CN111310136B - Authenticity verification method, device and equipment for image data - Google Patents

Authenticity verification method, device and equipment for image data Download PDF

Info

Publication number
CN111310136B
CN111310136B CN202010121303.4A CN202010121303A CN111310136B CN 111310136 B CN111310136 B CN 111310136B CN 202010121303 A CN202010121303 A CN 202010121303A CN 111310136 B CN111310136 B CN 111310136B
Authority
CN
China
Prior art keywords
image data
data
image
optical signal
environment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010121303.4A
Other languages
Chinese (zh)
Other versions
CN111310136A (en
Inventor
韩喆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN202010121303.4A priority Critical patent/CN111310136B/en
Priority to CN202111296197.4A priority patent/CN114003874A/en
Publication of CN111310136A publication Critical patent/CN111310136A/en
Priority to PCT/CN2020/138023 priority patent/WO2021169530A1/en
Application granted granted Critical
Publication of CN111310136B publication Critical patent/CN111310136B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0201Image watermarking whereby only tamper or origin are detected and no embedding takes place

Abstract

One or more embodiments of the application provide a method, a device and equipment for verifying authenticity of image data. The method comprises the steps of firstly, responding to an image acquisition instruction, and acquiring an optical signal from an image acquisition environment; wherein the optical signal comprises an optical signal emitted by a light generating device deployed in the image acquisition environment; the light signal sent by the light generating equipment carries environment information corresponding to the image acquisition environment; then, image data corresponding to the image acquisition environment is generated based on the acquired optical signal, so that a user of the image data analyzes the optical signal transmitted by the light generating device from the image data, and environment information carried by the optical signal is matched with information provided by a data provider of the image data to complete authenticity verification.

Description

Authenticity verification method, device and equipment for image data
Technical Field
The present application relates to the field of computer applications, and in particular, to a method, an apparatus, and a device for verifying authenticity of image data.
Background
In order to achieve the illegal purpose, the image data provider usually performs counterfeiting on the image data provided by the image data provider, and intends to deceive the image data user so that the data user can obtain an error conclusion according to the counterfeit image data.
Therefore, there is a need for an authenticity verification method of image data so that an image user can verify authenticity of the image data.
Disclosure of Invention
The application provides an authenticity verification method of image data, which comprises the following steps:
collecting optical signals from an image collection environment in response to an image collection instruction; wherein the optical signal comprises an optical signal emitted by a light generating device deployed in the image acquisition environment; the light signal sent by the light generating equipment carries environment information corresponding to the image acquisition environment;
and generating image data corresponding to the image acquisition environment based on the acquired optical signal, so that a user of the image data analyzes the optical signal transmitted by the light generation equipment from the image data, and matching environment information carried by the optical signal with information provided by a data provider of the image data to finish authenticity verification.
The application provides an authenticity verification method of image data, which comprises the following steps:
analyzing the acquired image data to obtain an optical signal; wherein the optical signal includes environmental information corresponding to the image acquisition environment;
and matching the environmental information carried by the optical signal with the information provided by the data provider of the image data to finish authenticity verification.
The application provides an authenticity verifying attachment of image data, includes:
the acquisition module is used for responding to an image acquisition instruction and acquiring optical signals from an image acquisition environment; wherein the optical signal comprises an optical signal emitted by a light generating device deployed in the image acquisition environment; the light signal sent by the light generating equipment carries environment information corresponding to the image acquisition environment;
and the generating module generates image data corresponding to the image acquisition environment based on the acquired optical signal, so that a user of the image data analyzes the optical signal transmitted by the light generating equipment from the image data, and matches environment information carried by the optical signal with information provided by a data provider of the image data to finish authenticity verification.
The application provides an authenticity verifying attachment of image data, includes:
the analysis module is used for analyzing the acquired image data to obtain an optical signal; wherein the optical signal includes environmental information corresponding to the image acquisition environment;
and the matching module is used for matching the environmental information carried by the optical signal with the information provided by the data provider of the image data so as to finish authenticity verification.
In the above technical solution, when acquiring image data, the optical signal may be acquired at the same time, so that environment information corresponding to the image acquisition environment may be stored in the image data, and when performing authenticity verification on the image data, since the environment information corresponding to the image acquisition environment may be analyzed and the environment information may be matched with information provided by a data provider to complete authenticity verification on the image data, on one hand, it may be determined that the image data has not been tampered and has authenticity from the beginning of the acquisition process to the current time; on the other hand, it can be determined that the image data is acquired in a real image acquisition environment.
Drawings
FIG. 1 is a flow chart of a method of authenticity verification of image data according to the present application;
FIG. 2 is a flow chart illustrating a method of verifying authenticity of image data according to the present application;
FIG. 3 is a diagram of an image data acquisition scenario presented herein;
FIG. 4 is a flow chart illustrating a financing party financing to a sponsor using a manifest as shown in the present application;
fig. 5 is a block diagram of an authenticity verifying apparatus of image data shown in the present application;
fig. 6 is a block diagram of an authenticity verifying apparatus of image data shown in the present application;
fig. 7 is a hardware configuration diagram of an authenticity verifying apparatus for image data according to the present application.
Detailed Description
In order to achieve the illegal purpose, the image data provider usually counterfeits the image data, and intends to deceive the image data user, so that the data user can obtain an error conclusion according to the counterfeit image data.
For example, in an application scenario of financing using a warehouse slip, a financing party (data provider) may provide image data after counterfeiting to an investor (data user) for illegal financing, so that the investor may draw a conclusion that goods listed in the warehouse slip really exist according to the image data after counterfeiting and provide funds to the financing party.
The storage bill is a certificate for taking the storage after the custodian receives the storage and pays to the stockman. The list of the warehouse is usually listed with information about the warehouse, the storage location of the warehouse, and the time period during which the warehouse is stored in the storage location.
In general, when financing using a manifest, the financing party needs to prove to the investor that the goods listed in the manifest are actually present.
In proving the actual presence of the goods listed in the manifest, the financer will typically provide image data (e.g., video of images stored on-site) to the sponsor that can prove that the stores listed in the manifest are indeed stored at the storage locations listed in the manifest within the time period listed in the manifest.
When receiving the image data, the supplier can compare the storage place, the storage and the time period of the storage in the storage place shown in the image data with the information listed on the warehouse list provided by the financing party; if the comparison result is consistent, the conclusion that the goods listed in the warehouse bill really exist can be obtained, and funds are provided for financing parties; if the comparison is inconsistent, a conclusion may be drawn that the goods listed in the manifest may not be present and the financer may be denied funds.
In reality, many illegal financers may build false storage places according to information listed in a warehouse list and shoot false image videos to be provided to the investor so that the investor suffers deception and provides funds in order to cheat the investor. Therefore, a method for acquiring image data and verifying authenticity is needed at present, so that a data user can verify authenticity of the image data provided by a data provider, and fraud is avoided.
In the related art, in order to verify the authenticity of image data, a data provider may generally add a digital watermark to the image data; and notifies the content of the digital watermark to the data user. When a data user receives the image data added with the digital watermark, the digital watermark carried by the image data can be analyzed, the analyzed digital watermark is compared with the digital watermark provided by a data provider, if the analyzed digital watermark is consistent with the digital watermark provided by the data provider, the image data can be determined to be not tampered, and the authenticity of the image data is determined.
For example, after the data provider collects the original image data, a digital watermark (e.g., a digital signature) may be added to the original image data through a specific algorithm (e.g., a spatial domain algorithm or a frequency domain algorithm) to obtain the image data to be verified. After receiving the image data to be verified, a data user can analyze the image data to be verified to obtain digital watermark information carried by the image data to be verified, and the obtained digital watermark is compared with a digital watermark provided by a data provider; if the two are consistent, it can be determined that the image data is not tampered and is authentic.
However, in the above method, since the digital watermark is added after the image data is acquired, it is only possible to prove that the image data obtained after the digital watermark is added is not falsified and has authenticity by using the above method, and it is not possible to prove whether the image data before the digital watermark is added is falsified and whether the image data is acquired in an authentic image acquisition environment.
For example, when a data provider adds a digital watermark to image data collected in a false collection environment and provides the image data to a data consumer for verification, the data consumer can only confirm that the image data added with the digital watermark is not tampered, but cannot recognize that the image data is collected in the false collection environment.
Based on the above, the application provides an authenticity verification method for image data, which is applied to an image data provider.
Specifically, the optical signal may be collected from the image collection environment in response to an image collection instruction; wherein the optical signal comprises an optical signal emitted by a light generating device deployed in the image acquisition environment; the light signal sent by the light generating equipment carries environment information corresponding to the image acquisition environment;
and generating image data corresponding to the image acquisition environment based on the acquired optical signal, so that a user of the image data analyzes the optical signal transmitted by the light generation equipment from the image data, and matching environment information carried by the optical signal with information provided by a data provider of the image data to finish authenticity verification.
The application also provides an authenticity verification method of the image data, which is applied to an image data user. The method ensures that a data user can analyze environmental information corresponding to an image acquisition environment when the authenticity of the image data is verified, and matches the environmental information with information provided by a data provider to finish the authenticity verification of the image data, and on one hand, whether the image data is tampered from the beginning of an acquisition process to the current moment or not and whether the image data has authenticity or not is determined; on the other hand, it is determined whether the image data is acquired in a real image acquisition environment.
Specifically, analyzing the acquired image data to obtain an optical signal; wherein the optical signal includes environmental information corresponding to the image acquisition environment;
and matching the environmental information carried by the optical signal with the information provided by the data provider of the image data to finish authenticity verification.
The following description will be given with reference to specific examples.
Example one
Referring to fig. 1, fig. 1 is a flowchart illustrating an authenticity verification method for image data according to the present application. As shown in fig. 1, the method may be applied to a data acquisition device, and specifically includes:
s101, collecting optical signals from an image collection environment in response to an image collection instruction; wherein the optical signal comprises an optical signal emitted by a light generating device deployed in the image acquisition environment; the light signal sent by the light generating equipment carries environment information corresponding to the image acquisition environment;
and S102, generating image data corresponding to the image acquisition environment based on the acquired optical signal, so that a user of the image data analyzes the optical signal transmitted by the light generating device from the image data, and matching environment information carried by the optical signal with information provided by a data provider of the image data to complete authenticity verification.
The image data may be video data or pictures collected by a data provider through a collection device. The collecting device may be a camera, a monitor or a mobile terminal having a function of taking a picture or taking a picture (which can collect the optical signals).
The environment information corresponding to the image acquisition environment may refer to a spatial environment and a temporal environment corresponding to the image data acquired; wherein the spatial environment is a storage environment in which an object related to the image data is located; the time environment is time stamp data corresponding to the time when the light generating device transmits the light signal when the image data is collected. The environment information may be matched with information provided by a data provider of the image data to perform authenticity verification.
In practical applications, the environment information may include address information when the image data is collected and timestamp data corresponding to when the light generating device transmits the light signal when the image data is collected.
In the above situation, when it is determined whether the image data is captured in a real image capturing environment, the environmental information carried by the optical signal may be matched with information provided by a data provider of the image data; if the environment information carried by the optical signal is correspondingly consistent with the information provided by the data provider of the image data, the authenticity of the image data can be confirmed; otherwise, determining that the image data is not real.
For example, in a scenario where financing is conducted using a manifest, a data provider may provide a data consumer with a storage location for a store, and time period information for the store to be stored at that location. When a data user acquires image data provided by a data provider, an optical signal carried by the image data can be analyzed, and timestamp information carried by an optical signal sent by the light generating device when the image data is acquired from the optical signal; after the timestamp information is acquired, the data user can judge whether the time period information indicated by the timestamp is matched with a time end provided by the data provider; if the image data is matched with the data provider, judging whether the address information carried by the image data is matched with the address information provided by the data provider; if the agreement also exists, it can be concluded that the storage items involved in the image data are indeed stored at the above-mentioned time provided by the data provider at the storage place provided by the data provider.
The optical generating device is specifically a device that can encode information into an optical signal. In practical applications, the light generating device may be deployed independently in an image acquisition environment. For example, a light generating device may be placed at a storage location where the target object is located, and when the light generating device encodes the information, the location where the light generating device is located (in this case, the storage location where the target object is located) may be used as address information, and timestamp information when the image data is acquired may be used as time information to be encoded into the light signal emitted by the light generating device for the acquisition device to acquire.
In another application, the light generating device may be integrated as a module in the collecting device. For example, if the collecting device is a mobile phone terminal, the light generating device may be an infrared emitting module in the mobile phone terminal, when the data provider collects image data, the infrared emitting module may use a location where the infrared emitting module is located as address information, and when the image data is collected, timestamp information carried by an optical signal sent by the light generating device is encoded into the optical signal sent by the device as time information for the mobile phone terminal to collect.
The light generating device can also encrypt the light signal in consideration of the safety of the coded information in the process of coding the light signal. In practical applications, the light generating device may encrypt the encoded light signal by using a preset encryption algorithm. After the encrypted optical signal is obtained, the data user can decrypt the optical signal through a preset decryption algorithm to obtain the information carried by the optical signal.
For example, the preset encryption and decryption algorithm may refer to an algorithm for performing encryption and decryption using a public and private key, the light generating device may be an invisible light generating device (e.g., an infrared light generating device), and the device is pre-assigned with a public and private key pair. When collecting image data, the invisible light generating device may encrypt the encoded invisible light by using a public key in the public and private key pair, and then encode the encrypted invisible light into invisible light (e.g., infrared light). When the encrypted environment information is obtained by analyzing the image data, the data user can decrypt the environment through the private key in the public and private key pair, so as to obtain the unencrypted environment information carried in the invisible light.
In the process of encoding the optical signal, the light generation device can encode information into the optical signal with a specific frequency by considering the influence of ambient natural light on the optical signal. In practical applications, the light generating device may encode the environment information corresponding to the image data into a frequency band with a minimum influence of natural light, so as to minimize the influence of natural light. For example, assuming that the light generating device is an invisible light generating device (e.g., an infrared light generating device), the device may emit invisible light having a frequency significantly different from that of natural light, so that the capturing device may minimize the influence of the natural light when capturing the invisible light. It will be appreciated by those skilled in the art that the use of optical signals at specific frequencies may also increase the security of the optical signal transmission. For example, when analyzing the acquired image data, if the data analyzer does not know the frequency of the optical signal, the optical signal cannot be analyzed from the image data, that is, the information carried by the optical signal cannot be obtained, so that the security of optical signal transmission is improved.
The optical signal may specifically be any kind of optical signal or any combination of kinds of optical signals that carry data environment information. In practical applications, the optical signal may be various visible light or invisible light, etc. For example, the light generating device may be an infrared light generating device, and the device may encode environmental information into infrared light and emit the infrared light outward for collection by a collection device. It will be appreciated by those skilled in the art that the above-mentioned invisible light may be any one or a combination of several of the following: infrared rays; ultraviolet rays; a far infrared ray; radio waves; the microwave is not limited herein.
By the method, when the image data is collected, the environment information corresponding to the image collection environment can be stored in the image data by collecting the optical signal at the same time, so that the authenticity of the image data can be verified.
After the image data is acquired by the method illustrated in fig. 1, the data user can verify the authenticity of the image data by the following method. Referring to fig. 2, fig. 2 is a flowchart illustrating a method for verifying authenticity of image data according to the present application. As shown in fig. 2, the method includes:
s201, analyzing the acquired image data to obtain an optical signal; wherein the optical signal includes environmental information corresponding to the image acquisition environment;
and S202, matching the environment information carried by the optical signal with the information provided by the data provider of the image data to finish authenticity verification.
The authenticity of the image data can be understood from two aspects, namely, the first aspect means that the image data is not tampered and is real and reliable; in a second aspect, the image data is acquired in a real image acquisition environment.
The optical signal may be an invisible light signal or a visible light signal, and the following description will take the optical signal as an example of an invisible light signal.
When analyzing the collected image data, the image data may be filtered to obtain the light of the invisible light part, and the light is converted into a light intensity curve; and carrying out spectrum analysis on the light intensity curve to obtain the invisible light signal.
In practical application, the image data may be filtered according to a preset filtering rule to obtain light of the invisible light part, and the obtained light is converted into a light intensity curve; then, the invisible light signal is obtained by performing spectrum analysis on the light intensity curve and removing noise in the light intensity curve.
For example, the filtering rule may be kalman filtering, and the spectral analysis means may be wavelet transformation. Under the condition, after the acquired image data is acquired, filtering light data of the invisible light part in the image data through Kalman filtering, and converting the filtered light data into a light intensity curve with the abscissa as time and the ordinate as light intensity; after being converted into a light intensity curve, the curve can be subjected to wavelet transformation and noise in the curve is removed, so that an invisible light signal is obtained.
After obtaining the invisible light signal, the data user may analyze the invisible light signal to obtain environment information carried by invisible light, and then may match the environment information with information provided by the data provider of the image data to complete authenticity verification.
In practical applications, assuming that the environment information may include address information when the image data is collected and timestamp data corresponding to when the light generating device transmits a light signal when the image data is collected, when the authenticity of the image data is determined based on the environment information included in the light signal, if the environment information is the same as information provided by the image data provider, on one hand, it may be determined whether the image data is collected in an actual image collection environment; on the other hand, it can be confirmed that the image data is not falsified from the captured time to the current time, and is real.
For example, in a scenario where financing is conducted using a manifest, a data provider may provide a data consumer with a storage location for a store, and time period information for the store to be stored at that location. When a data user acquires image data provided by a data provider, an optical signal carried by the image data can be analyzed, and timestamp information carried by an optical signal sent by the light generating device when the image data is acquired from the optical signal; after the timestamp information is acquired, the data user can judge whether the time period information indicated by the timestamp is matched with a time end provided by the data provider; if the image data is matched with the data provider, judging whether the address information carried by the image data is matched with the address information provided by the data provider; if the agreement also exists, it can be concluded that the storage items involved in the image data are indeed stored at the above-mentioned time provided by the data provider at the storage place provided by the data provider.
When analyzing the invisible light, if the environment information carried by the invisible light signal is an optical signal encrypted by a public key, in this step, the private key corresponding to the public key (usually, a private key pre-assigned to the light generating device) may be used to decrypt the environment information, so as to obtain corresponding unencrypted environment information.
According to the method, when the authenticity of the image data is verified, because the environment information corresponding to the image acquisition environment can be obtained by analyzing the optical signal in the image data, and then the environment information carried by the optical signal is matched with the information provided by the data provider of the image data to complete the authenticity verification, on one hand, the authenticity of the image data which is not tampered from the beginning of the acquisition process to the current moment can be determined; on the other hand, it can be determined that the image data is acquired in a real image acquisition environment.
Example two
In this embodiment, the light generating device may be integrated as a module in the collecting device. In the above situation, when verifying whether the image data is acquired by the acquisition device agreed by the data provider and the data user, the data user may determine whether the related information of the light generation module carried in the image data is the same as the related information of the light generation module in the agreed acquisition device, and if the related information is the same as the related information of the light generation module in the agreed acquisition device, may determine that the image data is acquired by the agreed acquisition device.
In one implementation, when acquiring image data, the light generating device (module) may encode ID information of the light generating device into an optical signal for acquisition by an acquisition device;
when verifying whether the image data is collected by the appointed collection equipment, the equipment ID information carried by the analyzed optical signal can be compared with the ID information of the light generation module carried by the appointed collection equipment; if the two are consistent, it can be determined that the image data is acquired by the appointed acquisition device.
In another implementation method, in a scenario where an optical signal is encrypted by using a public and private key, when image data is collected, the optical generator (module) may encode private key information of the optical generator into the optical signal for collection by a collection device;
when verifying whether the image data is collected by the appointed collection equipment, comparing the private key information carried by the analyzed optical signal with the private key information of the light generation module carried by the appointed collection equipment; if the two are consistent, it can be determined that the image data is acquired by the appointed acquisition device.
Here, it should be noted that the two implementation methods shown in the second embodiment may be used in combination in one scheme or in two schemes separately, and are not limited herein.
EXAMPLE III
When the above-mentioned image data is video data, since the video data is generally composed of several frames of images, time stamp information at the time when each frame of image is captured can be recorded in the corresponding optical signal.
In the above situation, when determining the authenticity of the image data based on the environment information included in the optical signal, the optical signal carried by the image data may be analyzed, and the timestamp information corresponding to the first frame image and the last frame image of the image data may be obtained from the optical signal; after the timestamp information is acquired, judging whether a time period formed by the timestamp is matched with a time period provided by a data provider or not; if the image data is matched with the data provider, judging whether the address information carried by the image data is matched with the address information provided by the data provider; if the image data are matched with the image data, on one hand, whether the image data are acquired in a real image acquisition environment can be confirmed; on the other hand, it can be confirmed that the image data is not falsified from the captured time to the current time, and is real.
In this embodiment, when verifying whether an individual frame image of the image data is modified or deleted, the optical signal carried by each frame image included in the video data may be analyzed to obtain timestamp data corresponding to each frame image; then, determining whether the corresponding time stamp data of each frame of image is continuous and uninterrupted; if yes, determining that the individual frame image of the image data is not modified or deleted; otherwise, it is determined that the individual frame image of the image data has been modified or deleted.
Example four
In this embodiment, other encoding methods may be used in addition to encoding the environment information by the encoding method described in the above embodiment. For example, the coding may be performed using a vibration signal. In the above situation, a vibration motor may be deployed at the acquisition location of the image data, and a vibration signal receiving module (e.g., an accelerometer) may be deployed on the acquisition device, and when the image data is acquired, the environment information acquired corresponding to the image acquisition environment may be encoded into a vibration signal according to a certain encoding rule, and the vibration signal may be received by the vibration signal receiving module in the acquisition device, and then the received vibration signal may be added to the image signal as a basis for verifying the authenticity of the image data.
In this embodiment, several encoding methods may be used for encoding. In practical application, a light intensity sensing module can be deployed in an image acquisition environment, and when the light intensity sensing module determines that the light intensity of the current ambient light is lower than a preset threshold value, an optical signal coding mode can be started to code the environmental information; if the light intensity sensing module determines that the light intensity of the current ambient light is greater than or equal to the preset threshold, the ambient information can be encoded in a vibration signal encoding mode.
By adopting the mode, adverse effects on the light signal coding due to too strong intensity of the environment light can be effectively avoided, and the coding effect on the environment information is improved.
The present application is described below in conjunction with a scenario in which financing is performed using a manifest.
EXAMPLE five
Referring to fig. 3, fig. 3 is a view of an image data acquisition scene shown in the present application. As shown in fig. 3, a warehouse environment is provided in which a warehouse (target object) is placed, at least one infrared light generating device and a video data collecting device are disposed.
Wherein the warehouse goods are the target objects listed on the warehouse bill provided by the financing party; the storage environment is a storage place listed on the bill of the warehouse.
Above-mentioned infrared light generating equipment can be when the open mode, acquires the timestamp information in real time to the timestamp information that will acquire, and the storage place information code of storage environment in the infrared light that self sent, and above-mentioned infrared light generating equipment can also use the public and private key of pre-allocation to encrypt the infrared light signal of launching.
The acquisition equipment can simultaneously acquire video data and infrared light signals sent by the infrared light generation equipment, and can also fuse the infrared light signals in the video data.
Referring to fig. 4, fig. 4 is a flow chart of financing from a financing party to a investor by using a warehouse slip. The financer, shown in FIG. 4, typically the owner of the invoice, may provide the invoice to the sponsor for funds; the sponsor, typically a financial loan institution, shown in figure 4 may deliver funds to the financer based on a policy provided by the financer.
When the financing party needs to carry out financing to the investor, a financing request can be initiated and the warehouse bill is provided to the investor. After the investor receives the financing request, the financing party may be required to provide a certification document (not shown in fig. 4) that can certify the authenticity of the information of the warehouse slip. The financer, upon receiving the request to provide the documentation, may provide the sponsor with video data that the stores listed in the manifest are indeed stored at the storage locations listed in the manifest.
When the financer collects the video data, the collection device (e.g., a field monitoring device or a mobile phone terminal, etc.) shown in fig. 3 may be used to record the video of the warehouse and the infrared light signal in the warehousing environment. After the video data is recorded, the financer can provide the video to the investor. It should be noted that, in the process of providing the video, in order to ensure the safety and reliability of the video data and prevent the video data from being tampered, the financer may upload the video data to the block chain. Under the condition, when the investor acquires the video, the investor can acquire the video data from the block chain, so that the video data is prevented from being tampered, and the safety and the reliability of the video data are ensured.
After the investor acquires the video data provided by the financing party, the video data can be analyzed, and the infrared light signal carried in the video data is acquired. After the infrared light signal is obtained, the investor can decrypt the infrared light signal through a private key corresponding to the invisible light equipment to obtain address information and time information carried by the infrared light signal. After the address information and the time information are obtained, the information can be compared with the related information listed in the warehouse bill, if the information is consistent with the related information listed in the warehouse bill, the investor can draw a conclusion that the warehouse bill information is real, and fund is released to the financing party.
Under the above situation, if the address information and the time information carried in the video data provided by the financing party are inconsistent with the listed warehouse bill, it indicates that the warehouse bill provided by the financing party is not authentic, and the investor can accordingly provide no fund for the financing party.
By the method, the infrared light signals are coded with the storage place information of the current storage environment and the timestamp information during video recording, and if the financing party tampers the videos or creates false storage environment counterfeiting, the video data provided by the financing party cannot carry serial information consistent with the information listed in the warehouse bill, so that the financing party cannot counterfeit.
The present application also provides an authenticity verifying apparatus for image data, please refer to fig. 5, and fig. 5 is a structural diagram of an authenticity verifying apparatus for image data shown in the present application. As shown, the apparatus 500 includes:
an acquisition module 510, responsive to an image acquisition instruction, for acquiring an optical signal from an image acquisition environment; wherein the optical signal comprises an optical signal emitted by a light generating device deployed in the image acquisition environment; the light signal sent by the light generating equipment carries environment information corresponding to the image acquisition environment;
the generating module 520 generates image data corresponding to the image capturing environment based on the captured optical signal, so that a user of the image data can analyze the optical signal transmitted by the light generating device from the image data, and match the environment information carried by the optical signal with the information provided by the data provider of the image data to complete authenticity verification.
In an embodiment, the apparatus 500 further includes:
the analysis module is used for analyzing the optical signal sent by the optical generating equipment from the generated image data;
and the matching module is used for matching the environmental information carried by the optical signal with the information provided by the data provider of the image data so as to finish authenticity verification.
In an embodiment, the light generating device includes a light generating hardware built in the image capturing device; or, a light generating device deployed in the image capturing environment and used in cooperation with the image capturing device.
In an embodiment, the optical signal is an invisible light signal; the light generating device is an invisible light generating device.
In an embodiment, the environment information corresponding to the image capturing environment includes address information corresponding to the image capturing environment;
the matching of the environmental information carried by the optical signal and the information provided by the data provider of the image data to complete authenticity verification includes:
analyzing the invisible light signal to obtain address information when the image data is collected;
determining whether the address information is the same as address information provided by a data provider of the image data;
if yes, the field data is determined to be real data.
In an embodiment shown in the foregoing description, the optical signal further carries timestamp data corresponding to a time when the optical signal is sent by the optical generation device;
the matching of the environmental information carried by the optical signal and the information provided by the data provider of the image data to complete the authenticity verification further includes:
analyzing the invisible light signal to obtain the timestamp data;
determining whether a time period indicated by the time stamp data is the same as a time period provided by a data provider of the image data;
if yes, the field data is determined to be real data.
In an illustrated embodiment, the light generating device performs encryption processing on the environment information carried by the emitted light signal in advance based on a public key corresponding to a private key held by the device;
the analyzing the invisible light signal includes:
and decrypting the environment information carried by the invisible light signal through a private key held by the invisible light generating equipment, and restoring the environment information.
In an embodiment, the invisible light includes any one or a combination of several of the following:
infrared rays; ultraviolet rays; a far infrared ray; radio waves; and (4) microwave.
In an embodiment, the image data includes:
video data or picture data.
In an embodiment, the apparatus 500 further includes:
determining whether the light intensity of the image acquisition environment is lower than a preset intensity threshold value;
and if so, instructing the invisible light generating equipment to send out the invisible light signal.
In an embodiment, the image data is video data; the apparatus 500 further comprises:
analyzing an optical signal carried by each frame of image included in the video data to obtain timestamp data corresponding to each frame of image;
determining whether the timestamp data corresponding to each frame of image is continuous and uninterrupted;
if yes, determining that the individual frame image of the image data is not modified or deleted; otherwise, it is determined that the individual frame image of the image data has been modified or deleted.
The application also provides an authenticity verification device of the image data. Referring to fig. 6, fig. 6 is a structural diagram of an authenticity verifying apparatus for image data according to the present application.
As shown in fig. 6, the apparatus 600 includes,
the analysis module 610 analyzes the acquired image data to obtain an optical signal; wherein the optical signal includes environmental information corresponding to the image acquisition environment;
and the matching module 620 matches the environmental information carried by the optical signal with information provided by a data provider of the image data to complete authenticity verification.
In an embodiment, the apparatus 600 further includes:
the acquisition module is used for acquiring optical signals sent by light generation equipment deployed in an image acquisition environment corresponding to image data when the image data is acquired; wherein the optical signal includes environmental information corresponding to the image capturing environment.
In an embodiment, the light generating device includes a light generating hardware built in the image capturing device; or, a light generating device deployed in the image capturing environment and used in cooperation with the image capturing device
In an embodiment, the optical signal is an invisible light signal; the light generating device is an invisible light generating device.
In an embodiment, the environment information corresponding to the image capturing environment includes address information corresponding to the image capturing environment;
the matching of the environmental information carried by the optical signal and the information provided by the data provider of the image data to complete authenticity verification includes:
analyzing the invisible light signal to obtain address information when the image data is collected;
determining whether the address information is the same as address information provided by a data provider of the image data;
if yes, the field data is determined to be real data.
In an embodiment shown in the foregoing description, the optical signal further carries timestamp data corresponding to a time when the optical signal is sent by the optical generation device;
the matching of the environmental information carried by the optical signal and the information provided by the data provider of the image data to complete the authenticity verification further includes:
analyzing the invisible light signal to obtain the timestamp data;
determining whether a time period indicated by the time stamp data is the same as a time period provided by a data provider of the image data;
if yes, the field data is determined to be real data.
In an illustrated embodiment, the light generating device performs encryption processing on the environment information carried by the emitted light signal in advance based on a public key corresponding to a private key held by the device;
the analyzing the invisible light signal includes:
and decrypting the environment information carried by the invisible light signal through a private key held by the invisible light generating equipment, and restoring the environment information.
In an embodiment, the invisible light includes any one or a combination of several of the following:
infrared rays; ultraviolet rays; a far infrared ray; radio waves; and (4) microwave.
In an embodiment, the image data includes:
video data or picture data.
In an embodiment, the apparatus 600 further includes:
determining whether the light intensity of the image acquisition environment is lower than a preset intensity threshold value;
and if so, instructing the invisible light generating equipment to send out the invisible light signal.
In an embodiment, the image data is video data; the apparatus 600 further comprises:
analyzing an optical signal carried by each frame of image included in the video data to obtain timestamp data corresponding to each frame of image;
determining whether the timestamp data corresponding to each frame of image is continuous and uninterrupted;
if yes, determining that the individual frame image of the image data is not modified or deleted; otherwise, it is determined that the individual frame image of the image data has been modified or deleted.
The embodiment of the image data acquisition device shown in the application can be applied to authenticity verification equipment of image data. The device embodiments may be implemented by software, or by hardware, or by a combination of hardware and software. Taking a software implementation as an example, as a logical device, the device is formed by reading, by a processor of the electronic device where the device is located, a corresponding computer program instruction in the nonvolatile memory into the memory for operation. From a hardware aspect, as shown in fig. 7, the hardware structure diagram of the image data authenticity verification apparatus shown in this application is a diagram, except for the processor, the memory, the network interface, and the nonvolatile memory shown in fig. 7, the electronic device where the apparatus is located in the embodiment may also include other hardware according to an actual function of the electronic device, which is not described again.
Referring to fig. 7, an authenticity verifying apparatus for image data, the apparatus comprising: a processor;
a memory for storing processor-executable instructions;
wherein, the processor executes the executable instructions to realize the method as shown in any one of the previous embodiments.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It will be understood that the present application is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the application is limited only by the appended claims.
The above description is only exemplary of the present application and should not be taken as limiting the present application, and any modifications, equivalents, improvements, etc. made within the spirit and principle of the present application should be included in the scope of the present application.

Claims (25)

1. A method of authenticity verification of image data, comprising:
under the condition that the light intensity of an image acquisition environment does not reach a preset threshold value, responding to an image acquisition instruction, and acquiring an optical signal from the image acquisition environment; wherein the optical signal comprises an optical signal emitted by a light generating device deployed in the image acquisition environment; the optical signal sent by the optical generating equipment carries environmental information corresponding to the image acquisition environment;
generating first image data corresponding to the image acquisition environment based on the acquired optical signal, so that a user of the first image data analyzes the optical signal sent by the light generation device from the first image data, and matching environment information carried by the optical signal with information provided by a data provider of the first image data to complete authenticity verification;
collecting a vibration signal from the image collection environment under the condition that the light intensity reaches the preset threshold value; the vibration signal comprises a vibration signal emitted by vibration equipment deployed in the image acquisition environment; the vibration signal carries the environment information;
and generating second image data based on the acquired vibration signals so that the user completes the authenticity verification based on the vibration signals included in the second image data.
2. The method of claim 1, further comprising:
analyzing the optical signal emitted by the light generating device from the generated image data;
and matching the environmental information carried by the optical signal with the information provided by the data provider of the image data to finish authenticity verification.
3. The method of claim 1, the light generating device comprising light generating hardware built into the image acquisition device; or, a light generating device deployed in the image capturing environment and used in cooperation with the image capturing device.
4. The method of claim 1, the optical signal being an invisible optical signal; the light generating device is an invisible light generating device.
5. The method of claim 4, the context information corresponding to the image acquisition context comprising address information corresponding to the image acquisition context;
the matching of the environmental information carried by the optical signal and the information provided by the data provider of the image data to complete authenticity verification includes:
analyzing the invisible light signal to obtain address information when the image data is collected;
determining whether the address information is the same as address information provided by a data provider of the image data;
and if so, determining the image data as real data acquired by a real environment.
6. The method of claim 5, wherein the optical signal further carries timestamp data corresponding to a time when the optical signal is sent by the optical generation device;
the matching of the environmental information carried by the optical signal and the information provided by the data provider of the image data to complete the authenticity verification further comprises:
analyzing the invisible light signal to obtain the timestamp data;
determining whether a time period indicated by the time stamp data is the same as a time period provided by a data provider of the image data;
and if so, determining the image data as real data acquired by a real environment.
7. The method according to claim 6, wherein the light generating device encrypts the environmental information carried by the emitted light signal in advance based on a public key corresponding to a private key held by the device;
the analyzing the invisible light signal includes:
and decrypting the environmental information carried by the invisible light signal through a private key held by the invisible light generating equipment, and restoring the environmental information.
8. The method of claim 4, the non-visible light comprising any one or combination of several of:
infrared rays; ultraviolet rays; a far infrared ray; radio waves; and (4) microwave.
9. The method of claim 1, the image data comprising:
video data or picture data.
10. The method of claim 4, further comprising:
determining whether the light intensity of the image acquisition environment is lower than a preset intensity threshold;
and if so, instructing the invisible light generation device to emit the invisible light signal.
11. The method of claim 6, the image data being video data; the method further comprises the following steps:
analyzing an optical signal carried by each frame of image included in the video data to obtain timestamp data corresponding to each frame of image;
determining whether the timestamp data corresponding to each frame of image is continuous and uninterrupted;
if so, determining that an individual frame image of the image data is not modified or truncated; otherwise, it is determined that the individual frame image of the image data has been modified or truncated.
12. A method of authenticity verification of image data, comprising:
analyzing the collected first image data to obtain an optical signal; the optical signal is sent out by light generating equipment deployed in an image acquisition environment under the condition that the light intensity of the image acquisition environment does not reach a preset threshold value; the optical signal includes environmental information corresponding to the image acquisition environment;
matching the environmental information carried by the optical signal with information provided by a data provider of the first image data to complete authenticity verification;
analyzing the collected second image data to obtain a vibration signal; the vibration signal is sent out by vibration equipment deployed in an image acquisition environment under the condition that the light intensity reaches the preset threshold value; the vibration signal comprises environmental information corresponding to the image acquisition environment;
and matching the environmental information carried by the vibration signal with the information provided by the data provider of the second image data to finish authenticity verification.
13. The method of claim 12, further comprising:
when image data are collected, simultaneously collecting optical signals sent by optical generation equipment deployed in an image collection environment corresponding to the image data; wherein the optical signal includes environmental information corresponding to the image acquisition environment.
14. The method of claim 13, the light generating device comprising light generating hardware built into the image acquisition device; or, a light generating device deployed in the image capturing environment and used in cooperation with the image capturing device.
15. The method of claim 12, the optical signal being an invisible optical signal; the light generating device is an invisible light generating device.
16. The method of claim 15, the context information corresponding to the image acquisition context comprising address information corresponding to the image acquisition context;
the matching of the environmental information carried by the optical signal and the information provided by the data provider of the image data to complete authenticity verification includes:
analyzing the invisible light signal to obtain address information when the image data is collected;
determining whether the address information is the same as address information provided by a data provider of the image data;
and if so, determining the image data as real data acquired by a real environment.
17. The method of claim 16, wherein the optical signal further carries timestamp data corresponding to a time when the optical signal is transmitted by the optical generation device;
the matching of the environmental information carried by the optical signal and the information provided by the data provider of the image data to complete the authenticity verification further comprises:
analyzing the invisible light signal to obtain the timestamp data;
determining whether a time period indicated by the time stamp data is the same as a time period provided by a data provider of the image data;
and if so, determining the image data as real data acquired by a real environment.
18. The method according to claim 17, wherein the light generating device encrypts the environmental information carried by the emitted light signal in advance based on a public key corresponding to a private key held by the device;
the analyzing the invisible light signal includes:
and decrypting the environmental information carried by the invisible light signal through a private key held by the invisible light generating equipment, and restoring the environmental information.
19. The method of claim 15, the non-visible light comprising any one or combination of several of:
infrared rays; ultraviolet rays; a far infrared ray; radio waves; and (4) microwave.
20. The method of claim 12, the image data comprising:
video data or picture data.
21. The method of claim 15, further comprising:
determining whether the light intensity of the image acquisition environment is lower than a preset intensity threshold;
and if so, instructing the invisible light generation device to emit the invisible light signal.
22. The method of claim 18, the image data being video data; the method further comprises the following steps:
analyzing an optical signal carried by each frame of image included in the video data to obtain timestamp data corresponding to each frame of image;
determining whether the timestamp data corresponding to each frame of image is continuous and uninterrupted;
if so, determining that an individual frame image of the image data is not modified or truncated; otherwise, it is determined that the individual frame image of the image data has been modified or truncated.
23. An authenticity verifying apparatus of image data, comprising:
the acquisition module is used for responding to an image acquisition instruction and acquiring an optical signal from the image acquisition environment under the condition that the light intensity of the image acquisition environment does not reach a preset threshold value; wherein the optical signal comprises an optical signal emitted by a light generating device deployed in the image acquisition environment; the optical signal sent by the optical generating equipment carries environmental information corresponding to the image acquisition environment;
the generating module generates first image data corresponding to the image acquisition environment based on the acquired optical signal, so that a user of the first image data analyzes the optical signal transmitted by the light generating device from the first image data, and environmental information carried by the optical signal is matched with information provided by a data provider of the first image data to complete authenticity verification;
the acquisition module acquires a vibration signal from the image acquisition environment under the condition that the light intensity reaches the preset threshold value; the vibration signal comprises a vibration signal emitted by vibration equipment deployed in the image acquisition environment; the vibration signal carries the environment information;
the generating module generates second image data based on the collected vibration signals, so that the user completes the authenticity verification based on the vibration signals included by the second image data.
24. An authenticity verifying apparatus of image data, comprising:
the analysis module is used for analyzing the acquired first image data to obtain an optical signal; the optical signal is sent out by light generating equipment deployed in an image acquisition environment under the condition that the light intensity of the image acquisition environment does not reach a preset threshold value; the optical signal includes environmental information corresponding to the image acquisition environment;
the matching module is used for matching the environmental information carried by the optical signal with the information provided by the data provider of the image data so as to finish authenticity verification;
the analysis module analyzes the acquired second image data to obtain a vibration signal; the vibration signal is sent out by vibration equipment deployed in an image acquisition environment under the condition that the light intensity reaches the preset threshold value; the vibration signal comprises environmental information corresponding to the image acquisition environment;
and the matching module is used for matching the environmental information carried by the vibration signal with the information provided by the data provider of the second image data so as to finish authenticity verification.
25. An authenticity verifying apparatus of image data, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor implements the method of any one of claims 1-22 by executing the executable instructions.
CN202010121303.4A 2020-02-26 2020-02-26 Authenticity verification method, device and equipment for image data Active CN111310136B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN202010121303.4A CN111310136B (en) 2020-02-26 2020-02-26 Authenticity verification method, device and equipment for image data
CN202111296197.4A CN114003874A (en) 2020-02-26 2020-02-26 Authenticity verification method, device and equipment for image data
PCT/CN2020/138023 WO2021169530A1 (en) 2020-02-26 2020-12-21 Method, apparatus and device for verifying authenticity of image data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010121303.4A CN111310136B (en) 2020-02-26 2020-02-26 Authenticity verification method, device and equipment for image data

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202111296197.4A Division CN114003874A (en) 2020-02-26 2020-02-26 Authenticity verification method, device and equipment for image data

Publications (2)

Publication Number Publication Date
CN111310136A CN111310136A (en) 2020-06-19
CN111310136B true CN111310136B (en) 2021-09-14

Family

ID=71156777

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202010121303.4A Active CN111310136B (en) 2020-02-26 2020-02-26 Authenticity verification method, device and equipment for image data
CN202111296197.4A Pending CN114003874A (en) 2020-02-26 2020-02-26 Authenticity verification method, device and equipment for image data

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202111296197.4A Pending CN114003874A (en) 2020-02-26 2020-02-26 Authenticity verification method, device and equipment for image data

Country Status (2)

Country Link
CN (2) CN111310136B (en)
WO (1) WO2021169530A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111310136B (en) * 2020-02-26 2021-09-14 支付宝(杭州)信息技术有限公司 Authenticity verification method, device and equipment for image data
US11670293B2 (en) * 2020-09-02 2023-06-06 Google Llc Arbitrating between multiple potentially-responsive electronic devices
CN112822219A (en) * 2021-03-01 2021-05-18 浙江大华技术股份有限公司 Multimedia data verification method, device, system and storage medium
CN115708116A (en) * 2021-08-10 2023-02-21 瑞庭网络技术(上海)有限公司 Video verification method, device and system, electronic equipment and storage medium
CN113741596B (en) * 2021-08-25 2022-10-04 中国铁路设计集团有限公司 Operation and maintenance method and system for railway power supply and distribution
CN115936706B (en) * 2023-03-10 2023-07-25 天聚地合(苏州)科技股份有限公司 Data element auxiliary transaction method, device and system based on blockchain
CN117495551B (en) * 2024-01-03 2024-03-12 蓝色火焰科技成都有限公司 Logistics financial product analysis method, device, system and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103024437A (en) * 2012-12-28 2013-04-03 河南辉煌科技股份有限公司 Video data integrity detection method
CN106471795A (en) * 2014-05-12 2017-03-01 飞利浦灯具控股公司 Checking using the image of the timestamp capture always being decoded from the illumination of modulated light source
CN110022355A (en) * 2019-03-04 2019-07-16 阿里巴巴集团控股有限公司 The storage method of environmental data, verification method and apparatus under special scenes
CN110661805A (en) * 2019-09-29 2020-01-07 支付宝(杭州)信息技术有限公司 Data processing method, device, storage medium and client

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4352260B2 (en) * 2005-01-17 2009-10-28 ソニー株式会社 Imaging device, method for recording captured image data, captured image data processing device, and captured image data processing method
CN103916435B (en) * 2013-01-04 2018-02-02 阿里巴巴集团控股有限公司 Judge the method and apparatus of information authenticity
US10002478B2 (en) * 2014-12-12 2018-06-19 Qualcomm Incorporated Identification and authentication in a shared acoustic space
CN105119883B (en) * 2015-07-08 2019-04-12 Oppo广东移动通信有限公司 A kind of verification method and server based on vibration signal
CN106529512B (en) * 2016-12-15 2019-09-10 北京旷视科技有限公司 Living body faces verification method and device
CN111310136B (en) * 2020-02-26 2021-09-14 支付宝(杭州)信息技术有限公司 Authenticity verification method, device and equipment for image data

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103024437A (en) * 2012-12-28 2013-04-03 河南辉煌科技股份有限公司 Video data integrity detection method
CN106471795A (en) * 2014-05-12 2017-03-01 飞利浦灯具控股公司 Checking using the image of the timestamp capture always being decoded from the illumination of modulated light source
CN110022355A (en) * 2019-03-04 2019-07-16 阿里巴巴集团控股有限公司 The storage method of environmental data, verification method and apparatus under special scenes
CN110661805A (en) * 2019-09-29 2020-01-07 支付宝(杭州)信息技术有限公司 Data processing method, device, storage medium and client

Also Published As

Publication number Publication date
CN114003874A (en) 2022-02-01
WO2021169530A1 (en) 2021-09-02
CN111310136A (en) 2020-06-19

Similar Documents

Publication Publication Date Title
CN111310136B (en) Authenticity verification method, device and equipment for image data
KR100407900B1 (en) Method and apparatus for securely transmitting and authenticating biometric data over a network
CN106656908B (en) Two-dimensional code processing method and device
CN101447005B (en) Method and system for utilizing GPS information to secure digital media
US20020056043A1 (en) Method and apparatus for securely transmitting and authenticating biometric data over a network
US20210287322A1 (en) Robust selective image, video, and audio content authentication
JP2017517783A (en) Method and apparatus for verifying usefulness of biometric image
CN110022355B (en) Storage method, verification method and equipment of environment data in specific scene
US20230074748A1 (en) Digital forensic image verification system
KR102213839B1 (en) Method for preventing video falsification and apparatus therefor
CN109145563A (en) A kind of auth method and device
KR20130114037A (en) Masking and recovering method of privacy region
US10891702B2 (en) Duplicate image evidence management system for verifying authenticity and integrity
CN111177748A (en) Fingerprint storage encryption method, device and system
US20220271930A1 (en) Cipher key generation apparatus and cipher key generation method
Anderson et al. Information hiding: An annotated bibliography
CN112307875A (en) Face verification method and face verification system
CN116756750A (en) Medical sensitive data acquisition desensitization method
KR101855905B1 (en) Video export processing server, video export web server and video export management system, and digital video integraty verification method for encrypted videos
KR101803963B1 (en) Image Recording Apparatus for Securing Admissibility of Evidence about Picked-up Image
KR20210084805A (en) Method for Restoring Distortion Video Based on Finger Print Recognition
CN115499196A (en) Scene forensics method, scene verification method, key transmitting device and server
CN111986166A (en) Validity identification method and system for multimedia evidence content
KR101822910B1 (en) Method for protection of video in Car Blackbox

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40031260

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant