What is Video Encryption?
Video Encryption is an extremely useful method for the stopping unwanted interception and viewing of any transmitted video or other information, for example from a law enforcement video surveillance being relayed back to a central viewing centre.
The scrambling is the easy part. It is the un-encryption that's hard, but there are several techniques that are available. However, the human eye is very good at, spotting distortions in pictures due to poor video decoding or poor choice of video scrambling hardware. Therefore, it is very important to choose the right hardware or else your video transmissions may be un-secure or your decoded video may not be watchable.
Some of the more popular techniques are detailed below:
Line Inversion:
Method: Whole or parts of the signal scan lines are inverted. Advantages: Simple, cheap video encryption. Disadvantages: Poor video decrypting quality, low obscurity, low security.
Sync Suppression:
Method: Hide/remove the horizontal/vertical line syncs.
Advantages: Provides a low cost solution to Encryption and provides good quality video decoding.
Disadvantages: This method is incompatible with some distribution equipment. Obscurity (i.e. how easy it is to visually decipher the image) is dependant on video content.
Line Shuffle:
Method: Each signal line is re-ordered on the screen.
Advantages: Provides a compatible video signal, a reasonable amount of obscurity, good decode quality.
Disadvantages: Requires a lot of digital storage space. There are potential issues with video stability. Less secure than the cut and rotate encryption method (see below)
Cut & Rotate:
Scrambling Method: Each scan line is cut into pieces and re-assembled in a different order.
Advantages: Provides a compatible video signal, gives an excellent amount of obscurity, as well as good decode quality and stability.
Disadvantages: Can have complex timing control and requires specialized scrambling equipment
The cut and rotate video encryption method is probably the best way of achieving reliable and good quality video encryption, an example of a good implementation of this system is in the Viewlock II
Implementing vice scrambling
The video scrambling hardware, in particular the decoder should function correctly even if there is a noisy (for example having what are commonly known as 'snow' on the screen. 'Snow' is when there are flecks on your TV screen, often seen in poor reception areas) or unstable signal. If the link to the encrypted signal should stop working then this should not be a problem. The link between the video encoder and video decoder should be regained and the decryption quickly continued.
The very nature of security camera systems is that they are often outdoors as so must be able to withstand the rigours of the weather. The video encryption hardware should be stable under or protected from the effects of rain, sunlight, extreme heat and cold. It should not be damaged if there is a power spike in the supply. In these systems the video encoder emits a wireless signal to the video decoder unit before it is viewed, it obviously must be the case that the very act of broadcasting the signal does not effect the video encoding hardware and likewise the video encoding hardware should not effect the radio transmitter.
The most important item is that the video scrambling system should be secure, else why bother? It is amazing how some encryption methods can easily be cracked. For example certain cable television stations 'encrypt' their channel broadcasts via a relatively un complex method, which can easily be decoded using a number of cheap bits of electronics from radio shack. That would obviously be illegal! The cable TV's method of encryption is very crude, they usually just dynamically alter the vertical sync signal so that your TV cannot get a proper lock on it and so it scrolls randomly.
The other extreme is to scramble the transmitted video signal too much so that it is costly both in equipment and time to the video at the receiver. Remember that this is a 'live' video scrambling broadcast followed by a 'live' video decryption display. ANY electronics can be copied, given enough money and time, but making this process as hard as possible is of benefit as it at least delays the time when illegal copies will be available.
Finally and most obviously each user must have a unique encryption key so that other users of the system cannot view the transmitted video by accident or purpose without the key owners knowledge. The total number of possible user keys must be such that it is highly unlikely for someone to guess the correct key.
Ovation Systems are specialists in the design and manufacture of high quality covert video surveillance equipment. Products include the Viewlock II video encryption system.
As the proud owner of a laptop computer, you'll want... Read More
Digital cameras have really taken off in popularity in recent... Read More
Tape drives remain the leading technology used by organizations for... Read More
Compatible Laser Toner CartridgesRecently, there has been a huge legal... Read More
IBM boasts a very large array of older and newer... Read More
Let's take a moment to think about the topic of... Read More
Nowadays, more and more monitor comes in with flyback transformers... Read More
It appears we need to further streamline health care and... Read More
Just about everyone would I agree, I think, that wires... Read More
When bought personal DVD player, the very next thing to... Read More
It's easy to be intimidated by all the laptop models... Read More
Laser toner is the ink for laser printers. It is... Read More
The data on your hard drive is the most critical... Read More
CD ROMS - If you're adding or removing an internal... Read More
Before you upgrade your PC hardware it's best to search... Read More
It's not exactly breaking news that our world is becoming... Read More
Other then keeping your HDD free of viruses, spyware, and... Read More
A cheap ink cartridge is sometimes the only way that... Read More
The other day my son said to me, what else... Read More
Printers are on-line devices initially categorised as being either impact... Read More
Computer MiceEvery computer user can hopefully identify their mouse and... Read More
Business Consultants earn hundreds of thousands of dollars every year... Read More
Have you noticed that laptop computers are beginning to dictate... Read More
This is the first step to servicing, upgrading or removing... Read More
Are you captivated by the stunning Case Mods you've seen... Read More
Soon the human brain will be completely interfaced with the... Read More
Crystal are use to keep the frequency of the clock... Read More
It is the most annoying thing when one day you... Read More
Nothing is completely safe today. Adobe has recently released a... Read More
Expansion Cards Part 2: AGPThe first in this series of... Read More
DVD CD ROMs have become predominantly the most used CD... Read More
So you finally have that new laptop you have been... Read More
Get ready everyone, home computers are about to set new... Read More
Video displays are most recent technique used in both outdoor... Read More
Many technicians are confused on how to really read a... Read More
Much has been written about solid state disks (SSDs) becoming... Read More
If you are tight on budget, go for Inkjet Printer.... Read More
Brother is right up there with HP and Samsung as... Read More
Surge Suppressors ? A First Line of DefenseAll home theater... Read More
Time is one of the most important things we have... Read More
Even with the popularity of digital technology, and the availability... Read More
A laptop computer certainly provides you with an unprecedented level... Read More
Expansion Cards Part 2: AGPThe first in this series of... Read More
1) Mechanical: This is a type of computer mouse that... Read More
We all know what it is like when that message... Read More
Laser toner refills can be expensive. Over the life of... Read More
Have you ever encountered before the problem of having multiple... Read More
For years, I smugly prided myself as a non-fax machine... Read More
With all the wheeling and dealing that seems to take... Read More
CD ROMS - If you're adding or removing an internal... Read More
Data Centers are the core of the Internet. The computer... Read More
Many people simply go to the retail store and get... Read More
Our corporate intranet is a non-framed environment with both Lotus... Read More
A cheap ink cartridge is sometimes the only way that... Read More
Blu ray is a next generation optical media format developed... Read More
PC cooling systems are one of the hottest - and... Read More
Before you upgrade your PC hardware it's best to search... Read More
DVD is an optical disc storage media format that can... Read More
Digital voice recorders have become increasingly popular over the last... Read More
So many people have small USB drives today, but what... Read More
A surge protector [AKA surge suppressor] is an electrical plug-in... Read More
Getting a new PC is exciting and a pain. It's... Read More
Are you captivated by the stunning Case Mods you've seen... Read More
Personal asset preventive maintenance software exists to help people manage... Read More
You can purchase an inkjet printer for as little as... Read More
Data loss is an expensive reality. It's a hard fact... Read More
Computer Hardware |