CN113609334A - Method for improving recognition reliability of cross-camera behaviors by using block chain - Google Patents
Method for improving recognition reliability of cross-camera behaviors by using block chain Download PDFInfo
- Publication number
- CN113609334A CN113609334A CN202110879829.3A CN202110879829A CN113609334A CN 113609334 A CN113609334 A CN 113609334A CN 202110879829 A CN202110879829 A CN 202110879829A CN 113609334 A CN113609334 A CN 113609334A
- Authority
- CN
- China
- Prior art keywords
- camera
- block chain
- hash
- block
- video
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/70—Information retrieval; Database structures therefor; File system structures therefor of video data
- G06F16/71—Indexing; Data structures therefor; Storage structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/70—Information retrieval; Database structures therefor; File system structures therefor of video data
- G06F16/75—Clustering; Classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/70—Information retrieval; Database structures therefor; File system structures therefor of video data
- G06F16/78—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
- G06F16/783—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
- G06F16/7837—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content using objects detected or recognised in the video content
- G06F16/784—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content using objects detected or recognised in the video content the detected or recognised objects being people
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/70—Information retrieval; Database structures therefor; File system structures therefor of video data
- G06F16/78—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
- G06F16/7867—Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using information manually generated, e.g. tags, keywords, comments, title and artist information, manually generated time, location and usage information, user ratings
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
Abstract
The invention discloses a method for improving cross-camera behavior identification reliability by using a block chain, which comprises a camera module, a block chain module and a behavior identification module, and comprises the following steps: defining a single-chain blockchain service; step two: defining a camera Internet of things system which can automatically divide a video, calculate Hash to be stored as a file name, and send a signature to a block chain certificate after file Hash is packaged and traded; step three: the camera service periodically polls the block height, divides videos according to the block outlet time of each block of the block chain, the blocks are connected through Hash, data in the blocks of the single chain are increased progressively according to the block height sequence, the videos for indexing and storing certificates are increased progressively according to the block outlet sequence, and meanwhile the time of occurrence of events can be determined according to the block timestamps, so that the sequence of the events can be ensured not to be disordered.
Description
Technical Field
The invention relates to the field of behavior recognition credibility, in particular to a method for improving cross-camera behavior recognition credibility by using a block chain.
Background
Machine learning is machine learning as opposed to algorithm learning. The earliest application of machine learning is the resolution of junk mails, and the traditional idea for solving the problem of computers is to write rules, define ' junk mails ' and enable the computers to execute the ' junk mails, so that an algorithm needs to be written. The algorithm has fixed input and output, the input is that a mail is corresponding to all information, and the output is that whether the mail is a junk mail or not is judged.
At present, algorithms for recognizing behaviors of people through machine learning tend to be mature, but the machine learning is to perform corresponding calculation output on input of pictures or videos, and cannot judge the sequence of events, so that the accuracy of a machine learning result is difficult to ensure for behavior recognition with event sequence judgment, and therefore the invention provides a method for improving the reliability of cross-camera behavior recognition by using a block chain to solve the problems.
For example, application No. 201811353903.2 discloses an active video identification method in combination with a blockchain, which is applied to the field of video identification and prevents video frames from being tampered in order to store the video frames completely and truly; the invention combines the public block chain and the private block chain to encrypt and store the video file and verify the source and tampering of the video, and the private block chain can be used as a local database to provide a basis for verifying the source and tampering of the video; and the first transaction timestamp generated by the private blockchain can be used as the occurrence time of the abnormal event to ensure the immediacy of the time for locally storing the video content, but the invention cannot accurately judge the sequence of the occurrence of the event.
Disclosure of Invention
The invention aims to provide a method for improving the recognition reliability of cross-camera behaviors by using a block chain, so as to solve the technical problem.
In order to solve the technical problems, the invention adopts the following technical scheme:
a method for improving cross-camera behavior recognition reliability by using a block chain comprises a camera module, a block chain module and a behavior recognition module, and comprises the following steps:
the method comprises the following steps: defining a single-chain blockchain service;
step two: defining a camera Internet of things system which can automatically divide a video, calculate Hash to be stored as a file name, and send a signature to a block chain certificate after file Hash is packaged and traded;
step three: the camera service periodically polls the tile height and partitions the video according to the out-of-tile time of each tile in the chain of tiles.
Preferably, the blocks are connected through Hash, data in the blocks of a single chain are increased progressively according to the block height sequence, the video for indexing and storing the certificate is increased progressively according to the block shooting sequence, meanwhile, the occurrence time of the event can be determined according to the block timestamp, and the sequence of the event is guaranteed not to be disturbed.
Preferably, the uniqueness and reliability of the video are determined through hash operation of the camera, and the video is determined to be strictly increased in time sequence through the block chain.
Preferably, the hash algorithm is an algorithm for mapping an input value to an output value (hash value) with a certain length, the hash value has the characteristics of high randomness and collision resistance, the hash value may correspond to different input values, but it is impossible to find different input values within a normal operation time, and it is impossible to find two inputs with the identical hash value through a large number of operations.
Preferably, the hash can be regarded as an anti-counterfeit label of the input value, and the hash function is the anti-counterfeit labels of different videos.
Preferably, the camera module includes a camera, and the camera collects and segments a video to obtain video data.
Preferably, the block chain module includes a block chain, and the video data is subjected to camera hash calculation and packed transaction uplink through the block chain, and then is subjected to video hash on the chain.
Preferably, the behavior recognition module includes a behavior recognition service, the behavior recognition service requests for evidence storing information and obtains video data, the behavior recognition service performs cross-camera behavior analysis, the behavior recognition service links the used video hash and recognition result with evidence storing information, and then outputs result data.
The invention has the beneficial effects that:
1. the algorithm for identifying the behavior of people and carrying out early warning by cross-camera tracking through machine learning is adopted, the uniqueness and reliability of the video are determined through the Hash operation of the camera, the video is determined to be strictly increased in time sequence through a block chain, and no error is generated;
2. the blocks are connected through Hash, data in the blocks of the single chain are increased progressively according to the block height sequence, the video for indexing and storing the certificate is increased progressively according to the block shooting sequence, meanwhile, the occurrence time of the event can be determined according to the block timestamp, and the sequence of the event is guaranteed not to be disturbed.
3. The invention can improve the reliability of the result of the cross-camera behavior recognition and reduce the possibility that the behavior recognition result is questioned.
Drawings
FIG. 1 is a schematic diagram of the system of the present invention;
FIG. 2 is a schematic diagram of a first embodiment of the present invention;
FIG. 3 is a schematic view of a second embodiment of the present invention;
Detailed Description
In order to make the technical means, the original characteristics, the achieved purposes and the effects of the invention easily understood, the invention is further described below with reference to the specific embodiments and the attached drawings, but the following embodiments are only the preferred embodiments of the invention, and not all embodiments. Based on the embodiments in the implementation, other embodiments obtained by those skilled in the art without any creative efforts belong to the protection scope of the present invention.
Specific embodiments of the present invention are described below with reference to the accompanying drawings.
In the prior art, the event occurrence sequence is difficult to be determined, the camera time is based on the hardware local time, errors are easy to generate and easy to modify, and the accuracy of the camera time is difficult to guarantee. For some scenarios, such as incomplete camera coverage, or cyclic spatial continuous occurrence of events, this sequence is more easily confused.
Example 1
The first case is shown in fig. 2, assuming that the correct order of execution of events in 4 rooms is 1>2>3>4, if the middle walkway lacks camera coverage, the front-to-back order of the video is indeterminate, and if the walkway has camera coverage but any two rooms are not fully covered, the front-to-back order of the two rooms can be reversed.
Example 2
In another case, as shown in fig. 3, if the correct event execution sequence of 4 rooms is 1>2>3>4, but the operations are executed in the sequence of 2>3>4>1, the order of 1>2>3>4 can still be formed by changing the video sequence, because the algorithm itself cannot recognize the sequence, and the algorithm alone is easily questioned.
Example 3
As shown in fig. 1, a method for improving reliability of cross-camera behavior recognition by using a blockchain includes a camera module, a blockchain module, and a behavior recognition module, and includes the following steps:
the method comprises the following steps: defining a single-chain blockchain service;
step two: defining a camera Internet of things system which can automatically divide a video, calculate Hash to be stored as a file name, and send a signature to a block chain certificate after file Hash is packaged and traded;
step three: the camera service periodically polls the tile height and partitions the video according to the out-of-tile time of each tile in the chain of tiles.
The working principle is as follows: defining a single-chain block chain service, defining a camera Internet of things system capable of automatically dividing videos, calculating Hash to be stored as file names, and sending signatures of the Hash packed transaction of the files to a block chain evidence storage, wherein the camera service periodically polls the block height, divides the videos according to the block outlet time of each block of the block chain, the blocks are connected through the Hash, data in the blocks of the single chain are increased progressively according to the block height sequence, the video for indexing evidence storage is increased progressively according to the block outlet sequence, meanwhile, the time of event occurrence can be determined according to the block timestamp, and the sequence of events is ensured not to be disturbed.
Example 4
As shown in fig. 1, a method for improving reliability of cross-camera behavior recognition by using a blockchain includes a camera module, a blockchain module, and a behavior recognition module, and includes the following steps:
the method comprises the following steps: defining a single-chain blockchain service;
step two: defining a camera Internet of things system which can automatically divide a video, calculate Hash to be stored as a file name, and send a signature to a block chain certificate after file Hash is packaged and traded;
step three: the camera service periodically polls the tile height and partitions the video according to the out-of-tile time of each tile in the chain of tiles.
The blocks are connected through Hash, data in the blocks of the single chain are increased progressively according to the sequence of the block heights, the video with the index certificate is increased progressively according to the block shooting sequence, meanwhile, the occurrence time of events can be determined according to the block timestamps, the sequence of the events can be guaranteed not to be disturbed, the uniqueness and the reliability of the video are determined through Hash operation of the camera, and the video is determined to be strictly increased progressively according to the time sequence through the block chain.
The hash algorithm is an algorithm for mapping an input value to an output value (hash value) with a determined length, the hash value has the characteristics of high randomness and collision resistance, the hash value may correspond to different input values, but different input values cannot be found within normal operation time, it is impossible to find two inputs with the same hash value through a large number of operations, the hash value can be regarded as an anti-counterfeit label of the input value, and the hash function is an anti-counterfeit label of different videos.
The camera module includes the camera, the video is gathered and is cut apart to the camera, obtain video data, the block chain module includes the block chain, video data carries out camera calculation hash and packing transaction cochain through the block chain, then carry out video hash deposit certificate on the chain, the action recognition module includes the action recognition service, action recognition service requests deposit certificate information, and obtain video data, action recognition service strides camera action analysis, action recognition service will use video hash and identification result cochain deposit certificate, then output result data.
The working principle and the using method of the invention are as follows:
the working principle is as follows: based on an algorithm for performing cross-camera tracking through machine learning to identify personnel behaviors and perform early warning, the uniqueness and reliability of the video are determined through hash operation of the camera, and the video is determined to be strictly increased in time sequence through a block chain. The similar scheme of the invention is to utilize the time of watermark on the camera shooting picture, but the time of watermark is apt to produce the error; an algorithm for mapping an input value to a length-determined output value (hash value). The hash value has the characteristics of high randomness and collision resistance, so although the hash value may correspond to different input values, it is impossible to find different input values within normal operation time, and thus it can be considered impossible to find two inputs having the identical hash value through a large number of operations. On the basis, Hash can be taken as an anti-counterfeit label of an input value, the Hash in the text is taken as the anti-counterfeit label of different videos, blocks are connected through Hash, data in the blocks of a single chain are increased progressively according to the sequence of block heights, videos for indexing and storing certificates are increased progressively according to the sequence of the blocks, meanwhile, the time of occurrence of an event can be determined according to the block timestamp, and the sequence of the event is guaranteed not to be disordered.
The specific method comprises the following steps: the video is collected and divided by the camera to obtain video data, the video data is subjected to camera hash calculation and packed transaction chaining through a block chain, then video hash-on-chain storage is carried out, the behavior recognition module comprises behavior recognition service, the behavior recognition service requests storage certificate information and obtains the video data, the behavior recognition service carries out cross-camera behavior analysis, the behavior recognition service uses video hash and recognition result chaining storage certificates, and then result data are output.
The foregoing shows and describes the general principles, essential features, and advantages of the invention. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, and the preferred embodiments of the present invention are described in the above embodiments and the description, and are not intended to limit the present invention. The scope of the invention is defined by the appended claims and equivalents thereof.
Claims (8)
1. A method for improving the identification reliability of cross-camera behaviors by using a block chain comprises a camera module, a block chain module and a behavior identification module, and is characterized by comprising the following steps:
the method comprises the following steps: defining a single-chain blockchain service;
step two: defining a camera Internet of things system which can automatically divide a video, calculate Hash to be stored as a file name, and send a signature to a block chain certificate after file Hash is packaged and traded;
step three: the camera service periodically polls the tile height and partitions the video according to the out-of-tile time of each tile in the chain of tiles.
2. The method of claim 1, wherein the method for improving confidence level of behavior recognition across cameras by using a block chain comprises: the blocks are connected through Hash, data in the blocks of the single chain are increased progressively according to the block height sequence, the video for indexing and storing the certificate is increased progressively according to the block shooting sequence, meanwhile, the occurrence time of the event can be determined according to the block timestamp, and the sequence of the event is guaranteed not to be disturbed.
3. The method of claim 2, wherein the method for improving confidence level of behavior recognition across cameras by using a block chain comprises: the uniqueness and the reliability of the video are determined through the Hash operation of the camera, and the video is determined to be strictly increased in time sequence through the block chain.
4. The method of claim 3, wherein the method for improving confidence level of behavior recognition across cameras by using a block chain comprises: the hash algorithm is an algorithm for mapping an input value to an output value (hash value) with a certain length, the hash value has the characteristics of high randomness and collision resistance, the hash value may correspond to different input values, but it is impossible to find different input values within a normal operation time, and it is impossible to find two inputs having the same hash value through a large number of operations.
5. The method of claim 4, wherein the method for improving confidence level of behavior recognition across cameras by using a block chain comprises: the hash can be regarded as an anti-counterfeit label of the input value, and the hash functions as the anti-counterfeit labels of different videos.
6. The method of claim 5, wherein the method for improving confidence level of behavior recognition across cameras by using a block chain comprises: the camera module comprises a camera, and the camera collects and segments videos to obtain video data.
7. The method of claim 6, wherein the method for improving confidence level of behavior recognition across cameras by using a block chain comprises: the block chain module comprises a block chain, the video data is subjected to camera calculation hash through the block chain, and is packaged for transaction chain linking, and then video HashCuve evidence on the chain is carried out.
8. The method of claim 7, wherein the method for improving confidence level of behavior recognition across cameras by using a block chain comprises: the behavior recognition module comprises a behavior recognition service, the behavior recognition service requests evidence storage information and acquires video data, the behavior recognition service performs cross-camera behavior analysis, the behavior recognition service links the used video hash and recognition results with evidence storage, and then outputs result data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110879829.3A CN113609334A (en) | 2021-08-02 | 2021-08-02 | Method for improving recognition reliability of cross-camera behaviors by using block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110879829.3A CN113609334A (en) | 2021-08-02 | 2021-08-02 | Method for improving recognition reliability of cross-camera behaviors by using block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113609334A true CN113609334A (en) | 2021-11-05 |
Family
ID=78339014
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110879829.3A Withdrawn CN113609334A (en) | 2021-08-02 | 2021-08-02 | Method for improving recognition reliability of cross-camera behaviors by using block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113609334A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116229334A (en) * | 2023-05-09 | 2023-06-06 | 厦门农芯数字科技有限公司 | Pig farm cross-camera event management method and system based on block chain |
-
2021
- 2021-08-02 CN CN202110879829.3A patent/CN113609334A/en not_active Withdrawn
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116229334A (en) * | 2023-05-09 | 2023-06-06 | 厦门农芯数字科技有限公司 | Pig farm cross-camera event management method and system based on block chain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111177080B (en) | Knowledge graph storage and verification method based on block chain and IPFS | |
CN111949672B (en) | Block chain storage method for supporting incremental update of Internet-of-things data | |
JP6716727B2 (en) | Streaming data distributed processing method and apparatus | |
CN109543455A (en) | A kind of data archiving method and device of block chain | |
CN111143883B (en) | Digital content evidence obtaining method, device and equipment based on block chain | |
CN114372296B (en) | Block chain-based user behavior data auditing method and system | |
US10332227B2 (en) | Multiple source watermarking for surveillance | |
CN111708794B (en) | Data comparison method and device based on big data platform and computer equipment | |
US20070261061A1 (en) | System and method of aggregating and consolidating security event data | |
Li et al. | Theoretical basis for intrusion detection | |
CN113536956B (en) | Method for detecting multimedia data tampering | |
CN103116628A (en) | Image file digital signature and judgment method and judgment device of repeated image file | |
CN113609334A (en) | Method for improving recognition reliability of cross-camera behaviors by using block chain | |
CN110830259A (en) | Method and system for providing originality and integrity certification for multimedia data | |
Pavlou et al. | Generalizing database forensics | |
CN111832018A (en) | Virus detection method, virus detection device, computer device and storage medium | |
CN110399485B (en) | Data tracing method and system based on word vector and machine learning | |
CN111966657A (en) | Distributed file classified storage system and storage method based on block chain | |
CN114298211A (en) | Feature binning method and device, electronic equipment and storage medium | |
CN112148904B (en) | Indexing method and device for alarm linkage video | |
CN110210254B (en) | Optimization verification method for repeated data in multiple data integrity verification | |
Jung et al. | Prioritizing cloud service threats for succession to information security management system | |
CN116229334B (en) | Pig farm cross-camera event management method and system based on block chain | |
CN113037496B (en) | Video acquisition device and method based on block chain technology | |
CN113300857A (en) | Block chain-based information encryption signature architecture and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20211105 |