用户名: 密码: 验证码:
视频信号的数字加密系统研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
伴随着网络技术和多媒体技术的飞速发展,多媒体信息逐渐成为人们获取信息的重要手段,已成为人们生活的重要组成部分。目前,在多媒体计算机技术应用系统中,对视频图像处理有两大研究方向:一是视频图像的压缩编码;二是视频图像的实时处理和图像信息的安全。
     视频图像压缩编码是解决有限的存储空间与越来越丰富的视频信息之间矛盾的需要,同时也是满足节省通信信道带宽和视频实时传输的需要。视频图像信息的安全是为了防止敏感信息轻易地窃取、篡改、非法复制和传播。信息安全主要包括信息加密技术和信息隐藏两部分,本文主要研究视频信息加密技术。
     论文首先简要地介绍了课题背景和当前的研究状况,研究了视频编码模型特点,分析了MPEG-2数据结构特点和AVI视频格式的异同,在同等的视觉质量范围下MPEG-2采用有损压缩方法减少运动图像中的冗余信息从而达到高压缩比,因此MPEG-2压缩算法作为国际标准,被许多的计算机平台共同支持,较AVI视频具有更好的兼容性。在此基础上设计了AVI视频到MPEG-2视频的实现方案,并加以实现。其次,参考了一般的数据加密方法,目前图像信息加密算法主要有二大类。一是用纯密码算法加密技术,将图像数据文件当作一般的二进制数据文件进行加密。二是基于编码模型的加密算法,它是根据图像描述语言或某种空间填充曲线,对图像信息进行变换。我们采用椭圆曲线加密算法作为纯密码加密技术进行实验,发现纯密码加密技术没有考虑到视频信号的特点,加密效果不理想。
     论文最后采用了置乱算法的加密思想,考虑到MPEG-2视频结构中P帧和B帧中运动向量计算的特点,提出了一种基于混沌理论的视频加密算法。利用混沌理论在MPEG-2视频的I帧中进行加密,然后通过P帧B帧分布到整个MPEG-2视频文件中。经过实验证明了这种方法对于I帧的压缩仍然具有视觉范围内很好的解密能力,即使对于P帧和B帧的压缩也有很不错的效果。
With the development at full speed of the network technology and multimedia technology, the multimedia information becomes the important means that people obtain information gradually and has already become the important component of people's life. At present, in the technological application system of the multimedia computer, there are two major researches to the video process: one is the compression code of the image; the other is the real-time processing of the image and protection of image information.
    It is a need of solving the contradiction between the limited memory space and more and more abundant video information that the video image compresses the code, alleviate video communication between channel and communication contradiction between the channel width in recent years and meet need that transmit in real time of video too at the same time. The protection of the image information of the video is for preventing the stealing, distorts, duplicates and spreads illegally easily of sensitive information. The technology of image information includes information encryption and information hiding two parts. The video information encryption is mainly researched in this paper.
    In this paper, at first, the background and the state of the subject are introduced. We study the code model characteristic of videos, analyse the characteristic of MPEG data structure and similarities and differences of forms of AVI video. The method which compresses the information of an image and the differences of images is adopted to reach the high compression ratio. MPEG compresses algorithms as the international standard, is supported together by many computer platforms now, have better compatibility than AVI video. We design the realization scheme to MPEG-2 video of AVI video on this basis, and realize. Secondly, we have consulted the general data encryption method. An encryption method based on ECC is applied on the MPEG system directly. The encryption method isn't considered the characteristic of the video signal, regard the image data file as the general binary scale data file to encrypt. It is
    
    
    unsatisfactory to encrypt the result.
    At last, a new method based on chaos theory is considered. We test it and get a better result than the other methods we have discussed.
引文
[1] Bruce Schneier.Applied cryptography: Protocols, Algorithms, and Source Code in C.John Wiley&Sons,Inc, 1996
    [2] Man Young Rhce.Cryptography and Secure Communication, McGraw-Hill Book Co.. 1994
    [3] 沈世镒编著.近代密码学.广东师范大学出版社,1999
    [4] 陈鲁升,沈世镒.现代密码学.北京:科学出版社,2001
    [5] ITU-T. Video Code for Audiovisual Services at P*64Kbps. Dec. 1990
    [6] G.C. Langelaar. Copy Protection for Multimedia Data based on Labeling Techniques. International Conference on Image Processing, Austin, Texas, U.S.A., 2001
    [7] Qi DongXu,Ding Wei and Li HuaShan.Tangram Algorithm: Image Tramsformation for Storing and Transmiting Visual Secrets.Proceeding of the 9'st International Conference of CAD/CG, Vol. 1,1997
    [8] Adi Shamir. How to Share a Secret.Communication of the ACM, 1979,22(11)
    [9] M.Naor and A.Shamir.Visual Cryptograhy, in"Advances in Cryptolog-Eurocrypt'94, Vol.950 of Lecture Notes in Computer science Spring-Verlag, Berlin, pp, 1-12,1995
    [10] D.R.Stinson. Cryptolography: Theory and Practice: CRC Press,Inc.,1995
    [11] 吴乐南.数据压缩原理与应用.电子工业出版社,1996.
    [12] 黎洪松编著.数字视频技术及应用.清华大学出版社
    [13] 胡晓风等编著.多媒体系统原理和应用.杭州:浙江大学出版社.1999
    [14] 杨长生.图像与声音压缩技术.杭州:浙江大学出版社.2000
    [15] T.B. Maples and G. A. Spanos, "Performance Study of a Selective EncryptionScheme for the Security of Networked, Real-time Video" In Proceedings of the 4th International Conf. on Computer Communications and Networks, September, 1999.
    [16] C. Shi and B. Bhargava, "Light-weight MPEG Video Encryption Algorithm." In Proc. of the Int'l Conf. on Multimedia'98, January, 1998, pages 55-61, New Delhi, India.
    [17] Lei Tang, "Methods for Encrypting and Decrypting MPEG Video Data Efficiently" In Proceedings of the ACM Multimedia96, pages 219-229, Boston, Nov., 1996.
    [18] C. Shi and B. Bhargava, "A Fast MPEG Video Encryption Algorithm," In Proc. of ACM Multimedia'98, Electronic Proceeding, 1998.
    
    
    [19] Matias Y., Shamir A.. A Video Scrambling Technique Based on Space FillingCurves. Prof. Of CRYPTO'87: 389-417, 1988.
    [20] Josef Scharinger, "Fast Encryption of Image Data Using Chaotic KolmogorovFlows," SPIE Vol. 3022, pp.278-289, 1997[FRID97] Jiri Fridich, "Secure Image Ciphering Based on Chaos," Final Technical Report, Rome Laboratory, New York, February, 1997.
    [21] 龙莹山,刘长明.数据加密的密码体制与DES算法.山东科学 1994,7(1)
    [22] 王衍波,薛通.应用密码学.北京:机械工业出版,2003
    [23] 潘承洞,潘承彪.初等数学论.北京:北京大学出版社,2002
    [24] 胡予璞,张玉清等.对称密码学.北京:机械工业出版社,2002
    [25] 张彤,王育民.信息隐藏技术及其在信息安全中的应用.中兴通讯技术.2002,8
    [26] 杨义先,钮心忻.多媒体信息伪装综论.通信学报.2002,23
    [27] 陈鲁升,沈世镒.现代密码学.北京:科学出版社,2001
    [28] 卿斯汉.密码学与计算机网络安全.北京:清华大学出版社,2001
    [29] 刘中伟,黄凯奇等.MPEG-4中的知识产权管理和保护技术.电声技术.2002,3
    [30] 钟玉琢,王琪,赵黎,杨小勤.MPEG-2运动图像压缩编码国际标准及MPEG的新进展.北京:清华大学出版社.2002.
    [31] 袁云.MPEG-2视频压缩技术及应用.中国数据通信.2002(3)
    [32] 张益贞,刘滔.Visual C++实现MPEG/JPEG编解码技术.人民邮电出版社.2002
    [33] 肖永隆,王理.利用VFM库函数快速分解AVI数据流.信息工程大学学报.2001(9)
    [34] 聂栋栋.基于网络实现AVI视频流的实时操作.电脑与信息技术.2002(1)
    [35] 周俊.谈谈AVI文件的修复.电脑知识与技术.2003(1)
    [36] 丁玮,齐东旭.数字图像变换及信息隐藏与伪装技术.计算机学报.1988,21(9)
    [37] 齐东旭.分形及计算机生成.北京:科学出版社,1994.
    [38] 李国富.基于正交拉丁方的数字图像置乱方法.北方工大学报,2001,13(1)
    [39] 邹建成.数字图像的三维Arnold变换及其周期性[A].China Graph' 2000学术会议论文集[C],2000
    [40] 齐东旭.一类新的置乱变换及其在图像信息隐藏中的应用.中国科学,2000,43(3)
    [41] 孙锐,孙洪.数字图像信息隐藏技术.通信技术.2001(007)
    [42] 陈庆璋,周必水.多媒体技术教程.浙江科学技术出版社,1998
    [43] 王育民,刘建伟.通信网的安全——理论与技术.西安:西安电子科技大学出版社,1999
    [44] ITU-T. Video Code for Audiovisual Services at P~*64Kbps. Dec.1990
    
    
    [45] G.C. Langelaar. Copy Protection for Multimedia Data based on Labeling Techniques. International Conference on Image Processing, Austin, Texas, U.S.A., 2001
    [46] Qi DongXu, Ding Wei and Li HuaShan.Tangram Algorithm:Image Tramsformation for Storing and Transmiting Visual Secrets.Proceeding of the 9'st International Conference of CAD/CG, Vol. 1, 1997
    [47] Adi Shamir.How to Share a Secret.Communication of the ACM, 197.9,22(11)
    [48] M.Naor and A.Shamir.Visual Cryptograhy, in "Advances in Cryptolog-Eurocrypt'94", Vol.950 of Lecture Notes in Computer science Spring-Verlag, Berlin, pp, 1-12,1995
    [49] D.R.Stinson. Cryptolography: Theory and Practice: CRC Press, Inc., 1995
    [50] G.Ateniese, C.Blundo, A.De Santis, and D.R.Stinso.On the Contrast in Visual Cryptolography Schemes, to appear in Journal of Cryptolography.Also available at Theory of Cryptolography Library.
    [51] Wang daoshun QiDongxu.Visaual Hiding of Digital image Accepted by SEC2000, 15th International Information Security Conference Beijing, 2000
    [52] G.Atenies, C.Blundo, A.De Santis, and D.R.Stinso.Comtrast Optimal Threshold Visual Cryptolography Schemes. 1998, 4,24,
    [53] T.EIGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transcations on Information Theory.vol. IT-31, no. 4,pp.469-472, July 1985
    [54] J. Ho_stein, J.Pipher, J.H, silverman, NTRU: A new high speed public key cryptosystem,In Algorithmic Number Theory, vol.IT-31,no.4,pp.469-472,July 1985
    [55] P. Davern. Fractal Based Image Steganography. Optics Express, vol.3 no. 12 pp. 525-528, 7 Dec. 1998
    [56] A.Shamir.How to Share a Secrete?, Coummunications of the ACM, v24.nll, pp.612-613. Nov, 1979
    [57] Townsed, P.D. Personal communication, July 1996
    [58] IEEE P1363: Editorial Contr, ibution to Standard for Public Key Cryptography, Februry 9, 1998
    [59] Julio Lopez and Ricardo Dahab, Improved algorithms for elliptic curve atithemtic in GF(2~n), SAC'98 LNCS Springer-Verlag,1998

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700