CN111277865A - Method and device for encrypting image in real time - Google Patents
Method and device for encrypting image in real time Download PDFInfo
- Publication number
- CN111277865A CN111277865A CN202010051614.8A CN202010051614A CN111277865A CN 111277865 A CN111277865 A CN 111277865A CN 202010051614 A CN202010051614 A CN 202010051614A CN 111277865 A CN111277865 A CN 111277865A
- Authority
- CN
- China
- Prior art keywords
- image
- data
- encrypted
- low
- processing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 238000012545 processing Methods 0.000 claims abstract description 53
- 238000004891 communication Methods 0.000 claims description 6
- 230000005540 biological transmission Effects 0.000 claims description 5
- 238000004590 computer program Methods 0.000 claims description 4
- 238000010586 diagram Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 230000000694 effects Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000000295 complement effect Effects 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000006073 displacement reaction Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 229910044991 metal oxide Inorganic materials 0.000 description 1
- 150000004706 metal oxides Chemical class 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The invention relates to a method and a device for encrypting images in real time, wherein the method comprises the following steps: acquiring image data based on an image sensor, and processing the image data in real time; dividing the image data into two paths for data processing, encrypting the image data based on a preset encryption algorithm, and compressing the image data based on a preset processing strategy to obtain an encrypted image series flow and a low-resolution image series flow for providing preview; and simultaneously transmitting the encrypted video streaming and the low-resolution video streaming to a data output device, and outputting the encrypted data file with the encrypted video streaming and the low-resolution video streaming through the data output device. By the method, the image content can be encrypted in real time, the streaming speed of the image is not influenced, and the low-resolution image can be provided for users to preview, so that the habit of the users is met, the user experience is improved, and the data security can be ensured.
Description
Technical Field
The present invention relates to the field of image technologies, and in particular, to a method and an apparatus for encrypting an image in real time.
Background
With the development of image devices, image acquisition and storage become more common, but the risk of image data theft also increases.
The traditional image encryption mode mainly encrypts the connection of the device, but not the encryption of the image content, so the image data itself is not encrypted, and the traditional encryption mode is very easy to crack. In addition, the image file is not encrypted and only the access authority is encrypted in order to facilitate the user to access the image file, so that the image data is very easy to leak and the real encryption effect is not achieved. The image is encrypted by adopting conventional encryption software, and the encryption process is easy to be invaded by hackers or risks of skimming, password leakage and the like exist in the encryption process.
Therefore, how to encrypt the video content in real time and provide a preview in order to better protect the video data from being stolen is a problem to be solved urgently.
Disclosure of Invention
Accordingly, there is a need for a method and apparatus for encrypting video in real time, which can encrypt video content in real time and provide a preview.
A method for real-time image encryption comprises the following steps:
acquiring image data based on an image sensor, and processing the image data in real time;
dividing the image data into two paths for data processing, encrypting the image data based on a preset encryption algorithm, and compressing the image data based on a preset processing strategy to obtain an encrypted image series flow and a low-resolution image series flow for providing preview;
and simultaneously transmitting the encrypted video streaming and the low-resolution video streaming to a data output device, and outputting the encrypted data file with the encrypted video streaming and the low-resolution video streaming through the data output device.
In one embodiment, the dividing the image data into two paths for data processing, encrypting the image data based on a preset encryption algorithm, and compressing the image data based on a preset processing policy to obtain an encrypted image stream and a low-resolution image stream for providing a preview includes:
dividing the image data into first image data and second image data through an image controller to carry out operation;
encrypting the first image data based on an AES encryption algorithm, and simultaneously performing SHA256 operation on the first image data to obtain a complete encrypted image streaming;
and compressing the second image data through the image controller, and processing the compressed data by combining an image processing algorithm to obtain a low-resolution image streaming for providing preview for a user.
In one embodiment, the compressing, by the video controller, the second video data and processing the compressed data with an image processing algorithm to obtain a low resolution video stream for providing a preview to a user further includes:
and compressing the second image data through the image controller to obtain a low-resolution image, and performing fuzzy processing and color tone processing on the low-resolution image to obtain a low-resolution image streaming flow for providing preview for a user.
In one embodiment, the transmitting the encrypted video stream and the low resolution video stream to a data output device simultaneously, and outputting the video data with the encrypted video stream and the low resolution video stream through the data output device includes:
generating, by the video controller, an encrypted data file from the encrypted video stream and the low resolution video stream;
and the image controller is in communication connection with a USB controller, the image controller transmits the encrypted data file to the USB controller, and the encrypted data file is sent to a USB interface through the USB controller to realize data transmission.
In one embodiment, the transmitting the encrypted video stream and the low resolution video stream to a data output device simultaneously, and outputting the encrypted data file with the encrypted video stream and the low resolution video stream through the data output device further includes:
generating, by the video controller, an encrypted data file from the encrypted video stream and the low resolution video stream;
and the image controller is in communication connection with an SoC chip, the image controller transmits the encrypted data file to the SoC chip, and the encrypted data file encrypted in real time is output through the SoC chip.
In one embodiment, the method further comprises:
when the image needs to be played, the encrypted data file is opened based on the player, the encrypted data file is decrypted through a preset secret key, and the image is played according to the decrypted image data.
An apparatus for real-time image encryption, comprising:
the image acquisition module is used for acquiring image data and processing the image data in real time;
the data processing module is used for dividing the image data into two paths for data processing, encrypting the image data based on a preset encryption algorithm, and compressing the image data based on a preset processing strategy to obtain an encrypted image streaming and a low-resolution image streaming for providing preview;
and the data output module is used for simultaneously transmitting the encrypted video streaming and the low-resolution video streaming to data output equipment, and outputting the encrypted data file with the encrypted video streaming and the low-resolution video streaming through the data output equipment.
A terminal comprising a memory and a processor, the memory having stored therein computer readable instructions which, when executed by the processor, cause the processor to perform the steps of the method described above.
A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the above-mentioned method.
The image real-time encryption method and the device thereof can be used for processing the image data in real time by acquiring the image data, dividing the image data into two paths for data processing, encrypting the image data based on a preset encryption algorithm, compressing the image data based on a preset processing strategy to obtain an encrypted image series flow and a low-resolution image series flow for providing preview, simultaneously transmitting the encrypted image series flow and the low-resolution image series flow to a data output device, and outputting an encrypted data file with the encrypted image series flow and the low-resolution image series flow through the data output device. By the method, the image content can be encrypted in real time, the streaming speed of the image is not influenced, and the low-resolution image can be provided for users to preview, so that the habit of the users is met, the user experience is improved, and the data security can be ensured.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flow diagram of a method for real-time encryption of images in one embodiment;
FIG. 2 is a diagram illustrating an exemplary embodiment of a real-time image encryption method;
FIG. 3 is a block diagram of an apparatus for real-time image encryption according to an embodiment.
Detailed Description
To facilitate an understanding of the invention, the invention will now be described more fully with reference to the accompanying drawings. Preferred embodiments of the present invention are shown in the drawings. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used herein in the description of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
It will be understood that, as used herein, the terms "first," "second," and the like may be used herein to describe various elements, but these elements are not limited by these terms. These terms are only used to distinguish one element from another. For example, a first device may be termed a second device, and, similarly, a second device may be termed a first device, without departing from the scope of the present invention. The first device and the second device are both devices having common properties, but are not the same device.
Fig. 1 is a flowchart of a method for encrypting a video in real time according to an embodiment, where the method for encrypting a video in real time according to the embodiment can implement real-time encryption of video content and can provide a preview. As shown in fig. 2, the method for encrypting the image in real time includes the following steps 102 to 106:
step 102: the method comprises the steps of obtaining image data based on an image sensor and processing the image data in real time.
Specifically, as shown in fig. 2, in the present embodiment, the image sensor 210 acquires image data, for example, a camera acquires an image through a CCD (Charge-coupled Device) image sensor or a CMOS (complementary metal Oxide Semiconductor) image sensor, so as to form image data.
Further, the acquired image data is transmitted to the image controller 220, and the image controller 220 processes the image data in real time. The video controller 220 is a device for processing and controlling transmission of video data, and the video controller 220 has functions of image processing (ISP), compression, encryption, and the like. Optionally, the image controller 220 may be a GPU (Graphics Processing Unit) or a CPU (central Processing Unit).
Step 104: the image data are divided into two paths for data processing, the image data are encrypted based on a preset encryption algorithm, and the image data are compressed based on a preset processing strategy, so that encrypted image series flow and low-resolution image series flow for providing preview are obtained.
Specifically, the image controller 220 divides the image data into a first image data and a second image data for operation, specifically, the image controller 220 divides the same image data into two paths for operation respectively, and the image data is input into the image controller 220.
The first image data is encrypted based on an Advanced Encryption Standard (AES) Encryption algorithm, and SHA256 operation is performed on the first image data to obtain a complete encrypted image stream. AES refers to a symmetric encryption algorithm, i.e. the same key is used for encryption and decryption, which consists essentially of 4 operations: byte substitution, row displacement, column confusion, round key addition; in addition, the original key needs to be expanded. SHA256 refers to an algorithm subdivided under SHA-2(Secure HashAlgorithm 2), and SHA256 is a hash function, also called hash algorithm, which is a method for creating a small digital "fingerprint" from any kind of data. The hash function compresses a message or data into a digest so that the amount of data becomes small, fixing the format of the data. Therefore, the integrity of the encrypted document can be ensured by performing the SHA256 operation on the first image data, thereby avoiding errors or artificial modification in the transmission process and ensuring the integrity of the encrypted document.
Further, the video stream refers to a series of compressed images transmitted to the user's receiver via the internet, so that the user can download and play related images. The second image data is compressed by the image controller 220, and the compressed data is processed by combining with an image processing algorithm, so as to obtain a low-resolution image stream for the user to preview, provide a low-resolution (e.g. 160x120) unencrypted image for the user to preview, provide a low-resolution image for the user to preview, so as to meet the habit of the user and improve the user experience. Specifically, the image controller 220 may compress the second image data to obtain a low-resolution image, perform blurring and color tone processing on the low-resolution image to obtain a low-resolution image stream for the user to preview, and perform the above processing on the low-resolution image, so that the low-resolution preview image cannot be used for other purposes, such as biometric identification and face identification, and the risk of image data theft is avoided.
Step 106: and simultaneously transmitting the encrypted video streaming and the low-resolution video streaming to a data output device, and outputting the encrypted data file with the encrypted video streaming and the low-resolution video streaming through the data output device.
Specifically, the data output device 230 may be a USB device, the USB device includes a USB controller and a USB interface, the image controller 220 generates an encrypted data file from the encrypted image stream and the low-resolution image stream, the image controller 220 is in communication with the USB controller, the image controller 220 transmits the encrypted data file to the USB controller, and the USB controller transmits the encrypted data file to the USB interface to implement data transmission. For example, the image controller 220 is integrated into a USB controller to form an encrypted data stream with a USB interface, and the USB interface is connected to the system to simplify the load of the system on the encryption operation, thereby achieving the effect of real-time encryption without affecting the speed of the image stream.
Optionally, the data output device 230 may also be an SoC chip, which is a system-on-a-chip having a dedicated target integrated circuit containing the complete system and having the entire contents of the embedded software. The encrypted image streaming and the low-resolution image streaming are generated into encrypted data files through the image controller 220, the image controller 220 is in communication connection with the SoC chip, the encrypted data files are transmitted to the SoC chip through the image controller 220, and the encrypted data files encrypted in real time are output through the SoC chip. For example, by integrating the image controller 220 into the SoC chip, the SoC chip can directly output real-time encrypted data.
The image real-time encryption method includes the steps of obtaining image data, conducting real-time processing on the image data, dividing the image data into two paths for data processing, encrypting the image data based on a preset encryption algorithm, compressing the image data based on a preset processing strategy to obtain an encrypted image series flow and a low-resolution image series flow for providing preview, simultaneously transmitting the encrypted image series flow and the low-resolution image series flow to a data output device, and outputting an encrypted data file with the encrypted image series flow and the low-resolution image series flow through the data output device. By the method, the image content can be encrypted in real time, the streaming speed of the image is not influenced, and the low-resolution image can be provided for users to preview, so that the habit of the users is met, the user experience is improved, and the data security can be ensured.
In one embodiment, the method for real-time encryption of images further comprises: when the image needs to be played, the encrypted data file is opened based on the player, the encrypted data file is decrypted through a preset secret key, and the image is played according to the decrypted image data. Specifically, the encrypted data file can be bound with the playing device to be decrypted and watched in real time when the playing device watches the encrypted data file, the software for watching the encrypted data file can be watched by inputting a password, the encrypted data file is copied to other playing devices to be watched, the password is required to be input to unlock the encrypted data file, the risk that image data is stolen is avoided, and the safety of the encrypted data file is improved.
Based on the same inventive concept, as shown in fig. 3, the following provides an apparatus for real-time encryption of images, the apparatus comprising: an image acquisition module 310, a data processing module 320 and a data output module 330.
The image obtaining module 310 is configured to obtain image data and process the image data in real time.
The data processing module 320 is configured to divide the image data into two paths for data processing, encrypt the image data based on a preset encryption algorithm, and compress the image data based on a preset processing policy, so as to obtain an encrypted image stream after encryption and a low-resolution image stream for providing preview.
The data output module 330 is configured to transmit the encrypted video stream and the low resolution video stream to a data output device simultaneously, and output an encrypted data file with the encrypted video stream and the low resolution video stream through the data output device.
Through the device for encrypting the image in real time, the image content can be encrypted in real time, the speed of the image streaming is not influenced, the image with low resolution can be provided for users to preview, the habit of the users is met, and the safety of data can be ensured while the user experience is improved.
The present application further provides a terminal, including a memory and a processor, where the memory stores computer readable instructions, and the instructions, when executed by the processor, cause the processor to execute the steps of the method for encrypting an image in real time in the foregoing embodiment.
The present application also provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the method for real-time image encryption in the above embodiments.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above examples only show some embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.
Claims (9)
1. A method for real-time image encryption, comprising:
acquiring image data based on an image sensor, and processing the image data in real time;
dividing the image data into two paths for data processing, encrypting the image data based on a preset encryption algorithm, and compressing the image data based on a preset processing strategy to obtain an encrypted image series flow and a low-resolution image series flow for providing preview;
and simultaneously transmitting the encrypted video streaming and the low-resolution video streaming to a data output device, and outputting the encrypted data file with the encrypted video streaming and the low-resolution video streaming through the data output device.
2. The method of claim 1, wherein the dividing the video data into two paths for data processing, encrypting the video data based on a predetermined encryption algorithm, and compressing the video data based on a predetermined processing strategy to obtain an encrypted video stream and a low resolution video stream for providing preview, comprises:
dividing the image data into first image data and second image data through an image controller to carry out operation;
encrypting the first image data based on an AES encryption algorithm, and simultaneously performing SHA256 operation on the first image data to obtain a complete encrypted image streaming;
and compressing the second image data through the image controller, and processing the compressed data by combining an image processing algorithm to obtain a low-resolution image streaming for providing preview for a user.
3. The method of claim 2, wherein the compressing the second video data by the video controller and processing the compressed data with an image processing algorithm to obtain a low resolution video stream for providing a preview to a user, further comprises:
and compressing the second image data through the image controller to obtain a low-resolution image, and performing fuzzy processing and color tone processing on the low-resolution image to obtain a low-resolution image streaming flow for providing preview for a user.
4. The method of claim 2, wherein the transmitting the encrypted video stream and the low resolution video stream to a data output device simultaneously, and outputting the video data with the encrypted video stream and the low resolution video stream through the data output device comprises:
generating, by the video controller, an encrypted data file from the encrypted video stream and the low resolution video stream;
and the image controller is in communication connection with a USB controller, the image controller transmits the encrypted data file to the USB controller, and the encrypted data file is sent to a USB interface through the USB controller to realize data transmission.
5. The method of claim 2, wherein the transmitting the encrypted video stream and the low resolution video stream simultaneously to a data output device, and outputting an encrypted data file with the encrypted video stream and the low resolution video stream via the data output device, further comprises:
generating, by the video controller, an encrypted data file from the encrypted video stream and the low resolution video stream;
and the image controller is in communication connection with an SoC chip, the image controller transmits the encrypted data file to the SoC chip, and the encrypted data file encrypted in real time is output through the SoC chip.
6. The method of claim 1, further comprising:
when the image needs to be played, the encrypted data file is opened based on the player, the encrypted data file is decrypted through a preset secret key, and the image is played according to the decrypted image data.
7. An apparatus for encrypting images in real time, comprising:
the image acquisition module is used for acquiring image data and processing the image data in real time;
the data processing module is used for dividing the image data into two paths for data processing, encrypting the image data based on a preset encryption algorithm, and compressing the image data based on a preset processing strategy to obtain an encrypted image streaming and a low-resolution image streaming for providing preview;
and the data output module is used for simultaneously transmitting the encrypted video streaming and the low-resolution video streaming to data output equipment, and outputting the encrypted data file with the encrypted video streaming and the low-resolution video streaming through the data output equipment.
8. A terminal comprising a memory and a processor, the memory having stored therein computer readable instructions which, when executed by the processor, cause the processor to perform the steps of the method of any one of claims 1 to 6.
9. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010051614.8A CN111277865A (en) | 2020-01-17 | 2020-01-17 | Method and device for encrypting image in real time |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010051614.8A CN111277865A (en) | 2020-01-17 | 2020-01-17 | Method and device for encrypting image in real time |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111277865A true CN111277865A (en) | 2020-06-12 |
Family
ID=71002270
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010051614.8A Pending CN111277865A (en) | 2020-01-17 | 2020-01-17 | Method and device for encrypting image in real time |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111277865A (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000125276A (en) * | 1998-10-13 | 2000-04-28 | Nec Eng Ltd | Image data transmitter, image data receiver and image data transmitting method |
CN1333973A (en) * | 1998-11-20 | 2002-01-30 | 艾利森电话股份有限公司 | Method and device for encryption of images |
TW200926758A (en) * | 2007-12-13 | 2009-06-16 | Altek Corp | Image processing system with image encryption function and method thereof |
US20110229043A1 (en) * | 2010-03-18 | 2011-09-22 | Fujitsu Limited | Image processing apparatus and image processing method |
US20150016602A1 (en) * | 2013-07-15 | 2015-01-15 | At&T Intellectual Propertyi, L.P. | Method and apparatus for providing secure image encryption and decryption |
CN105426724A (en) * | 2015-11-24 | 2016-03-23 | 上海斐讯数据通信技术有限公司 | Electronic image encryption method and device, electronic image decryption method and device, and equipment |
CN105447395A (en) * | 2015-12-04 | 2016-03-30 | 上海斐讯数据通信技术有限公司 | Picture encryption system and picture decryption system |
US20170094372A1 (en) * | 2015-09-25 | 2017-03-30 | Samsung Electronics Co., Ltd. | Device and method for processing image |
CN106791923A (en) * | 2016-12-30 | 2017-05-31 | 中广热点云科技有限公司 | A kind of stream of video frames processing method, video server and terminal device |
-
2020
- 2020-01-17 CN CN202010051614.8A patent/CN111277865A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000125276A (en) * | 1998-10-13 | 2000-04-28 | Nec Eng Ltd | Image data transmitter, image data receiver and image data transmitting method |
CN1333973A (en) * | 1998-11-20 | 2002-01-30 | 艾利森电话股份有限公司 | Method and device for encryption of images |
TW200926758A (en) * | 2007-12-13 | 2009-06-16 | Altek Corp | Image processing system with image encryption function and method thereof |
US20110229043A1 (en) * | 2010-03-18 | 2011-09-22 | Fujitsu Limited | Image processing apparatus and image processing method |
US20150016602A1 (en) * | 2013-07-15 | 2015-01-15 | At&T Intellectual Propertyi, L.P. | Method and apparatus for providing secure image encryption and decryption |
US20170094372A1 (en) * | 2015-09-25 | 2017-03-30 | Samsung Electronics Co., Ltd. | Device and method for processing image |
CN105426724A (en) * | 2015-11-24 | 2016-03-23 | 上海斐讯数据通信技术有限公司 | Electronic image encryption method and device, electronic image decryption method and device, and equipment |
CN105447395A (en) * | 2015-12-04 | 2016-03-30 | 上海斐讯数据通信技术有限公司 | Picture encryption system and picture decryption system |
CN106791923A (en) * | 2016-12-30 | 2017-05-31 | 中广热点云科技有限公司 | A kind of stream of video frames processing method, video server and terminal device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US5907619A (en) | Secure compressed imaging | |
AU2003203718B2 (en) | Methods and systems for authentication of components in a graphics system | |
JP4698106B2 (en) | System and method for copy protection of transmitted information | |
EP1343321B1 (en) | Methods and systems for cryptographically protecting secure content in video memory | |
KR100677026B1 (en) | Video Signal Transceiver System and Security Module Used in It | |
US9276745B2 (en) | Preserving image privacy when manipulated by cloud services | |
US7913094B2 (en) | Information reproducing apparatus and secure module | |
EP0809379A2 (en) | Authentication apparatus according to the challenge-response principle | |
EP2058974A1 (en) | Key terminal apparatus, lsi for encryption process, unique key producing method, and content system | |
KR100794890B1 (en) | Information processing method, forgery verification method and apparatus, storage medium | |
CN112804560A (en) | Video encryption transmission method, middleware and computer readable storage medium | |
JPH11205738A (en) | Image input device, its method and storage medium | |
US20100008504A1 (en) | Data transmitting apparatus, data receiving apparatus, data transmitting method, and data receiving method | |
CN107809644A (en) | A kind of encryption area image reversible data concealing method of double-encryption | |
JP4261724B2 (en) | Signature data generation apparatus and image verification apparatus | |
EP2593894A1 (en) | System and method to prevent manipulation of transmitted video data | |
JP5043421B2 (en) | Information processing apparatus and method | |
JP2007329688A (en) | Data processing apparatus and method thereof | |
Salim et al. | Hide text in an image using Blowfish algorithm and development of least significant bit technique | |
JP2004208088A (en) | Method and device for enciphering device key, method and device for deciphering device key, method and device for enciphering/deciphering device key, and program therefor | |
CN111177748A (en) | Fingerprint storage encryption method, device and system | |
DK2594064T3 (en) | System and method for preventing manipulation of the transmitted video data | |
CN102396241B (en) | Method of securing access to audio/video content in a decoding unit | |
CN111277865A (en) | Method and device for encrypting image in real time | |
KR20060061219A (en) | Cryptographic processor |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200612 |
|
RJ01 | Rejection of invention patent application after publication |