JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE) ›› 2015, Vol. 45 ›› Issue (4): 40-44.doi: 10.6040/j.issn.1672-3961.0.2014.353

Previous Articles     Next Articles

Video perceptual encryption algorithm in remote education receiver

WANG Lanzhong1, MENG Wenjie2   

  1. 1. School of Foreign Languages and Literature, Shandong University, Jinan 250100, Shandong, China;
    2. School of Electrical Engineering and Automation, Qilu University of Technology, Jinan 250353, Shandong, China
  • Received:2014-12-08 Revised:2015-05-06 Online:2015-08-20 Published:2014-12-08

Abstract: In terms of the problems of the traditional algorithms concerning the working nonfluncy of the distance education operating system and the drop-outs video playing, a perceptive encryption algorithm was proposed based on the advantages and disadvantages of the comprehensive induction of the traditional video encryption scheme and the characteristics of the H.264 video data. Furthermore, an experimental platform of distance education video was established to modify the kernel of Android system, aggrandize the video data flow processing bank and introduce the remote education receiving devices. When the video was displayed on the basis of the perceptive encryption, asterisks appeared. The video could be displayed by applying the decryption algorithm to the perceptive algorithm. And the Android system works smoothly, which indicates that the effective control of video encryption and video decryption could be achieved through the algorithm, and the system operation stability could also be guaranteed.

Key words: remote education, perceptual encryption algorithm, android operating system, copyright management

CLC Number: 

  • TP309.7
[1] MEYER J, GADEGAST F. Security mechanisms for multimedia-data with the example MPEG1-video[D].Berlin:Technology University of Berlin, 1995.
[2] WEN J T, SEVERA M, ZENG W J, et al. A format-compliant configurable encryption framework for access control of video[J]. IEEE Transaction on Circuits and Systems for Video Technology, 2002, 12(6):545-557.
[3] SHI C G, WANG S Y, BHARGAVA B. MPEG video encryption in real-time using secret key cryptography[C]//Proceedings of the International Conference of Parallel and Distributed-Processing Techniques and Application (PDPTA99).Las Vegas,Nevada:Education and Application Press, 1999:2822-2828.
[4] BLOM R, CARRARA E, MC GREW D, et al. The secure real time transport protocol (SRTP)[EB/OL].[2001-03-04].
[5] SCHNEIER B. Applied Cryptography: protocols, algorithms, and source code in C[M].北京:机械工业出版社, 2000.
[6] WALLACE G,REGORY K. The JPEG still image compression standard[J].Communication of the ACM, 1991, 34(4):30-44.
[7] CHENG H, LI X B. Partial encryption of compressed images and videos[J]. IEEE Transactions on Signal Processing, 2000, 48(4):2439.
[8] TOSUN A S, FENG W C. Efficient multi-layer coding and encryption of MPEG Video Streams[C]//Proceedings of IEEE International Conference on Multimedia and Expo. New York, America:IEEE, 2000:119-122.
[9] ITU-T for ITU Telecommunication Standardization Sector. ITU-T Rec H 263, Video Coding for Narrow Telecommunication Channels at<64kbit/s[S].[S.l.]:[s.n.], 1995:2-8.
[10] Moving Picture Experts Group. ISO 11172: ISO/MPEG 90/176, Coding of Moving Pictures and Associated Audio[S].[S.l.]:[s.n.], 1992:1-20.
[11] WU C P, KUO C C J.Efficient multimedia encryption via entropy codec design[C]//Proceedings of SPIE International Symposium on Electronic Imaging. San Jose, CA, USA: SPIE:128-138.
[12] WU C P, KUO C C J. Fast encryption methods for audiovisual data confidentiality[C]//Proceedings of SPIE International Symposia on Information Technologies. Boston, USA: SPIE, 2000:284-295.
[13] BAHR K, HINSCH E, SCHULZE G. Incorporating security functions in multimedia conferencing applications in the context of the MICE project[C]//Proceedings of 2nd International Workshop of IWACA. Heidelberg, Germany: IWACA, 1994:28-36.
[14] ZENG W, LEI S. Efficient frequency domain selective scrambling of digital video[J]. IEEE Trans Multimedia, 2003(5):118-129.
No related articles found!
Full text



No Suggested Reading articles found!