您的位置:山东大学 -> 科技期刊社 -> 《山东大学学报(工学版)》

山东大学学报(工学版) ›› 2015, Vol. 45 ›› Issue (4): 40-44.doi: 10.6040/j.issn.1672-3961.0.2014.353

• 控制科学与工程 • 上一篇    下一篇

远程教育中视频感知加密算法

王兰忠1, 孟文杰2   

  1. 1. 山东大学外国语学院, 山东 济南 250100;
    2. 齐鲁工业大学电气工程与自动化学院, 山东 济南 250353
  • 收稿日期:2014-12-08 修回日期:2015-05-06 出版日期:2015-08-20 发布日期:2014-12-08
  • 作者简介:王兰忠(1973-),男,山东莱西人,工程师,主要研究方向为网络在线学习.E-mail:lan2726@sdu.edu.cn
  • 基金资助:
    山东省科技发展计划项目(2012GXH20104)

Video perceptual encryption algorithm in remote education receiver

WANG Lanzhong1, MENG Wenjie2   

  1. 1. School of Foreign Languages and Literature, Shandong University, Jinan 250100, Shandong, China;
    2. School of Electrical Engineering and Automation, Qilu University of Technology, Jinan 250353, Shandong, China
  • Received:2014-12-08 Revised:2015-05-06 Online:2015-08-20 Published:2014-12-08

摘要: 针对传统加密算法在基于Android操作系统的远程教育视频存在着运行不流畅、视频播放出现漏码等问题,在综合归纳传统视频加密方案的优缺点以及H.264视频数据特点的基础上,提出了一种根据不同数据元素类型进行不同加密强度控制的感知加密算法。修改Android系统的内核,增加视频数据流处理库,导入远程教育接收装置,搭建了远程教育视频的试验平台。在试验平台上对视频信号的播放、解密以及Android系统的运行进行了测试,论证了该方法的有效性、流畅性和稳定性。

关键词: 版权管理, 感知加密, Android操作系统, 远程教育

Abstract: In terms of the problems of the traditional algorithms concerning the working nonfluncy of the distance education operating system and the drop-outs video playing, a perceptive encryption algorithm was proposed based on the advantages and disadvantages of the comprehensive induction of the traditional video encryption scheme and the characteristics of the H.264 video data. Furthermore, an experimental platform of distance education video was established to modify the kernel of Android system, aggrandize the video data flow processing bank and introduce the remote education receiving devices. When the video was displayed on the basis of the perceptive encryption, asterisks appeared. The video could be displayed by applying the decryption algorithm to the perceptive algorithm. And the Android system works smoothly, which indicates that the effective control of video encryption and video decryption could be achieved through the algorithm, and the system operation stability could also be guaranteed.

Key words: remote education, perceptual encryption algorithm, android operating system, copyright management

中图分类号: 

  • TP309.7
[1] MEYER J, GADEGAST F. Security mechanisms for multimedia-data with the example MPEG1-video[D].Berlin:Technology University of Berlin, 1995.
[2] WEN J T, SEVERA M, ZENG W J, et al. A format-compliant configurable encryption framework for access control of video[J]. IEEE Transaction on Circuits and Systems for Video Technology, 2002, 12(6):545-557.
[3] SHI C G, WANG S Y, BHARGAVA B. MPEG video encryption in real-time using secret key cryptography[C]//Proceedings of the International Conference of Parallel and Distributed-Processing Techniques and Application (PDPTA99).Las Vegas,Nevada:Education and Application Press, 1999:2822-2828.
[4] BLOM R, CARRARA E, MC GREW D, et al. The secure real time transport protocol (SRTP)[EB/OL].[2001-03-04]. http://www.itu.int/rec/T-REC-H.235.7/en/
[5] SCHNEIER B. Applied Cryptography: protocols, algorithms, and source code in C[M].北京:机械工业出版社, 2000.
[6] WALLACE G,REGORY K. The JPEG still image compression standard[J].Communication of the ACM, 1991, 34(4):30-44.
[7] CHENG H, LI X B. Partial encryption of compressed images and videos[J]. IEEE Transactions on Signal Processing, 2000, 48(4):2439.
[8] TOSUN A S, FENG W C. Efficient multi-layer coding and encryption of MPEG Video Streams[C]//Proceedings of IEEE International Conference on Multimedia and Expo. New York, America:IEEE, 2000:119-122.
[9] ITU-T for ITU Telecommunication Standardization Sector. ITU-T Rec H 263, Video Coding for Narrow Telecommunication Channels at<64kbit/s[S].[S.l.]:[s.n.], 1995:2-8.
[10] Moving Picture Experts Group. ISO 11172: ISO/MPEG 90/176, Coding of Moving Pictures and Associated Audio[S].[S.l.]:[s.n.], 1992:1-20.
[11] WU C P, KUO C C J.Efficient multimedia encryption via entropy codec design[C]//Proceedings of SPIE International Symposium on Electronic Imaging. San Jose, CA, USA: SPIE:128-138.
[12] WU C P, KUO C C J. Fast encryption methods for audiovisual data confidentiality[C]//Proceedings of SPIE International Symposia on Information Technologies. Boston, USA: SPIE, 2000:284-295.
[13] BAHR K, HINSCH E, SCHULZE G. Incorporating security functions in multimedia conferencing applications in the context of the MICE project[C]//Proceedings of 2nd International Workshop of IWACA. Heidelberg, Germany: IWACA, 1994:28-36.
[14] ZENG W, LEI S. Efficient frequency domain selective scrambling of digital video[J]. IEEE Trans Multimedia, 2003(5):118-129.
No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!