Video Encryption

What is Video Encryption?

Video Encryption is an extremely useful method for the stopping unwanted interception and viewing of any transmitted video or other information, for example from a law enforcement video surveillance being relayed back to a central viewing centre.

The scrambling is the easy part. It is the un-encryption that's hard, but there are several techniques that are available. However, the human eye is very good at, spotting distortions in pictures due to poor video decoding or poor choice of video scrambling hardware. Therefore, it is very important to choose the right hardware or else your video transmissions may be un-secure or your decoded video may not be watchable.

Some of the more popular techniques are detailed below:

Line Inversion:

Method: Whole or parts of the signal scan lines are inverted. Advantages: Simple, cheap video encryption. Disadvantages: Poor video decrypting quality, low obscurity, low security.

Sync Suppression:

Method: Hide/remove the horizontal/vertical line syncs.

Advantages: Provides a low cost solution to Encryption and provides good quality video decoding.

Disadvantages: This method is incompatible with some distribution equipment. Obscurity (i.e. how easy it is to visually decipher the image) is dependant on video content.

Line Shuffle:

Method: Each signal line is re-ordered on the screen.

Advantages: Provides a compatible video signal, a reasonable amount of obscurity, good decode quality.

Disadvantages: Requires a lot of digital storage space. There are potential issues with video stability. Less secure than the cut and rotate encryption method (see below)

Cut & Rotate:

Scrambling Method: Each scan line is cut into pieces and re-assembled in a different order.

Advantages: Provides a compatible video signal, gives an excellent amount of obscurity, as well as good decode quality and stability.

Disadvantages: Can have complex timing control and requires specialized scrambling equipment

The cut and rotate video encryption method is probably the best way of achieving reliable and good quality video encryption, an example of a good implementation of this system is in the Viewlock II

Implementing vice scrambling

The video scrambling hardware, in particular the decoder should function correctly even if there is a noisy (for example having what are commonly known as 'snow' on the screen. 'Snow' is when there are flecks on your TV screen, often seen in poor reception areas) or unstable signal. If the link to the encrypted signal should stop working then this should not be a problem. The link between the video encoder and video decoder should be regained and the decryption quickly continued.

The very nature of security camera systems is that they are often outdoors as so must be able to withstand the rigours of the weather. The video encryption hardware should be stable under or protected from the effects of rain, sunlight, extreme heat and cold. It should not be damaged if there is a power spike in the supply. In these systems the video encoder emits a wireless signal to the video decoder unit before it is viewed, it obviously must be the case that the very act of broadcasting the signal does not effect the video encoding hardware and likewise the video encoding hardware should not effect the radio transmitter.

The most important item is that the video scrambling system should be secure, else why bother? It is amazing how some encryption methods can easily be cracked. For example certain cable television stations 'encrypt' their channel broadcasts via a relatively un complex method, which can easily be decoded using a number of cheap bits of electronics from radio shack. That would obviously be illegal! The cable TV's method of encryption is very crude, they usually just dynamically alter the vertical sync signal so that your TV cannot get a proper lock on it and so it scrolls randomly.

The other extreme is to scramble the transmitted video signal too much so that it is costly both in equipment and time to the video at the receiver. Remember that this is a 'live' video scrambling broadcast followed by a 'live' video decryption display. ANY electronics can be copied, given enough money and time, but making this process as hard as possible is of benefit as it at least delays the time when illegal copies will be available.

Finally and most obviously each user must have a unique encryption key so that other users of the system cannot view the transmitted video by accident or purpose without the key owners knowledge. The total number of possible user keys must be such that it is highly unlikely for someone to guess the correct key.

Ovation Systems are specialists in the design and manufacture of high quality covert video surveillance equipment. Products include the Viewlock II video encryption system.

In The News:


pen paper and inkwell


cat break through


Learn How To Diagnose Power Supply Problems

The Power Supply convert's your regular household current into low... Read More

Correctional Institution Preventive Maintenance Software

There is a great need for preventive maintenance in correctional... Read More

How To Buy The Perfect Student Laptop

If you are like most student's, money isn't exactly growing... Read More

Used Laptop Computer: Your Quick Purchase Inspection Guide ? Part 3

Used laptop computers are everywhere these days. How can you... Read More

Batteries for Your Laptop

With technology advancing more every day, electronics have become smaller... Read More

How To Backup Your Hard Drive

We all know that we should back up our system... Read More

How To Format A Hard Drive

Here's how to format a hard drive (Legal Stuff: We... Read More

A Guide to Refurbished IBM Laptops

IBM boasts a very large array of older and newer... Read More

High Definition DVD

High definition DVD, also known as HD-DVD (which actually stands... Read More

Does Size Really Matter In Our Digital Age?

Well, we've all seen the advert, but that's not what... Read More

What is ESR Meter?

All capacitors have a certain amount of resistance to the... Read More

Bluetooth Basics - Bluetooth Technology Tutorial

Bluetooth BasicsBluetooth technology is nothing new, but in many respects... Read More

Getting to Know Inkjet Printers

Inkjet printers were born in the 1980s, replacing the popular... Read More

HIPPA Goes Mobile and Wireless for Hospitals and First Responders

It appears we need to further streamline health care and... Read More

Computer Parts Online

In today's age, building computers on yourself is often chosen... Read More

How to Solve Multiple Paper Loading Problem in HP5L and HP6L Laser Printer

Have you ever encountered before the problem of having multiple... Read More

Cheap Ink Cartridge

A cheap ink cartridge is sometimes the only way that... Read More

Video Encryption

What is Video Encryption?Video Encryption is an extremely useful method... Read More

How To Choose A Computer Case

Things to Consider When Choosing a Computer CaseIn the past,... Read More

Review of Logitech Computer Speakers

When it comes to computer speaker systems, you have a... Read More

Understanding Transistor Data and Replacement

If, for some reason, you can't get an exact replacement... Read More

Obsolete Is A Dirty Word (Intel Pentium 64 Bit Microchip)

Get ready everyone, home computers are about to set new... Read More

Surge Protector: A Simple Mechanism Description

A surge protector [AKA surge suppressor] is an electrical plug-in... Read More

Laptop and Notebook Theft Prevention

Laptops or Notebook computers are an expensive personal and business... Read More

Computer Network Installation

Computer network installation has become an essential prerequisite for any... Read More

To Upgrade or Not?

To upgrade or not? That is the question. At least,... Read More

Trouble-shooting Hard Drive Problems - Part 1

It is extremely important not to make or write any... Read More

Got The Message that You Need New Ink Cartridges?

We all know what it is like when that message... Read More

JunxionBox -- WiFi Access Everywhere

Now you can more easily access the Internet wherever mobile... Read More

Recordable DVD Formats Explained

Picking your way through the ton of information available on... Read More

Intel Celeron vs Pentium

The Celeron and Pentium Processors are two of Intel's best... Read More

How to Read CRT Tube Part Numbers

All picture tubes, whether monochrome or color type are identified... Read More

Digital Camera Prints - Getting the Most for Your Money

Digital cameras have really taken off in popularity in recent... Read More