program, and when the computer program is executed by a processor, the processor is caused to execute the video or picture encryption secure transmission method of the embodiment of the first aspect.
Specifically, the steps executed by the processor are described in detail in the embodiment of the first aspect, and reference may be made to the video or picture encryption secure transmission method in the embodiment of the first aspect, which is not described herein again.
Drawings
Fig. 1 is a flowchart of a video or picture encryption secure transmission method according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a video or picture encryption security transmission apparatus according to an embodiment of the present application;
Fig. 3 is a schematic diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It will be appreciated that as used herein, the term module may refer to or include an Application Specific Integrated Circuit (ASIC), an electronic circuit, a processor (shared, dedicated, or group) and/or memory that executes one or more software or firmware programs, a combinational logic circuit, and/or other suitable hardware components that provide the described functionality, or may be part of such hardware components.
It is understood that, according to some embodiments of the present application, the video or the picture of the present application may also be information such as text, and is not limited herein.
It is understood that the privacy portion of the present application may be a portion that needs to be protected according to actual situations, and may be a whole video stream or a certain segment of a video, or may be a whole picture or partial information in a picture, and may be defined according to personal needs, for example, the privacy portion may be a face of a portrait picture, clothing, or background information.
it will be appreciated that in the various embodiments of the present application, the processor may be a microprocessor, a digital signal processor, a microcontroller, the like, and/or any combination thereof. According to another aspect, the processor may be a single-core processor, a multi-core processor, the like, and/or any combination thereof.
Embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
referring to fig. 1, fig. 1 is a schematic flow chart of a video or picture encryption secure transmission method according to an embodiment of the present application, where the method includes:
Step S11, obtaining original data of a video or picture to be encrypted, where the original data of the video or picture may be a face in a portrait picture, a certain video stream in the video, or text information.
In step S12, data of a private part to be protected in the video or picture to be encrypted is extracted, where the data of the private part refers to data related to a part to be protected in the data of the video or picture, such as face information, background information, or information of the whole picture, and the data that is not private is a data stream of the private part or a data block of the private part.
Step S13, performing stream encryption processing on the data of the private part to obtain ciphertext data of the video or the picture, where the stream encryption algorithm may include one of rc4, oryx, seal, des, and 3 des.
In one possible implementation of the first aspect of the present application, as shown in fig. 1, the method further includes:
step S14, performing privacy protection processing on the ciphertext data to obtain a privacy-protected video or picture, where the ciphertext data is further processed by privacy protection, where the privacy protection processing may include blurring processing, mosaic replacing, scrambling processing, and the like, so as to improve protection of the privacy portion.
the video or picture encryption safe transmission method can encrypt the original data of the video or picture and protect the privacy, and can effectively avoid the leakage of the privacy data of the video or picture and the like of a user caused by malicious stealing in the transmission process of the video or picture. The safety of the user privacy information is improved.
In one possible implementation of the first aspect of the present application, the method may further include:
And step S15, storing the original data of the video or picture to be encrypted. That is, it is equivalent to divide the original data of the video or picture into two parts, one of which is used for encryption processing to avoid privacy disclosure during transmission, and the other is used for saving to obtain the original data of the video or picture under the condition of decryption by professionals, i.e. the picture or video is restored to original appearance.
in one possible implementation of the first aspect of the present application, the method may further include: and acquiring a privacy-protected video or picture, and decrypting the data of the encrypted video or picture to obtain the original video or picture to be encrypted. That is, after the original data of the picture or video is added to the extension field and stored, the professional can recover the video or picture by decrypting the original data of the video or picture, where the professional mentioned in this application refers to the professional who is allowed to recover the video or picture.
In another embodiment of the present application, the method may further include: and after carrying out privacy protection processing on the ciphertext data, sending the ciphertext data to the client to display a privacy-protected video or picture. That is, when a certain video or picture needs to be displayed in a certain occasion, but the real appearance of the video or picture cannot be revealed, the encrypted and privacy-protected video or picture can be sent to the display end to display the privacy-protected picture or video. The display terminal may be a personal PC terminal, or a terminal device used for display in a public place.
For example, in a portrait in a certain scene, after extracting facial feature data from the portrait, streaming-encrypting the facial feature data, and performing mosaic replacement processing, the face in the portrait is not recognizable after the streaming-encrypting and mosaic-replacing processing, with the face of the person as a private part. According to the picture, the original data of the picture is subjected to stream encryption and mosaic processing, and in the process of transmission, even if someone maliciously steals the picture, the real face of the picture cannot be obtained, so that the privacy security of a user is improved.
Therefore, according to the video encryption safe transmission method provided by the embodiment of the application, after the original data of the video or the picture is encrypted and subjected to privacy protection processing, the problem that the privacy is leaked due to the fact that the video or the picture is maliciously stolen in the transmission process can be avoided, and the privacy of a user is better protected.
Based on the same inventive concept as the above classification method, as shown in fig. 2, the present application further provides a video/picture encryption secure transmission apparatus, which is shown in fig. 2 and includes an obtaining module 101, an extracting module 102, an encrypting module 103, and a privacy processing module 104.
Specifically, the obtaining module 101 is configured to obtain original data of a video or a picture to be encrypted, the extracting module 102 is configured to extract data of a privacy portion that needs to be protected in the video or the picture to be encrypted, the encrypting module 103 is configured to perform stream encryption processing on the data of the privacy portion to obtain ciphertext data of the video or the picture, and the privacy processing module 104 is configured to perform privacy protection processing on the ciphertext data of the video or the picture to obtain the video or the picture with privacy protection.
Wherein, the encryption module 103 can be understood as an encryptor, and the encryptor can include an algorithm for encryption, such as its own private key and symmetric key. The original data of the video or the picture can be a face in a portrait picture, a certain video stream in the video, or text information.
As a preferred embodiment of the second aspect of the present application, the apparatus further includes a storage module, where the storage module is configured to store original data of a video or a picture to be encrypted, and the storage module may include an adding module, where the adding module adds an extended field to the original data of the video or the picture, and stores the original data of the video or the picture added with the extended field in another database table through the storage module.
As a preferred embodiment of the embodiments of the second aspect of the present application, the apparatus further comprises: the decryption module obtains the video or picture with privacy protection and decrypts the data of the encrypted video or picture to obtain the original video or picture to be encrypted, wherein the decryption module can be understood as a decoder, and the decoder comprises an algorithm for decryption, such as a private key and a symmetric secret key of the decoder.
As a preferred embodiment of the second aspect of the present application, the apparatus further includes a sending module, configured to send the ciphertext data to a display terminal after performing privacy protection processing on the ciphertext data, so as to display a privacy-protected video or picture. The display end may be a general-purpose client or a personal PC end.
As a preferred embodiment of the second aspect of the present application, the privacy processing module 104 may include a blurring processing module, a mosaic replacing module, and a scrambling processing module, where the blurring processing module is configured to perform blurring processing on a ciphertext data stream or a ciphertext data block, the mosaic replacing module is configured to perform mosaic replacing on the ciphertext data stream or the ciphertext data block, and the scrambling processing module is configured to perform scrambling processing on the ciphertext data stream or the ciphertext data block so as to make the privacy of the picture or video not obscure, so as to better protect the privacy.
According to the video or picture encryption safe transmission method, after the original data of the video or picture is encrypted and subjected to privacy protection processing, the problem that the privacy is leaked due to the fact that the video or picture is maliciously stolen in the transmission process can be avoided, and the privacy of a user is better protected.
Based on the same inventive concept as the method described above, the present application further provides an electronic device, referring to fig. 3, fig. 3 is a schematic diagram of the electronic device according to an embodiment of the present application, where the electronic device 1400 includes a processor 1404; and a memory 1402, in which memory 1402 computer program instructions are stored,
Wherein, when the computer program instructions are executed by the processor 1401, cause the processor 1401 to perform the steps of:
Acquiring original data of a video or picture to be encrypted;
Extracting data of private parts needing to be protected in a video or picture to be encrypted;
Carrying out stream encryption processing on the data of the private part to obtain ciphertext data of a video or a picture;
And carrying out privacy protection processing on the ciphertext data to obtain a privacy-protected video or picture.
Further, as shown in fig. 3, the electronic apparatus further includes a network interface 1403, an input device 1404, a hard disk 1405, and a display device 1406.
The various interfaces and devices described above may be interconnected by a bus architecture. A bus architecture may be any architecture that may include any number of interconnected buses and bridges. Various circuits of one or more Central Processing Units (CPUs), represented in particular by processor 1401, and one or more memories, represented by memory 1402, are coupled together. The bus architecture may also connect various other circuits such as peripherals, voltage regulators, power management circuits, and the like. It will be appreciated that a bus architecture is used to enable communications among the components. The bus architecture includes a power bus, a control bus, and a status signal bus, in addition to a data bus, all of which are well known in the art and therefore will not be described in detail herein.
The network interface 1403 may be connected to a network (e.g., the internet, a local area network, etc.), obtain relevant data from the network, and store the data in the hard disk 1405.
an input device 1404 may receive various instructions input by an operator and send to processor 1401 for execution. The input devices 1404 may include a keyboard or pointing device (e.g., mouse, trackball, touch pad, touch screen, or the like).
The display device 1406 may display a result obtained by the processor 1401 executing the instruction.
the memory 1402 is used for storing programs and data necessary for operating the operating system, and data such as intermediate results in the calculation process of the processor 1401.
It will be appreciated that the memory 1402 in the subject embodiments can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. The nonvolatile memory may be a Read Only Memory (ROM), a Programmable Read Only Memory (PROM), an Erasable Programmable Read Only Memory (EPROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), or a flash memory. Volatile memory can be Random Access Memory (RAM), which acts as external cache memory. The memory 1402 of the apparatus and methods described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
In some embodiments, memory 1402 stores elements, executable modules or data structures, or a subset thereof, or an expanded set thereof as follows: an operating system 14021 and application programs 14014.
the operating system 14021 includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, for implementing various basic services and processing hardware-based tasks. The application 14014 includes various applications, such as a Browser (Browser), and the like, for implementing various application services. A program implementing the methods of embodiments of the present application may be included in application 14014.
The methods disclosed in the embodiments described above may be implemented in processor 1401, or by processor 1401. Processor 1401 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by instructions in the form of hardware integrated logic circuits or software in the processor 1401. The processor 1401 may be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, and may implement or perform the methods, steps, and logic blocks disclosed in the embodiments of the present application. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory 1402, and a processor 1401 reads information in the memory 1402 and performs the steps of the above method in combination with hardware thereof.
It is to be understood that the embodiments described herein may be implemented in hardware, software, firmware, middleware, microcode, or any combination thereof. For a hardware implementation, the processing units may be implemented within one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), general purpose processors, controllers, micro-controllers, microprocessors, other electronic units designed to perform the functions described herein, or a combination thereof.
For a software implementation, the techniques described herein may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described herein. The software codes may be stored in a memory and executed by a processor. The memory may be implemented within the processor or external to the processor.
in particular, the computer program when executed by the processor 1404 may further implement the steps of:
And storing the original data of the video or the picture to be encrypted.
Preferably, the computer program when executed by the processor 1401 also performs the steps of:
And after carrying out privacy protection processing on the encrypted video or picture, sending the encrypted video or picture to the display end to display the privacy-protected video or picture.
preferably, the computer program when executed by the processor 1401 also performs the steps of:
the privacy protection processing includes obfuscation processing, mosaic replacement, and scrambling processing.
In the embodiment of the application, after the electronic device 1400 encrypts and protects the privacy of the original data of the video or the picture, the problem that the privacy is leaked due to malicious stealing of the video or the picture in the transmission process can be avoided, and the privacy of the user can be better protected.
in addition, an embodiment of the present application further provides a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the processor is caused to execute the following steps:
Acquiring original data of a video or picture to be encrypted;
Extracting data of private parts needing to be protected in the video or picture to be encrypted;
Carrying out stream encryption processing on the data of the private part to obtain ciphertext data of a video or a picture;
And carrying out privacy protection processing on the ciphertext data to obtain a privacy-protected video or picture.
when being executed by a processor, the computer program realizes the processes of the alarm method embodiment, can achieve the same technical effect, and is not repeated for avoiding repetition. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
In the several embodiments provided in the present application, it should be understood that the disclosed method and apparatus may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may be physically included alone, or two or more units may be integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The foregoing is a preferred embodiment of the present application and it should be noted that modifications and embellishments could be made by those skilled in the art without departing from the principle described in the present application and should be considered as the scope of protection of the present application.
Claims (12)
1. A video/picture encryption secure transmission method is characterized by comprising the following steps:
acquiring original data of a video or picture to be encrypted;
Extracting data of private parts needing to be protected in the video or picture to be encrypted;
And encrypting the data of the private part to obtain ciphertext data of the video or the picture.
2. The method of claim 1,
And carrying out stream encryption processing on the data of the private part to obtain ciphertext data of the video or the picture.
3. The method of claim 2, further comprising:
and carrying out privacy protection processing on the ciphertext data to obtain a privacy-protected video or picture.
4. The method of claim 1, further comprising:
and storing the original data of the video or the picture to be encrypted.
5. the method of claim 1, wherein the privacy preserving process comprises one or more of a blurring process, a mosaic replacement, and a scrambling process.
6. A video/picture encryption secure transmission apparatus, comprising:
the acquisition module is used for acquiring original data of a video or picture to be encrypted;
the extraction module is used for extracting data of private parts needing to be protected in the video or picture to be encrypted;
And the encryption module is used for encrypting the data of the private part to obtain ciphertext data of the video or the picture.
7. the apparatus according to claim 6, wherein the encryption module is further configured to encrypt the data of the private part to obtain ciphertext data of a video or a picture.
8. The apparatus of claim 7, further comprising:
and the privacy processing module is used for carrying out privacy protection processing on the ciphertext data of the video or the picture to obtain the privacy-protected video or picture.
9. The apparatus of claim 6, further comprising:
And the storage module is used for storing the original data of the video or the picture to be encrypted.
10. The apparatus of claim 8, wherein the privacy preserving process comprises one or more of a blurring process, a mosaic replacement, and a scrambling process.
11. An electronic device, comprising:
A processor; and
a memory communicatively coupled to the processor, having computer program instructions stored therein,
wherein the computer program instructions, when executed by the processor, cause the processor to perform the video/picture encryption secure transmission method of any of claims 1-5.
12. A computer-readable storage medium, characterized in that it stores a computer program which, when executed by a processor, causes the processor to execute the video/picture encryption secure transmission method of any one of claims 1-5.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201910939027.XA CN110582010A (en) | 2019-09-30 | 2019-09-30 | Video/picture encryption transmission method and device, electronic equipment and storage medium |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201910939027.XA CN110582010A (en) | 2019-09-30 | 2019-09-30 | Video/picture encryption transmission method and device, electronic equipment and storage medium |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN110582010A true CN110582010A (en) | 2019-12-17 |
Family
ID=68814032
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201910939027.XA Pending CN110582010A (en) | 2019-09-30 | 2019-09-30 | Video/picture encryption transmission method and device, electronic equipment and storage medium |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN110582010A (en) |
Cited By (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111314742A (en) * | 2020-04-02 | 2020-06-19 | 上海商魁信息科技有限公司 | Video processing method and device and machine-readable storage medium |
| CN111586066A (en) * | 2020-05-12 | 2020-08-25 | 上海依图网络科技有限公司 | Method and device for encrypting multimedia data |
| CN111654664A (en) * | 2020-05-08 | 2020-09-11 | 浙江大华技术股份有限公司 | High-altitude parabolic detection method and system, computer equipment and storage medium |
| CN113360938A (en) * | 2021-05-20 | 2021-09-07 | 维沃移动通信有限公司 | Data transmission method and device and electronic equipment |
| CN113886850A (en) * | 2021-09-28 | 2022-01-04 | 上海商汤智能科技有限公司 | Information encryption method, decryption method, apparatus, electronic device, storage medium |
| CN114817942A (en) * | 2022-02-28 | 2022-07-29 | 亿咖通(湖北)技术有限公司 | Video privacy protection method and device, electronic equipment and storage medium |
| CN116186365A (en) * | 2022-12-26 | 2023-05-30 | 广州繁星互娱信息科技有限公司 | Web page snapshot saving method, web page display method, device and equipment |
| CN117411974A (en) * | 2023-12-14 | 2024-01-16 | 汉华易美视觉科技有限公司 | Picture material classification management system based on wireless communication technology |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103605928A (en) * | 2013-11-18 | 2014-02-26 | 清华大学 | Method and system for protecting privacy of images |
| CN105528549A (en) * | 2015-12-09 | 2016-04-27 | 上海斐讯数据通信技术有限公司 | Figure recognition based photo encryption/decryption method and system and mobile terminal |
| US20160292447A1 (en) * | 2015-04-06 | 2016-10-06 | Lawlitt Life Solutions, LLC | Multi-layered encryption |
| CN106485164A (en) * | 2016-09-27 | 2017-03-08 | 维沃移动通信有限公司 | A kind of image processing method and mobile terminal |
| US20180189505A1 (en) * | 2016-12-31 | 2018-07-05 | Entefy Inc. | System and method of applying adaptive privacy control layers to encoded media file types |
| CN109598138A (en) * | 2018-11-15 | 2019-04-09 | 阿里巴巴集团控股有限公司 | The method and device that whether sensitive information identification, cover and perception are checked in picture |
-
2019
- 2019-09-30 CN CN201910939027.XA patent/CN110582010A/en active Pending
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103605928A (en) * | 2013-11-18 | 2014-02-26 | 清华大学 | Method and system for protecting privacy of images |
| US20160292447A1 (en) * | 2015-04-06 | 2016-10-06 | Lawlitt Life Solutions, LLC | Multi-layered encryption |
| CN105528549A (en) * | 2015-12-09 | 2016-04-27 | 上海斐讯数据通信技术有限公司 | Figure recognition based photo encryption/decryption method and system and mobile terminal |
| CN106485164A (en) * | 2016-09-27 | 2017-03-08 | 维沃移动通信有限公司 | A kind of image processing method and mobile terminal |
| US20180189505A1 (en) * | 2016-12-31 | 2018-07-05 | Entefy Inc. | System and method of applying adaptive privacy control layers to encoded media file types |
| CN109598138A (en) * | 2018-11-15 | 2019-04-09 | 阿里巴巴集团控股有限公司 | The method and device that whether sensitive information identification, cover and perception are checked in picture |
Cited By (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111314742A (en) * | 2020-04-02 | 2020-06-19 | 上海商魁信息科技有限公司 | Video processing method and device and machine-readable storage medium |
| CN111654664A (en) * | 2020-05-08 | 2020-09-11 | 浙江大华技术股份有限公司 | High-altitude parabolic detection method and system, computer equipment and storage medium |
| CN111586066A (en) * | 2020-05-12 | 2020-08-25 | 上海依图网络科技有限公司 | Method and device for encrypting multimedia data |
| CN111586066B (en) * | 2020-05-12 | 2022-08-12 | 上海依图网络科技有限公司 | Method and device for encrypting multimedia data |
| CN113360938A (en) * | 2021-05-20 | 2021-09-07 | 维沃移动通信有限公司 | Data transmission method and device and electronic equipment |
| CN113886850A (en) * | 2021-09-28 | 2022-01-04 | 上海商汤智能科技有限公司 | Information encryption method, decryption method, apparatus, electronic device, storage medium |
| CN114817942A (en) * | 2022-02-28 | 2022-07-29 | 亿咖通(湖北)技术有限公司 | Video privacy protection method and device, electronic equipment and storage medium |
| CN116186365A (en) * | 2022-12-26 | 2023-05-30 | 广州繁星互娱信息科技有限公司 | Web page snapshot saving method, web page display method, device and equipment |
| CN117411974A (en) * | 2023-12-14 | 2024-01-16 | 汉华易美视觉科技有限公司 | Picture material classification management system based on wireless communication technology |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN110582010A (en) | Video/picture encryption transmission method and device, electronic equipment and storage medium | |
| CN100542085C (en) | System and method for secure executable code | |
| US20160117518A1 (en) | File Encryption/Decryption Device And File Encryption/Decryption Method | |
| CN107784207B (en) | Display method, device and equipment of financial APP interface and storage medium | |
| CN106228076B (en) | A kind of picture validation code guard method and system based on SGX | |
| CN111327947B (en) | Screen capture management method and device and mobile terminal | |
| CN113641648A (en) | Distributed cloud security storage method, system and storage medium | |
| CN114390316A (en) | Processing method and device for image acquisition synchronous encryption privacy protection | |
| TW200929985A (en) | Secure information storage system and method | |
| DOrazio et al. | iOS anti-forensics: How can we securely conceal, delete and insert data? | |
| CN102306255B (en) | Document protection method and system | |
| Pushpa | Hybrid data encryption algorithm for secure medical data transmission in cloud environment | |
| CN113259718A (en) | Video stream encryption method and device, communication equipment and storage medium | |
| CN113672954A (en) | Feature extraction method and device and electronic equipment | |
| Park et al. | Rushmore: Securely displaying static and animated images using TrustZone | |
| Riaz et al. | Enhanced image encryption techniques using modified advanced encryption standard | |
| CN113886850A (en) | Information encryption method, decryption method, apparatus, electronic device, storage medium | |
| KR102258638B1 (en) | Systems and methods to block JavaScript-based web automation attacks and sniffing | |
| Ajmera et al. | Video steganography: Using scrambling-AES encryption and DCT, DST steganography | |
| CN103605927A (en) | Encryption and decryption method based on embedded Linux system | |
| CN118590680A (en) | A subway monitoring image data encryption transmission method, system, device and medium | |
| US20160337673A1 (en) | Protection of privacy in a video stream by means of a redundant slice | |
| CN114417365B (en) | Implementation method of one-to-one compression encryption and decryption key document security tool | |
| CN110544199A (en) | Image processing method and device, storage medium and electronic equipment | |
| Besteena et al. | Reversible data hiding in selectively encrypted RGB images by reserving room in advance |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191217 |
|
| RJ01 | Rejection of invention patent application after publication |