What is Video Encryption?
Video Encryption is an extremely useful method for the stopping unwanted interception and viewing of any transmitted video or other information, for example from a law enforcement video surveillance being relayed back to a central viewing centre.
The scrambling is the easy part. It is the un-encryption that's hard, but there are several techniques that are available. However, the human eye is very good at, spotting distortions in pictures due to poor video decoding or poor choice of video scrambling hardware. Therefore, it is very important to choose the right hardware or else your video transmissions may be un-secure or your decoded video may not be watchable.
Some of the more popular techniques are detailed below:
Line Inversion:
Method: Whole or parts of the signal scan lines are inverted. Advantages: Simple, cheap video encryption. Disadvantages: Poor video decrypting quality, low obscurity, low security.
Sync Suppression:
Method: Hide/remove the horizontal/vertical line syncs.
Advantages: Provides a low cost solution to Encryption and provides good quality video decoding.
Disadvantages: This method is incompatible with some distribution equipment. Obscurity (i.e. how easy it is to visually decipher the image) is dependant on video content.
Line Shuffle:
Method: Each signal line is re-ordered on the screen.
Advantages: Provides a compatible video signal, a reasonable amount of obscurity, good decode quality.
Disadvantages: Requires a lot of digital storage space. There are potential issues with video stability. Less secure than the cut and rotate encryption method (see below)
Cut & Rotate:
Scrambling Method: Each scan line is cut into pieces and re-assembled in a different order.
Advantages: Provides a compatible video signal, gives an excellent amount of obscurity, as well as good decode quality and stability.
Disadvantages: Can have complex timing control and requires specialized scrambling equipment
The cut and rotate video encryption method is probably the best way of achieving reliable and good quality video encryption, an example of a good implementation of this system is in the Viewlock II
Implementing vice scrambling
The video scrambling hardware, in particular the decoder should function correctly even if there is a noisy (for example having what are commonly known as 'snow' on the screen. 'Snow' is when there are flecks on your TV screen, often seen in poor reception areas) or unstable signal. If the link to the encrypted signal should stop working then this should not be a problem. The link between the video encoder and video decoder should be regained and the decryption quickly continued.
The very nature of security camera systems is that they are often outdoors as so must be able to withstand the rigours of the weather. The video encryption hardware should be stable under or protected from the effects of rain, sunlight, extreme heat and cold. It should not be damaged if there is a power spike in the supply. In these systems the video encoder emits a wireless signal to the video decoder unit before it is viewed, it obviously must be the case that the very act of broadcasting the signal does not effect the video encoding hardware and likewise the video encoding hardware should not effect the radio transmitter.
The most important item is that the video scrambling system should be secure, else why bother? It is amazing how some encryption methods can easily be cracked. For example certain cable television stations 'encrypt' their channel broadcasts via a relatively un complex method, which can easily be decoded using a number of cheap bits of electronics from radio shack. That would obviously be illegal! The cable TV's method of encryption is very crude, they usually just dynamically alter the vertical sync signal so that your TV cannot get a proper lock on it and so it scrolls randomly.
The other extreme is to scramble the transmitted video signal too much so that it is costly both in equipment and time to the video at the receiver. Remember that this is a 'live' video scrambling broadcast followed by a 'live' video decryption display. ANY electronics can be copied, given enough money and time, but making this process as hard as possible is of benefit as it at least delays the time when illegal copies will be available.
Finally and most obviously each user must have a unique encryption key so that other users of the system cannot view the transmitted video by accident or purpose without the key owners knowledge. The total number of possible user keys must be such that it is highly unlikely for someone to guess the correct key.
Ovation Systems are specialists in the design and manufacture of high quality covert video surveillance equipment. Products include the Viewlock II video encryption system.
![]() |
|
![]() |
|
![]() |
|
![]() |
The Power Supply convert's your regular household current into low... Read More
There is a great need for preventive maintenance in correctional... Read More
If you are like most student's, money isn't exactly growing... Read More
Used laptop computers are everywhere these days. How can you... Read More
With technology advancing more every day, electronics have become smaller... Read More
We all know that we should back up our system... Read More
Here's how to format a hard drive (Legal Stuff: We... Read More
IBM boasts a very large array of older and newer... Read More
High definition DVD, also known as HD-DVD (which actually stands... Read More
Well, we've all seen the advert, but that's not what... Read More
All capacitors have a certain amount of resistance to the... Read More
Bluetooth BasicsBluetooth technology is nothing new, but in many respects... Read More
Inkjet printers were born in the 1980s, replacing the popular... Read More
It appears we need to further streamline health care and... Read More
In today's age, building computers on yourself is often chosen... Read More
Have you ever encountered before the problem of having multiple... Read More
A cheap ink cartridge is sometimes the only way that... Read More
What is Video Encryption?Video Encryption is an extremely useful method... Read More
Things to Consider When Choosing a Computer CaseIn the past,... Read More
When it comes to computer speaker systems, you have a... Read More
If, for some reason, you can't get an exact replacement... Read More
Get ready everyone, home computers are about to set new... Read More
A surge protector [AKA surge suppressor] is an electrical plug-in... Read More
Laptops or Notebook computers are an expensive personal and business... Read More
Computer network installation has become an essential prerequisite for any... Read More
To upgrade or not? That is the question. At least,... Read More
It is extremely important not to make or write any... Read More
We all know what it is like when that message... Read More
Now you can more easily access the Internet wherever mobile... Read More
Picking your way through the ton of information available on... Read More
The Celeron and Pentium Processors are two of Intel's best... Read More
All picture tubes, whether monochrome or color type are identified... Read More
Digital cameras have really taken off in popularity in recent... Read More
A dedicated server is a single computer on a web-hosting... Read More
For Video cards - Most PC video cards these days... Read More
It's not exactly breaking news that our world is becoming... Read More
In the first two installments of this series of Tech... Read More
If, for some reason, you can't get an exact replacement... Read More
The gaming laptop is coming of age! It is steadily... Read More
It is the most annoying thing when one day you... Read More
To Wire or Not to Wire Wireless networks... Read More
Video technology has increased significantly over the past years, and... Read More
Video displays are most recent technique used in both outdoor... Read More
Used laptop computers are everywhere these days. How can you... Read More
Looking for a real bargain on laptop batteries? How do... Read More
OverviewAs "generic", "remanufactured", and "new compatible" inkjet printer cartridges and... Read More
Things to Consider When Choosing a Computer CaseIn the past,... Read More
Computers and their accompanying printers were huge years ago. In... Read More
Tools needed:1 - 10cc Injector1 - 4" - 5" of... Read More
HP refurbished laptops can be found on their website hpshopping.com.... Read More
Our corporate intranet is a non-framed environment with both Lotus... Read More
For years, I smugly prided myself as a non-fax machine... Read More
Hard Drives: ATA versus SATAThe performance of computer systems has... Read More
Thinking about getting a new computer, but with all the... Read More
PC cooling systems are one of the hottest - and... Read More
Let's take a moment to think about the topic of... Read More
Who needs an LCD display? Well, if you're like me,... Read More
Crystal are use to keep the frequency of the clock... Read More
The notebook computer is coming of age. For the first... Read More
The process of adding USB 2.0 ports took no time... Read More
It's easy to be intimidated by all the laptop models... Read More
CCNA and CCNP candidates hear it all the time: "you... Read More
Laptops or Notebook computers are an expensive personal and business... Read More
You just poured hours upon hours into a lengthy research... Read More
Many small businesses have considered connecting computers and other devices... Read More
Here's how to format a hard drive (Legal Stuff: We... Read More
Computer Hardware |