CN111314742A - Video processing method and device and machine-readable storage medium - Google Patents

Video processing method and device and machine-readable storage medium Download PDF

Info

Publication number
CN111314742A
CN111314742A CN202010253747.3A CN202010253747A CN111314742A CN 111314742 A CN111314742 A CN 111314742A CN 202010253747 A CN202010253747 A CN 202010253747A CN 111314742 A CN111314742 A CN 111314742A
Authority
CN
China
Prior art keywords
transaction data
data
video
video data
original
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010253747.3A
Other languages
Chinese (zh)
Other versions
CN111314742B (en
Inventor
陈凯
王蕾
胡昱林
刘永松
周天外
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Shangkui Information Technology Co ltd
Shanghai Sunmi Technology Group Co Ltd
Original Assignee
Shanghai Shangkui Information Technology Co ltd
Shanghai Sunmi Technology Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Shangkui Information Technology Co ltd, Shanghai Sunmi Technology Group Co Ltd filed Critical Shanghai Shangkui Information Technology Co ltd
Priority to CN202010253747.3A priority Critical patent/CN111314742B/en
Publication of CN111314742A publication Critical patent/CN111314742A/en
Application granted granted Critical
Publication of CN111314742B publication Critical patent/CN111314742B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4405Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The embodiment of the application provides a video processing method, a video processing device and a machine-readable storage medium. The method comprises the following steps: acquiring first video data and original transaction data; encrypting the original transaction data to obtain encrypted transaction data; and embedding the encrypted transaction data and the original transaction data into the first video data to generate second video data, so that the encrypted transaction data and the original transaction data extracted from the second video data can be conveniently determined to determine whether the second video data is tampered.

Description

Video processing method and device and machine-readable storage medium
Technical Field
The embodiments of the present application relate to the field of information technology, and more particularly, to a video processing method, apparatus, and machine-readable storage medium.
Background
With the rapid development of new media and mobile internet, short video is developed into the most rapid application. Short video depends on time length, data flow is less, and use scenes are extremely diversified. For short videos in a transaction scene, a higher security level and an anti-counterfeiting verification means are required.
The current video stream encryption method mainly comprises the following steps:
1. full encryption (Naive Algorithm) encrypts the entire video stream using standard encryption methods such as DES, Data encryption standard. The video bit stream is treated the same as the traditional text data, and the special structure of the data stream after video compression is not utilized.
2. Selective encryption (Selective encryption), which is video encryption based on the source characteristics.
At present, no matter a total encryption scheme or a selective encryption scheme is adopted, the complexity of an encryption algorithm for a video is generally high, a receiving end also needs a corresponding decryption algorithm design, and the encryption algorithm generally aims at the content of the whole video stream, and once the encryption algorithm is decrypted, whether transaction data in the video stream is tampered or not cannot be judged. Even if the anti-counterfeiting is carried out by a watermarking mode, the watermarking anti-counterfeiting is usually formed by third-party software, so that the anti-counterfeiting is easy to imitate and falsifie. How to improve the security of video stream encryption becomes one of the problems to be solved.
Disclosure of Invention
The video processing method, the video processing device and the machine-readable storage medium can achieve tamper resistance of the transaction video and improve actual safety of the transaction video.
In one aspect, an embodiment of the present application provides a video processing method, where the method includes:
acquiring first video data and original transaction data;
encrypting the original transaction data to obtain encrypted transaction data;
and embedding the encrypted transaction data and the original transaction data into the first video data to generate second video data.
Wherein the encrypting the original transaction data to obtain encrypted transaction data comprises:
encrypting the original transaction data according to the encryption token to obtain encrypted transaction data;
correspondingly, the embedding the encrypted transaction data and the original transaction data into the first video data to generate second video data specifically includes:
and embedding the encrypted transaction data and the original transaction data into an extension field corresponding to the video format of the first video data to generate second video data.
Specifically, the video format of the first video data includes, but is not limited to, an flv video format, and the raw transaction data is stored in a script tag in the flv encoding format.
Wherein the obtaining the first video data and the raw transaction data comprises:
acquiring first video data uploaded by a video camera, and acquiring original transaction data uploaded by transaction equipment;
or original transaction data are stored in the video data of the server, the original transaction data are extracted from an extension field corresponding to the video format of the video data, and the video data after the original transaction data are extracted are first video data.
Further, the method further comprises:
extracting the original transaction data and the encrypted transaction data from the second video data;
decrypting the encrypted transaction data according to the encrypted token to obtain decrypted transaction data;
verifying whether the second video data is tampered according to the decrypted transaction data and the original transaction data.
Wherein the verifying whether the second video data is tampered specifically includes:
comparing the decrypted transaction data with the original transaction data;
verifying that the second video data is not tampered when the decrypted transaction data is the same as the original transaction data;
verifying that the second video data is tampered when the decrypted transaction data and the original transaction data are different.
In practical applications, the original transaction data includes at least one of a transaction amount, a transaction content, a transaction time, and a transaction object, or the first video data at least includes video data for recording a transaction process.
On the other hand, the embodiment of the application provides a video processing device, which comprises an acquisition module, an extraction module and a processing module;
the acquisition module is used for acquiring first video data and original transaction data;
the encryption module is used for encrypting the original transaction data acquired from the first video data acquired by the acquisition module to obtain encrypted transaction data;
the processing module is used for embedding the encrypted transaction data obtained by the encryption module and the original transaction data obtained by the obtaining module into the first video data to generate second video data.
Wherein, the acquisition module is used for acquiring first video data uploaded by the video camera and acquiring original transaction data uploaded by the transaction equipment,
or when the video data of the server side stores original transaction data, the acquisition module extracts the original transaction data from an extension field corresponding to the video format of the video data, and the video data after the original transaction data is extracted is first video data.
Further, the encryption module is configured to encrypt the original transaction data according to an encryption token to obtain encrypted transaction data, and the processing module is further configured to decrypt the encrypted transaction data according to the encryption token to obtain decrypted transaction data; correspondingly, the device also comprises a verification module,
the verification module is used for verifying whether the second video data is tampered or not according to the decrypted transaction data obtained by the decryption of the processing module and the original transaction data extracted by the extraction module.
The verification module specifically comprises a comparison unit, a first verification unit and a second verification unit;
the comparing unit is used for comparing the decrypted transaction data with the original transaction data;
the first verification unit is used for verifying that the second video data is not tampered when the comparison result of the comparison unit is that the decrypted transaction data is the same as the original transaction data;
the second verification unit is used for verifying that the second video data is tampered when the comparison result of the comparison unit is that the decrypted transaction data is different from the original transaction data.
In another aspect, an embodiment of the present application provides a video processing apparatus, where the apparatus includes:
a processor, an encryptor, a memory and a computer program stored on said memory and executable on said processor; wherein the processor implements the video processing method when executing the computer program.
In yet another aspect, embodiments of the present application provide a machine-readable storage medium having stored thereon executable instructions that, when executed by a machine, cause the method described above to be implemented.
Therefore, in the technical scheme, in order to prevent a user from modifying the transaction content list and the transaction total amount freely only by modifying and editing the first video data, the method encrypts the original transaction data to obtain the encrypted transaction data, and embeds the original transaction data and the encrypted transaction data into the first video data to generate the second video data. When the client needs to verify the video, the server extracts the original transaction data and the encrypted transaction data from the second video data, decrypts the encrypted transaction data by using the encrypted token, and compares the decrypted transaction data with the original transaction data.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed to be used in the description of the embodiments or the prior art will be briefly described below. However, it should be understood by those skilled in the art that the drawings in the following description are illustrative of some of the present application only and are not limiting on the scope thereof.
Fig. 1 is a schematic flow diagram of a method of generating second video data according to one embodiment.
Fig. 2 is a schematic flow diagram of a video processing method according to one embodiment.
Fig. 3 is a schematic structural diagram of a video processing apparatus according to an embodiment.
Fig. 4 is a schematic block diagram of a video processing apparatus according to an embodiment.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. It should be understood by those skilled in the art that the embodiments described are a part of the embodiments of the present invention, and not all embodiments. All other embodiments can be obtained by any suitable modification or variation by a person skilled in the art based on the embodiments in the present application.
The encryption algorithm of the current video is generally high in complexity, the video needs to be decrypted by a corresponding decryption algorithm, requirements on equipment at an encryption end and equipment at a decryption end are high, the content of the whole video stream is encrypted, once the content of the video stream is decrypted, the video stream can only be judged to be tampered, and whether transaction data in the video is tampered or not can not be confirmed.
In view of this, an embodiment of the present application provides a video processing scheme, where a video stream is processed and then stored in a server, a server obtains first video data and original transaction data, encrypts the original transaction data to obtain encrypted transaction data, and embeds the encrypted transaction data and the original transaction data into the original first video data to generate second video data.
After receiving original transaction data (hereinafter referred to as first video data) and original transaction data sent by a client through a network, a server encrypts the original transaction data by using an encryption token to obtain encrypted transaction data, wherein the encryption token can be stored in the server or acquired from a cloud terminal by the server, and then the original transaction data and the encrypted transaction data are embedded into corresponding extension fields in a video format of the first video data to generate second video data.
For a video file, the video file or video stream follows a certain video format, and there is an extension field in the video format, and in practice, the extension field may or may not be filled with content, and does not affect the normal use of the video.
The above technical solution will be described in detail with reference to specific embodiments.
As shown in fig. 1, in a method for generating second video data, in step 101, a server receives original transaction data and first video data sent by a client, and encrypts the original transaction data to generate encrypted transaction data;
in practical application, a client-server mode is adopted, and a server refers to a service code running on a server. In a specific service scene, for example, for an intelligent store service, a video camera and a cash register are deployed in a store, at the moment, first video data are collected by the camera and uploaded to a server, and transaction equipment such as cash register software on the cash register can report transaction data to the server, so that the server acquires the first video data uploaded by the video camera and acquires original transaction data uploaded by the transaction equipment.
In step 102, the server generates second video data according to the encrypted transaction data, the original transaction data and the first video data.
The server receives the original transaction data and the first video data, encrypts the first video data to obtain second video data, and specifically encrypts the original transaction data by using an encryption token to obtain encrypted transaction data, wherein the encryption token can be stored in the server or can be acquired by the server from a cloud.
The server side embeds the encrypted transaction data and the original transaction data into an extension field corresponding to the video format of the first video data to obtain second video data, and the second video data comprises the first video data and three parts of contents of the original transaction data and the encrypted transaction data.
Taking an flv video format as an example, an extended field in an encoding format of the flv video is a script tag, and the step embeds original transaction data and encrypted transaction data into the script tag of the first video data, so as to generate a new video.
In addition, after the second video data is generated, the server stores the second video data in the server, sets a network video playing address for the second video data correspondingly, and sends the network video playing address to the client, so that the client can access and play the second video data to the server according to the received network video playing address.
Therefore, in the technical scheme, in the video encryption process, the original transaction data are encrypted to obtain encrypted transaction data, the original transaction data and the encrypted transaction data are embedded into the extension field in the first video data, so that two parts of data are generated in the second video data, one part of the second video data is the original transaction data, the other part of the second video data is the encrypted transaction data, the verification of whether the second video data is tampered can be completed by extracting the original transaction data and the encrypted transaction data and decrypting the encrypted transaction data, and thus, the service end provides an effective way for verifying whether the video is tampered.
In a retail scene, the video can be a cash register audit video, the cash register audit video is provided for a bank to be a transaction running line certificate, and transaction counterfeiting is prevented.
Fig. 2 is a schematic flow diagram of a server-side video processing method according to one embodiment.
In step 201, determining second video data needing verification;
in practical application, a server provides video verification capability, the server obtains a verification request initiated by a client, if the verification request carries identification information, corresponding second video data is determined according to the identification information in the verification request, and if the verification request carries video data, the video data is determined to be the second video data. That is to say, the application provides two application scenarios, one is that the client sends identification information to the server, the server stores the corresponding relationship between each identification information and the video data, the server determines the video data to be verified according to the identification information first, and then verifies whether the second video data is damaged, the other is that the client directly sends the video data to the server, and the server directly verifies the received video data.
The server stores a plurality of second video data, each second video data is provided with identification information, a corresponding relation between each video data and each identification information is formed, each video data can correspond to one or more identification information, but one identification information only corresponds to one video data, that is, one video data can be uniquely determined according to one identification information, so that after the identification information sent by the client is received, the second video data can be correspondingly determined according to the identification information, and the video object needing to be verified by the client is determined.
The second video data of the application comprises encrypted transaction data, original transaction data and the first video data. The original transaction data can be at least one of transaction amount, transaction content, transaction time and transaction object, and the first video data at least comprises video data for recording transaction process. The specific generation process of the second video data will be described in detail below.
In step 202, extracting original transaction data and encrypted transaction data from the second video data;
specifically, the original transaction data and the encrypted transaction data are embedded into the first video data at the server side to obtain the second video data. Here, extracting the original transaction data and the encrypted transaction data from the second video data specifically includes: searching an extension field corresponding to the video format of the second video data; original transaction data and encrypted transaction data are extracted from the extension field.
In practical application, a video has a corresponding encoding format, for example, for an flv video format, an extended field in the encoding format of the flv video is a script tag, the script tag has a fixed format, and it is good to analyze according to the fixed format, for example, a first field represents a data type, a second field represents a data length, and then a specific data value can be extracted according to the data length.
In step 203, decrypting the encrypted transaction data according to the encrypted token to obtain decrypted transaction data;
the encryption token used for decryption in the application is the same as the encryption token used for encrypting the first video data before, so that the decrypted transaction data obtained by decrypting the encrypted transaction data can be compared with the unencrypted original transaction data to confirm whether the video is tampered.
In step 204, it is determined whether the second video data is tampered or not according to the decrypted transaction data and the original transaction data.
In the step, the decrypted transaction data obtained by decrypting the video is compared with the original transaction data extracted from the video, and the cashing audit video is falsified if the comparison results are different.
Determining whether the second video data is tampered according to the decrypted transaction data and the original transaction data, specifically comprising: when the decrypted transaction data is the same as the original transaction data, determining that the second video data is not tampered; and when the decrypted transaction data is different from the original transaction data, determining that the second video data is tampered.
Fig. 3 is a schematic structural diagram of a video processing apparatus according to an embodiment, the apparatus including: an acquisition module 301, an extraction module 302 and a processing module 303;
an obtaining module 301, configured to obtain first video data and original transaction data;
an encryption module 302, configured to encrypt original transaction data acquired from the first video data acquired by the acquisition module 301 to obtain encrypted transaction data;
the processing module 303 is configured to embed the encrypted transaction data obtained by the encryption module 302 and the original transaction data obtained by the obtaining module into the first video data to generate second video data.
Wherein, the obtaining module 301 is configured to obtain first video data uploaded by a video camera, obtain original transaction data uploaded by a transaction device,
or when the original transaction data are stored in the video data of the server, the acquisition module extracts the original transaction data from the extension field corresponding to the video format of the video data, and the video data after the original transaction data are extracted are the first video data.
The encryption module 302 is configured to encrypt original transaction data according to the encryption token to obtain encrypted transaction data, and the processing module 303 is further configured to decrypt the encrypted transaction data according to the encryption token to obtain decrypted transaction data; correspondingly, the device also comprises a verification module,
the verification module is used for verifying whether the second video data is tampered or not according to the decrypted transaction data obtained by decryption of the processing module and the original transaction data extracted by the extraction module.
Specifically, the verification module specifically comprises a comparison unit, a first verification unit and a second verification unit;
the comparison unit is used for comparing the decrypted transaction data with the original transaction data;
the first verification unit is used for verifying that the second video data is not tampered when the comparison result of the comparison unit is that the decrypted transaction data is the same as the original transaction data;
the second verification unit is used for verifying that the second video data is tampered when the comparison result of the comparison unit is that the decrypted transaction data is different from the original transaction data.
Further, the video processing apparatus provided in this embodiment further includes a second processing module, configured to store the second video data in the server, set a network video playing address for the second video data, and send the network video playing address to the client.
The processing module can determine whether the second video data is tampered, specifically compare the decrypted transaction data with the original transaction data, if the decrypted transaction data is the same as the original transaction data, the second video data is not tampered, and if the decrypted transaction data is different from the original transaction data, the second video data is tampered.
Because the encrypted token for encrypting the original transaction data is the same as the encrypted token for decrypting the encrypted transaction data, the encrypted transaction data is obtained by encrypting the original transaction data through the encrypted token, and the encrypted transaction data is decrypted by using the same encrypted token, as long as the encrypted transaction data is not tampered, the decrypted transaction data obtained by decryption should be the same as the original transaction data, that is, as long as the decrypted transaction data is judged to be the same as the original transaction data, the original transaction data is not tampered, that is, the second video data is not tampered, and as long as the decrypted transaction data is judged to be different from the original transaction data, the original transaction data is tampered, that is, the second video data is tampered.
In the video processing apparatus provided by the embodiment of the present invention, the second video data generated by the server includes two pieces of data, one piece of data is original transaction data, and the other piece of data is encrypted transaction data, and when a verification request sent by the client is received, the original transaction data is encrypted to obtain encrypted transaction data, and the original transaction data and the encrypted transaction data are embedded in the extension field of the first video data, and at this time, the verification of whether the second video data is tampered is completed by extracting the original transaction data and the encrypted transaction data and decrypting the encrypted transaction data, so that the server provides an effective way of verifying whether the video is tampered.
Fig. 4 is a schematic block diagram of a video processing apparatus according to an embodiment.
The video processing apparatus 400 includes: a processor 401, an encryptor 402, a memory 403 and a computer program stored on the memory and executable on the processor, the video processing method in the above embodiments being implemented when the processor 401 executes the computer program.
For example, the processor 401 may be a Central Processing Unit (CPU) or the like. Memory 403 may include random access memory, flash memory, read only memory, programmable read only memory, non-volatile memory or registers, and the like. The encryptor 402 has an encryption token built therein. The memory 403 may store executable instructions. Processor 401 may execute executable instructions stored in memory 403 to implement various processes described herein, such as the various processes shown in fig. 1-2.
In addition, the embodiment of the application also provides a machine-readable storage medium. The machine-readable storage medium may store executable instructions that, when executed by a machine, cause the machine to perform particular processes of the method embodiments described above with reference to fig. 1-2.
For example, a machine-readable storage medium may include, but is not limited to, Random Access Memory (RAM), Read-Only Memory (ROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), Static Random Access Memory (SRAM), a hard disk, flash Memory, and so forth.
Those of skill in the art would understand that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the technical solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments of the present application, the disclosed system, apparatus and method may be implemented in other ways. For example, the division of the unit is only one logic function division, and there may be another division manner in actual implementation. For example, multiple units or components may be combined or may be integrated into another system. In addition, the coupling between the respective units may be direct coupling or indirect coupling. In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or may exist separately and physically.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a machine-readable storage medium. Therefore, the technical solution of the present application may be embodied in the form of a software product, which may be stored in a machine-readable storage medium and may include several instructions to cause an electronic device to perform all or part of the processes of the technical solution described in the embodiments of the present application. The storage medium may include various media that can store program codes, such as ROM, RAM, a removable disk, a hard disk, a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present application, and the scope of the present application is not limited thereto. Those skilled in the art can make changes or substitutions within the technical scope disclosed in the present application, and such changes or substitutions should be within the protective scope of the present application.

Claims (13)

1. A method of video processing, the method comprising:
acquiring first video data and original transaction data;
encrypting the original transaction data to obtain encrypted transaction data;
and embedding the encrypted transaction data and the original transaction data into the first video data to generate second video data.
2. The method of claim 1, wherein the encrypting the raw transaction data to obtain encrypted transaction data comprises:
encrypting the original transaction data according to the encryption token to obtain encrypted transaction data;
correspondingly, the embedding the encrypted transaction data and the original transaction data into the first video data to generate second video data specifically includes:
and embedding the encrypted transaction data and the original transaction data into an extension field corresponding to the video format of the first video data to generate second video data.
3. The method of claim 1 or 2, wherein the video format of the first video data includes but is not limited to flv video format, and the raw transaction data is stored in a script tag in flv encoded format.
4. The method of claim 3, wherein the obtaining first video data and raw transaction data comprises:
acquiring first video data uploaded by a video camera, and acquiring original transaction data uploaded by transaction equipment;
or original transaction data are stored in the video data of the server, the original transaction data are extracted from an extension field corresponding to the video format of the video data, and the video data after the original transaction data are extracted are first video data.
5. The method of claim 3, further comprising:
extracting the original transaction data and the encrypted transaction data from the second video data;
decrypting the encrypted transaction data according to the encrypted token to obtain decrypted transaction data;
verifying whether the second video data is tampered according to the decrypted transaction data and the original transaction data.
6. The method according to claim 5, wherein the verifying whether the second video data is tampered with includes:
comparing the decrypted transaction data with the original transaction data;
verifying that the second video data is not tampered when the decrypted transaction data is the same as the original transaction data;
verifying that the second video data is tampered when the decrypted transaction data and the original transaction data are different.
7. The method of claim 1, wherein the raw transaction data comprises at least one of transaction amount, transaction content, transaction time, and transaction object, or wherein the first video data comprises at least video data recording transaction process.
8. The video processing device is characterized by comprising an acquisition module, an extraction module and a processing module;
the acquisition module is used for acquiring first video data and original transaction data;
the encryption module is used for encrypting the original transaction data acquired from the first video data acquired by the acquisition module to obtain encrypted transaction data;
the processing module is used for embedding the encrypted transaction data obtained by the encryption module and the original transaction data obtained by the obtaining module into the first video data to generate second video data.
9. The apparatus according to claim 8, wherein the obtaining module is configured to obtain first video data uploaded by a video camera, obtain original transaction data uploaded by a transaction device,
or when the video data of the server side stores original transaction data, the acquisition module extracts the original transaction data from an extension field corresponding to the video format of the video data, and the video data after the original transaction data is extracted is first video data.
10. The apparatus according to claim 8, wherein the encryption module is configured to encrypt the original transaction data according to an encryption token to obtain encrypted transaction data, and the processing module is further configured to decrypt the encrypted transaction data according to the encryption token to obtain decrypted transaction data; correspondingly, the device also comprises a verification module,
the verification module is used for verifying whether the second video data is tampered or not according to the decrypted transaction data obtained by the decryption of the processing module and the original transaction data extracted by the extraction module.
11. The apparatus according to claim 10, wherein the verification module specifically comprises a comparison unit, a first verification unit and a second verification unit;
the comparing unit is used for comparing the decrypted transaction data with the original transaction data;
the first verification unit is used for verifying that the second video data is not tampered when the comparison result of the comparison unit is that the decrypted transaction data is the same as the original transaction data;
the second verification unit is used for verifying that the second video data is tampered when the comparison result of the comparison unit is that the decrypted transaction data is different from the original transaction data.
12. A video processing apparatus, characterized in that the apparatus comprises:
a processor, an encryptor, a memory and a computer program stored on said memory and executable on said processor; characterized in that the processor, when executing the computer program, implements the video processing method according to any of claims 1-7.
13. A machine-readable storage medium having stored thereon executable instructions which when executed by a machine result in the implementation of a method according to any one of claims 1-7.
CN202010253747.3A 2020-04-02 2020-04-02 Video processing method and device and machine-readable storage medium Active CN111314742B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010253747.3A CN111314742B (en) 2020-04-02 2020-04-02 Video processing method and device and machine-readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010253747.3A CN111314742B (en) 2020-04-02 2020-04-02 Video processing method and device and machine-readable storage medium

Publications (2)

Publication Number Publication Date
CN111314742A true CN111314742A (en) 2020-06-19
CN111314742B CN111314742B (en) 2023-02-03

Family

ID=71146125

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010253747.3A Active CN111314742B (en) 2020-04-02 2020-04-02 Video processing method and device and machine-readable storage medium

Country Status (1)

Country Link
CN (1) CN111314742B (en)

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5491511A (en) * 1994-02-04 1996-02-13 Odle; James A. Multimedia capture and audit system for a video surveillance network
US7320008B1 (en) * 2004-12-20 2008-01-15 Veritas Operating Corporation Data protection mechanism
CN101763609A (en) * 2009-12-03 2010-06-30 上海格尔软件股份有限公司 Virtual transaction evidence-obtaining method based on data signature and video technology
WO2012151651A1 (en) * 2011-05-12 2012-11-15 Solink Corporation Video analytics system
WO2013051032A1 (en) * 2011-10-03 2013-04-11 Ezetap Mobile Solutions Private Limited A dongle device with rechargeable power supply for a secure electronic transaction
US8570375B1 (en) * 2007-12-04 2013-10-29 Stoplift, Inc. Method and apparatus for random-access review of point of sale transactional video
WO2014147602A1 (en) * 2013-03-19 2014-09-25 Amit Kumar Jain Amit Video player for monetary transactions
CN104902345A (en) * 2015-05-26 2015-09-09 多维新创(北京)技术有限公司 Method and system for realizing interactive advertising and marketing of products
US20150278807A1 (en) * 2014-03-28 2015-10-01 Samsung Eletrônica da Amazônia Ltda. Method for authentication of mobile transactions using video encryption and method for video encryption
CN105357206A (en) * 2015-11-19 2016-02-24 杭州铭师堂教育科技发展有限公司 Secure video transmission method
US20160307194A1 (en) * 2012-12-31 2016-10-20 Piyush Bhatnagar System and method for point of sale payment data credentials management using out-of-band authentication
CN106682520A (en) * 2016-11-17 2017-05-17 精硕科技(北京)股份有限公司 Data exchange method and system
CN107547915A (en) * 2017-10-23 2018-01-05 江苏省公用信息有限公司 A kind of IPTV video contents tamper resistant method
CN109560934A (en) * 2018-10-25 2019-04-02 金蝶软件(中国)有限公司 Data tamper resistant method, device, computer equipment and storage medium
CN109711836A (en) * 2018-11-15 2019-05-03 远光软件股份有限公司 A kind of storage method of transaction, storage network and electronic equipment
CN109784920A (en) * 2018-12-27 2019-05-21 上海边界智能科技有限公司 A kind of Transaction Information auditing method and device based on block chain
US20190180275A1 (en) * 2017-12-13 2019-06-13 Mastercard International Incorporated Method and system for consumer-initiated transactions using encrypted tokens
CN110582010A (en) * 2019-09-30 2019-12-17 上海依图网络科技有限公司 Video/picture encryption transmission method and device, electronic equipment and storage medium

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5491511A (en) * 1994-02-04 1996-02-13 Odle; James A. Multimedia capture and audit system for a video surveillance network
US7320008B1 (en) * 2004-12-20 2008-01-15 Veritas Operating Corporation Data protection mechanism
US8570375B1 (en) * 2007-12-04 2013-10-29 Stoplift, Inc. Method and apparatus for random-access review of point of sale transactional video
CN101763609A (en) * 2009-12-03 2010-06-30 上海格尔软件股份有限公司 Virtual transaction evidence-obtaining method based on data signature and video technology
WO2012151651A1 (en) * 2011-05-12 2012-11-15 Solink Corporation Video analytics system
WO2013051032A1 (en) * 2011-10-03 2013-04-11 Ezetap Mobile Solutions Private Limited A dongle device with rechargeable power supply for a secure electronic transaction
US20160307194A1 (en) * 2012-12-31 2016-10-20 Piyush Bhatnagar System and method for point of sale payment data credentials management using out-of-band authentication
WO2014147602A1 (en) * 2013-03-19 2014-09-25 Amit Kumar Jain Amit Video player for monetary transactions
US20150278807A1 (en) * 2014-03-28 2015-10-01 Samsung Eletrônica da Amazônia Ltda. Method for authentication of mobile transactions using video encryption and method for video encryption
CN104902345A (en) * 2015-05-26 2015-09-09 多维新创(北京)技术有限公司 Method and system for realizing interactive advertising and marketing of products
CN105357206A (en) * 2015-11-19 2016-02-24 杭州铭师堂教育科技发展有限公司 Secure video transmission method
CN106682520A (en) * 2016-11-17 2017-05-17 精硕科技(北京)股份有限公司 Data exchange method and system
CN107547915A (en) * 2017-10-23 2018-01-05 江苏省公用信息有限公司 A kind of IPTV video contents tamper resistant method
US20190180275A1 (en) * 2017-12-13 2019-06-13 Mastercard International Incorporated Method and system for consumer-initiated transactions using encrypted tokens
CN109560934A (en) * 2018-10-25 2019-04-02 金蝶软件(中国)有限公司 Data tamper resistant method, device, computer equipment and storage medium
CN109711836A (en) * 2018-11-15 2019-05-03 远光软件股份有限公司 A kind of storage method of transaction, storage network and electronic equipment
CN109784920A (en) * 2018-12-27 2019-05-21 上海边界智能科技有限公司 A kind of Transaction Information auditing method and device based on block chain
CN110582010A (en) * 2019-09-30 2019-12-17 上海依图网络科技有限公司 Video/picture encryption transmission method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN111314742B (en) 2023-02-03

Similar Documents

Publication Publication Date Title
US11366878B2 (en) Method and apparatus for delivering encoded content
US10769252B2 (en) Method and apparatus for watermarking of digital content, method for extracting information
CN101262599B (en) Method and system for data processing
US8806215B2 (en) Method and system for robust watermark insertion and extraction for digital set-top boxes
US9094733B2 (en) Methods and systems for cryptographic access control of video
JP6297137B2 (en) Method for watermarking media content and system for implementing the method
US20120089843A1 (en) Information processing apparatus, information processing method, and program
WO2021051757A1 (en) Two-dimensional code-based file acquisition method and device and two-dimensional code generation method
US7111167B1 (en) Digital watermarks with values derived from remote platforms
JP6438459B2 (en) Method for watermarking compressed content encrypted with at least one content key
CN113411638A (en) Video file playing processing method and device, electronic equipment and storage medium
CN103136466B (en) A kind of Web3D encryption method based on softdog
CN111200741B (en) Video processing method and device and machine-readable storage medium
KR101967855B1 (en) Method and system for verifying electronic document security using 2D barcode block division
CN111314742B (en) Video processing method and device and machine-readable storage medium
CN109829322B (en) Authorization information based real-time encryption and decryption method and system for digital media files
KR102154897B1 (en) Method for supervising digital contents using block chain and fingerprinting, device and computer readable medium for performing the method
JP2003078515A (en) Contents distributing system, decoding device, encrypting device, decoding program, and encrypting program
CN116644485A (en) Anti-counterfeiting authentication method and device for server memory, electronic equipment and storage medium
TW201811064A (en) User unit for watermarking digital content, method for transmitting and for watermarking content and method for detecting at least one watermark
CN112231651A (en) Method for preventing decompiling and tampering copyright authorization
JP2002352146A (en) Method, system and program for charging contents parts and storage medium with contents parts charging program stored therein
CN109660355B (en) Method, device, storage medium and terminal for preventing POS terminal from being illegally tampered
CN117972797A (en) Tamper-proof processing method and device for digital files and electronic equipment
CN113127891A (en) Template file encryption method and device for intelligent media desktop

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant