Font Size: a A A

Research On Disc Play With Authentication Contents Encryption Algorithm

Posted on:2012-04-09Degree:MasterType:Thesis
Country:ChinaCandidate:Y D YangFull Text:PDF
GTID:2218330362956475Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the development of multimedia and network techniques, High-definition digital media have been applied in a variety of aspects, such as Video on Demand, Toll Television and video conference. Under the support of the nation, The Next-Generation Disc with full intellectual property rights was developed by Wuhan National Lab of Optoelectronics, in order to challenge the Blue-Ray monopoly position abroad. Compared with Blue-Ray, NVD has the comparable image quality, a lower price and does not need to pay for the huge patent fee, so it has a large market prospect. Obviously, without the effective techniques of media contents protection, NVD could hardly move forward in the market.Based on the deep analysis of encryption algorithm of disc and video, a new encryption strategy ground on network video transportation was proposed. In this scheme, some video data would be extracted from the whole video file as the sensitive data for this file, which are stored in the server end. Meanwhile, the remainder data would be encrypted by common encryption algorithms. The ciphertext should be stored in NVD discs and the key for decryption could be put in the server end too. For the authentication play process, the sensitive data and key for decryption would be transported from server end to a NVD player, and then the NVD player could decrypt the ciphertext in discs, combine them with the sensitive data and play with full satisfaction of customers. For non-authentication play process, even if the ciphertext in discs are cracked, owing to the lack of sensitive data, a NVD player could not play with good satisfaction effects.Ground on the encryption scheme above, the disc authentication play system is designed and developed. This system could accomplish a series of functions, such as user management and authentication, sensitive data transportation, video file encryption and so on. Also the extraction strategy for sensitive data could be adjusted freely. The final testing analysis shows that this system could fully satisfy content providers'encryption requirement, with the lower network band support.
Keywords/Search Tags:Disc authentication play, Video encryption algorithm, Disc encryption technique, Sensitive video data
PDF Full Text Request
Related items