CN116647717B - Computer video leakage protection method and system based on encryption technology - Google Patents

Computer video leakage protection method and system based on encryption technology Download PDF

Info

Publication number
CN116647717B
CN116647717B CN202310932843.4A CN202310932843A CN116647717B CN 116647717 B CN116647717 B CN 116647717B CN 202310932843 A CN202310932843 A CN 202310932843A CN 116647717 B CN116647717 B CN 116647717B
Authority
CN
China
Prior art keywords
information
video
data packet
pixel
dispersion coefficient
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310932843.4A
Other languages
Chinese (zh)
Other versions
CN116647717A (en
Inventor
李梁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongqi Dingxuan Technology Beijing Co ltd
Original Assignee
Zhongqi Dingxuan Technology Beijing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongqi Dingxuan Technology Beijing Co ltd filed Critical Zhongqi Dingxuan Technology Beijing Co ltd
Priority to CN202310932843.4A priority Critical patent/CN116647717B/en
Publication of CN116647717A publication Critical patent/CN116647717A/en
Application granted granted Critical
Publication of CN116647717B publication Critical patent/CN116647717B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/231Content storage operation, e.g. caching movies for short term storage, replicating data over plural servers, prioritizing data for deletion
    • H04N21/23109Content storage operation, e.g. caching movies for short term storage, replicating data over plural servers, prioritizing data for deletion by placing content in organized collections, e.g. EPG data repository
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
    • H04N21/23406Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving management of server-side video buffer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/24Monitoring of processes or resources, e.g. monitoring of server load, available bandwidth, upstream requests
    • H04N21/2404Monitoring of server processing errors or hardware failure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • H04N21/2541Rights Management
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Abstract

The application relates to the technical field of data processing, and provides a computer video leakage protection method and system based on encryption technology, wherein the method comprises the following steps: acquiring user authority information and a downloading authority constraint range; determining a first video data packet; acquiring transmission state information and play state information; activating a video encryption sub-plug-in, and encrypting to obtain a second video data packet; the second video data packet is replaced with the first video data packet for transmission or/and playing, so that the technical problem that illegal transmission of the downloaded video by an authorized user cannot be prevented and hidden danger of video leakage exists is solved, the problem that the video downloaded by the authorized user is prevented from being subjected to leakage management is solved, illegal acquisition of the video is avoided, the safety and privacy of data are effectively improved, and the technical effects that the video is illegally accessed and used are avoided.

Description

Computer video leakage protection method and system based on encryption technology
Technical Field
The application relates to the technical field of data processing, in particular to a computer video leakage protection method and system based on encryption technology.
Background
Computer video leakage protection, i.e., protecting video data in a computer from being acquired, viewed or transmitted by unauthorized persons by various technical means and measures, is commonly used for protecting personal and organization information security.
Video leakage may lead to privacy leakage, commercial confidentiality leakage, etc. In general, only authorized personnel are limited to access sensitive video data through means of rights management, identity verification and the like, so that unauthorized persons are ensured to be unable to acquire video content; the video data is encrypted and only authorized decryptors can view the video data.
However, there is still a limitation in protecting the security and privacy of video data, such as the inability to leak-protect the cached video, and users retransmit the cached video resources to other users. In summary, it can be known that the video downloaded by the authorized user cannot be prevented from being subjected to leakage management, and the risk of video leakage still exists.
In summary, in the prior art, there is a technical problem that an authorized user cannot prevent illegal transmission of a downloaded video, and hidden danger of video leakage exists.
Disclosure of Invention
The application provides a computer video leakage protection method and system based on an encryption technology, and aims to solve the technical problem that illegal transmission of a downloaded video by an authorized user cannot be prevented in the prior art, and hidden danger of video leakage exists.
In view of the above problems, the present application provides a method and a system for protecting computer video leakage based on encryption technology.
The first aspect of the present disclosure provides a computer video leakage protection method based on encryption technology, wherein the method is applied to a server, the server has a lightweight monitoring plug-in, and the method comprises: when a downloading request instruction of a first video of a first login user is received, acquiring user permission information and a downloading permission constraint range; when the user authority information belongs to the downloading authority constraint range, the lightweight monitoring plug-in unit and the first video image stream are stored simultaneously as a first video data packet; transmitting the first video data packet to a local database of the first login user based on a preset video playing platform, activating the lightweight monitoring plug-in, and acquiring transmission state information and playing state information of the first video data packet; when the transmission state information is in an abnormal transmission state or/and the play state information is in an abnormal play state, activating a video encryption sub-plug-in of the lightweight monitoring plug-in, encrypting the first video image stream and obtaining a second video data packet; and replacing the first video data packet with the second video data packet for transmission or/and playing.
In another aspect of the disclosure, a computer video leakage protection system based on encryption technology is provided, wherein the system comprises: the instruction receiving module is used for acquiring user permission information and a downloading permission constraint range when receiving a downloading request instruction of a first video of a first login user; the simultaneous storage module is used for simultaneously storing the light-weight monitoring plug-in and the first video image stream as a first video data packet when the user permission information belongs to the downloading permission constraint range; the plug-in activation module is used for transmitting the first video data packet to a local database of the first login user based on a preset video playing platform, activating the light-weight monitoring plug-in and acquiring transmission state information and playing state information of the first video data packet; the image stream encryption module is used for activating a video encryption sub-plug-in of the lightweight monitoring plug-in when the transmission state information is in an abnormal transmission state or/and the play state information is in an abnormal play state, encrypting the first video image stream and obtaining a second video data packet; and the data packet replacing module is used for replacing the first video data packet with the second video data packet for transmission or/and playing.
One or more technical schemes provided by the application have at least the following technical effects or advantages:
when a downloading request instruction of a first video of a first login user is received, acquiring user permission information and a downloading permission constraint range; when the user authority information belongs to the downloading authority constraint range, the lightweight monitoring plug-in unit and the first video image stream are stored simultaneously as a first video data packet; transmitting the first video data packet to a local database of a first login user based on a preset video playing platform, activating a lightweight monitoring plug-in, and acquiring transmission state information and playing state information of the first video data packet; when the transmission state information is in an abnormal transmission state or/and the playing state information is in an abnormal playing state, activating a video encryption sub-plug-in of the lightweight monitoring plug-in, encrypting the first video image stream and obtaining a second video data packet; the second video data packet is replaced with the first video data packet to be transmitted or/and played, so that leakage prevention management is realized for the video downloaded by the authorized user, illegal acquisition of the video is avoided, the safety and privacy of the data are effectively improved, and illegal access and use of the video are avoided.
The foregoing description is only an overview of the present application, and is intended to be implemented in accordance with the teachings of the present application in order that the same may be more clearly understood and to make the same and other objects, features and advantages of the present application more readily apparent.
Drawings
Fig. 1 is a schematic flow chart of a possible computer video leakage protection method based on encryption technology according to an embodiment of the present application;
fig. 2 is a schematic diagram of a possible flow for obtaining a second video data packet in a computer video leakage protection method based on encryption technology according to an embodiment of the present application;
fig. 3 is a schematic diagram of a possible image ordering process in a computer video leakage protection method based on encryption technology according to an embodiment of the present application;
fig. 4 is a schematic diagram of a possible structure of a computer video leakage protection system based on encryption technology according to an embodiment of the present application.
Reference numerals illustrate: the system comprises an instruction receiving module 100, a simultaneous storage module 200, a plug-in activating module 300, an image stream encrypting module 400 and a data packet replacing module 500.
Detailed Description
The embodiment of the application provides a computer video leakage protection method and a system based on an encryption technology, which solve the technical problems that illegal transmission of a downloaded video by an authorized user cannot be prevented and hidden danger of video leakage exists, realize leakage prevention management on the video downloaded by the authorized user, avoid illegal acquisition of the video, effectively improve the safety and privacy of data and avoid illegal access and use of the video.
Having described the basic principles of the present application, various non-limiting embodiments of the present application will now be described in detail with reference to the accompanying drawings.
Example 1
As shown in fig. 1, an embodiment of the present application provides a computer video leakage protection method based on encryption technology, where the method is applied to a server, and the server has a lightweight monitoring plug-in, and the method includes:
s10: when a downloading request instruction of a first video of a first login user is received, acquiring user permission information and a downloading permission constraint range;
s20: when the user authority information belongs to the downloading authority constraint range, the lightweight monitoring plug-in unit and the first video image stream are stored simultaneously as a first video data packet;
specifically, the video data is encrypted to obtain an encrypted video, the encrypted video needs to be input with a password to open the video for watching, a request needs to be sent for caching and downloading the encrypted video, a server can cache and download the video after agreeing, and the computer video leakage protection based on the encryption technology refers to protecting confidentiality, integrity and availability of the computer video data by technical means so as to prevent video leakage and abuse. At present, leakage prevention management cannot be performed on videos downloaded by authorized users, the risk of video leakage still exists, the authorized users acquire video resources in a video caching mode, and the video resources are transferred to an illegal network station for profit-making.
The server is provided with a light-weight monitoring plug-in; the light-weight monitoring plug-in is a monitoring program plug-in with smaller volume and less occupied resources and is used for monitoring and managing user behaviors; the first login user is any authorized user; the first video is any video provided by a server; after a first login user clicks the first video and sends a downloading request instruction, the server acquires user authority information and a downloading authority constraint range when receiving the downloading request instruction of the first video of the first login user, wherein the user authority information can be user identity and user in a department, and the downloading authority constraint range is that which part of videos, such as sports event videos corresponding to sports channel members, is authorized to be downloaded by the first login user;
when the user authority information belongs to the downloading authority constraint range, the first login user is authorized to download the first video, the server encrypts the first video image by using an encryption technology, and the lightweight monitoring plug-in and the encrypted first video image are simultaneously stored as a first video data packet so as to ensure the safety of video data;
by using encryption technology and lightweight monitoring plug-in, the computer video data is safely stored and access controlled, so that confidentiality, integrity and availability of the video data are ensured, data leakage and abuse are prevented, and meanwhile, the method can limit access and downloading of the video data by a user according to user permission information and downloading permission constraint range, so that the security of the video data is improved.
S30: transmitting the first video data packet to a local database of the first login user based on a preset video playing platform, activating the lightweight monitoring plug-in, and acquiring transmission state information and playing state information of the first video data packet;
step S30 includes the steps of:
s31: acquiring first playing platform identity information of transmission basic information of the first video data packet according to the lightweight monitoring plug-in, wherein the transmission basic information comprises first physical address information of the local database and second physical address information of a receiving end;
s32: when the first physical address information and the second physical address information are inconsistent, generating an abnormal transmission state and adding the abnormal transmission state into the transmission state information;
s33: when the first physical address information is consistent with the second physical address information, generating a conventional transmission state and adding the conventional transmission state information into the transmission state information;
s34: when the identity information of the first playing platform is inconsistent with the identity information of the second playing platform stored by the lightweight monitoring plug-in, generating an abnormal playing state and adding the abnormal playing state into the playing state information;
s35: and when the first playing platform identity information is consistent with the second playing platform identity information stored by the lightweight monitoring plug-in, generating a conventional playing state and adding the conventional playing state information into the playing state information.
Specifically, the communication connection between the terminal corresponding to the first login user and the server is utilized, the first video data packet is transmitted to a local database of the first login user based on a preset video playing platform, meanwhile, in the transmission process, the lightweight monitoring plug-in is activated, the transmission state information and the playing state information of the first video data packet are monitored and acquired, the transmission state information is used for representing the transmission condition of the first video data packet, and related indexes such as transmission progress and transmission speed are related; the playing state information is used for representing the playing state of the first video data packet and relates to relevant indexes such as playing progress, playing duration and the like;
further, the transmission basic information refers to physical address information of the video data packet, including first physical address information of the local database and second physical address information of the receiving end, where the first physical address information and the second physical address information refer to source addresses and destination addresses in the video transmission process, and are used for determining a transmission path and a target device; according to the lightweight monitoring plug-in, monitoring and obtaining first playing platform identity information of transmission basic information of the first video data packet, wherein the first playing platform identity information is login identity information corresponding to a preset video playing platform in the transmission process, and comprises a user contact mode and user online time length;
the normal transmission state refers to a normal state in the video transmission process, such as transmission speed, delay and the like; the transmission state information is state information in the video transmission process, and is used for monitoring and analyzing abnormal conditions in the transmission process, including network interruption, data packet loss or damage; the first playing platform identity information and the second playing platform identity information refer to the identity information of the playing platform, and are used for confirming the identity of the playing platform and avoiding the abnormal playing problem caused by inconsistent identity information; the abnormal playing state refers to abnormal conditions such as blocking and picture distortion in the video playing process; the playing state information is state information in the video playing process and is used for monitoring and analyzing abnormal conditions in the playing process;
comparing the first physical address information with the second physical address information: when the first physical address information and the second physical address information are inconsistent, the abnormal transmission is indicated to occur, and the network transmission is possible, an abnormal transmission state is generated at the moment, and the abnormal transmission state is added into the transmission state information; when the first physical address information and the second physical address information are consistent, including: the first case is that own and own device transmissions are directly ignored (downloading device and playing device are the same device); the second case is that the transmission is transmitted to others, and the transmission cannot be transmitted remotely, and is very limited, so that the transmission is considered normal, and a conventional transmission state is generated and added into the transmission state information;
by monitoring and recording the state information in the video transmission process and the state information in the playing process, abnormal conditions are found and processed in time, stability and reliability of video transmission and playing are ensured, and meanwhile, the abnormal playing problem caused by inconsistent identity information is avoided by comparing the identity information of different platforms.
S40: when the transmission state information is in an abnormal transmission state or/and the play state information is in an abnormal play state, activating a video encryption sub-plug-in of the lightweight monitoring plug-in, encrypting the first video image stream and obtaining a second video data packet;
s50: and replacing the first video data packet with the second video data packet for transmission or/and playing.
As shown in fig. 2, step S40 includes the steps of:
s41: acquiring first image sequence information of the first video image stream;
s42: performing sequence random adjustment on the first video image stream to obtain a second video image stream;
s43: acquiring second image sequence information of the second video image stream;
s44: performing dispersion analysis on the second image sequence information based on the first image sequence information to obtain a first dispersion coefficient;
s45: and setting the second video image stream as the second video data packet when the first dispersion coefficient meets a first dispersion coefficient threshold value.
Specifically, the video encryption sub-plug-in is a software component or a functional module for encrypting and decrypting video data, and is commonly used for transforming the video data by a first video data packet and a chaotic sequence to hide the original form of the video, so as to obtain a second video data packet, wherein the obtained second video data packet cannot realize normal play; when the transmission state information is an abnormal transmission state or/and the playing state information is an abnormal playing state, the computer video leakage protection system based on the encryption technology activates the video encryption sub-plug-in of the light-weight monitoring plug-in, encrypts the first video image stream to obtain a second video data packet, and simultaneously replaces the first video data packet with the encrypted second video data packet to transmit or/and play, and because the second video data packet cannot realize normal playing, illegal reloading and playing of the video can be avoided by utilizing the method;
further, the first video image stream refers to a process that the first video data packets are transmitted in the form of a continuous image stream; the first image sequence information refers to related information of a series of images in the first video image stream, such as image frame rate, resolution, etc.; comparing the first video data packet to obtain first image sequence information of the first video image stream; the random sequence adjustment means that the chaotic sequence is used for carrying out random adjustment on the image sequence in the first video image stream so as to hide the original form of the video and realize encryption of the first video image stream; performing sequence random adjustment on the first video image stream to obtain a second video image stream;
acquiring second image sequence information of the second video image stream; the dispersion analysis refers to carrying out dispersion analysis on different parts of the first video image stream and the second video image stream so as to evaluate the quality of video transmission and playing; the first dispersion coefficient refers to a difference coefficient between different parts in the first video image stream and the second video image stream, and is used for evaluating whether the corresponding form of the first video data packet is completely hidden; performing dispersion analysis on the second image sequence information based on the first image sequence information to obtain a first dispersion coefficient; setting a first dispersion coefficient threshold value which is not lower than 85%; when the first dispersion coefficient does not meet the first dispersion coefficient threshold value, indicating that the second video image stream may deliver valid image information; when the first dispersion coefficient meets a first dispersion coefficient threshold value, indicating that the second video image stream cannot transmit effective and reliable image information, and setting the second video image stream as the second video data packet; by monitoring and recording the state information in the video transmission and playing process, the corresponding form of the first video data packet is thoroughly hidden, the identity information of different platforms is compared, and the information received by an unauthorized user and successfully read the first video data packet is avoided.
The embodiment of the application also comprises the following steps:
s461: when the first dispersion coefficient meets a first dispersion coefficient threshold value, acquiring an ith frame image of the second video image stream;
s462: acquiring first pixel point positioning information of the ith frame image;
s463: randomly rearranging pixel points of the ith frame image to obtain an ith frame image rearranging result;
s464: acquiring second pixel point positioning information of the i-th frame image rearrangement result;
s465: performing dispersion analysis on the second pixel point positioning information based on the first pixel point positioning information to obtain a second dispersion coefficient;
s466: when the second dispersion coefficient meets a second dispersion coefficient threshold value, adding the i-th frame image rearrangement result into a third video image stream;
s467: and setting the third video image stream as the second video data packet.
Step S44 includes the steps of:
s441: constructing a first dispersion coefficient evaluation formula:
s442: wherein,a j-th order of the pictures representing the first picture sequence information,>the order of the pictures representing the j-th order in the second picture sequence information, < >>Characterizing the order of the j-1 th order image in the second image sequence information,/for the order of the j-1 th order image>The order of the pictures representing the j+1th order in the second picture sequence information, +.> and />Characterizing normalized tuning parameters,/->Characterization of the total number of images>Characterizing a first dispersion coefficient;
s443: and performing dispersion analysis on the second image sequence information based on the first image sequence information according to the first dispersion coefficient evaluation formula to acquire the first dispersion coefficient.
Step S465 includes the steps of:
s465-1: traversing the positioning information of the first pixel point to construct a k pixel neighborhood, wherein the k pixel neighborhood refers to a neighborhood obtained by drawing a circle by taking any one pixel point as a circle center and taking k pixels as radiuses;
s465-2: constructing a second dispersion coefficient evaluation formula:
s465-3: wherein,positioning information of a first pixel representing the positioning information of the first pixel,/for the first pixel>Positioning information characterizing the positioning information of the first pixel at the second pixel,/I>Representing the positioning information of the t pixel point positioning information of the k pixel neighborhood of the first pixel point in the positioning information of the second pixel point, wherein Q is the total number of the pixel points of the k pixel neighborhood of the first pixel point,total number of pixels for the first pixel location information,/for the first pixel location information> and />For normalizing the adjustment parameters->Characterizing a second dispersion coefficient;
s465-4: and performing dispersion analysis on the first pixel point positioning information and the second pixel point positioning information according to the k pixel neighborhood and the second dispersion coefficient evaluation formula to acquire the second dispersion coefficient.
Specifically, the first dispersion coefficient and the second dispersion coefficient: the method is an index for measuring the data dispersion degree and is used for describing the distribution condition of pixel points, wherein a first dispersion coefficient refers to the dispersion coefficient of the positioning information of a first pixel point, and a second dispersion coefficient refers to the dispersion coefficient of the positioning information of a second pixel point; when the first dispersion coefficient meets a first dispersion coefficient threshold value, acquiring an ith frame image of the second video image stream; the pixel positioning information refers to the position information of each pixel in the video image, and comprises an abscissa and an ordinate; acquiring first pixel point positioning information of the ith frame image; the random rearrangement of the pixel points refers to random scrambling of the sequence of the pixel points in the video image so as to change the positions and distribution conditions of the pixel points, thereby avoiding the leakage of the ith frame of image and further increasing the safety of the video; randomly rearranging pixel points of the ith frame image to obtain an ith frame image rearranging result;
the second pixel point positioning information is the position information of randomly rearranged pixel points of the pixel points, and comprises an abscissa and an ordinate; the video consists of a frame of image, and the ith frame of image refers to the ith image; acquiring second pixel point positioning information of the i-th frame image rearrangement result; performing dispersion analysis on the second pixel point positioning information based on the first pixel point positioning information to obtain a second dispersion coefficient; setting a second dispersion coefficient threshold value; when the second dispersion coefficient does not meet the second dispersion coefficient threshold value, the pixel sequence in the image corresponding to the second pixel positioning information still keeps a certain rule, and the image corresponding to the first pixel positioning information can be restored; when the second dispersion coefficient meets a second dispersion coefficient threshold value, the fact that the sequence of the pixels in the image corresponding to the second pixel positioning information does not have any rule is indicated, and the image corresponding to the first pixel positioning information cannot be directly restored; adding the i-th frame image rearrangement result into a third video image stream; and setting the third video image stream as the second video data packet.
The video security is effectively protected, the video is prevented from being illegally transmitted, and the original form of the video is destroyed through random rearrangement and dispersion analysis of the pixel points, so that unauthorized users are difficult to guess and crack the video content.
Further, performing a dispersibility analysis on the second image sequence information based on the first image sequence information to obtain a first dispersion coefficient, including, after multiple verifications and generalizations, constructing a first dispersion coefficient evaluation formula:
, wherein ,/>A j-th order of the pictures representing the first picture sequence information,>the order of the pictures representing the j-th order in the second picture sequence information, < >>Characterizing the order of the j-1 th order image in the second image sequence information,/for the order of the j-1 th order image>The order of the pictures representing the j+1th order in the second picture sequence information, +.> and />Characterizing normalized tuning parameters,/->Characterization of the total number of images>Representing a first dispersion coefficient, wherein the j-th image represents the j-th image in the image sequence, the sequence in the first image sequence is represented by the total number of images, the number of images contained in the first image sequence is represented by the total number of images, and the second image sequence information is subjected to dispersion analysis based on the first image sequence information according to the first dispersion coefficient evaluation formula, so that the first dispersion coefficient is obtained;
by performing the dispersion analysis on the first image sequence information and the second image sequence information, the rule that the pixel points of the images in the second image sequence information exist in sequence can be avoided, and the rule that the pixel points of the images in the first image sequence information exist in sequence can still be kept, so that the unauthorized user is difficult to guess and crack the video content. Specifically, the dispersion analysis technology damages the original form of the video by carrying out random rearrangement and dispersion analysis on the pixel point positions, thereby effectively improving the safety and reliability of the video.
Further, performing a dispersion analysis on the second pixel positioning information based on the first pixel positioning information to obtain a second dispersion coefficient, where the k pixel neighborhood refers to a neighborhood obtained by drawing a circle with any one pixel as a center and k pixels as radii, in other words, for a given pixel, the k pixel neighborhood includes surrounding k pixels with the pixel as a center;
traversing the positioning information of the first pixel point to construct a k pixel neighborhood;
constructing a second dispersion coefficient evaluation formula:, wherein ,/>Positioning information of a first pixel representing the positioning information of the first pixel,/for the first pixel>Positioning information characterizing the positioning information of the first pixel at the second pixel,/I>The positioning information of the t pixel point positioning information of the k pixel neighborhood representing the first pixel point in the second pixel point positioning information is represented, Q is the total number of the pixel points of the k pixel neighborhood of the first pixel point, and Q is the sum of the pixel points of the k pixel neighborhood of the first pixel point>Total number of pixels in k pixel neighborhood corresponding to the first pixel positioning information, for the first pixel> and />For normalizing the adjustment parameters->Characterizing a second dispersion coefficient, wherein the t-th pixel positioning information refers to the position information of the t-th pixel in the k-pixel neighborhood of the first pixel;
and carrying out substitution operation according to the k pixel neighborhood and the second dispersion coefficient evaluation formula, carrying out dispersion analysis on the first pixel point positioning information and the second pixel point positioning information, and obtaining the second dispersion coefficient to provide support for dispersion coefficient evaluation.
As shown in fig. 3, the embodiment of the present application further includes:
s468-1: when the first dispersion coefficient does not meet the first dispersion coefficient threshold value, carrying out repeated sequence random adjustment on the first video image stream;
s468-2: and when the second dispersion coefficient does not meet the second dispersion coefficient threshold value, repeating random rearrangement of pixel points is carried out on the ith frame of image.
In particular, when the first dispersion coefficient does not meet a first dispersion coefficient threshold, indicating that the second video image stream may deliver valid image information, in which case the first video image stream is subjected to a repeated sequence random adjustment; when the second dispersion coefficient does not meet the second dispersion coefficient threshold, it indicates that the sequence of pixels in the image corresponding to the second pixel positioning information still keeps a certain rule, and the image corresponding to the first pixel positioning information can be restored.
In summary, the method and the system for protecting computer video leakage based on encryption technology provided by the embodiment of the application have the following technical effects:
1. when a downloading request instruction of a first video of a first login user is received, acquiring user permission information and a downloading permission constraint range; when the user authority information belongs to the downloading authority constraint range, the lightweight monitoring plug-in unit and the first video image stream are stored simultaneously as a first video data packet; transmitting the first video data packet to a local database of a first login user based on a preset video playing platform, activating a lightweight monitoring plug-in, and acquiring transmission state information and playing state information of the first video data packet; when the transmission state information is in an abnormal transmission state or/and the playing state information is in an abnormal playing state, activating a video encryption sub-plug-in of the lightweight monitoring plug-in, encrypting the first video image stream and obtaining a second video data packet; the application provides a computer video leakage protection method and system based on encryption technology, which can realize the leakage prevention management of the video downloaded by the authorized user, prevent the illegal acquisition of the video, effectively improve the safety and privacy of the data and avoid the illegal access and use of the video.
2. Since the first image sequence information for acquiring the first video image stream is adopted; performing sequence random adjustment on the first video image stream to obtain a second video image stream; acquiring second image sequence information of a second video image stream; performing dispersion analysis on the second image sequence information based on the first image sequence information to obtain a first dispersion coefficient; and setting the second video image stream as the second video data packet when the first dispersion coefficient meets the first dispersion coefficient threshold value. By monitoring and recording the state information in the video transmission and playing process, the corresponding form of the first video data packet is thoroughly hidden, the identity information of different platforms is compared, and the information received by an unauthorized user and successfully read the first video data packet is avoided.
Example two
Based on the same inventive concept as the computer video leakage protection method based on encryption technology in the foregoing embodiments, as shown in fig. 4, an embodiment of the present application provides a computer video leakage protection system based on encryption technology, where the system includes:
the instruction receiving module 100 is configured to obtain user permission information and a download permission constraint range when receiving a download request instruction of a first video of a first login user;
the simultaneous storage module 200 is configured to store the lightweight monitoring plug-in and the first video image stream simultaneously as a first video data packet when the user permission information belongs to the download permission constraint range;
the plug-in activation module 300 is configured to transmit the first video data packet to a local database of the first login user based on a preset video playing platform, activate the lightweight monitoring plug-in, and obtain transmission status information and playing status information of the first video data packet;
the image stream encryption module 400 is configured to activate a video encryption sub-plug-in of the lightweight monitoring plug-in when the transmission status information is in an abnormal transmission status or/and the play status information is in an abnormal play status, encrypt the first video image stream, and obtain a second video data packet;
and the data packet replacing module 500 is configured to replace the first video data packet with the second video data packet for transmission or/and playing.
Further, the plug-in activation module 300 is configured to perform the following steps:
acquiring first playing platform identity information of transmission basic information of the first video data packet according to the lightweight monitoring plug-in, wherein the transmission basic information comprises first physical address information of the local database and second physical address information of a receiving end;
when the first physical address information and the second physical address information are inconsistent, generating an abnormal transmission state and adding the abnormal transmission state into the transmission state information;
when the first physical address information is consistent with the second physical address information, generating a conventional transmission state and adding the conventional transmission state information into the transmission state information;
when the identity information of the first playing platform is inconsistent with the identity information of the second playing platform stored by the lightweight monitoring plug-in, generating an abnormal playing state and adding the abnormal playing state into the playing state information;
and when the first playing platform identity information is consistent with the second playing platform identity information stored by the lightweight monitoring plug-in, generating a conventional playing state and adding the conventional playing state information into the playing state information.
Further, the image stream encryption module 400 is configured to perform the following steps:
acquiring first image sequence information of the first video image stream;
performing sequence random adjustment on the first video image stream to obtain a second video image stream;
acquiring second image sequence information of the second video image stream;
performing dispersion analysis on the second image sequence information based on the first image sequence information to obtain a first dispersion coefficient;
and setting the second video image stream as the second video data packet when the first dispersion coefficient meets a first dispersion coefficient threshold value.
Further, the image stream encryption module 400 is further configured to perform the following steps:
when the first dispersion coefficient meets a first dispersion coefficient threshold value, acquiring an ith frame image of the second video image stream;
acquiring first pixel point positioning information of the ith frame image;
randomly rearranging pixel points of the ith frame image to obtain an ith frame image rearranging result;
acquiring second pixel point positioning information of the i-th frame image rearrangement result;
performing dispersion analysis on the second pixel point positioning information based on the first pixel point positioning information to obtain a second dispersion coefficient;
when the second dispersion coefficient meets a second dispersion coefficient threshold value, adding the i-th frame image rearrangement result into a third video image stream;
and setting the third video image stream as the second video data packet.
Further, the image stream encryption module 400 is further configured to perform the following steps:
constructing a first dispersion coefficient evaluation formula:
wherein ,a j-th order of the pictures representing the first picture sequence information,>the order of the pictures representing the j-th order in the second picture sequence information, < >>Characterizing the order of the j-1 th order image in the second image sequence information,/for the order of the j-1 th order image>The order of the pictures representing the j+1th order in the second picture sequence information, +.> and />Characterizing normalized tuning parameters,/->Characterization of the total number of images>Characterizing a first dispersion coefficient;
and performing dispersion analysis on the second image sequence information based on the first image sequence information according to the first dispersion coefficient evaluation formula to acquire the first dispersion coefficient.
Further, the image stream encryption module 400 is further configured to perform the following steps:
traversing the positioning information of the first pixel point to construct a k pixel neighborhood, wherein the k pixel neighborhood refers to a neighborhood obtained by drawing a circle by taking any one pixel point as a circle center and taking k pixels as radiuses;
construction of a second dispersion coefficient evaluationEstimating an equation:
wherein ,positioning information of a first pixel representing the positioning information of the first pixel,/for the first pixel>Positioning information characterizing the positioning information of the first pixel at the second pixel,/I>The positioning information of the t pixel point positioning information of the k pixel neighborhood representing the first pixel point in the second pixel point positioning information is represented, Q is the total number of the pixel points of the k pixel neighborhood of the first pixel point, and Q is the sum of the pixel points of the k pixel neighborhood of the first pixel point>Total number of pixels for the first pixel location information,/for the first pixel location information> and />For normalizing the adjustment parameters->Characterizing a second dispersion coefficient;
and performing dispersion analysis on the first pixel point positioning information and the second pixel point positioning information according to the k pixel neighborhood and the second dispersion coefficient evaluation formula to acquire the second dispersion coefficient.
Further, the image stream encryption module 400 is further configured to perform the following steps:
when the first dispersion coefficient does not meet the first dispersion coefficient threshold value, carrying out repeated sequence random adjustment on the first video image stream;
and when the second dispersion coefficient does not meet the second dispersion coefficient threshold value, repeating random rearrangement of pixel points is carried out on the ith frame of image.
Any of the steps of the methods described above may be stored as computer instructions or programs in a non-limiting computer memory and may be called by a non-limiting computer processor to identify any method for implementing an embodiment of the present application, without unnecessary limitations.
Further, the first or second element may not only represent a sequential relationship, but may also represent a specific concept, or/and refer to individual or total selection of elements. It will be apparent to those skilled in the art that various modifications and variations can be made to the present application without departing from the scope of the application. Thus, the present application is intended to include such modifications and alterations insofar as they come within the scope of the application or the equivalents thereof.

Claims (8)

1. The computer video leakage protection method based on encryption technology is characterized by being applied to a server, wherein the server is provided with a lightweight monitoring plug-in unit, and the method comprises the following steps:
when a downloading request instruction of a first video of a first login user is received, acquiring user permission information and a downloading permission constraint range;
when the user authority information belongs to the downloading authority constraint range, the lightweight monitoring plug-in unit and the first video image stream are stored simultaneously as a first video data packet;
transmitting the first video data packet to a local database of the first login user based on a preset video playing platform, activating the lightweight monitoring plug-in, and acquiring transmission state information and playing state information of the first video data packet;
when the transmission state information is in an abnormal transmission state or/and the play state information is in an abnormal play state, activating a video encryption sub-plug-in of the lightweight monitoring plug-in, encrypting the first video image stream and obtaining a second video data packet;
and replacing the first video data packet with the second video data packet for transmission or/and playing.
2. The method of claim 1, wherein transmitting the first video data packet to the local database of the first login user based on a preset video playing platform, activating the lightweight monitoring plug-in, and obtaining transmission status information and playing status information of the first video data packet, comprises:
acquiring first playing platform identity information of transmission basic information of the first video data packet according to the lightweight monitoring plug-in, wherein the transmission basic information comprises first physical address information of the local database and second physical address information of a receiving end;
when the first physical address information and the second physical address information are inconsistent, generating an abnormal transmission state and adding the abnormal transmission state into the transmission state information;
when the first physical address information is consistent with the second physical address information, generating a conventional transmission state and adding the conventional transmission state information into the transmission state information;
when the identity information of the first playing platform is inconsistent with the identity information of the second playing platform stored by the lightweight monitoring plug-in, generating an abnormal playing state and adding the abnormal playing state into the playing state information;
and when the first playing platform identity information is consistent with the second playing platform identity information stored by the lightweight monitoring plug-in, generating a conventional playing state and adding the conventional playing state information into the playing state information.
3. The method of claim 1, wherein when the transmission status information is an abnormal transmission status, or/and the play status information is an abnormal play status, activating a video encryption sub-plug-in of the lightweight monitoring plug-in, encrypting the first video image stream, and obtaining a second video data packet, comprising:
acquiring first image sequence information of the first video image stream;
performing sequence random adjustment on the first video image stream to obtain a second video image stream;
acquiring second image sequence information of the second video image stream;
performing dispersion analysis on the second image sequence information based on the first image sequence information to obtain a first dispersion coefficient;
and setting the second video image stream as the second video data packet when the first dispersion coefficient meets a first dispersion coefficient threshold value.
4. A method as recited in claim 3, further comprising:
when the first dispersion coefficient meets a first dispersion coefficient threshold value, acquiring an ith frame image of the second video image stream;
acquiring first pixel point positioning information of the ith frame image;
randomly rearranging pixel points of the ith frame image to obtain an ith frame image rearranging result;
acquiring second pixel point positioning information of the i-th frame image rearrangement result;
performing dispersion analysis on the second pixel point positioning information based on the first pixel point positioning information to obtain a second dispersion coefficient;
when the second dispersion coefficient meets a second dispersion coefficient threshold value, adding the i-th frame image rearrangement result into a third video image stream;
and setting the third video image stream as the second video data packet.
5. The method of claim 3, wherein performing a dispersion analysis on the second image sequence information based on the first image sequence information to obtain a first dispersion coefficient comprises:
constructing a first dispersion coefficient evaluation formula:
wherein ,a j-th order of the pictures representing the first picture sequence information,>the order of the pictures representing the j-th order in the second picture sequence information, < >>Characterizing the order of the j-1 th order image in the second image sequence information,/for the order of the j-1 th order image>The order of the pictures representing the j+1th order in the second picture sequence information, +.> and />Characterizing normalized tuning parameters,/->Characterization of the total number of images>Characterizing a first dispersion coefficient;
and performing dispersion analysis on the second image sequence information based on the first image sequence information according to the first dispersion coefficient evaluation formula to acquire the first dispersion coefficient.
6. The method of claim 4, wherein performing a dispersion analysis on the second pixel location information based on the first pixel location information to obtain a second dispersion coefficient comprises:
traversing the positioning information of the first pixel point to construct a k pixel neighborhood, wherein the k pixel neighborhood refers to a neighborhood obtained by drawing a circle by taking any one pixel point as a circle center and taking k pixels as radiuses;
constructing a second dispersion coefficient evaluation formula:
wherein ,positioning information of a first pixel representing the positioning information of the first pixel,/for the first pixel>Positioning information characterizing the positioning information of the first pixel at the second pixel,/I>The positioning information of the t pixel point positioning information of the k pixel neighborhood representing the first pixel point in the second pixel point positioning information is represented, Q is the total number of the pixel points of the k pixel neighborhood of the first pixel point, and Q is the sum of the pixel points of the k pixel neighborhood of the first pixel point>Total number of pixels for the first pixel location information,/for the first pixel location information> and />For normalizing the adjustment parameters->Characterizing a second dispersion coefficient;
and performing dispersion analysis on the first pixel point positioning information and the second pixel point positioning information according to the k pixel neighborhood and the second dispersion coefficient evaluation formula to acquire the second dispersion coefficient.
7. The method as recited in claim 4, further comprising:
when the first dispersion coefficient does not meet the first dispersion coefficient threshold value, carrying out repeated sequence random adjustment on the first video image stream;
and when the second dispersion coefficient does not meet the second dispersion coefficient threshold value, repeating random rearrangement of pixel points is carried out on the ith frame of image.
8. A computer video leakage protection system based on encryption technology, for implementing a computer video leakage protection method based on encryption technology as claimed in any one of claims 1 to 7, comprising:
the instruction receiving module is used for acquiring user permission information and a downloading permission constraint range when receiving a downloading request instruction of a first video of a first login user;
the simultaneous storage module is used for simultaneously storing the light-weight monitoring plug-in and the first video image stream as a first video data packet when the user permission information belongs to the downloading permission constraint range;
the plug-in activation module is used for transmitting the first video data packet to a local database of the first login user based on a preset video playing platform, activating the light-weight monitoring plug-in and acquiring transmission state information and playing state information of the first video data packet;
the image stream encryption module is used for activating a video encryption sub-plug-in of the lightweight monitoring plug-in when the transmission state information is in an abnormal transmission state or/and the play state information is in an abnormal play state, encrypting the first video image stream and obtaining a second video data packet;
and the data packet replacing module is used for replacing the first video data packet with the second video data packet for transmission or/and playing.
CN202310932843.4A 2023-07-27 2023-07-27 Computer video leakage protection method and system based on encryption technology Active CN116647717B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310932843.4A CN116647717B (en) 2023-07-27 2023-07-27 Computer video leakage protection method and system based on encryption technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310932843.4A CN116647717B (en) 2023-07-27 2023-07-27 Computer video leakage protection method and system based on encryption technology

Publications (2)

Publication Number Publication Date
CN116647717A CN116647717A (en) 2023-08-25
CN116647717B true CN116647717B (en) 2023-09-22

Family

ID=87623391

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310932843.4A Active CN116647717B (en) 2023-07-27 2023-07-27 Computer video leakage protection method and system based on encryption technology

Country Status (1)

Country Link
CN (1) CN116647717B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102655602A (en) * 2012-04-19 2012-09-05 北京交通大学 Decoding device for adaptive clients and plugin acquisition method
CN104883540A (en) * 2015-05-13 2015-09-02 成都三零凯天通信实业有限公司 Video monitoring client system based on NeoKylin operation system
CN105939491A (en) * 2016-05-25 2016-09-14 乐视控股(北京)有限公司 Video playing method and device
CN109348292A (en) * 2018-11-20 2019-02-15 广州易方信息科技股份有限公司 A kind of video segment method based on slice file byte-threshold
CN109905696A (en) * 2019-01-09 2019-06-18 浙江大学 A kind of recognition methods of the Video service Quality of experience based on encryption data on flows

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2929695A1 (en) * 2012-12-10 2015-10-14 Koninklijke KPN N.V. Digital rights management for segmented content

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102655602A (en) * 2012-04-19 2012-09-05 北京交通大学 Decoding device for adaptive clients and plugin acquisition method
CN104883540A (en) * 2015-05-13 2015-09-02 成都三零凯天通信实业有限公司 Video monitoring client system based on NeoKylin operation system
CN105939491A (en) * 2016-05-25 2016-09-14 乐视控股(北京)有限公司 Video playing method and device
CN109348292A (en) * 2018-11-20 2019-02-15 广州易方信息科技股份有限公司 A kind of video segment method based on slice file byte-threshold
CN109905696A (en) * 2019-01-09 2019-06-18 浙江大学 A kind of recognition methods of the Video service Quality of experience based on encryption data on flows

Also Published As

Publication number Publication date
CN116647717A (en) 2023-08-25

Similar Documents

Publication Publication Date Title
CN103026335B (en) Device for the secure key retrieval of stream media player differentiates
CN104270614B (en) A kind of video-encryption decryption method and device
US8566457B2 (en) Content delivery service providing apparatus and content delivery service terminal unit
US20090313477A1 (en) Dvr server and method for controlling access to monitoring device in network-based dvr system
US7650312B2 (en) Method and system to enable continuous monitoring of integrity and validity of a digital content
KR101522311B1 (en) A carrying-out system for images of the closed-circuit television with preview function
CN109274650B (en) Electronic image retrieval management system and method
CN109151506B (en) Method, system and server for operating video file
CN113411638A (en) Video file playing processing method and device, electronic equipment and storage medium
CN111400745A (en) Picture management method and device and electronic equipment
US20080148349A1 (en) Authorization to use content
US8893299B1 (en) Content keys for authorizing access to content
CN116193167A (en) Vehicle-mounted monitoring video file processing method and device
JP4599882B2 (en) Unauthorized browsing monitoring system
KR102131976B1 (en) User terminal apparatus and method for providing personal information thereby
US9521135B2 (en) Method and system for a computer-based, secured communication between data processing units
EP3910959A1 (en) Systems and methods for identifying a content receiving device
KR102365580B1 (en) Method and apparatus for managing integrally closed-circuit television providing abuse event information
CN116647717B (en) Computer video leakage protection method and system based on encryption technology
KR102016051B1 (en) Main server providing video export service capable of tracing an leaking point and operation method thereof
CN115547441A (en) Safety acquisition method and system based on personal health medical data
CN110691267B (en) TLS-based video stream address authentication method, storage medium, equipment and system
JP2012108739A (en) Digital moving image access control system and program
CN112954458A (en) Video occlusion method, device, electronic device and storage medium
KR20090022493A (en) Device authenticating apparatus, method and computer readable record-medium on which program for executing method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant