In addition to Weibo, there is also WeChat
Please pay attention

WeChat public account
Shulou
 
            
                     
                
2025-10-31 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Development >
Share
Shulou(Shulou.com)06/03 Report--
This article is about how to use cenc encryption. The editor thinks it is very practical, so share it with you as a reference and follow the editor to have a look.
Universal encryption format CENC is an encryption format based on ISO/IEC14496-12. CENC defines two encryption methods: full sample encryption and sub-sample encryption. Full sample encryption encrypts the whole sample as a complete unit; the sample in sub-sample encryption is divided into one or more subsample, each subsample is alternately composed of unencrypted region and encrypted region, all encrypted regions in Sample are regarded as a logically continuous block, and the increase of counter value has nothing to do with switching NAL units.
CENC encryption mechanism
CENC encryption replaces sampleentry as follows:
1. Add ProtectionSchemeInformationBox ('sinf') to each track to identify the content as encrypted.
2. ProtectionSchemeInformationBox ('sinf') contains SchemeTypeBox (' schm'): defines the corresponding encryption algorithm, where scheme_type defines the encryption type and scheme_version defines the schema version. In CENC encryption:
The pattern type scheme_type='cenc',CENC is encrypted by AES-CTR algorithm
Mode version scheme_version=0 x 00010000.
3. ProtectionSchemeInformationBox ('sinf') should include SchemeInformationBox (' schi').
4. SchemeInformationBox ('schi') contains TrackEncryptionBox (' tenc'): describes the encryption parameters of the track.
The relevant parameters defined in the CENC universal encryption format are included in the following box:
1. Information related to the scheme of the content protection system, such as license and authorization acquisition information, is included in ProtectionSystemSpecificHeaderBox ('pssh').
2. The encryption parameters for each track (including KID, initialization vector, encryption flag bits) are included in TrackEncryptionBox ('tenc').
3. The encryption parameters for samplesgroups (including KID, initialization vector, encryption flag bits) are included in SampleGroupDescriptionBox ('sgpd').
4. The encryption parameters of individual sample (including initialization vector, subsample encrypted data) are included in the additional information of the sample, which is referenced by SampleAuxiliaryInformationSizesBox ('saiz') and SampleAuxiliaryInformationOffsetsBox (' saio').
Thank you for reading! This is the end of this article on "how to use cenc encryption". I hope the above content can be of some help to you, so that you can learn more knowledge. if you think the article is good, you can share it for more people to see!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

The market share of Chrome browser on the desktop has exceeded 70%, and users are complaining about

The world's first 2nm mobile chip: Samsung Exynos 2600 is ready for mass production.According to a r


A US federal judge has ruled that Google can keep its Chrome browser, but it will be prohibited from

Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope





 
             
            About us Contact us Product review car news thenatureplanet
More Form oMedia: AutoTimes. Bestcoffee. SL News. Jarebook. Coffee Hunters. Sundaily. Modezone. NNB. Coffee. Game News. FrontStreet. GGAMEN
© 2024 shulou.com SLNews company. All rights reserved.