Patent classifications
H04N21/23476
Storage drive protection using file system level encryption
Systems, devices and automated processes provide robust, computationally-efficient and secure protection of media content or other electronic data stored on a user-supplied storage device through the use of efficient file system encryption. Only certain portions of the content are encrypted by the host device, thereby reducing the computational demand in comparison to encrypting all of the content. By selecting the particular portions to encrypt, the formatting and structure of the stored data can be concealed, thereby making the use of the unencrypted content very difficult, if not impossible. In implementations based upon the XFS file system, for example, the superblocks that store header information about the files stored on the drive can be encrypted, thereby rendering the unencrypted content
Security of paired storage drives
Robust, computationally-efficient and secure systems, devices and automated processes are described for storing content on a disk drive or other storage device that is supplied to a media encoder or other host device. The user-supplied drive may be used, for example, to store content in a digital video recorder (DVR) or the like. The host device creates two separate digital identifiers that separately identify the host device and the user, respectively, so that subsequent pairing can be performed based upon either identifier. The two identifiers are stored on the storage device and rendered upon subsequent pairing for validation by the host device.
Encrypted audio streaming
The disclosed technology relates to broadcasting encrypted data to multiple receiver devices, where some receiver devices have long-term access to the encrypted data and some receiver devices have a temporary access to the encrypted data. Receivers having long-term access are part of a “member group” because these member group devices have a master key and the master key enables the member group devices to derive the necessary information to decrypt the encrypted broadcast. In contrast, devices with temporary access possess only a guest key and not master key, without a master key the devices need to receive the guest key from another device to decrypt the broadcast. Access to the encrypted stream can also be based on broadcasting multiple or single diversifiers, where a diversifier can include group identification information to assist in restricting access to the encrypted stream.
PRIVACY PROTECTION METHOD FOR TRANSMITTING END AND RECEIVING END, ELECTRONIC DEVICE AND COMPUTER READABLE STORAGE MEDIUM
Provided are a privacy protection method for a transmitting end and a receiving end, an electronic device, and a computer-readable storage medium. The method includes acquiring an initial image, acquiring an area to be scrambled in the initial image, performing backup and scrambling for the initial image based on the area to be scrambled to obtain a scrambled image and backup information, encrypting the backup information to obtain an encrypted result, and transmitting the scrambled image and the encrypted result.
PORTIONED VIDEO STREAMING CONCEPTS
Portion- or tile-based video streaming concepts are described.
SENSOR DEVICE AND ENCRYPTION METHOD
Image encryption in which excessive concealment of information is prevented while reduction in cost is achieved by eliminating a need for a receiving side of an image to take measures against leakage of personal information is realized. In one example, a sensor device includes an array sensor with pixels having a light receiving element of visible or invisible light. A detector detects a target area on the basis of an image signal obtained by the array sensor. The target area in the image signal is encrypted on the basis of information from the detector. Thus, encryption of the image signal can be performed in the image sensor at least to the extent that no individual can be identified. Also, depending on a decryption key on a receiving side of the image, a part of the content of the image can be visually recognized while personal information is concealed.
Electronic device for reproducing data and operation method thereof
An electronic device and an operation method thereof, according to various embodiments, may: receive first data and second data compressed in a designated compression scheme; decompress the received first data and the received second data on the basis of at least the designated compression scheme; decrypt the decompressed second data; detect success of the decryption; and reproduce the decompressed first data and the decrypted second data.
VIDEO COMMUNICATION DATA SECURITY
A processing system including at least one processor may obtain a portion of a video stream, identify a first region of the portion of the video stream that contains a first item that is designated for obscuring, replace the first item in the first region of the portion of the video stream with an obscured version of the first item, and encrypt the portion of the video stream with a first encryption key. The processing system may further generate an executable package comprising the first item in the first region of the portion of the video, where the executable package is encrypted with a second encryption key, and transmit the portion of the video stream that is encrypted with the first encryption key and the executable package that is encrypted with the second encryption key to a recipient device.
Blurring privacy masks
Methods and apparatus, including computer program products, implementing and using techniques for encoding a video sequence comprising a plurality of image frames, by an encoder are described. An image frame is received from a video stream. An input is received, which indicates one or more regions in the received image frame for which a privacy mask should be applied. The one or more regions are represented by one or more coding units. The image frame is encoded into an output frame, wherein image data in the one or more regions is replaced by intra-predicted coding units with transformed coefficients set to zero, the intra-predicted coding units are obtained from a prediction stage in the encoder.
Method and apparatus for redacting video for compression and identification of releasing party
A method and system for protecting video and image files processes from original files to detect skin tones of persons appearing in the media. Pixels determined to contain skin tones are blurred or blacked out, and the pixel locations and their original color values are stored in a metadata file. The metadata file is encrypted and stored with the redacted video file. Thereafter, when an authorized person wants to see an unredacted version of the video, the system decrypts the metadata and reconstituted the video, replacing the redacted pixels with their original color values, and inserting a unique watermark into the video that identifies the requesting person. The watermarked video is then provided to the requesting person.