CN102687519B - The reception of video stream and transfer approach, recording medium, conveyer and reversal block - Google Patents

The reception of video stream and transfer approach, recording medium, conveyer and reversal block Download PDF

Info

Publication number
CN102687519B
CN102687519B CN201080045821.7A CN201080045821A CN102687519B CN 102687519 B CN102687519 B CN 102687519B CN 201080045821 A CN201080045821 A CN 201080045821A CN 102687519 B CN102687519 B CN 102687519B
Authority
CN
China
Prior art keywords
video stream
image
common
transformation formula
reversion
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201080045821.7A
Other languages
Chinese (zh)
Other versions
CN102687519A (en
Inventor
艾曼纽·皮拉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Viaccess SAS
Original Assignee
Viaccess SAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Viaccess SAS filed Critical Viaccess SAS
Publication of CN102687519A publication Critical patent/CN102687519A/en
Application granted granted Critical
Publication of CN102687519B publication Critical patent/CN102687519B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/167Systems rendering the television signal unintelligible and subsequently intelligible
    • H04N7/1675Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/765Interface circuits between an apparatus for recording and another apparatus

Abstract

The invention discloses a kind of common video stream transfer approach, comprise: video stream is encoded, to obtain a compressing image stream; And described compressing image spread deliver at least one receiving system, it is characterized in that, this common video stream transfer approach, also comprise: before described video stream is encoded, reversed to stating common video stream by encryption reciprocal transformation formula, use and obtain reversion video stream, described common video stream is substituted with described reversion video stream, and then carry out encoding and transmit to described reversion video stream, wherein by described encryption reciprocal transformation formula, each image in described common video stream is reversed; And/or regulate the color of the pixel of each image in described common image, and then when being screen show described reversion impact and do not pass through in advance to reverse image described in the process of encryption reciprocal transformation formula, people is made directly to perceive described each common image.

Description

The reception of video stream and transfer approach, recording medium, conveyer and reversal block
Technical field
The present invention relates to a kind of transmission and method of reseptance of video stream, the invention still further relates to carrier, conveyer and the reversal block for realizing these methods.
Background technology
Usually, for comprising the existing method adopting the video stream of common form to transmit: encode to video stream, use and obtain compressing image stream; And compressing image is spread and delivers at least one receiving system.
And for including the known method that video stream receives according to said method: video stream is received; And decoding is carried out to received video stream, use and obtain decompress(ion) video stream.
So-called common video stream or unencryption video stream refer to the data flow (stream) of the image also can understood by the direct perception of people when being shown in screen.Such as, the Multimedia Program sequence of film or the visual program of audio frequency is similar to.But this common video stream is but not shielded.Therefore, the receiving system being equipped with display unit and suitable decoder by any can be used for watching this common video stream.Specifically, common video stream, without scrambling process, therefore can be watched this image under specified requirements.
Usually, in order to protect this common video stream, these known methods also can comprise: carry out scrambling process to compressing image stream, use this video stream under specified requirements and watch, and then can sell this access authorization.
Correspondingly, known method of reseptance comprises usually: before decoding, carry out scramble process to video stream.Therefore, when transmitting video stream from conveyer to receiving system, this video stream can be protected.
By convention, usually before encoding, scrambling can be carried out to video stream.In fact, use current method for scrambling, the reversion daylight reason of carrying out video stream reduces the compression ratio of encoder aobviously.
Wherein, compression ratio is amount of information and the ratio compressing rear amount of information before compression.
And in known transmission and method of reseptance, when from when carrying out the scrambler image output stream of scrambling to video stream, no longer this video stream is protected.Therefore, illegal use includes to be retrieved non-scrambling video stream or decompress(ion) video stream, and the user used to not buying mandate broadcasts.
In order to solve the problem, descrambler and decoder integrate by people, also proposed identical electronic building brick simultaneously, system level chip as is known (SystemOnChip), use and make video stream be difficult to searched arriving.But this assembly but usually uses not protected external RAM, to perform descrambling operation and decoding operation.Therefore, still deposit this this by the content search descrambling in RAM after the possibility of video stream.
When this receiving system is personal computer, by stealing in the invoked procedure of the video driver device of this computer, and then search out the video stream after descrambling.
In order to overcome this defect, people propose: need the decompress(ion) video stream to exporting from decoder to be encrypted.Meanwhile, before being only screen to carry out display, the video stream after encryption is decrypted.Therefore, this method can be protected being connected between receiving system with display unit.An example of this protection is: high broadband digital content resist technology (HDCP).But, in this approach, before inputting decipher or when exporting, instead of before being encrypted, descrambling video stream can be searched for.And this encryption applied on the output of decoder, effectively cannot prevent the illegal retrieval that video stream is carried out.
And when encoder, scrambler, descrambler and decoder are all special equipments.In fact, in the event of saving defect from damage, be only that everyone of these equipment can operate this defect.Third party cannot propose solution to the work adjustment of these equipment.
Summary of the invention
Therefore, in order to from avoiding in fact by the limitation of above known techniques and one or more problems that shortcoming caused, the object of the present invention is to provide a kind of method for transmitting common video stream or unencryption video stream, this method comprises: carry out reversion process by encryption reciprocal transformation formula to the image of common video stream, use and obtain conversion video stream or reversion video stream, and then to the video stream that obtains carry out encoding and transmit, instead of carry out encoding and transmit to common video stream, wherein this encryption reciprocal transformation formula changes for making each image in common image sequence.Before encoding, reversed to stating common video stream by encryption reciprocal transformation formula, use and obtain reversion video stream, described common video stream is substituted with described reversion video stream, and then carry out encoding and transmit to described reversion video stream, wherein by described encryption reciprocal transformation formula, each image in described common video stream is reversed; And/or regulate the color of the pixel of each image in described common image, and then when being screen show described reversion impact and do not pass through in advance to reverse image described in the process of encryption reciprocal transformation formula, people is made directly to perceive described each common image.
Wherein, term " oppositely " transform means and from scrambling video stream, retrieves for making the reciprocal transformation that reversion occurs common video stream.
Wherein, term " secret " means and does not make this transform announce to the public.
Said method system is for preventing to retrieve compressing image stream at the output of descrambler or retrieve decompress(ion) video stream on the output of decoder.In fact, on above-mentioned two outputs, the gratifying video stream retrieved is converting image stream.Therefore, carry out viewing under the situation of reciprocal transformation formula and still can this user make troubles not providing in advance.Therefore, the characteristic of the characteristic of transform that uses and the reciprocal transformation formula of shown use be secret.And then, even if decoder output also can to the video stream transmitted protect.
In addition, existing encoder, scrambler, decoder and descrambler need not be changed in order to perform said method.
Meanwhile, in order to change common image, the pre-change that the present invention only carries out the position of picture element and/or the adjustment that color carried out to picture element, and then the deterioration of compression ratio limiting existing encoder.
The transfer approach of the embodiment of the present invention can include one or more characteristics following: wherein, wherein by apply the compression ratio of described reversion video stream after described encryption reciprocal transformation formula be do not reverse video stream compression ratio 55%.Wherein encrypt the combination that reciprocal transformation formula is a basic transformation formula or multiple basic transformation formula, the step forming described encryption reciprocal transformation formula comprises: form symmetrical image, described symmetrical image and described common image about described image edge axisymmetricly; The chunk of the pixel of described common image is made to produce pre-change; And side-play amount is added in the colourity of at least one chunk pixel of described common image.Wherein said encryption reciprocal transformation formula is used for making described common video stream be reversed to a reversion video stream, and described reversion video stream includes the information segment with described common video stream each image as many.This common video stream transfer approach also comprises: regulate described encryption reciprocal transformation formula within predetermined time interval or by order.This transfer approach also comprises: send message, described message includes the algorithm making described receiving system find reciprocal transformation formula, and described inverse change formula is used for rebuilding described common video stream according to described reversion video stream.This transfer approach, also comprises: before encoding, and message is inserted reversion video stream, uses and message is together transmitted with reversion video stream.
The transfer approach of the embodiment of the present invention also has following advantages: can select causing the transform of decoder slight degradation, and the transmission bandwidth of reversing needed for video stream therefore can be made to be kept closer to the level transmitting bandwidth needed for common video stream; Formed and carry out pre-transform process with the multipair image block of image of existing image symmetry, use and make the transmission bandwidth of reversing needed for video stream be kept closer to the level transmitting bandwidth needed for common video stream; Employ the conversion method of the quality not reducing the information including each common image, use and rebuild by the reversion video stream of common image, wherein this reversion video stream have with the identical quality of the common image that transmits; Routine adjustment is carried out to privacy transformation formula used, uses the improper status emphasizing user in the procedure for displaying of this reversion video stream, and limit by the effective time of the legal license to transform used, and then improve security performance; To in converting image stream the password in the message that comprises transmit, wherein this converting image stream by demand unloading to other news road.
Another object of the present invention is to provide a kind of method shown the video stream transmitted according to said method, wherein after decoding is carried out to this video stream, this method comprises: changed conversion video stream or converting image stream by privacy transformation formula used in transport process, use and obtain common video stream, so to the video stream that obtains show.
The another object of the present invention there are provided a kind of carrier, and this carrier includes a kind of instruction, uses and performs said method when being performed this instruction by electronic calculator.
The another object of the present invention is to provide a kind of device for transmitting video stream by common mode, and being comprise: encoder, is for encoding to video stream, uses and obtains compressing image stream, and conveyer, system is used for compressing image to spread to deliver at least one receiving system, being characterised in that of this device, also comprise: reversal block, for the image by the described common video stream of encryption reciprocal transformation formula reversion, use and obtain reversion video stream, and then carry out encoding and transmit to described reversion video stream, and do not carry out encoding to described common video stream and transmit, it is a series of common images that wherein said encryption reciprocal transformation formula is used for each video conversion, be wherein that the step of a series of common image comprises by each video conversion: identical pre-change is carried out to the position of pixel in each image in described common image sequence, and/or identical adjustment is carried out to the colour of pixel in each image in described common image sequence, and then when being screen show described reversion impact and do not pass through in advance to reverse image described in the process of encryption reciprocal transformation formula, make people directly perceive described each common image.
Finally, the another object of the present invention is to provide a kind of reverse conversion module, uses and performs above-mentioned method of reseptance when transmitting by the inverse type of secret conversion type used, and then change the image of converting image stream, to obtain common video stream.
Brief Description Of Drawings
With reference to the following drawings, specification subsequently can clearly be understood, in accompanying drawing:
Fig. 1 is for transmitting and receiving the schematic diagram of the system of video stream;
Fig. 2 is the schematic diagram of common image;
The schematic diagram of the reversion image that Fig. 3 and Fig. 4 obtains by image common in Fig. 2;
Fig. 5 is the structural representation together transmitting message with video stream;
Fig. 6 carries out by system shown in Figure 1 the method flow diagram that transmits Yu receive to video stream; And
Fig. 7, Fig. 8 and Fig. 9 are respectively the variant embodiments of system shown in Figure 1.
In conjunction with following explanation, above-mentioned accompanying drawing shows and explains the present invention and use side's ratio juris of the present invention.In above-mentioned accompanying drawing, in order to represent clear, the thickness of parts and structure may be exaggerated.And identical label in different figures represents identical parts.
Embodiment
In accompanying drawing of the present invention, mark identical assembly by identical label.
Hereinafter, no longer the characteristics and function known by those skilled in that art is described.In addition, these terms can be used for the conditional access that descriptive system carries out content of multimedia.And about the more information of these terms, reader can with reference to following documents: " functional module of conditional access system " that publish in " European Broadcasting Union's comment " that December 21 nineteen ninety-five, European Broadcasting Union published at Belgian Bu Lusaier.
Fig. 1 is for for transmitting and receiving the system 2 of video stream.Such as, this video stream may correspond to the Multimedia Program sequence in such as television broadcasting, film or audio frequency-video program.
Herein, produce common image by emission source 4 and be sent to device 6, and then by the network 8 transmitted for information, this video stream being sent to multiple receiving system.
Usually, network 8 is that long range information transmits network, as: internet or satellite network or reuse as a kind of wireless network in Digital Transmission terrestrial television (transmittingdigitalterrestrialtelevision).
In order to reduced graph 1, illustrate only two kinds of receiving systems 10 and 12.
Meanwhile, device 6 can compress received video stream at input 18 place, and can store compressed video stream at output 19 place.Wherein, encoder 16 is the digital encoder that can process digital video stream.Such as, this encoder can carry out work according to MPEG2 standard (MovingPictureExpertGroup-2) or UIT-TH264 (international telecommunication union telecommunication standardization H-264) standard.
Wherein, compressing image stream is sent directly to the input 20 of scrambler 22.This scrambler 22 can carry out scrambling to compressing image stream, uses to be formed and watches condition under certain condition, as the user by receiving system the access authorization bought.Meanwhile, the video stream after the output 24 pairs of scramblings connected by the input of multiplexer 26 stores.
And then the specified control field CW by being produced by key generator 32 makes scrambler 22 pairs of compressing image streams carry out scrambling, this specified control field CW is sent to conditional access system 28 (conditionalaccesssystem) simultaneously.Usually, this scrambling step meets certain standard, as: DVB-CSA (the public scrambling algorithms of digital video broadcasting) standard, ISMACryp (Internet Streaming Media alliance encryption standard), SRTP (the Internet protocol security key information resource record Working Group Criteria) etc.Herein, conditional access system 28 can produce authorization control message (EntitlementControlMessages, ECMs), wherein this authorization control message include by key generator 32 produce and the password CW of control field CW that uses by scrambler 22 *.And then, multitasking can be carried out to the message of the scrambling image provided respectively by conditional access system 28 and scrambler 22 and video stream by multiplexer 26, use and transmit on network 8.
In addition, device 6 also includes the reversal block 30 for reversing to common image.This reversal block 30 can be converted into reversion video stream by from the common video stream received by emission source 4.Wherein, this reversal block 30 can be connected between the output of emission source 4 and encoder 16.Therefore, the image being undertaken encoding by encoder 16 be reversed by reversal block 30 after image, and and non-generic image.The function of this reversal block 30 is: protect this video stream after carrying out descrambling and decoding process by receiving system 10 and receiving system 12 pairs of video stream.For this reason, before being screen to show this image, the reversion image of this image had not necessarily implemented that the user of this reversion can perceive.Meanwhile, need to make the image after reversion be different from the common image obtained from said apparatus as far as possible.For this reason, by reversal block 30 by after received encryption and reverse transform T is provided to each received common video stream.
, preferably transform T is selected meanwhile, use and do not make the compression ratio of encoder 16 that trickle change occurs.Wherein, if the compression ratio of this encoder equal ± 55%, then need not finely tune its compression ratio, simultaneously preferably make its compression ratio be ± 15%, and this compression ratio obtains by direct coding to common video stream.In order to reach this purpose, also this transform T can be chosen to be the equation of the characteristic of encoder.
In addition, also can select transform T, use and prevent the quality of image from reducing.For this reason, the image be inverted includes the information segment identical with common image equally.
Herein, transform T can be obtained by making several reversion basic transformation formula Tei combine.Specifically, only can use two groups of basic transformation formula Tei that reverse, that is: the basic transformation formula for making the location of pixels of common image that pre-change occur; And the basic transformation formula for adjusting the pixel color of image.
Wherein, the common trait of these basic transformation formulas is: do not regulate correlation existing between the continuous image of common video stream.For this reason, can not regulate accurately compression ratio.In fact, in the coding method of MPEG2 standard UIT-TH264 standard, supplement the generation of imaged frame by encoder restriction.
By graphic method, can by following six basic transformation formula Te1 to Te6.Wherein, availablely make other pixels of the pixel of common image and common image that pre-change together occur by basic transformation formula Te1 to Te3, basic transformation formula Te4 is used for carrying out signal to three chunks of the picture element of common image and changing in advance, Te5 and Te6 and for regulating the color of image pixel.And in non-limiting example, can be described Te5 and Te6 in the framework of lightness-colourity-concentration (YUV) coloud coding standard.But, just as known to a person skilled in the art, also can what its coloud coding standard in office, as: also can equivalently in the framework of RGB standard to for regulating the basic transformation formula of image pixel color to be described.
Such as, basic transformation formula Te1 can be used for reversing to the pixel on left side and right side.Wherein, common image as shown in Figure 3 or the image 34 after deciphering can be provided before basic transformation formula.And the image 36 that reverses accordingly is shown in Figure 3.Wherein, reversion image 36 is symmetrical about axle 38 with image 34, and this axle 38 is parallel to each other with the vertical edges of image 34.
Meanwhile, basic transformation formula Te2 is used for reversing to the top and bottom of common image.Wherein, the reversion image 40 by providing basic transformation formula to obtain to image 34 is shown in Figure 4.Wherein, reversion image 40 is symmetrical about axle 42 with image 34, and this axle 38 is parallel to each other with the horizontal sides of image 34.
Meanwhile, basic transformation formula Te3 can make at least one region of common image pixel occur to change in advance in another region of the pixel of common image therewith.Wherein, the region by there is pre-change is preferably made to become the region of implementing coding method.Such as, the region of 16 pixel × 16 pixels can be made identical with the region of MPEG2 standard and UIT-TH264 standard encoding method.Therefore, the pre-change in this region can produce restriction to the decay of the compression ratio of encoder 16.
Wherein, basic transformation formula Te4 can perform the pre-change of circulation at least three regions of the pixel of common image.When using basic transformation formula Te3, the region through changing in advance can be made identical with the region of implementing encryption algorithm.
For basic transformation formula Te3 and basic transformation formula Te4, the identification carried out for the region through pre-change has come by a parametrization value.
And the digimigration amount of basic transformation formula Te5 for applying to image colourity U component and the V component value as chromatic value.Wherein, the value of this side-play amount can be parameterized.And in the coding method meeting MPEG2 and UIT-TH264 standard, for carrying out to video stream the brightness that compressed value main sections is labeled as Y.Meanwhile, in this encryption algorithm, U component and the V component of colourity can not be considered on the contrary.Therefore, can regulate U component and V component when not disturbing encoder 16, and then can not regulate compression ratio.
Meanwhile, the basic transformation formula Te6 of this part can be used for the U component of each pixel in common image and V component are reversed.
Wherein, in the internal memory 50 be connected with device 6, record can be carried out to these basic transformation formulas.
Meanwhile, by merging above-mentioned one or multiple basic transformation formula Tei can obtain transform T.Herein, by merging multiple basic transformation formula Tei with predefined procedure.Therefore, this transform T is the combination of some basic transformation formula Tei.
And then, in order to set up reciprocal transformation formula T-1, basic transformation formula used must be combined, and when these basic transformation formulas used carry out parameterized treatment, also must know used parameter value., must be encrypted the fragment of these information herein, use and prevent unauthorized individual from obtaining reciprocal transformation formula T-1.
Herein, reversal block 30 also can produce the message of the fragment password including secret information, and wherein this secret information can be used for setting up reciprocal transformation formula T-1.Herein, term " password " refers to the message in fact itself not comprising and be enough to obtain reciprocal transformation formula T-1 information.In fact, no matter this message is recorded in wherein or needing to measure it also or at needs calculates it in advance, and the information be contained in this message all can combine with the information segment that will be contained in receiving system.
Therefore, this password can be the identifier of basic transformation formula Tei particular combination.Meanwhile, this receiving system also must include: the setting being similar to corresponding table and so on, this correspondence table be convenient in each identifier needing to receive and and will be used for video stream inverse transform reciprocal transformation formula T-1 between set up and contact.
Meanwhile, this password also can comprise the identifier of parameter.In this situation, this receiving system must include the setting of similar correspondence table and so on, and the identifier that this correspondence table may correspond in using and parameter.
Herein, also by being encrypted secret information, use acquisition password.Such as, the executable code of reciprocal transformation formula T-1 is obtained by simultaneous decoding mode or asynchronous decoded mode.Then, this receiving system is decrypted by the password received by pre-recorded double secret key, and then forms reciprocal transformation formula T-1.Similarly, also can be encrypted the identifier of the parameter of basic transformation formula.
Such as, Fig. 5 shows the structure of the message 54 produced by reversal block 30, uses and forms reciprocal transformation formula T-1.Meanwhile, this message 54 includes field 56, and this field contains password T *.Therefore, the structure of this message has identical or similar structure with authorization control message.Therefore, hereafter no longer this is repeated.
Meanwhile, message 54 also includes field 58, and this field 58 contains access consideration CA, and this access consideration CA with the access authorization be previously recorded in receiving system, can use the formation allowing or stop reciprocal transformation formula T-1.
Herein, message 54 also includes: field 60, includes for identifying the message 54 of such as signaling S and so on; And field 62, include for identifying the message of such as Cyclical Redundancy Check (CyclicRedundancyCheck, CRC) code.
Finally, message 54 can be inserted in reversion video stream by this reversal block 30 before encoding, and uses and transmit this message to receiving system while transmission reversion video stream.But reversion video stream message 54 inserted in such a way can not carry out fine adjustments to the compression ratio of encoder 16.For this reason, also other diverse ways can be used.Such as, this message 54 can be transmitted as teletext.Therefore, encode to by the additive quantity of at least a line picture element of message 54 with reversion image by color-code method.
Herein, message 54 transmits reversion video stream by digitized video watermark method.But, preferably this method is simplified, use ensure need not in statistics in continuous reversion image insert the robustness of message.In fact, if the continuous reversion of this image is to regulate image 54, then can forms reciprocal transformation formula T-1, and not occur the flaw of secure context.
Herein, the example of reversal block 30 can also be the programmable electronic calculator that can reach the instruction of executive logging on carrier.For this reason, reversal block 30 can be connected to internal memory 50, and this internal memory 50 includes the instruction for performing the needs of method shown in Fig. 6.
Wherein, this receiving system 10 has the receiver 70 for transmitting video stream.Wherein, receiver 70 is connected to de-multiplexer 72, and this de-multiplexer 72 first can transmit video stream to descrambler 74, then can transmit authorization control message and entitlement management message to safe processor 76.Usually, this safe processor 76 is one and includes as the cryptographic key only allowing validated user to use or the nextport hardware component NextPort of private information of access authorization.In order to ensure the privacy of this message, the privacy of this message attempts to have robustness strong as far as possible for the attack carried out relative to hacker.Therefore, this stronger robustness more can be resisted these and attacked compared with other parts of receiving system 10.Such as, this safe processor can be the chip card being provided with electronic processors.Meanwhile, this safe processor is also by electronic calculator executive software module.
Such as, this safe processor 76 has internal memory 78, and this internal memory includes different cipher key access mandates, uses and carries out descrambling to scrambling image.
And then descrambler 74 can carry out scramble process with the control field CW common by safe processor 76 to the image after scrambling.Wherein, the video stream after scramble process can be transferred into the decoder 80 it being carried out to decoding process.And then decompress(ion) video stream or decoding video stream are transferred into the video card 82 for driving the process of show image stream on the display unit 84 being equipped with screen 86.Herein, video card 82 has inverse transform module 88.Wherein, this inverse transform module 88 can form reciprocal transformation formula T-1 and carry out inverse transformation, uses and obtains common video stream.For this reason, video card 82 has electronic calculator 90, and this electronic calculator 90 is be connected to internal memory 92, and this internal memory 92 includes the instruction performed shown in Fig. 6 needed for method.
Meanwhile, display unit 84 can show received common video stream or deciphering video stream on screen 86.
Such as, receiving system 12 can be identical with receiving system 10, no longer repeats this below.
Below, be described with reference to the carrying out practically mode of the method shown in Fig. 6 to system 2.Wherein, the method forms basically by for video stream transfer phase 100 and for the video stream reception stage 102.
When video stream transfer phase 100 starts, transform T can be formed in step 104 place.Herein, can start to form new transform T in predetermined space.Such as, this predetermined space can be less than 20 seconds, is preferably less than 10 seconds.
Then, in step 106, the message 54 corresponding with transform T-phase can be formed.Meanwhile, in step 108, to reverse the video stream of common image by applying transform T.
Then, in step 110, message 54 can be inserted in video stream in post-conversion, and then obtained video stream can be sent to encoder 16.
In step 112, encoder 16 can be encoded to the video stream after conversion, uses and obtains compressing image stream.
In step 114, the control field CW produced by key generator 32 makes scrambler 22 pairs of compressing image streams carry out scrambling process.
In step 116, the video stream after the scrambling that can produce conditional access system 28 and authorization control message carry out multiplex's process.Finally, in step 118 the fragment of multiplexed information can be sent to different receiving systems.
And step 120 place for receiving before transmitted information being carried out to solution multiplex (MUX) and processing, can start to carry out video stream and receive the stage 102.And when transmitting authorization control message and entitlement management message to safe processor 76, video stream can be sent to descrambler 74.
In step 122, safe processor 76 can to the password CW of the control field of control character *carry out decoding process and to descrambler 74 transfer control field CW.
In step 124, descrambler 74 can carry out scramble process to the scrambling video stream with received code character.
In step 126, the video stream after descrambling can be conveyed through to the decoder 80 for carrying out decoding to video stream.Then, can transmit to inverse transform module 88 the decompress(ion) video stream obtained.
In step 128, inverse transform module 88 can extract message 54 from received video stream.
In step 130, can compare access consideration CA and prerecord access authorization TdA.If so received access consideration CA is not corresponding with prerecord access authorization TdA, then in step 132 then, can stop and form reciprocal transformation formula T-1, otherwise, password T can be formed in step 134 *, and then form reciprocal transformation formula T-1.
In step 136, reciprocal transformation formula T-1 can be applied to the video stream after reversion, use the common video stream of display on screen 86 in step 138.
Fig. 7 shows for the system transmitted with receive video stream.Wherein, except following except some, system 5 is identical with system 2: can in encapsulation 152 Executive Module 88, and this encapsulation 152 is independent of device 10 and display unit 84; And substitute video card 82 by the video card 154 lacking module 88.
Wherein, this encapsulation 152 is inserted between video card 154 and display unit 84.
This embodiment can be used for stable and carries out cryptanalysis fully and without the need to carrying out any adjustment to receiving system 10.In fact, add encapsulation 152 to be enough to more protect transmitted video stream.
Fig. 8 shows system 160, and this system 160 is with the difference of system 120: the display unit 162 by including inverse transform module 88 substitutes display unit 84; And substitute video card 82 by the video card 164 lacking inverse transform module 88.
Such as, in embodiments of the present invention, receiving system 10 can be the CPU in personal computer.And descrambler 74 and encoder 80 be can be and be connected to this CPU and realized by demountable USB flash disk (USBstick).Herein, the embodiment of the present invention can ensure to be transmitted for video stream by the personal computer be arranged between universal serial bus and display unit 162.
Fig. 9 shows system 170, and this system 170 is with the difference of system 2: substitute receiving system 10 by receiving system 172.Wherein, this receiving system 172 is with the difference of receiving system 10: the compressing image stream that this receiving system 172 can be used for the output of decoder 80 produces is encrypted.Wherein, receiving system 172 is made to interrupt being connected from different users by local area network (LAN) 178.In order to make diagram more simple, illustrate only two terminals herein, that is: terminal 180 and terminal 182.
Wherein, terminal 180 includes deciphering module 184, and this deciphering module can be decrypted being encrypted video stream by encrypting module 174.And then the video stream after deciphering can be sent to the inverse transform module 88 that can form common video stream before showing by this deciphering module 184.
Wherein, terminal 182 is the example identical with terminal 180.
In embodiments of the present invention, this method is used for protecting the video stream transmitted between decoder 80 and encrypting module 174 and the video stream that transmits between deciphering module 184 and inverse transform module 88.
Meanwhile, the present invention also can have other embodiment a lot.Such as, common image can come from and include the emission source 4 that satellite connects or the Internet connects.
Can enciphering transformation formula or reciprocal transformation formula be activated at the network terminal or make it lose efficacy with being allowed a choice.
Meanwhile, inverse transform module 88 software that can adopt extra computer hardware or be performed by electronic calculator.
In the present invention's variant embodiments, the video stream after reversion can be sent to the external world by message 54., also by point to point connect or point-to-multipoint, message 54 is transmitted meanwhile, also or by network 8 or the difference news road on heterogeneous networks this message is transmitted.Such as, the server by the transport layer of video stream is specified transmits message 54.
Meanwhile, multiplex's process can be carried out to this message 54 and video stream and authorization control message.In this situation, in the side of receiving system, message 54 and the compressing image stream similarities and differences can be sent to inverse transform module 88 simultaneously.Further, also by according to known technique by password T *be inserted in authorization control message, use and make formed authorization control message become message 54.For this reason, reversal block 30 can by password T *be provided to conditional access system 28.
In known technology, can cancel or close the key generator 32 for protecting contents known, conditional access system 28, scrambler 22, safe processor 76 and descrambler 74.
In the present invention's variant embodiments, by choosing a basic transformation formula to form basic transformation formula T in except other group basic transformation formula of above-mentioned two groups of basic transformation formulas.
And in other embodiments, by predetermined rule, or as: some characteristic of the common image of the pixel color of image is encoded to new transform.Similarly, also new reciprocal transformation formula T-1 can be formed in the rule corresponding according to the identical characteristics corresponding with same common image with above-mentioned rule.Such as, new basic transformation formula T is used to carry out the common image of encoding by the new transform reversion except old transform.And in receiving system side, by old reciprocal transformation formula, common image is retrieved.Then, by provide old reciprocal transformation formula form new reciprocal transformation formula T-1 beyond the common image that obtains.Therefore, in embodiments of the present invention, no longer need particular message, as: message 54 is inserted and will be sent in the video stream of receiving system.
Or, the basic transformation formula T that received command enable is new can be responded.Such as, automatically produce order by encoder when can produce at new image I or when each scene changes at every turn.
Or, this video card can have on the link transmitted to display unit 84 by receiving system 10 the module that is encrypted of the video stream that transmits.Responsively, display unit 84 can be equipped with the module for being decrypted encrypted image stream.Such as, these modules can simplify HDCP (high broadband digital content resist technology) standard.Meanwhile, also inverse transformation can be performed before video stream is inputted encrypting module or when exporting from deciphering module.
In the above description, " scrambling " and " descrambling " can be regarded as and be equal to " encryption " and " deciphering ".
Meanwhile, foregoing also can be used for DRM (Digital Right Management).

Claims (10)

1. a common video stream transfer approach, bag is containing ︰
-video stream is encoded (112), to obtain compressing image stream; And
-described compressing image spread and delivers at least one receiving system (118),
It is characterized in that, before described video stream is encoded, this common video stream transfer approach Hai Bao Han ︰ is reversed to each the common image in described common video stream by encryption reciprocal transformation formula, use and obtain reversion video stream, described common video stream is substituted with described reversion video stream, and then carry out encoding and transmit to described reversion video stream
-wherein on each image of described common video stream, same conversion is carried out to the position of pixel in each image in described common video stream by described encryption reciprocal transformation formula; And/or
-on each image of described common video stream, same adjustment is carried out to the color of the pixel of each image in described common video stream,
And then be screen to show described reversion video stream and not in advance by reverse described in described encryption reciprocal transformation formula reverse process video stream time, people is directly perceived be different from the image in described common video stream,
Wherein carry out coding one encoder that described video stream is carried out, described encoder is compressed described reversion video stream by correlation existing between continuous image in described common video stream,
Wherein said encryption reciprocal transformation formula is the combination of a basic transformation formula or multiple basic transformation formula, and the step that described basic transformation formula performs comprises:
-form symmetrical image, described symmetrical image and described common image about described image edge axisymmetricly;
-make the chunk of the pixel of described common image produce conversion;
-in the colourity of at least one chunk pixel of described common image, add side-play amount; And
-the U component of each pixel in described common image and V component are reversed.
2. common video stream transfer approach as claimed in claim 1, wherein by apply the compression ratio of described reversion video stream after described encryption reciprocal transformation formula be do not reverse video stream compression ratio+55%.
3. common video stream transfer approach as claimed in claim 1, wherein said encryption reciprocal transformation formula is used for making described common video stream be reversed to a reversion video stream, and described reversion video stream includes the information segment with described common video stream each image as many.
4. common video stream transfer approach as claimed in claim 1, wherein comprises, and regulates within predetermined time interval or by order to described encryption reciprocal transformation formula.
5. common video stream transfer approach as claimed in claim 4, Hai Bao Han ︰ sends message (118), described message includes the algorithm making described receiving system find reciprocal transformation formula, and described inverse change formula is used for rebuilding described common video stream according to described reversion video stream.
6. common video stream transfer approach as claimed in claim 5, described message, before encoding, is inserted described reversion video stream (110) by Hai Bao Han ︰, uses and described message and described reversion video stream are transmitted simultaneously.
7., as the common video stream transfer approach in the claims as described in any one, also bag carried out scrambling process (114) to described compressing image stream containing ︰ before transmitting.
8., as the common video stream transfer approach in the claims as described in any one, also bag is containing ︰
-described video stream is received (120); And
-decoding (126) is carried out to received described video stream, use the described compressing image stream obtaining image,
It is characterized in that: after decoding is flow to described image, described method also Bao Hanyou ︰ in transport process by reversing (136) to described encryption reciprocal transformation formula, the image of described reversion video stream is changed, and then obtain the video stream meeting decrypted form, and obtained video stream is shown.
9., for transmitting a device for common video stream, bag is containing ︰
-encoder (16), for encoding to video stream, using and obtaining compressing image stream; And
-conveyer, delivers at least one receiving system for being spread by described compressing image,
It is characterized in that, Hai Bao Han ︰ reversal block (30), for each the common image reversed in described common video stream by encryption reciprocal transformation formula, use and obtain reversion video stream, and then carry out encoding and transmit to described reversion video stream, and do not carry out encoding to described common video stream and transmit, it is a series of common images that wherein said encryption reciprocal transformation formula is used for each video conversion, is wherein the step Bao Han ︰ of a series of common image by each video conversion
-on each image of described common video stream, same conversion is carried out to the position of pixel in each image in described common video stream; And/or
-on each image of described common video stream, identical adjustment is carried out to the colour of pixel in each image in described common video stream,
And then be screen to show described reversion video stream and not in advance by reverse described in described encryption reciprocal transformation formula reverse process video stream time, people is directly perceived be different from the image in described common video stream,
Wherein carry out coding one encoder that described video stream is carried out, described encoder is compressed described reversion video stream by correlation existing between continuous image in described common video stream,
Wherein said encryption reciprocal transformation formula is the combination of a basic transformation formula or multiple basic transformation formula, and the step that described basic transformation formula performs comprises:
-form symmetrical image, described symmetrical image and described common image about described image edge axisymmetricly;
-make the chunk of the pixel of described common image produce conversion;
-in the colourity of at least one chunk pixel of described common image, add side-play amount; And
-the U component of each pixel in described common image and V component are reversed.
10. a back switching module (88), for performing common video stream transfer approach as claimed in claim 8, it is characterized in that, described reversal block is used for the mode of reversing to described encryption reciprocal transformation formula by carrying out transmitting, the image of converting image stream is reversed, uses and obtain described common video stream.
CN201080045821.7A 2009-10-22 2010-10-20 The reception of video stream and transfer approach, recording medium, conveyer and reversal block Expired - Fee Related CN102687519B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
FR0957438 2009-10-22
FR0957438A FR2951891B1 (en) 2009-10-22 2009-10-22 METHODS FOR TRANSMITTING AND RECEIVING IMAGE FLOWS, RECORDING MEDIUM, TRANSMITTING DEVICE, TRANSFORMING MODULE FOR THESE METHODS
PCT/EP2010/065792 WO2011048142A1 (en) 2009-10-22 2010-10-20 Methods for transmitting and receiving streams of images, recording medium, transmitting device and transformation module for said methods

Publications (2)

Publication Number Publication Date
CN102687519A CN102687519A (en) 2012-09-19
CN102687519B true CN102687519B (en) 2016-03-23

Family

ID=42331698

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201080045821.7A Expired - Fee Related CN102687519B (en) 2009-10-22 2010-10-20 The reception of video stream and transfer approach, recording medium, conveyer and reversal block

Country Status (6)

Country Link
EP (1) EP2491714A1 (en)
CN (1) CN102687519B (en)
FR (1) FR2951891B1 (en)
RU (1) RU2513907C2 (en)
TW (1) TWI415464B (en)
WO (1) WO2011048142A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR3024007B1 (en) 2014-07-16 2016-08-26 Viaccess Sa METHOD FOR ACCESSING MULTIMEDIA CONTENT PROTECTED BY A TERMINAL

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6570990B1 (en) * 1998-11-13 2003-05-27 Lsi Logic Corporation Method of protecting high definition video signal

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2122295C1 (en) * 1994-04-29 1998-11-20 Виктор Павлович Дворкович Method for frame-by-frame compression of images
US5999189A (en) * 1995-08-04 1999-12-07 Microsoft Corporation Image compression to reduce pixel and texture memory requirements in a real-time image generator
US6795583B1 (en) * 1999-11-24 2004-09-21 General Electric Company Image data compression employing embedded compression and decompression codes
US6674374B1 (en) * 2003-01-25 2004-01-06 Unisys Corporation Data compressor utilizing switched input coincidence elements
RU2304808C1 (en) * 2004-12-02 2007-08-20 Кэнон Кабусики Кайся Image generation device and method for controlling said device
US8326064B2 (en) * 2007-01-22 2012-12-04 Nec Corporation Image re-encoding method to decode image data which is orthogonally transformed per first block and encoded by a first encoding method
TWI478584B (en) * 2007-03-08 2015-03-21 Realtek Semiconductor Corp Apparatus and method thereof for encoding/decoding video
JP4803085B2 (en) * 2007-03-26 2011-10-26 日本電気株式会社 COMMUNICATION DEVICE, COMMUNICATION CONTROL SYSTEM, COMMUNICATION CONTROL METHOD, AND COMMUNICATION CONTROL PROGRAM

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6570990B1 (en) * 1998-11-13 2003-05-27 Lsi Logic Corporation Method of protecting high definition video signal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Image scrambling algorithm basedon random shuffling strategy;Shao liping;《Industrial electronics and applications,2008.ICIEA 3rd IEEE conference on》;20080605;正文第2278-2283页 *

Also Published As

Publication number Publication date
FR2951891A1 (en) 2011-04-29
TWI415464B (en) 2013-11-11
TW201130307A (en) 2011-09-01
FR2951891B1 (en) 2011-12-30
RU2513907C2 (en) 2014-04-20
EP2491714A1 (en) 2012-08-29
RU2012120849A (en) 2013-11-27
CN102687519A (en) 2012-09-19
WO2011048142A1 (en) 2011-04-28

Similar Documents

Publication Publication Date Title
CN1150760C (en) Mehtod for protecting audio-visual data across NRSS interface
CN100366083C (en) Method for operating conditional access system for broadcast applications
US20040193871A1 (en) System and method for transmitting data using selective partial encryption
EP2373019A1 (en) Secure descrambling of an audio / video data stream
EP2311257A1 (en) Apparatus and method for encrypting image data, and decrypting the encrypted image data, and image data distribution system
AU2002248228B2 (en) Methods and apparatus for securely transmitting and processing digital image data
CN100442839C (en) Information transmitting method and apparatus for interactive digital broadcast television system
US20030206636A1 (en) Method and system for protecting video data
CN102714593B (en) The encryption method of control character, transfer approach and decryption method and the recording medium for performing these methods
US11259057B2 (en) Methods, devices and system for generating a watermarked stream
US7224806B2 (en) Threshold cryptography scheme for conditional access systems
US8948384B2 (en) Image encrypting/decrypting system and method
CN114640855A (en) Data processing method and system
Thomas et al. Secure transcoders for single layer video data
EP1348276A2 (en) Threshold cryptography scheme for conditional access systems
CN102687519B (en) The reception of video stream and transfer approach, recording medium, conveyer and reversal block
EP2146506B1 (en) System and method of enabling decryption of encrypted services
CN102598690A (en) Encryption procedure and device for an audiovisual data stream
EP2403244A1 (en) Secure encryption method for electronic content distribution
US20040047472A1 (en) Threshold cryptography scheme for conditional access systems
CA2372810A1 (en) Method and apparatus for access control of pre-encrypted on-demand television services
KR20200119649A (en) Transmitting apparatus, receiveing apparatus and method for protecting video
Villegas et al. Network assisted content protection architectures for a connected world
KR100830801B1 (en) transmitting and receiving method of enciphered moving picture data
WO2006129222A2 (en) Viewing of video data in a normal mode and a tease mode

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160323

Termination date: 20201020

CF01 Termination of patent right due to non-payment of annual fee