Username: Save?
Password:
Home Forum Links Search Login Register*
    News: Welcome to the TechnoWorldInc! Community!
Recent Updates
[November 08, 2024, 04:31:03 PM]

[November 08, 2024, 04:31:03 PM]

[November 08, 2024, 04:31:03 PM]

[November 08, 2024, 04:31:03 PM]

[November 08, 2024, 04:31:03 PM]

[October 17, 2024, 05:05:06 PM]

[October 17, 2024, 04:53:18 PM]

[October 17, 2024, 04:53:18 PM]

[October 17, 2024, 04:53:18 PM]

[October 17, 2024, 04:53:18 PM]

[September 09, 2024, 12:27:25 PM]

[September 09, 2024, 12:27:25 PM]

[September 09, 2024, 12:27:25 PM]
Subscriptions
Get Latest Tech Updates For Free!
Resources
   Travelikers
   Funistan
   PrettyGalz
   Techlap
   FreeThemes
   Videsta
   Glamistan
   BachatMela
   GlamGalz
   Techzug
   Vidsage
   Funzug
   WorldHostInc
   Funfani
   FilmyMama
   Uploaded.Tech
   MegaPixelShop
   Netens
   Funotic
   FreeJobsInc
   FilesPark
Participate in the fastest growing Technical Encyclopedia! This website is 100% Free. Please register or login using the login box above if you have already registered. You will need to be logged in to reply, make new topics and to access all the areas. Registration is free! Click Here To Register.
+ Techno World Inc - The Best Technical Encyclopedia Online! » Forum » THE TECHNO CLUB [ TECHNOWORLDINC.COM ] » Computer / Technical Issues » Hardware
 Video Encryption
Pages: [1]   Go Down
  Print  
Author Topic: Video Encryption  (Read 785 times)
Stephen Taylor
TWI Hero
**********



Karma: 3
Offline Offline

Posts: 15522

unrealworld007
View Profile
Video Encryption
« Posted: August 09, 2007, 10:56:22 AM »


Video Encryption


What is Video Encryption?

Video Encryption is an extremely useful method for the stopping unwanted interception and viewing of any transmitted video or other information, for example from a law enforcement video surveillance being relayed back to a central viewing centre.

The scrambling is the easy part. It is the un-encryption that's hard, but there are several techniques that are available. However, the human eye is very good at, spotting distortions in pictures due to poor video decoding or poor choice of video scrambling hardware. Therefore, it is very important to choose the right hardware or else your video transmissions may be un-secure or your decoded video may not be watchable.

Some of the more popular techniques are detailed below:

Line Inversion:

Method: Whole or parts of the signal scan lines are inverted.Advantages: Simple, cheap video encryption.Disadvantages: Poor video decrypting quality, low obscurity, low security.

Sync Suppression:

Method: Hide/remove the horizontal/vertical line syncs.

Advantages: Provides a low cost solution to Encryption and provides good quality video decoding.

Disadvantages: This method is incompatible with some distribution equipment. Obscurity (i.e. how easy it is to visually decipher the image) is dependant on video content.

Line Shuffle:

Method: Each signal line is re-ordered on the screen.

Advantages: Provides a compatible video signal, a reasonable amount of obscurity, good decode quality.

Disadvantages: Requires a lot of digital storage space. There are potential issues with video stability. Less secure than the cut and rotate encryption method (see below)

Cut & Rotate:

Scrambling Method: Each scan line is cut into pieces and re-assembled in a different order.

Advantages: Provides a compatible video signal, gives an excellent amount of obscurity, as well as good decode quality and stability.

Disadvantages: Can have complex timing control and requires specialized scrambling equipment

The cut and rotate video encryption method is probably the best way of achieving reliable and good quality video encryption, an example of a good implementation of this system is in the Viewlock II

Implementing vice scrambling

The video scrambling hardware, in particular the decoder should function correctly even if there is a noisy (for example having what are commonly known as 'snow' on the screen. 'Snow' is when there are flecks on your TV screen, often seen in poor reception areas) or unstable signal. If the link to the encrypted signal should stop working then this should not be a problem. The link between the video encoder and video decoder should be regained and the decryption quickly continued.

The very nature of security camera systems is that they are often outdoors as so must be able to withstand the rigours of the weather. The video encryption hardware should be stable under or protected from the effects of rain, sunlight, extreme heat and cold. It should not be damaged if there is a power spike in the supply. In these systems the video encoder emits a wireless signal to the video decoder unit before it is viewed, it obviously must be the case that the very act of broadcasting the signal does not effect the video encoding hardware and likewise the video encoding hardware should not effect the radio transmitter.

The most important item is that the video scrambling system should be secure, else why bother? It is amazing how some encryption methods can easily be cracked. For example certain cable television stations 'encrypt' their channel broadcasts via a relatively un complex method, which can easily be decoded using a number of cheap bits of electronics from radio shack. That would obviously be illegal! The cable TV's method of encryption is very crude, they usually just dynamically alter the vertical sync signal so that your TV cannot get a proper lock on it and so it scrolls randomly.

The other extreme is to scramble the transmitted video signal too much so that it is costly both in equipment and time to the video at the receiver. Remember that this is a 'live' video scrambling broadcast followed by a 'live' video decryption display. ANY electronics can be copied, given enough money and time, but making this process as hard as possible is of benefit as it at least delays the time when illegal copies will be available.

Finally and most obviously each user must have a unique encryption key so that other users of the system cannot view the transmitted video by accident or purpose without the key owners knowledge. The total number of possible user keys must be such that it is highly unlikely for someone to guess the correct key.

Ovation Systems are specialists in the design and manufacture of high quality covert video surveillance equipment. Products include the Viewlock II video encryption system.

Logged

Pages: [1]   Go Up
  Print  
 
Jump to:  

Copyright © 2006-2023 TechnoWorldInc.com. All Rights Reserved. Privacy Policy | Disclaimer
Page created in 0.128 seconds with 24 queries.