[go: up one dir, main page]

CN110582010A - Video/picture encryption transmission method and device, electronic equipment and storage medium - Google Patents

Video/picture encryption transmission method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN110582010A
CN110582010A CN201910939027.XA CN201910939027A CN110582010A CN 110582010 A CN110582010 A CN 110582010A CN 201910939027 A CN201910939027 A CN 201910939027A CN 110582010 A CN110582010 A CN 110582010A
Authority
CN
China
Prior art keywords
video
picture
data
privacy
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910939027.XA
Other languages
Chinese (zh)
Inventor
杨俊�
王文艺
陶云峰
戴和树
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Is According To Figure Network Technology Co Ltd
Shanghai Yitu Network Science and Technology Co Ltd
Original Assignee
Shanghai Is According To Figure Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Is According To Figure Network Technology Co Ltd filed Critical Shanghai Is According To Figure Network Technology Co Ltd
Priority to CN201910939027.XA priority Critical patent/CN110582010A/en
Publication of CN110582010A publication Critical patent/CN110582010A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/235Processing of additional data, e.g. scrambling of additional data or processing content descriptors
    • H04N21/2351Processing of additional data, e.g. scrambling of additional data or processing content descriptors involving encryption of additional data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • H04N21/26613Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing keys in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The application provides a video/picture encryption transmission method and device, electronic equipment and a storage medium. The video/picture encryption transmission method comprises the following steps: acquiring original data of a video or picture to be encrypted; extracting data of private parts needing to be protected in the video or picture to be encrypted; carrying out stream encryption processing on the data of the private part to obtain ciphertext data of a video or a picture; and carrying out privacy protection processing on the ciphertext data to obtain a privacy-protected video or picture.

Description

video/picture encryption transmission method and device, electronic equipment and storage medium
Technical Field
the present application relates to the field of video/picture security technologies, and in particular, to a video/picture encryption transmission method and apparatus, an electronic device, and a computer-readable storage medium.
Background
With the development of economy and the rapid development of the internet, people have higher and higher dependence on the internet, but the security problem of the internet is increasingly prominent, and the large-scale user information is frequently revealed due to malicious damage, hacking and the like.
Because people have high dependence on the internet and can not be used in an avoidable manner, in the transmission process of a communication link, privacy information is easy to leak in the encryption mode in the traditional link, and great potential safety hazards are brought, so that various technical means are required to be adopted for protecting the privacy information of people, including information such as characters, pictures and the like. The encryption methods of the prior art have not been able to meet the need for privacy protection.
disclosure of Invention
in view of this, the present application provides a video/picture encryption secure transmission method, apparatus, device and computer readable storage medium, which perform a mosaic process after performing a stream encryption process on video/picture content data, so as to avoid private data leakage and better protect private information.
In order to solve the above technical problem, in a first aspect, the present application provides a video/picture encryption secure transmission method, including: acquiring original data of a video or picture to be encrypted; extracting data of private parts needing to be protected in the video or picture to be encrypted; and encrypting the data of the private part to obtain ciphertext data of the video or the picture.
that is, after data of a private part in original data of a video or a picture is encrypted, the encryption may be in a stream encryption manner to adapt to streaming data of the video or the picture.
it should be noted that the original data of the video or the picture in the present application may also be other privacy information data, such as some text conversations, personal identity information, etc., and is not limited herein.
The data of the private parts in the present application may be defined according to the needs of an individual, for example, the private parts may be the face, clothing, or background information of a portrait photo, or may be the original data of an entire picture or a certain video.
The privacy protection processing in this application refers to a part for protecting privacy by further processing ciphertext data so that a picture or a video is blurred and illegible to achieve the purpose of protecting the video or the picture, and preferably, the privacy protection processing includes one or more of blurring processing, mosaic replacement, and scrambling processing.
In addition, the stream encryption in the present application is a symmetric encryption, and encrypts the data stream of the private part according to a stream encryption algorithm, where the stream encryption of the data of the private part may be the stream encryption of the data of the private part, or may be the block encryption of the data of the private part. The data stream encryption of the private part generates a random code stream by using an encryption algorithm and a secret key, and then generates a data stream of encrypted video or picture ciphertext data together with the data stream. The data block of the privacy part is encrypted to divide the original data of the video or the picture into data blocks (such as 64 bits) with fixed size, and the data blocks are processed by using the key. The stream cipher algorithm may include: rc4, oryx, seal, des, 3des, etc.
in a possible implementation of the first aspect, privacy protection processing is performed on ciphertext data after stream encryption to obtain a privacy-protected video or picture so as to destroy data of a privacy part in the video or picture, the picture subjected to privacy protection is encrypted first, and when the video or picture is played, a viewer can visually see that the picture is subjected to privacy processing, so that a phenomenon similar to screen-splash "messy codes" occurring when only the video or picture is encrypted during playing can be avoided, and the user may think that a video source, a device, a display or the like has a fault. In a possible implementation of the first aspect, the method further includes: and after carrying out privacy protection processing on the ciphertext data, sending the ciphertext data to the display end to display a privacy-protected video or picture. That is, the pictures or videos after privacy protection processing are blurred when displayed on the display side, where the display side may be a general-purpose client, a public-oriented public place, or a non-dedicated client device such as a terminal device used by an individual.
in a possible implementation of the first aspect, the method further includes: and storing the original data of the video or the picture to be encrypted. The original data of the video or the picture can be put into the extension field so as to be stored, and the original picture or the video can be conveniently obtained by professional management personnel through decryption when needed.
In a possible implementation of the first aspect, the method further includes: and acquiring a privacy-protected video or picture, and decrypting the data of the encrypted video or picture to obtain the original video or picture to be encrypted. That is, since the original data of the picture or video is stored, the original data of the desired picture or video can be obtained by means of decryption. The decryption may be performed by decrypting the encrypted symmetric key according to the private key of the user, and decrypting the original data with the symmetric key.
The video or picture encryption secure transmission device according to the embodiment of the second aspect of the application comprises:
The acquisition module is used for acquiring original data of a video or picture to be encrypted;
The extraction module is used for extracting data of private parts needing to be protected in the video or picture to be encrypted;
The encryption module is used for encrypting the data of the privacy part to obtain ciphertext data of the video or the picture, wherein the encryption module can be understood as a coder, the coder can comprise an algorithm for encryption, such as a private key and a symmetric key of the coder, and the encryption can be stream encryption.
As a preferred embodiment of the second aspect of the present application, the apparatus further comprises: the privacy processing module is used for carrying out privacy protection processing on the ciphertext data of the video or the picture to obtain the privacy-protected video or picture, wherein the privacy processing module can comprise a fuzzification processing module, a mosaic replacing module and a messy code processing module so as to realize fuzzification processing on the ciphertext data. As a preferred embodiment of the second aspect of the present application, the apparatus further comprises: and the sending module is used for carrying out privacy protection processing on the ciphertext data and then sending the ciphertext data to the display end to display a privacy-protected video or picture.
As a preferred embodiment of the second aspect of the present application, the video or picture encryption security transmission apparatus further includes: and the storage module is used for storing the original data of the video or the picture to be encrypted. The storage module can add an extension field into the original data of the video or the picture, and store the encrypted picture or the video data and the original picture or the video data separately, so that the original video or the picture can be obtained later.
in a possible implementation of the second aspect, the apparatus further includes: the decryption module obtains a privacy-protected video or picture and decrypts data of the encrypted video or picture to obtain an original video or picture to be encrypted, wherein the decryption module can be understood as a decoder, and the decoder comprises an algorithm for decryption, such as a private key and a symmetric key of the decoder.
An electronic device according to an embodiment of the third aspect of the present application includes: a processor; and a memory having computer program instructions stored therein,
Wherein, when the computer program instructions are executed by the processor, the processor is caused to execute the video or picture encryption secure transmission method of the first aspect.
Specifically, the execution steps of the processor have been described in detail in the embodiment of the first aspect, and reference may be made to the video or picture encryption secure transmission method in the embodiment of the first aspect, which is not described herein again.
according to the computer-readable storage medium of the embodiment of the fourth aspect of the present application, the computer-readable storage medium stores a computer program, and when the computer program is executed by a processor, the processor is caused to execute the video or picture encryption secure transmission method of the embodiment of the first aspect.
Specifically, the steps executed by the processor are described in detail in the embodiment of the first aspect, and reference may be made to the video or picture encryption secure transmission method in the embodiment of the first aspect, which is not described herein again.
Drawings
Fig. 1 is a flowchart of a video or picture encryption secure transmission method according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a video or picture encryption security transmission apparatus according to an embodiment of the present application;
Fig. 3 is a schematic diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It will be appreciated that as used herein, the term module may refer to or include an Application Specific Integrated Circuit (ASIC), an electronic circuit, a processor (shared, dedicated, or group) and/or memory that executes one or more software or firmware programs, a combinational logic circuit, and/or other suitable hardware components that provide the described functionality, or may be part of such hardware components.
It is understood that, according to some embodiments of the present application, the video or the picture of the present application may also be information such as text, and is not limited herein.
It is understood that the privacy portion of the present application may be a portion that needs to be protected according to actual situations, and may be a whole video stream or a certain segment of a video, or may be a whole picture or partial information in a picture, and may be defined according to personal needs, for example, the privacy portion may be a face of a portrait picture, clothing, or background information.
it will be appreciated that in the various embodiments of the present application, the processor may be a microprocessor, a digital signal processor, a microcontroller, the like, and/or any combination thereof. According to another aspect, the processor may be a single-core processor, a multi-core processor, the like, and/or any combination thereof.
Embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
referring to fig. 1, fig. 1 is a schematic flow chart of a video or picture encryption secure transmission method according to an embodiment of the present application, where the method includes:
Step S11, obtaining original data of a video or picture to be encrypted, where the original data of the video or picture may be a face in a portrait picture, a certain video stream in the video, or text information.
In step S12, data of a private part to be protected in the video or picture to be encrypted is extracted, where the data of the private part refers to data related to a part to be protected in the data of the video or picture, such as face information, background information, or information of the whole picture, and the data that is not private is a data stream of the private part or a data block of the private part.
Step S13, performing stream encryption processing on the data of the private part to obtain ciphertext data of the video or the picture, where the stream encryption algorithm may include one of rc4, oryx, seal, des, and 3 des.
In one possible implementation of the first aspect of the present application, as shown in fig. 1, the method further includes:
step S14, performing privacy protection processing on the ciphertext data to obtain a privacy-protected video or picture, where the ciphertext data is further processed by privacy protection, where the privacy protection processing may include blurring processing, mosaic replacing, scrambling processing, and the like, so as to improve protection of the privacy portion.
the video or picture encryption safe transmission method can encrypt the original data of the video or picture and protect the privacy, and can effectively avoid the leakage of the privacy data of the video or picture and the like of a user caused by malicious stealing in the transmission process of the video or picture. The safety of the user privacy information is improved.
In one possible implementation of the first aspect of the present application, the method may further include:
And step S15, storing the original data of the video or picture to be encrypted. That is, it is equivalent to divide the original data of the video or picture into two parts, one of which is used for encryption processing to avoid privacy disclosure during transmission, and the other is used for saving to obtain the original data of the video or picture under the condition of decryption by professionals, i.e. the picture or video is restored to original appearance.
in one possible implementation of the first aspect of the present application, the method may further include: and acquiring a privacy-protected video or picture, and decrypting the data of the encrypted video or picture to obtain the original video or picture to be encrypted. That is, after the original data of the picture or video is added to the extension field and stored, the professional can recover the video or picture by decrypting the original data of the video or picture, where the professional mentioned in this application refers to the professional who is allowed to recover the video or picture.
In another embodiment of the present application, the method may further include: and after carrying out privacy protection processing on the ciphertext data, sending the ciphertext data to the client to display a privacy-protected video or picture. That is, when a certain video or picture needs to be displayed in a certain occasion, but the real appearance of the video or picture cannot be revealed, the encrypted and privacy-protected video or picture can be sent to the display end to display the privacy-protected picture or video. The display terminal may be a personal PC terminal, or a terminal device used for display in a public place.
For example, in a portrait in a certain scene, after extracting facial feature data from the portrait, streaming-encrypting the facial feature data, and performing mosaic replacement processing, the face in the portrait is not recognizable after the streaming-encrypting and mosaic-replacing processing, with the face of the person as a private part. According to the picture, the original data of the picture is subjected to stream encryption and mosaic processing, and in the process of transmission, even if someone maliciously steals the picture, the real face of the picture cannot be obtained, so that the privacy security of a user is improved.
Therefore, according to the video encryption safe transmission method provided by the embodiment of the application, after the original data of the video or the picture is encrypted and subjected to privacy protection processing, the problem that the privacy is leaked due to the fact that the video or the picture is maliciously stolen in the transmission process can be avoided, and the privacy of a user is better protected.
Based on the same inventive concept as the above classification method, as shown in fig. 2, the present application further provides a video/picture encryption secure transmission apparatus, which is shown in fig. 2 and includes an obtaining module 101, an extracting module 102, an encrypting module 103, and a privacy processing module 104.
Specifically, the obtaining module 101 is configured to obtain original data of a video or a picture to be encrypted, the extracting module 102 is configured to extract data of a privacy portion that needs to be protected in the video or the picture to be encrypted, the encrypting module 103 is configured to perform stream encryption processing on the data of the privacy portion to obtain ciphertext data of the video or the picture, and the privacy processing module 104 is configured to perform privacy protection processing on the ciphertext data of the video or the picture to obtain the video or the picture with privacy protection.
Wherein, the encryption module 103 can be understood as an encryptor, and the encryptor can include an algorithm for encryption, such as its own private key and symmetric key. The original data of the video or the picture can be a face in a portrait picture, a certain video stream in the video, or text information.
As a preferred embodiment of the second aspect of the present application, the apparatus further includes a storage module, where the storage module is configured to store original data of a video or a picture to be encrypted, and the storage module may include an adding module, where the adding module adds an extended field to the original data of the video or the picture, and stores the original data of the video or the picture added with the extended field in another database table through the storage module.
As a preferred embodiment of the embodiments of the second aspect of the present application, the apparatus further comprises: the decryption module obtains the video or picture with privacy protection and decrypts the data of the encrypted video or picture to obtain the original video or picture to be encrypted, wherein the decryption module can be understood as a decoder, and the decoder comprises an algorithm for decryption, such as a private key and a symmetric secret key of the decoder.
As a preferred embodiment of the second aspect of the present application, the apparatus further includes a sending module, configured to send the ciphertext data to a display terminal after performing privacy protection processing on the ciphertext data, so as to display a privacy-protected video or picture. The display end may be a general-purpose client or a personal PC end.
As a preferred embodiment of the second aspect of the present application, the privacy processing module 104 may include a blurring processing module, a mosaic replacing module, and a scrambling processing module, where the blurring processing module is configured to perform blurring processing on a ciphertext data stream or a ciphertext data block, the mosaic replacing module is configured to perform mosaic replacing on the ciphertext data stream or the ciphertext data block, and the scrambling processing module is configured to perform scrambling processing on the ciphertext data stream or the ciphertext data block so as to make the privacy of the picture or video not obscure, so as to better protect the privacy.
According to the video or picture encryption safe transmission method, after the original data of the video or picture is encrypted and subjected to privacy protection processing, the problem that the privacy is leaked due to the fact that the video or picture is maliciously stolen in the transmission process can be avoided, and the privacy of a user is better protected.
Based on the same inventive concept as the method described above, the present application further provides an electronic device, referring to fig. 3, fig. 3 is a schematic diagram of the electronic device according to an embodiment of the present application, where the electronic device 1400 includes a processor 1404; and a memory 1402, in which memory 1402 computer program instructions are stored,
Wherein, when the computer program instructions are executed by the processor 1401, cause the processor 1401 to perform the steps of:
Acquiring original data of a video or picture to be encrypted;
Extracting data of private parts needing to be protected in a video or picture to be encrypted;
Carrying out stream encryption processing on the data of the private part to obtain ciphertext data of a video or a picture;
And carrying out privacy protection processing on the ciphertext data to obtain a privacy-protected video or picture.
Further, as shown in fig. 3, the electronic apparatus further includes a network interface 1403, an input device 1404, a hard disk 1405, and a display device 1406.
The various interfaces and devices described above may be interconnected by a bus architecture. A bus architecture may be any architecture that may include any number of interconnected buses and bridges. Various circuits of one or more Central Processing Units (CPUs), represented in particular by processor 1401, and one or more memories, represented by memory 1402, are coupled together. The bus architecture may also connect various other circuits such as peripherals, voltage regulators, power management circuits, and the like. It will be appreciated that a bus architecture is used to enable communications among the components. The bus architecture includes a power bus, a control bus, and a status signal bus, in addition to a data bus, all of which are well known in the art and therefore will not be described in detail herein.
The network interface 1403 may be connected to a network (e.g., the internet, a local area network, etc.), obtain relevant data from the network, and store the data in the hard disk 1405.
an input device 1404 may receive various instructions input by an operator and send to processor 1401 for execution. The input devices 1404 may include a keyboard or pointing device (e.g., mouse, trackball, touch pad, touch screen, or the like).
The display device 1406 may display a result obtained by the processor 1401 executing the instruction.
the memory 1402 is used for storing programs and data necessary for operating the operating system, and data such as intermediate results in the calculation process of the processor 1401.
It will be appreciated that the memory 1402 in the subject embodiments can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. The nonvolatile memory may be a Read Only Memory (ROM), a Programmable Read Only Memory (PROM), an Erasable Programmable Read Only Memory (EPROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), or a flash memory. Volatile memory can be Random Access Memory (RAM), which acts as external cache memory. The memory 1402 of the apparatus and methods described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
In some embodiments, memory 1402 stores elements, executable modules or data structures, or a subset thereof, or an expanded set thereof as follows: an operating system 14021 and application programs 14014.
the operating system 14021 includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, for implementing various basic services and processing hardware-based tasks. The application 14014 includes various applications, such as a Browser (Browser), and the like, for implementing various application services. A program implementing the methods of embodiments of the present application may be included in application 14014.
The methods disclosed in the embodiments described above may be implemented in processor 1401, or by processor 1401. Processor 1401 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by instructions in the form of hardware integrated logic circuits or software in the processor 1401. The processor 1401 may be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, and may implement or perform the methods, steps, and logic blocks disclosed in the embodiments of the present application. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory 1402, and a processor 1401 reads information in the memory 1402 and performs the steps of the above method in combination with hardware thereof.
It is to be understood that the embodiments described herein may be implemented in hardware, software, firmware, middleware, microcode, or any combination thereof. For a hardware implementation, the processing units may be implemented within one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), general purpose processors, controllers, micro-controllers, microprocessors, other electronic units designed to perform the functions described herein, or a combination thereof.
For a software implementation, the techniques described herein may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described herein. The software codes may be stored in a memory and executed by a processor. The memory may be implemented within the processor or external to the processor.
in particular, the computer program when executed by the processor 1404 may further implement the steps of:
And storing the original data of the video or the picture to be encrypted.
Preferably, the computer program when executed by the processor 1401 also performs the steps of:
And after carrying out privacy protection processing on the encrypted video or picture, sending the encrypted video or picture to the display end to display the privacy-protected video or picture.
preferably, the computer program when executed by the processor 1401 also performs the steps of:
the privacy protection processing includes obfuscation processing, mosaic replacement, and scrambling processing.
In the embodiment of the application, after the electronic device 1400 encrypts and protects the privacy of the original data of the video or the picture, the problem that the privacy is leaked due to malicious stealing of the video or the picture in the transmission process can be avoided, and the privacy of the user can be better protected.
in addition, an embodiment of the present application further provides a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the processor is caused to execute the following steps:
Acquiring original data of a video or picture to be encrypted;
Extracting data of private parts needing to be protected in the video or picture to be encrypted;
Carrying out stream encryption processing on the data of the private part to obtain ciphertext data of a video or a picture;
And carrying out privacy protection processing on the ciphertext data to obtain a privacy-protected video or picture.
when being executed by a processor, the computer program realizes the processes of the alarm method embodiment, can achieve the same technical effect, and is not repeated for avoiding repetition. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
In the several embodiments provided in the present application, it should be understood that the disclosed method and apparatus may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may be physically included alone, or two or more units may be integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The foregoing is a preferred embodiment of the present application and it should be noted that modifications and embellishments could be made by those skilled in the art without departing from the principle described in the present application and should be considered as the scope of protection of the present application.

Claims (12)

1. A video/picture encryption secure transmission method is characterized by comprising the following steps:
acquiring original data of a video or picture to be encrypted;
Extracting data of private parts needing to be protected in the video or picture to be encrypted;
And encrypting the data of the private part to obtain ciphertext data of the video or the picture.
2. The method of claim 1,
And carrying out stream encryption processing on the data of the private part to obtain ciphertext data of the video or the picture.
3. The method of claim 2, further comprising:
and carrying out privacy protection processing on the ciphertext data to obtain a privacy-protected video or picture.
4. The method of claim 1, further comprising:
and storing the original data of the video or the picture to be encrypted.
5. the method of claim 1, wherein the privacy preserving process comprises one or more of a blurring process, a mosaic replacement, and a scrambling process.
6. A video/picture encryption secure transmission apparatus, comprising:
the acquisition module is used for acquiring original data of a video or picture to be encrypted;
the extraction module is used for extracting data of private parts needing to be protected in the video or picture to be encrypted;
And the encryption module is used for encrypting the data of the private part to obtain ciphertext data of the video or the picture.
7. the apparatus according to claim 6, wherein the encryption module is further configured to encrypt the data of the private part to obtain ciphertext data of a video or a picture.
8. The apparatus of claim 7, further comprising:
and the privacy processing module is used for carrying out privacy protection processing on the ciphertext data of the video or the picture to obtain the privacy-protected video or picture.
9. The apparatus of claim 6, further comprising:
And the storage module is used for storing the original data of the video or the picture to be encrypted.
10. The apparatus of claim 8, wherein the privacy preserving process comprises one or more of a blurring process, a mosaic replacement, and a scrambling process.
11. An electronic device, comprising:
A processor; and
a memory communicatively coupled to the processor, having computer program instructions stored therein,
wherein the computer program instructions, when executed by the processor, cause the processor to perform the video/picture encryption secure transmission method of any of claims 1-5.
12. A computer-readable storage medium, characterized in that it stores a computer program which, when executed by a processor, causes the processor to execute the video/picture encryption secure transmission method of any one of claims 1-5.
CN201910939027.XA 2019-09-30 2019-09-30 Video/picture encryption transmission method and device, electronic equipment and storage medium Pending CN110582010A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910939027.XA CN110582010A (en) 2019-09-30 2019-09-30 Video/picture encryption transmission method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910939027.XA CN110582010A (en) 2019-09-30 2019-09-30 Video/picture encryption transmission method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN110582010A true CN110582010A (en) 2019-12-17

Family

ID=68814032

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910939027.XA Pending CN110582010A (en) 2019-09-30 2019-09-30 Video/picture encryption transmission method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110582010A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111314742A (en) * 2020-04-02 2020-06-19 上海商魁信息科技有限公司 Video processing method and device and machine-readable storage medium
CN111586066A (en) * 2020-05-12 2020-08-25 上海依图网络科技有限公司 Method and device for encrypting multimedia data
CN111654664A (en) * 2020-05-08 2020-09-11 浙江大华技术股份有限公司 High-altitude parabolic detection method and system, computer equipment and storage medium
CN113360938A (en) * 2021-05-20 2021-09-07 维沃移动通信有限公司 Data transmission method and device and electronic equipment
CN113886850A (en) * 2021-09-28 2022-01-04 上海商汤智能科技有限公司 Information encryption method, decryption method, apparatus, electronic device, storage medium
CN114817942A (en) * 2022-02-28 2022-07-29 亿咖通(湖北)技术有限公司 Video privacy protection method and device, electronic equipment and storage medium
CN116186365A (en) * 2022-12-26 2023-05-30 广州繁星互娱信息科技有限公司 Web page snapshot saving method, web page display method, device and equipment
CN117411974A (en) * 2023-12-14 2024-01-16 汉华易美视觉科技有限公司 Picture material classification management system based on wireless communication technology

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103605928A (en) * 2013-11-18 2014-02-26 清华大学 Method and system for protecting privacy of images
CN105528549A (en) * 2015-12-09 2016-04-27 上海斐讯数据通信技术有限公司 Figure recognition based photo encryption/decryption method and system and mobile terminal
US20160292447A1 (en) * 2015-04-06 2016-10-06 Lawlitt Life Solutions, LLC Multi-layered encryption
CN106485164A (en) * 2016-09-27 2017-03-08 维沃移动通信有限公司 A kind of image processing method and mobile terminal
US20180189505A1 (en) * 2016-12-31 2018-07-05 Entefy Inc. System and method of applying adaptive privacy control layers to encoded media file types
CN109598138A (en) * 2018-11-15 2019-04-09 阿里巴巴集团控股有限公司 The method and device that whether sensitive information identification, cover and perception are checked in picture

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103605928A (en) * 2013-11-18 2014-02-26 清华大学 Method and system for protecting privacy of images
US20160292447A1 (en) * 2015-04-06 2016-10-06 Lawlitt Life Solutions, LLC Multi-layered encryption
CN105528549A (en) * 2015-12-09 2016-04-27 上海斐讯数据通信技术有限公司 Figure recognition based photo encryption/decryption method and system and mobile terminal
CN106485164A (en) * 2016-09-27 2017-03-08 维沃移动通信有限公司 A kind of image processing method and mobile terminal
US20180189505A1 (en) * 2016-12-31 2018-07-05 Entefy Inc. System and method of applying adaptive privacy control layers to encoded media file types
CN109598138A (en) * 2018-11-15 2019-04-09 阿里巴巴集团控股有限公司 The method and device that whether sensitive information identification, cover and perception are checked in picture

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111314742A (en) * 2020-04-02 2020-06-19 上海商魁信息科技有限公司 Video processing method and device and machine-readable storage medium
CN111654664A (en) * 2020-05-08 2020-09-11 浙江大华技术股份有限公司 High-altitude parabolic detection method and system, computer equipment and storage medium
CN111586066A (en) * 2020-05-12 2020-08-25 上海依图网络科技有限公司 Method and device for encrypting multimedia data
CN111586066B (en) * 2020-05-12 2022-08-12 上海依图网络科技有限公司 Method and device for encrypting multimedia data
CN113360938A (en) * 2021-05-20 2021-09-07 维沃移动通信有限公司 Data transmission method and device and electronic equipment
CN113886850A (en) * 2021-09-28 2022-01-04 上海商汤智能科技有限公司 Information encryption method, decryption method, apparatus, electronic device, storage medium
CN114817942A (en) * 2022-02-28 2022-07-29 亿咖通(湖北)技术有限公司 Video privacy protection method and device, electronic equipment and storage medium
CN116186365A (en) * 2022-12-26 2023-05-30 广州繁星互娱信息科技有限公司 Web page snapshot saving method, web page display method, device and equipment
CN117411974A (en) * 2023-12-14 2024-01-16 汉华易美视觉科技有限公司 Picture material classification management system based on wireless communication technology

Similar Documents

Publication Publication Date Title
CN110582010A (en) Video/picture encryption transmission method and device, electronic equipment and storage medium
CN100542085C (en) System and method for secure executable code
US20160117518A1 (en) File Encryption/Decryption Device And File Encryption/Decryption Method
CN107784207B (en) Display method, device and equipment of financial APP interface and storage medium
CN106228076B (en) A kind of picture validation code guard method and system based on SGX
CN111327947B (en) Screen capture management method and device and mobile terminal
CN113641648A (en) Distributed cloud security storage method, system and storage medium
CN114390316A (en) Processing method and device for image acquisition synchronous encryption privacy protection
TW200929985A (en) Secure information storage system and method
DOrazio et al. iOS anti-forensics: How can we securely conceal, delete and insert data?
CN102306255B (en) Document protection method and system
Pushpa Hybrid data encryption algorithm for secure medical data transmission in cloud environment
CN113259718A (en) Video stream encryption method and device, communication equipment and storage medium
CN113672954A (en) Feature extraction method and device and electronic equipment
Park et al. Rushmore: Securely displaying static and animated images using TrustZone
Riaz et al. Enhanced image encryption techniques using modified advanced encryption standard
CN113886850A (en) Information encryption method, decryption method, apparatus, electronic device, storage medium
KR102258638B1 (en) Systems and methods to block JavaScript-based web automation attacks and sniffing
Ajmera et al. Video steganography: Using scrambling-AES encryption and DCT, DST steganography
CN103605927A (en) Encryption and decryption method based on embedded Linux system
CN118590680A (en) A subway monitoring image data encryption transmission method, system, device and medium
US20160337673A1 (en) Protection of privacy in a video stream by means of a redundant slice
CN114417365B (en) Implementation method of one-to-one compression encryption and decryption key document security tool
CN110544199A (en) Image processing method and device, storage medium and electronic equipment
Besteena et al. Reversible data hiding in selectively encrypted RGB images by reserving room in advance

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191217

RJ01 Rejection of invention patent application after publication