Professional Documents
Culture Documents
= D|at::|:m
I
I I "
I
|:(|aa:(:': :(|:'|r|:(|:.::
!M\
G cc8 B
:
'
s
o
7
IICi!CX!
Lncrypton
IICi!CX!
Decrypton
Figure 2. Flow chart of AES 128 encryption and decryption algorithm
The entire sofware development is completed in the
environment of Linux system, The ARM side of dual-core
processors is responsible for the system call, and OSP side is
responsible for the implementation of AES 128 encrption
and decryption algorithm. In order to enable ARM core to
calling the algorithms that implement on OSP core, we must
package the algorithm of AES128 encryption and decryption
into Codec Server managed by Codec Engine. In the .tcf
confguration fle of Codec Server, we manage hardware
resources of TM3200M6446 by setting OSP/BIOS. Afer
repeated testing, we can obtain the optimal allocation
situation of memor: for 80K LID of OSP core of
TM3200M6446, 32K is confgured into Cache, and the lef
48K is as internal RAM; for 64K L2 of OSP core, 32K is
confgured into Cache, and the lef 32K is as interal RAM.
At the same time, when we compile the Codec Server,
through setting the optimizing profle as "-03" in
package. bId of Co dec server, to optimize the code, and
improve the effciency of the implementation of the code.
IV. TEST RESULTS
The sofware development of this system is under the
Linux operating system of the virtual machine, the version of
Linux operating system: Monta Vista Linux Professional
Edition v4.
Before the test, we use a cross cable to link the hardware
platform with the host through a switch, and confgure the
NFS network services, in order to make the development
board and the host can access each other. Meanwhile, in the
Windows environment of the host, we use a serial cable to
connect development board with the host, and set the
HyperTerminal. Using the terminal, we can monitor the
hardware system starting, and set the command parameters.
In practical tests, we found that If we only encrypted I
fames of each video sequence, because of the relationship of
time and space among fames, as well as I Blocks of P, B
fames not been encrypted, the results of encryption is not
very perfect, video sequences are still partially visible; when
all I fames and I Blocks of P, B fames in the video
sequences were encrypted, we could obtain better encrypted
results; and when the video sequence data was encrypted
completely, though we could get the highest security,
because of needing to process most of the data, time
consuming was the most.
In the testing process, we input the encryption commands
in the HyperTerminal. The hardware system parses the
commands by MSP430, reads the audio and video data
stored in the HO (hard disk), displays the flms encrypted
on the OSO. Figure3, Figure 4, Figure 5 are respectively the
encryption image of encrypting I fames of each video
sequence only, I fames and I Blocks of P, B fame, all I, P,
B fames of digital movie. When we decode the encryption
image, the input encryption video image can not play
normally. Figure6 is the original video image, using AES 128
decryption algorithm.
Figure 3. Encryption image of encrypting Iframes only
\Z-Z
z010Inte/nationalCome/enceonImo/mation,Aetwo/kingandAutomation(ICIAA)
Figure 4. Encryption image of encrypting I frames and I Blocks of P, B
fames
Figure 5. Encryption image of encrypting all the I, P, B frames
|rlllll)
\l /
I i+|l+l
I
IiIi '|
( )
|l1
(
llI. M'I' l.l'!
1 , 1|` |
|
|
I " | '' I
|'^!
Figure 6. Original video image afer decrypting
V. CONCLUSIONS
This paper proposes the solutions and implementation
methods of different securit level for digital cinema
encryption, based on DaVinci hardware platform and
Da Vinci digital multimedia sofware technology, which
guarantees the securit of digital movie. Using the support of
DaVinci high-level Linux, standardized APls and product
oriented underlying drivers, it's signifcant to reduce the
complexity of sofware design, shorten the development
cycles of products, and reduce development costs. The test
results show that the design plan we proposes meets the
needs of the actual security level, and the digital cinema
projection system has a high stabilit and reliability.
Meanwhile, the design methods proposed can be used for
other confdential felds. Therefore, the design methods
proposed have an extensive reference.
REFERENCES
[I] Zhang Peimin. To Speed up the Development of Digital Cinema of
China [A].Video Technology, 2004.9:7-9.
[2] Chen Shaozhen. Cryptography Basics.Bei Jing:Science Press,
2008.05.
[3] Gu Dawu.The advanced encryption standard (AES) algorithm-
Rijndael design. Bei Jing:TSINGHUA Universicity Press,2003 .. 03.
[4] DaVinci for Digital Video.http://www. ti.com.2006.
[5] The Future of Digital Video.http://www.ti.com.2006.
[6] Xu Peng, Zhou Haobing.TMS320DM6446 Video Research Based on
DaVinci technology [J]. Electronic World,2006(2)135-137.
[7] Tang, L. Methods for Encrypting and Decrypting MPEG Video Data
Efciently[C]. In Proceedings of the Fourth ACM Interational
Multimedia Conference(ACM Multimedia 96). 1996.
[8] B. Bhargava, C. Sh, i and S-Y Wang. MPEG Video Encryption
Algori t hms[M]. Mult i medi a Tool s and Appl i cat i ons, 2004.
\Z-Z