Patent classifications
H04N21/23476
PORTIONED VIDEO STREAMING CONCEPTS
Portion- or tile-based video streaming concepts are described.
Selective Picture-Based Encryption of Video Streams
A method for encrypting a video stream in a video encoder is provided that includes receiving the video stream and encrypting randomly selected pictures in the video stream as the video stream is encoded.
Method and device for encoding multimedia data, and method and device for decoding same
One embodiment of the present disclosure provides a method of generating an encrypted multimedia bitstream, the method comprising: obtaining processed multimedia data; selecting an object to be encrypted from among the processed multimedia data; encrypting the selected object to be encrypted; converting the processed multimedia data into encrypted multimedia data, based on a result of the encrypting; and generating encrypted multimedia bitstream by encoding the encrypted multimedia data.
ELECTRONIC DEVICE FOR REPRODUCING DATA AND OPERATION METHOD THEREOF
An electronic device and an operation method thereof, according to various embodiments, may: receive first data and second data compressed in a designated compression scheme; decompress the received first data and the received second data on the basis of at least the designated compression scheme; decrypt the decompressed second data; detect success of the decryption; and reproduce the decompressed first data and the decrypted second data.
BLURRING PRIVACY MASKS
Methods and apparatus, including computer program products, implementing and using techniques for encoding a video sequence comprising a plurality of image frames, by an encoder are described. An image frame is received from a video stream. An input is received, which indicates one or more regions in the received image frame for which a privacy mask should be applied. The one or more regions are represented by one or more coding units. The image frame is encoded into an output frame, wherein image data in the one or more regions is replaced by intra-predicted coding units with transformed coefficients set to zero, the intra-predicted coding units are obtained from a prediction stage in the encoder.
TECHNIQUES FOR SECURE VIDEO FRAME MANAGEMENT
Embodiments of the present disclosure can provide devices, methods, and computer-readable medium for secure frame management. The techniques disclosed herein provide an intelligent method for detecting triggering items in one or more frames of streaming video from an Internet Protocol camera. Upon detection, the camera transmits one or more frames of the video over a network to a computing device. Upon detecting a triggering item in a frame of the video stream, the computing device can begin a streaming session with a server and stream the one or more frames of video and accompanying metadata to the server. The frames, metadata, and associated keys can all be encrypted prior to streaming to the server. For each subsequent segment of video frames that includes the triggering item, the server can append the frames of that segment to the video clip in an encrypted container. Once the triggering item is no longer detected, the streaming session can be closed.
METHOD AND ARRANGEMENT FOR DETECTING DIGITAL CONTENT TAMPERING
A method for detecting tampering of a digital content is provided. The method includes receiving a portion of the digital content at a computing device (710). The method further includes encrypting the portion of the digital content by the computing device when the portion of the digital content contains proof-of-verification (720). The method further includes computing a first hash value for the encrypted portion of the digital content by the computing device (730). The method further includes comparing the computed first hash value with a second hash value associated with the portion of the digital content in the computing device, wherein the second hash value is obtained by the computing device from a distributed ledger system (740). The method further includes identifying the evidence of tampering of the digital content when the computed first hash value is not equal to the second hash value (750). The method further includes providing an alert message to a user or an output medium upon detecting tampering of the digital content (760). A method for creating a tamper-evident digital content is also provided.
Selective picture-based encryption of video streams
A method for encrypting a video stream in a video encoder is provided that includes receiving the video stream and encrypting randomly selected pictures in the video stream as the video stream is encoded.
Providing Load Balanced Secure Media Content and Data Delivery in a Distributed Computing Environment
A system and method for providing load balanced secure media content and data delivery in a distributed computing environment is disclosed. Media content is segmented and encrypted into a set of individual encrypted segments on a centralized control center. Each individual encrypted segment has the same fixed size. The complete set of individual encrypted segments is staged to a plurality of intermediate control nodes. Individual encrypted segments are mirrored from the staged complete set to a plurality of intermediate servers. Requests are received from clients for the media content at the centralized control center. Each individual encrypted segment in the set is received from one of an intermediate control node and an intermediate server optimally sited from the requesting client. The individual encrypted segments are reassembled into the media content for media playback.
Encrypted audio streaming
The disclosed technology relates to broadcasting encrypted data to multiple receiver devices, where some receiver devices have long-term access to the encrypted data and some receiver devices have a temporary access to the encrypted data. Receivers having long-term access are part of a member group because these member group devices have a master key and the master key enables the member group devices to derive the necessary information to decrypt the encrypted broadcast. In contrast, devices with temporary access possess only a guest key and not master key, without a master key the devices need to receive the guest key from another device to decrypt the broadcast. Access to the encrypted stream can also be based on broadcasting multiple or single diversifiers, where a diversifier can include group identification information to assist in restricting access to the encrypted stream.