JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE) ›› 2015, Vol. 45 ›› Issue (4): 40-44.doi: 10.6040/j.issn.1672-3961.0.2014.353

Previous Articles     Next Articles

Video perceptual encryption algorithm in remote education receiver

WANG Lanzhong1, MENG Wenjie2   

  1. 1. School of Foreign Languages and Literature, Shandong University, Jinan 250100, Shandong, China;
    2. School of Electrical Engineering and Automation, Qilu University of Technology, Jinan 250353, Shandong, China
  • Received:2014-12-08 Revised:2015-05-06 Online:2015-08-20 Published:2014-12-08

Abstract: In terms of the problems of the traditional algorithms concerning the working nonfluncy of the distance education operating system and the drop-outs video playing, a perceptive encryption algorithm was proposed based on the advantages and disadvantages of the comprehensive induction of the traditional video encryption scheme and the characteristics of the H.264 video data. Furthermore, an experimental platform of distance education video was established to modify the kernel of Android system, aggrandize the video data flow processing bank and introduce the remote education receiving devices. When the video was displayed on the basis of the perceptive encryption, asterisks appeared. The video could be displayed by applying the decryption algorithm to the perceptive algorithm. And the Android system works smoothly, which indicates that the effective control of video encryption and video decryption could be achieved through the algorithm, and the system operation stability could also be guaranteed.

Key words: remote education, perceptual encryption algorithm, android operating system, copyright management

CLC Number: 

  • TP309.7
[1] MEYER J, GADEGAST F. Security mechanisms for multimedia-data with the example MPEG1-video[D].Berlin:Technology University of Berlin, 1995.
[2] WEN J T, SEVERA M, ZENG W J, et al. A format-compliant configurable encryption framework for access control of video[J]. IEEE Transaction on Circuits and Systems for Video Technology, 2002, 12(6):545-557.
[3] SHI C G, WANG S Y, BHARGAVA B. MPEG video encryption in real-time using secret key cryptography[C]//Proceedings of the International Conference of Parallel and Distributed-Processing Techniques and Application (PDPTA99).Las Vegas,Nevada:Education and Application Press, 1999:2822-2828.
[4] BLOM R, CARRARA E, MC GREW D, et al. The secure real time transport protocol (SRTP)[EB/OL].[2001-03-04]. http://www.itu.int/rec/T-REC-H.235.7/en/
[5] SCHNEIER B. Applied Cryptography: protocols, algorithms, and source code in C[M].北京:机械工业出版社, 2000.
[6] WALLACE G,REGORY K. The JPEG still image compression standard[J].Communication of the ACM, 1991, 34(4):30-44.
[7] CHENG H, LI X B. Partial encryption of compressed images and videos[J]. IEEE Transactions on Signal Processing, 2000, 48(4):2439.
[8] TOSUN A S, FENG W C. Efficient multi-layer coding and encryption of MPEG Video Streams[C]//Proceedings of IEEE International Conference on Multimedia and Expo. New York, America:IEEE, 2000:119-122.
[9] ITU-T for ITU Telecommunication Standardization Sector. ITU-T Rec H 263, Video Coding for Narrow Telecommunication Channels at<64kbit/s[S].[S.l.]:[s.n.], 1995:2-8.
[10] Moving Picture Experts Group. ISO 11172: ISO/MPEG 90/176, Coding of Moving Pictures and Associated Audio[S].[S.l.]:[s.n.], 1992:1-20.
[11] WU C P, KUO C C J.Efficient multimedia encryption via entropy codec design[C]//Proceedings of SPIE International Symposium on Electronic Imaging. San Jose, CA, USA: SPIE:128-138.
[12] WU C P, KUO C C J. Fast encryption methods for audiovisual data confidentiality[C]//Proceedings of SPIE International Symposia on Information Technologies. Boston, USA: SPIE, 2000:284-295.
[13] BAHR K, HINSCH E, SCHULZE G. Incorporating security functions in multimedia conferencing applications in the context of the MICE project[C]//Proceedings of 2nd International Workshop of IWACA. Heidelberg, Germany: IWACA, 1994:28-36.
[14] ZENG W, LEI S. Efficient frequency domain selective scrambling of digital video[J]. IEEE Trans Multimedia, 2003(5):118-129.
[1] LI Rui-feng, YI Zheng-ge, YUAN Wen-yong, YANG Xiao-yuan, NIU Ke. ECDSA-based auditing scheme for cloud storage [J]. Journal of Shandong University(Engineering Science), 2022, 57(5): 57-65.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LI Kan . Empolder and implement of the embedded weld control system[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2008, 38(4): 37 -41 .
[2] LAI Xiang . The global domain of attraction for a kind of MKdV equations[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2006, 36(1): 87 -92 .
[3] YU Jia yuan1, TIAN Jin ting1, ZHU Qiang zhong2. Computational intelligence and its application in psychology[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(1): 1 -5 .
[4] CHEN Rui, LI Hongwei, TIAN Jing. The relationship between the number of magnetic poles and the bearing capacity of radial magnetic bearing[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2018, 48(2): 81 -85 .
[5] WANG Bo,WANG Ning-sheng . Automatic generation and combinatory optimization of disassembly sequence for mechanical-electric assembly[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2006, 36(2): 52 -57 .
[6] QIN Tong, SUN Fengrong*, WANG Limei, WANG Qinghao, LI Xincai. 3D surface reconstruction using the shape based interpolation guided by maximal discs[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2010, 40(3): 1 -5 .
[7] ZHANG Ying,LANG Yongmei,ZHAO Yuxiao,ZHANG Jianda,QIAO Peng,LI Shanping . Research on technique of aerobic granular sludge cultivationby seeding EGSB anaerobic granular sludge[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2006, 36(4): 56 -59 .
[8] Yue Khing Toh1, XIAO Wendong2, XIE Lihua1. Wireless sensor network for distributed target tracking: practices via real test bed development[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(1): 50 -56 .
[9] SUN Weiwei, WANG Yuzhen. Finite gain stabilization of singlemachine infinite bus system subject to saturation[J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2009, 39(1): 69 -76 .
[10] SUN Yu-li,LI De-fa,ZUO Dun-wen,QI mei . [J]. JOURNAL OF SHANDONG UNIVERSITY (ENGINEERING SCIENCE), 2006, 36(6): 19 -23 .