Font Size: a A A

Design And Implementation Of Trusted HD Video Coding System Security Architecture

Posted on:2016-01-30Degree:MasterType:Thesis
Country:ChinaCandidate:Z H GaoFull Text:PDF
GTID:2272330479983759Subject:Instrument Science and Technology
Abstract/Summary:PDF Full Text Request
There exist some problems in the current airborne video system, its coding efficiency and video definition are unsatisfactory. In order to solve these problems, our research group developed a high-definition(HD) video coding system. But there are still a problem cannot be ignored, airborne video such as aerial video belongs to sensitive data, we must ensure that its acquisition security and privacy in the process of transmission and storage, etc. In order to ensure the HD video data security, this topic research HD video coding system security architecture.Firstly, we analysis and research the security threat which HD video coding system faced. Threats including spy local attack, hacker network intrusion, and the intercept listener in the process of video transmission. This paper designed the overall system security architecture, including trusted embedded systems, network intrusion detection, H.264 video encryption and etc. After this, we deeply studied the key security technologies to implement the security architecture. Details are as follows:① Research and application of trusted embedded system. In this paper, the trusted embedded system were studied to keep the local security of the HD video coding system. Based on the research and analysis of existing trust transfer mechanism, we proposed fan-shaped trust transfer mechanism. This mechanism can improve work efficiency under the premise of security ensures. On top of that, we use the trusted hardware module as a trusted root to design and implement an embedded system security start function. In order to further ensure the security of DH video coding system after boot or in the process of operation, the role-based user rights management and system based on the Proc file system monitoring technology has carried on the research and application.② Network intrusion detection system design. To prevent possible invasion threat from the internet, this paper deeply studied the network intrusion detection technology. Firstly we proposed a Hidden Conditional Random Field based network intrusion detection system which greatly improved the efficiency of intrusion detection. After this, we put forward a Two-stage Feature Selection(TSFS) method including Artificial Feature Selection and Backward Feature Elimination Wrapper method. The TSFS method enhanced the network intrusion detection system in both detection accuracy and efficiency.③ H.264 video encryption technology research. To prevent the video data being intercepted in the process of network transmission, and Lead to the leakage of sensitive information, This paper studied and analyzed the encryption methods about H.264 HD video coding standard in detail. By combining the principle of DM8168 platform coding h.264 video and chaotic key stream, we proposed the h.264 bitstream domain encryption method based on chaotic theory. This provides important support for video confidentiality.
Keywords/Search Tags:security architecture, trusted computing, intrusion detection, video encryption
PDF Full Text Request
Related items