CN117633728B - Video cartoon digital copyright trading platform and copyright right-determining method based on blockchain - Google Patents

Video cartoon digital copyright trading platform and copyright right-determining method based on blockchain Download PDF

Info

Publication number
CN117633728B
CN117633728B CN202410108641.2A CN202410108641A CN117633728B CN 117633728 B CN117633728 B CN 117633728B CN 202410108641 A CN202410108641 A CN 202410108641A CN 117633728 B CN117633728 B CN 117633728B
Authority
CN
China
Prior art keywords
work
floating layer
information
file
picture
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410108641.2A
Other languages
Chinese (zh)
Other versions
CN117633728A (en
Inventor
冯明进
杨叶
袁永焱
杨锐
牛雪丽
刘广宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Yunshangxin Audiovisual Culture Technology Co ltd
Original Assignee
Chengdu Yunshangxin Audiovisual Culture Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Yunshangxin Audiovisual Culture Technology Co ltd filed Critical Chengdu Yunshangxin Audiovisual Culture Technology Co ltd
Priority to CN202410108641.2A priority Critical patent/CN117633728B/en
Publication of CN117633728A publication Critical patent/CN117633728A/en
Application granted granted Critical
Publication of CN117633728B publication Critical patent/CN117633728B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The video cartoon digital copyright trading platform based on the blockchain and the copyright right confirming method comprise the following steps: step 1, a user logs in a copyright trading platform to confirm identity information; step 2, uploading an undetermined copyrighted work by a user, and processing the copyrighted work into a picture file by a platform; meanwhile, generating work uploading information; step 3, identifying a floating layer file of the picture file to carry out material infringement judgment, and entering step 4 if the material infringement judgment is made; otherwise, enter step 5; step 4, after waiting for uploading the certification file by the user, performing a step 5; and 5, not judging the suspected infringed work, generating encryption information by the platform and implanting the encryption information into the work. By encrypting the rights-guaranteeing works, even if an infringer performs shearing editing on the rights-guaranteeing works to form new materials, the encryption information can not be eliminated, solidification of infringement is realized, and copyright protection and infringement judgment can be effectively performed on the edited electronic copyright works.

Description

Video cartoon digital copyright trading platform and copyright right-determining method based on blockchain
Technical Field
The invention belongs to the technical field of software, relates to data processing, and in particular relates to a video cartoon digital copyright trading platform and a copyright right determining method based on a blockchain.
Background
With the development of network technology and the wide application of smart phones, copyrighted works in electronic forms such as movie and television animation become the main copyrighted work embodiment form on the network, and due to the replicability of the electronic copyrighted works, the copyrighted works such as audio and video images are easy to edit and cut by utilizing image and audio editing software, etc., the infringement and theft of the electronic copyrighted works on the network are difficult to stop, and after the electronic copyrighted works such as videos and pictures are stolen, a pirate can hardly directly use the complete works, but splice the electronic copyrighted works by re-editing, clipping or adding other elements, so that infringement is difficult to be identified.
The Chinese patent CN111428207A discloses a digital copyright registration and transaction method based on a blockchain technology, the other Chinese patent CN111563823A discloses a network work copyright transaction processing method, device and system based on the blockchain, encryption processing in a blockchain form is carried out in the copyright confirmation and transaction process in the prior art, the theft of the complete copyright work can be monitored, but infringement identification in the re-editing creation of the copyright work after the transaction still lacks effective response means, and a copyright transaction platform in the prior art does not have effective checking mechanism for whether infringement exists among the copyright works of different authors uploaded successively.
Disclosure of Invention
In order to overcome the technical defects in the prior art, the invention discloses a video cartoon digital copyright trading platform and a copyright right confirming method based on a blockchain.
The invention discloses a video cartoon digital copyright right-determining method based on a block chain, which comprises the following steps:
step 1, a user logs in a copyright trading platform to confirm identity information;
step 2, uploading an undetermined copyrighted work by a user, identifying the type of the copyrighted work by a platform, and uniformly processing the copyrighted work into a picture file; meanwhile, generating work uploading information;
step 3, identifying a floating layer file of the picture file to carry out material infringement judgment, and entering step 4 if the material infringement judgment is made; otherwise, enter step 5;
step 4, after waiting for uploading the certification file by the user, performing a step 5;
step 5, not judging the suspected infringement work, generating encryption information by the platform and implanting the encryption information into the work, wherein the method specifically comprises the following steps of:
step 51, for the single picture file, directly using the single picture file as a key frame to enter the next step;
for a video picture set formed by continuous multi-frame pictures, screening key frame pictures from the picture set;
step 52, extracting video content characteristics from the key frames;
step 53, uploading information based on the identity information in step 1, the video content features obtained in step 52 together to generate encryption information, and uploading the trusted blockchain to form encryption information of the certificate on the blockchain;
step 54, embedding the encrypted information into a floating layer file of the picture file;
and 6, restoring the picture file into an original form, confirming the right, uploading and storing.
Preferably, the specific process of identifying the floating layer file of the picture file to perform the material infringement judgment in step 3 is as follows:
checking whether the picture file has a floating layer file, if not, entering a step 5, and if so, carrying out the following steps:
analyzing the floating layer file of the picture file, and checking whether encryption information exists in the floating layer file;
if the floating layer file has the encryption information, analyzing the user identity information contained in the encryption information, judging whether the user identity information is the same as the user identity information of the uploaded work, if so, ignoring the information, and otherwise, considering that the suspected infringement exists.
Preferably, the method for identifying the picture file in the step 3 is random extraction or extraction according to a set rule, and the set rule extraction is as follows: and (3) extracting only a plurality of frames from all the frame images within 1 second for analysis and inspection.
Preferably, the method for performing the key frame screening in the step 51 is any one of the following two methods:
method 1: setting fixed intervals, wherein each fixed interval selects one frame;
method 2: comparing two adjacent frames frame by frame, and marking a second frame of the adjacent frames with obvious change as a key frame;
the specific way of comparison is:
calculating pixel mean values of block images of two frames of pictures, calculating the sum of absolute values of pixel mean value difference values of block mean values of corresponding positions of the two frames of pictures, and defining the sum of absolute values as pixel difference P1 of two adjacent frames;
dividing two frames of pictures into G blocks, wherein the pixel mean value of each block is A ij The method comprises the steps of carrying out a first treatment on the surface of the Subscript i=1, 2, j=1, 2 … G
The pixel difference p1= Σ j |A 1j -A 2j I, j=1, 2 … G; g is the number of blocks of the picture, A ij Is the pixel mean value; the subscript i denotes a different picture, and i=1, 2; subscript j denotes different partitions, and j=1, 2 … G;
the pixel difference threshold P0 is set, and when P1 is greater than P0, the change is considered significant.
Preferably, the step 53 specifically includes:
utilizing the authorship hash value F1, the work hash value F2 and the video content characteristic F3 of the key frame of the work; obtaining first encryption information B1=F1+F2+F3, wherein an authorship hash value F1 is generated by the identity information obtained in the step 1, and a work hash value is generated by the work uploading information obtained in the step 2;
generating a plurality of coordinates according to the X X Y of the frame pixels of the video, wherein X and Y are respectively a horizontal pixel value and a vertical pixel value of a frame picture, and the coordinates are uniformly distributed on the picture;
for works with floating layer files but not judged to be infringing, directly implanting encryption information on the floating layer files according to the generated multiple coordinates;
for works without floating layer files, generating a transparent floating layer with the same size according to the size of a frame picture;
respectively carrying out floating layer marking on the encrypted information according to the generated coordinates to obtain a floating layer with the encrypted information;
and placing the floating layer on each corresponding key frame, and restoring each frame into a video file.
Preferably, if a transaction occurs after the work is authorized, the following steps are performed:
generating a unique transaction hash value F4 for the transaction;
then processing the work into a plurality of frames and screening key frames, and then obtaining second encryption information B2=F4 by using a transaction hash value F4 of the work;
then generating a plurality of new coordinates not repeated in step 53 according to the frame pixels x×y of the video;
respectively carrying out floating layer marking on the existing floating layers according to a plurality of new coordinates on the second encrypted information B2;
and finally, after the floating layer Tpng2 added with the second encryption information B2 is placed on each corresponding key frame, restoring each frame into a video file, uploading and storing.
Preferably, the floating layer mark specifically comprises:
generating an identification code according to the encryption information, wherein the identification code consists of a transparent color block and a colored block; storing the encryption information and the identification code in an associated manner;
adding a display command to the floating layer so that the pattern on the floating layer can be displayed;
selecting a specific area on the key frame, wherein the shape of the specific area is consistent with the shape of the identification code, and processing the color original color C0 at the position corresponding to the colored square of the identification code in the specific area to obtain a converted color C2;
and enabling the display effect of the superimposed color C1 of the colored square of the identification code and the transformed color C2 of the same position of the specific area after being superimposed to be equal to the original color C0 of the specific area;
a floating layer is placed over each corresponding keyframe.
Preferably, the encrypted information includes an identifier composed of identification information and identity information of the uploaded work.
The invention also discloses a film and television cartoon digital copyright trading platform based on the blockchain, which comprises one or more clients and further comprises:
the registration login module is used for registering login of a user and verifying identity information of the login user;
the work uploading module is used for logging in a user to upload works;
the work analysis module is used for converting the uploaded works into picture files;
the encryption information generation module is used for generating exclusive and unique encryption information for each uploaded work; the encryption information generation module is connected with a trusted blockchain;
the encryption information implantation module is used for implanting the encryption information generated by the encryption information generation module into the picture file generated by the work analysis module;
the infringement judging module is used for checking whether the picture file generated in the work analysis module contains encryption information or not and further judging whether the work is infringed or not;
the certification file uploading module is used for logging in a user to upload other certification files such as license certification materials and the like;
the right confirming module is used for confirming the right of the uploaded work;
and the memory is used for storing the copyrighted works.
Preferably, the encryption information implantation module further comprises an identification code generation module and a picture specific area processing module, wherein the identification code generation module is connected with a floating layer generation module, and the floating layer generation module and the picture specific area processing module are connected with a floating layer adding module.
By adopting the copyright trading platform and the copyright right-confirming method, through carrying out floating layer encryption on the right-confirming work, even if an infringer forms new materials after cutting and editing the right-confirming work, encryption information still cannot be eliminated, solidification of infringement is realized, and copyright protection and infringement judgment can be effectively carried out on the electronic copyright work after editing.
Drawings
FIG. 1 is a flowchart illustrating an embodiment of the copyright right determining method according to the present invention;
FIG. 2 is a schematic diagram of a specific implementation flow of step 2 and step 3 in the copyright right method according to the present invention;
FIG. 3 is a schematic diagram of an embodiment of the copyright trading platform according to the present invention;
fig. 4 is a schematic diagram of an embodiment of the encryption information implantation module according to the present invention.
Detailed Description
The following describes embodiments of the present invention in further detail with reference to fig. 1 to 4.
The copyright right confirming method of the invention, as shown in figure 1, comprises the following steps:
step 1, a user logs in a copyright trading platform to confirm identity information;
the identity information is used for confirming the identity of the user, the identity information can be used as the basis of encryption information in the subsequent step and the basis of judging whether to infringe or not in the subsequent step, and the copyrighted work with the same identity information, namely the authored copyright work owned by the author, cannot be regarded as infringement.
Step 2, uploading the copyright works which are not authorized by the user, identifying the types of the copyright works by the platform, and uniformly processing the copyright works into picture files; meanwhile, generating work uploading information;
for example, if the copyrighted work uploaded by the user is a picture file, the copyrighted work does not need to be processed; splitting the video file into picture files if the copyrighted works uploaded by the user are video files, and directly judging the piracy of the audio files contained in the video files by analyzing the tone, wherein the audio files generally can not be processed and identified later; when the copyright works uploaded by the user are compression packages, decompressing and then processing the copyright works to convert the copyright works into picture files;
after the image file is converted into the image file, the position of the camera usually moves and deflects in the video shooting process, so that the same object in the continuous frames is different in size, and the phenomenon of shaking and the like can occur.
The work uploading information is characteristic information during work uploading, and generally comprises information such as time, place, uploading person, login user and the like for work uploading, and encryption information generation for subsequent steps.
And 3, carrying out material infringement judgment, wherein the material infringement judgment specifically comprises the following steps:
checking whether the picture file has a floating layer file, if so, analyzing the floating layer file of the picture file, and checking whether encryption information exists in the floating layer file; if the floating layer file is not found, directly entering the step 5;
if the floating layer file has encryption information, analyzing user identity information contained in the encryption information, judging whether the user identity information is the same as the user uploading the work, if so, neglecting, otherwise, considering that suspected infringement exists;
the analysis of the picture file can be performed by analyzing and checking all frames, or can be performed by randomly extracting or extracting according to a set rule, for example, for a picture file obtained by analyzing a video file, only 1 frame is extracted for analyzing and checking 12 or 24 frames of images within 1 second. One implementation flow of step 2 and step 3 is shown in fig. 2.
As shown in fig. 2, for the case where encryption information exists, a piece of related information is generated for each existing authentic work, for example, an uploaded work, possibly obtained by splicing 20 seconds of videos of each of the copyrighted work a and copyrighted work B, which have been authenticated by the platform, information 1 is generated for indicating that the uploaded work is suspected of using copyrighted work a, and information 2 is generated for indicating that the uploaded work is suspected of using copyrighted work B.
Pushing out the judging conclusion for the work judged to be suspected of infringing, and entering a step 4, otherwise, entering a step 5;
step 4, waiting for the user to upload the certification file, and then carrying out the subsequent step 5;
where the proof file is typically license proof material provided by the user to the copyright holder of the infringing work, such as a copy of a copyright license transfer contract, or the like.
Step 5, the suspected infringed work is not judged, the platform generates encryption information and is implanted into the work, the encryption information is generated by specific information of the copyrighted work uploaded by a user, and the encryption information can comprise information such as authorship hash value, work copyright hash value, work uploading time, work uploading place, existing copyright transaction and the like based on a blockchain technology; so that the generated encrypted information is unique and exclusive to each uploaded work.
The encryption information is implanted into the picture file generated in the step 2, the implantation of the picture file can be carried out frame by frame, or the implantation can be randomly extracted or carried out according to a set rule, for example, the picture file obtained by analyzing the video file is implanted into only 1 frame of 12 or 24 frames of images within 1 second.
One embodiment of step 5 includes the steps of:
step 51, for the single picture file, directly taking the single picture file as a key frame, and entering the next step;
for a video picture set composed of continuous multi-frame pictures, key frame picture screening is performed from the picture set, wherein the key frame screening can be performed by setting fixed intervals, wherein one frame is selected for each fixed interval, for example, setting the fixed interval as 12 frames, and selecting one frame for each 12 frames;
or comparing two adjacent frames frame by frame, marking the second frame of the adjacent frames as a key frame,
the specific comparison mode is that the pixel mean value of the block images of two frames of pictures can be calculated, the sum of absolute values of the pixel mean value difference values of the block mean values at the corresponding positions of the two frames of pictures is calculated, and the sum of absolute values is defined as the pixel difference P1 of two adjacent frames;
for example, dividing two frames of pictures into G blocks, wherein the pixel mean value of each block is A ij The method comprises the steps of carrying out a first treatment on the surface of the Subscript i=1, 2, j=1, 2 … G
The pixel difference p1= Σ j |A 1j -A 2j I, j=1, 2 … G. The pixel difference threshold P0 is set, and when P1 is greater than P0, the change is considered significant.
In the above manner, by comparing the pixel mean value differences throughout the images, two adjacent frames of images with significant changes can be identified.
Step 52, extracting video content characteristics from the key frames: video content features may include features of color distribution, image texture, motion information, etc. of the video.
Wherein the color distribution can adopt color histogram description to confirm weight and store in a distributed mode, the image texture can use methods such as SIFT (scale invariant feature transform) or SURF (speeded up robust feature) to describe image texture information, and the optical flow method to describe motion information.
And 53, inputting the information uploaded by the works obtained in the step 2 into an encryption information generation module to generate unique text information serving as encryption information based on the extracted video content characteristics.
The encryption information may be a hash value, a serial number, or other form of unique text information.
The encryption information generation module can be connected with the trusted blockchain, and after the encryption information is generated, the encryption information can be directly stored and verified on the blockchain, so that the encryption information cannot be tampered and traced.
Hash encryption is adopted to generate a hash value as encryption information, and a typical basic operation mode is as follows: the data to be encrypted is formatted according to a certain rule to ensure that the same input data produces the same hash value. And (3) combining the identity information of the uploader obtained in the step (1) and the work uploading information obtained in the step (2) such as longitude and latitude coordinates of a video uploading place, video uploading time and the like into a character string with the length being 512 integer multiples, and filling the character string into the 512 integer multiples if the length of the data is not the 512 integer multiples. For SHA-256 hash algorithms, bit stuffing is typically used, i.e. a "1" is added first, then a "0" is added until the data length reaches an integer 512 times, 448 bits are added, then a 64 bit integer is added, the stuffed data is divided into 512 bit blocks, and the hash value is initialized.
There are six initial hash values under the SHA-256 algorithm mechanism, each being a 32-bit hexadecimal number. These initial values are loaded at the beginning of the algorithm and a series of operations are performed on each 512-bit block, including logical operations, bitwise operations, rotations, and SHA-256 algorithm specific logical functions. The operations iterate on each block, the current 256-bit hash value is updated, and after all blocks are processed, a 256-bit hash value is finally generated, namely the output encryption information.
The encryption information can be added at any one or more of the head, tail and center of the floating layer file, and the addition of the encryption information at multiple locations of the floating layer file has the advantage that even if a pirate cuts the picture file, for example cuts half of the picture file, the pirate can still find the complete encryption information in the floating layer file of the cut file.
In the following, a specific embodiment of encryption information generation and implantation is given, and in the present invention, unless a display command is explicitly added, the information added on the floating layer by default is not displayed in the picture.
After the user registers and signs up on the platform, the platform generates a unique authorship hash value F1 for the user based on the blockchain technology.
After the user uploads the video to the platform, the platform generates a unique work hash value F2 for the work based on the blockchain technique.
And then, after the uploaded video is processed, splitting the video file into a plurality of frames, and screening out key frames.
Then, splicing the authorship hash value F1, the work hash value F2 and the video content characteristic F3 of the key frame, and then performing coding operation BM to obtain first encryption information B1=BM (F1+F2+F3), namely, splicing and coding the first encryption information B1 as the authorship hash value F1, the work hash value F2 and the video content characteristic F3. The hash value of the work is generated by the uploading information of the work obtained in the step 2.
The purpose of the encoding operation BM is to shorten the information length of the first encrypted information, and may generate a short code library corresponding to the hash value in advance, and one-to-one correspond the longer hash value to the shorter short code, call the short code splicing corresponding to the hash value, and encode to obtain the first encrypted information.
Then, according to the frame pixels x×y of the video, five coordinates (X1, Y1), (X2, Y2), (X3, Y3), (X1, Y3), (X3, Y1) are generated, and the acquisition formulas are respectively:
x1=x10%, x2=x50%, x3=x90%, y1=y10%, y2=y50% and y3=y90%, and the calculated decimal point is directly discarded as a whole.
Where X and Y are a horizontal pixel value and a vertical pixel value of a frame picture, for example, x=1024, y=768, x1=102, x2=512, x3=921, y1=76, y2=384, y3=691, and five coordinates are (102, 76), (512, 384), (921, 691), (102, 691), (921, 76), respectively; the 5 points are near four corners of the frame and at the center of the frame respectively, and even if the picture is cut, it is possible to store a complete first encryption information B1 with high probability.
And a transparent floating layer with the same size is generated according to the size of the frame picture.
And marking the first encrypted information B1 on the floating layer according to 5 coordinates respectively, and leaving the transparent watermark to obtain the floating layer Tpng1 with the first encrypted information.
And finally, after the floating layer Tpng1 is placed on each corresponding key frame picture, each frame is restored into a video file.
In this embodiment, if the work uploaded by the user has a floating layer and the floating layer has encrypted information, the user usually uses the authenticated work to create again, and the floating layer of part of the pictures has encrypted information, and when the encrypted information is added again, the coordinates of the original encrypted information are avoided.
A further specific embodiment of the generation of the encryption information is given below.
After the user purchases the video authorization, the platform generates a unique transaction hash value F4 for the transaction based on blockchain technology.
Then processing the video file purchased by the person into a plurality of frames, and then encoding the transaction hash value F4 of the work to obtain second encrypted information B2=F4;
then, according to the frame pixels x×y of the video, five coordinates (X4, Y1), (X5, Y2), (X6, Y3), (X4, Y3), and (X6, Y1) are generated, and the acquisition formulas are respectively:
X1=X*15%,X2=X*55%,X3=X*95%;Y1=Y*10%,Y2=Y*50%,Y3=Y*90%;
and respectively leaving the transparent watermarks on the existing floating layers according to 5 coordinates by the second encryption information B2 to obtain the floating layer Tpng2 with the transparent watermarks.
The coordinates of the addition of the second encrypted information B2 are different from the coordinates of the addition of the first encrypted information B1, and do not collide with the first encrypted information.
And finally, after the floating layer Tpng2 is placed on each corresponding key frame, each frame is restored into a video file.
The encryption information generation mode based on the original digital copyright DNA anti-counterfeiting encryption technology can effectively provide reliable digital copyright evidence. The specific background execution process comprises the following steps:
step 54, embedding the encrypted information into a floating layer of the picture for floating layer marking, wherein the encrypted information can be marked on each frame or key frames can be selected for marking; when a pirate intercepts one or a plurality of frames of the video, the intercepted video and the picture file only contain pictures embedded with encryption information, and the pictures are identified.
The floating layer file is in the form of long string characters, and the floating layer file does not affect the display effect of the picture, and after the encrypted information is implanted, the floating layer file is modified, but the picture display cannot be affected.
The floating layer file has the function of adding the watermark similar to the existing picture, and is different from the watermark in that the floating layer file is not added with a display command, so that all information on the floating layer file can not be displayed on the picture. Therefore, the floating layer does not add any information which can affect the display of the picture, but only embeds the encryption information which can not be displayed in the picture.
One specific implementation of adding floating layer files is:
and processing the video by using the open source computer program ffmpeg, generating encryption information in the processing process, applying a video filter, and adding a floating layer to each frame of picture of the video.
According to the invention, by adding the floating layer and adding the encryption information on the floating layer, on the premise of not influencing the display effect of the picture, different types of encryption information can be added everywhere in the floating layer, and theoretically, all areas of the picture can be covered, even if a pirate edits and cuts the picture, the encryption information can still be detected, and compared with the method of directly adding the edited encryption information in the picture file, the mode has higher flexibility, and the number and the positions of addition are not limited, so that the normal display of the picture can not be influenced.
In the above embodiment, the display attribute of the floating layer file is set to be not displayed, the floating layer mark is to delete the floating layer directly for preventing pirates, and the following embodiment may be adopted for the encryption information.
Adding a display command to the floating layer so that the pattern on the floating layer can be displayed;
generating a two-dimensional code or a bar code according to the encryption information, wherein the two-dimensional code is taken as an example, and the two-dimensional code consists of a transparent square block and a colored square block; storing the encryption information and the two-dimension code in a memory of a platform in an associated manner;
selecting specific areas on the key frame, typically areas with insignificant color change such as sky, and partial areas in the areas such as overall black shadows, which are typically located at the midpoints of four corners and four sides of the key frame; the shape of the specific area is consistent with the shape of the two-dimensional code, and the color original color C0 at the position corresponding to the colored square block of the two-dimensional code in the specific area is processed to obtain a conversion color C2;
the display effect after the superposition of the superposition color C1 of the two-dimensional code colored square and the transformation color C2 of the same position of the specific area is equal to the original color C0 of the specific area;
superposing the floating layer and the corresponding key frame;
for convenience in processing, the color of the colored square superimposed color C1 of the two-dimensional code is generally consistent everywhere, the original color C0 is subtracted from the superimposed color C1 to obtain a converted color C2, and when encrypted information identification is performed, if a floating layer exists, the two-dimensional code displayed on the floating layer is directly identified.
If the pirate removes the floating layer by technical means, the original picture cannot show the same display effect as the original picture because the original picture has been modified.
The grey value of the pixels of the naturally formed picture is approximately linearly changed in the area with insignificant color change, namely the grey value is gradually changed, and for the specific area after the processing, the two-dimensional code is intermittently hopped, the pixel value of the area corresponding to the colored square is reduced, the pixel value of the area corresponding to the transparent square is unchanged, so that the grey value of the specific area is leapfrog change, even if the grey value of the specific area cannot be identified by naked eyes due to insignificant color change of the specific area, the grey value of the specific area can be detected by software, and the picture can still be identified to be subjected to the encryption processing according to the invention, and the two-dimensional code can be restored according to the grey change of the specific area, for example, the grey value of a certain line is 19, 20, 19, 19, 14, 19, 15, 20, 14 and 20; it can be seen that the gray values of 14, 15 are significantly lower, i.e. these significantly lower gray changes can be considered as the areas corresponding to colored squares, while the remaining areas are areas corresponding to transparent squares.
Because the two-dimensional code information in the prior art has information redundancy, the two-dimensional code information is read completely, and only a large part of the two-dimensional code is read, so that part of the encrypted information can be identified.
The following is a further embodiment of the present invention:
the user name of the login platform is Miao Miao, and the account UID is STC 1286111267588804608;
the work number of the login user Miao Miao' uploaded the original digital work is STC1286324422755618816, and the name is blue science and technology internet big data propaganda video:
work class "file check code" for digital works: d2b58b0b7051a19d9a95e1dff1ffba6c ":
the registrar identity information of the login user includes a name: the ID card number of the right person is 5108888888888452X, and the login user has the right of uploading works and performing block chain right confirmation on the login platform.
The time for uploading the works is 2023, 7, 12 and 14 minutes, and the uploading place is Qinghai sheep district Shuncheng Dajie in Qinghai city of Sichuan province;
the uploaded work is a section of WMV video file of 1 minute and 15 seconds.
After the user logs in, the video file is resolved into a plurality of picture files through the work resolving module,
and checking the picture file to check whether the floating layer file exists, and if the floating layer file does not exist, judging that the floating layer file is impossible to be an infringement work.
If the floating layer file exists, continuously checking whether an encrypted information identifier exists in the floating layer file, if the encrypted information identifier is detected, analyzing the user information in the encrypted information identifier, wherein the analyzed user information is the logged user name Miao Miao, if the analyzed user information is different from the logged user name Miao Miao, judging that the work is suspected to be infringing.
If the user uploads the works without infringing, forming work uploading information according to the user name, the time, the place and the like of uploading the works;
extracting key frames in the pictures, and extracting color distribution, image textures, motion information and the like to form video content characteristics;
and uploading the work uploading information and the video content characteristics to an encryption information generating module to generate a unique digital identifier as encryption information.
The encryption information generation module is connected with the trusted blockchain, and after the encryption information is generated, the encryption information can be directly stored and verified on the blockchain, so that the encryption information cannot be tampered and traced. I.e. generates encryption information based on a trusted blockchain.
In yet another embodiment, a unique identifier may be added to the encrypted information to facilitate checking whether the encrypted information exists in the picture in step 3.
And adding an identifier into the encrypted information, wherein the identifier is Distributed storage X, distributed storage is identification information, X8 is eight-bit identity information, the identifier is added into the encrypted information of the key frame, and the encrypted information added with the identifier is respectively implanted into a plurality of coordinates of the floating layer file.
In the subsequent identification, only the identifier is found, whether the right-confirming work of the platform is quoted or not can be judged, and the owner user information of the right-confirming work is obtained rapidly according to the eight-bit identity information X8, so that whether the right-confirming work is suspected to be infringing or not is judged.
If the picture file obtained by analysis does not contain the floating layer, the encryption information is implanted after the floating layer is added.
And after the encrypted information is implanted, restoring the file and uploading the file to a cloud storage space of the copyright trading platform.
The copyright right confirming method can be used for judging whether copyright of the copyright works is infringed by the platform or not in the copyright works uploaded newly by the user, deciding whether to conduct right confirmation of the copyright works according to a judging result, and can also be used for judging whether other foreign works infringe the copyright of the copyright works of the platform or not, inputting the foreign works into the copyright trading platform, and conducting right infringement judgment according to the steps 1 to 3.
The method for confirming the rights of the digital rights of the movie and television cartoon can be realized based on the movie and television cartoon digital rights trading platform disclosed by the invention.
The copyright trading platform of the present invention includes one or more clients, as shown in fig. 3, and further includes:
the registration login module is used for registering login of a user and verifying identity information of the login user;
the work uploading module is used for logging in a user to upload works;
the work analysis module is used for converting the uploaded works into picture files;
the image processing and feature extracting module is used for preprocessing the image file and adding a floating layer to the image file without the floating layer; extracting visual content characteristics of the picture for generating encryption information;
the encryption information generation module is used for generating unique encryption information for each uploaded work; the said
The encryption information generation module is connected with an external trusted blockchain;
the encryption information implantation module is used for implanting the encryption information generated by the encryption information generation module into the floating layer of the picture file generated by the work analysis module;
the infringement judging module is used for checking whether the floating layer of the picture file generated in the work analysis module contains encryption information or not and further judging whether infringement exists or not;
the certification file uploading module is used for logging in a user to upload other certification files such as license certification materials and the like;
the right confirming module is used for confirming the right of the uploaded work;
and the memory is used for storing the copyrighted works.
Fig. 3 shows a typical data flow schematic diagram of the copyright trading platform in the present invention when performing the authorization operation, and in the specific embodiment shown in fig. 3, the memory is implemented by a cloud space.
In the specific embodiment shown in fig. 4, the encryption information implantation module includes an identification code generation module and a picture specific area processing module, where the identification code generation module is connected with a floating layer generation module, and the floating layer generation module and the picture specific area processing module are connected with a floating layer adding module.
In the specific embodiment of fig. 4, an identification code generating module generates an identification code, and a specific region processing module of a picture processes a specific region of a key frame, so that a display effect after superposition of a superposition color C1 of a colored square of the identification code and a transformation color C2 of the same position of the specific region is equal to an original color C0 of the specific region; generating a floating layer with an identification code and display command characters by a floating layer generating module, so that the identification code on the floating layer can be displayed; and finally adding the floating layer to the corresponding key frame by the floating layer adding module.
Embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The foregoing description of the preferred embodiments of the present invention is not obvious contradiction or on the premise of a certain preferred embodiment, but all the preferred embodiments can be used in any overlapped combination, and the embodiments and specific parameters in the embodiments are only for clearly describing the invention verification process of the inventor and are not intended to limit the scope of the invention, and the scope of the invention is still subject to the claims, and all equivalent structural changes made by applying the specification and the content of the drawings of the present invention are included in the scope of the invention.

Claims (9)

1. The movie and television cartoon digital copyright right-determining method based on the block chain is characterized by comprising the following steps of:
step 1, a user logs in a copyright trading platform to confirm identity information;
step 2, uploading an undetermined copyrighted work by a user, identifying the type of the copyrighted work by a platform, and uniformly processing the copyrighted work into a picture file; meanwhile, generating work uploading information;
step 3, identifying a floating layer file of the picture file to carry out material infringement judgment, and entering step 4 if the material infringement judgment is made; otherwise, enter step 5;
step 4, after waiting for uploading the certification file by the user, performing a step 5;
step 5, not judging the suspected infringement work, generating encryption information by the platform and implanting the encryption information into the work, wherein the method specifically comprises the following steps of:
step 51, for the single picture file, directly using the single picture file as a key frame to enter the next step;
for a video picture set formed by continuous multi-frame pictures, screening key frame pictures from the picture set;
step 52, extracting video content characteristics from the key frames;
step 53, uploading information based on the identity information in step 1, the video content features obtained in step 52 together to generate encryption information, and uploading the trusted blockchain to form encryption information of the certificate on the blockchain;
the step 53 specifically includes:
utilizing the authorship hash value F1, the work hash value F2 and the video content characteristic F3 of the key frame of the work; obtaining first encryption information B1=F1+F2+F3, wherein an authorship hash value F1 is generated by the identity information obtained in the step 1, and a work hash value is generated by the work uploading information obtained in the step 2;
generating a plurality of coordinates according to the X X Y of the frame pixels of the video, wherein X and Y are respectively a horizontal pixel value and a vertical pixel value of a frame picture, and the coordinates are uniformly distributed on the picture;
for works with floating layer files but not judged to be infringing, directly implanting encryption information on the floating layer files according to the generated multiple coordinates;
for works without floating layer files, generating a transparent floating layer with the same size according to the size of a frame picture;
respectively carrying out floating layer marking on the encrypted information according to the generated coordinates to obtain a floating layer with the encrypted information;
the floating layer is arranged on each corresponding key frame, and each frame is restored into a video file;
step 54, embedding the encrypted information into a floating layer file of the picture file;
and 6, restoring the picture file into an original form, confirming the right, uploading and storing.
2. The copyright right determining method according to claim 1, wherein the specific process of identifying the floating layer file of the picture file to perform the material infringement determination in step 3 is as follows:
checking whether the picture file has a floating layer file, if not, entering a step 5, and if so, carrying out the following steps:
analyzing the floating layer file of the picture file, and checking whether encryption information exists in the floating layer file;
if the floating layer file has the encryption information, analyzing the user identity information contained in the encryption information, judging whether the user identity information is the same as the user identity information of the uploaded work, if so, ignoring the information, and otherwise, considering that the suspected infringement exists.
3. The copyright verification method according to claim 1, wherein the method for identifying the picture file in the step 3 is random extraction or extraction according to a set rule, and the set rule extraction is: and (3) extracting only a plurality of frames from all the frame images within 1 second for analysis and inspection.
4. The copyright verification method as claimed in claim 1, wherein the key frame filtering method in the step 51 is any one of the following two methods:
method 1: setting fixed intervals, wherein each fixed interval selects one frame;
method 2: comparing two adjacent frames frame by frame, and marking a second frame of the adjacent frames with obvious change as a key frame;
the specific way of comparison is:
calculating pixel mean values of block images of two frames of pictures, calculating the sum of absolute values of pixel mean value difference values of block mean values of corresponding positions of the two frames of pictures, and defining the sum of absolute values as pixel difference P1 of two adjacent frames;
dividing two frames of pictures into G blocks, wherein the pixel mean value of each block is A ij The method comprises the steps of carrying out a first treatment on the surface of the Subscript i=1, 2, j=1, 2 … G
The pixel difference p1= Σ j |A 1j -A 2j |, j=1,2…G;G is the number of blocks of the picture, A ij Is the pixel mean value; the subscript i denotes a different picture, and i=1, 2; subscript j denotes different partitions, and j=1, 2 … G;
the pixel difference threshold P0 is set, and when P1 is greater than P0, the change is considered significant.
5. The copyright validation method of claim 1, wherein if a transaction occurs after the work validation, performing the steps of:
generating a unique transaction hash value F4 for the transaction;
then processing the work into a plurality of frames and screening key frames, and then obtaining second encryption information B2=F4 by using a transaction hash value F4 of the work;
then generating a plurality of new coordinates not repeated in step 53 according to the frame pixels x×y of the video;
respectively carrying out floating layer marking on the existing floating layers according to a plurality of new coordinates on the second encrypted information B2;
and finally, placing the floating layer Tpng2 added with the second encryption information B2 on each corresponding key frame, restoring each frame into a video file, uploading and storing.
6. The copyright verification method as claimed in claim 1 or 5, wherein said floating layer mark is specifically:
generating an identification code according to the encryption information, wherein the identification code consists of a transparent color block and a colored block; storing the encryption information and the identification code in an associated manner;
adding a display command to the floating layer so that the pattern on the floating layer can be displayed;
selecting a specific area on the key frame, wherein the shape of the specific area is consistent with the shape of the identification code, and processing the color original color C0 at the position corresponding to the colored square of the identification code in the specific area to obtain a converted color C2;
and the display effect after the superposition of the superposition color C1 of the identification code colored square and the transformation color C2 of the same position of the specific area is equal to the original color C0 of the specific area.
7. The copyright validation method of claim 1, wherein the encrypted information includes an identifier, the identifier consisting of identification information and identity information of the uploaded work.
8. Video cartoon digital copyright trading platform based on block chain, which is characterized by comprising one or more clients and further comprising:
the registration login module is used for registering login of a user and verifying identity information of the login user;
the work uploading module is used for logging in a user to upload works;
the work analysis module is used for converting the uploaded works into picture files;
the encryption information generation module is used for generating exclusive and unique encryption information for each uploaded work; the encryption information generation module is connected with a trusted blockchain;
the encryption information implantation module is used for implanting the encryption information generated by the encryption information generation module into the picture file generated by the work analysis module;
the infringement judging module is used for checking whether the picture file generated in the work analysis module contains encryption information or not and further judging whether the work is infringed or not;
the certification file uploading module is used for logging in a user to upload the license certification material file;
the right confirming module is used for confirming the right of the uploaded work; the method comprises the following steps of generating encryption information by a platform without judging the suspected infringement and implanting the encryption information into the work, wherein the method comprises the following steps of:
step 51, for the single picture file, directly using the single picture file as a key frame to enter the next step;
for a video picture set formed by continuous multi-frame pictures, screening key frame pictures from the picture set;
step 52, extracting video content characteristics from the key frames;
step 53, uploading information based on the identity information in step 1, the video content features obtained in step 52 together to generate encryption information, and uploading the trusted blockchain to form encryption information of the certificate on the blockchain;
the step 53 specifically includes:
utilizing the authorship hash value F1, the work hash value F2 and the video content characteristic F3 of the key frame of the work; obtaining first encryption information B1=F1+F2+F3, wherein an authorship hash value F1 is generated by the identity information obtained in the step 1, and a work hash value is generated by the work uploading information obtained in the step 2;
generating a plurality of coordinates according to the X X Y of the frame pixels of the video, wherein X and Y are respectively a horizontal pixel value and a vertical pixel value of a frame picture, and the coordinates are uniformly distributed on the picture;
for works with floating layer files but not judged to be infringing, directly implanting encryption information on the floating layer files according to the generated multiple coordinates;
for works without floating layer files, generating a transparent floating layer with the same size according to the size of a frame picture;
respectively carrying out floating layer marking on the encrypted information according to the generated coordinates to obtain a floating layer with the encrypted information;
the floating layer is arranged on each corresponding key frame, and each frame is restored into a video file;
step 54, embedding the encrypted information into a floating layer file of the picture file;
and the memory is used for storing the copyrighted works.
9. The copyright trading platform according to claim 8, further comprising the encryption information embedding module including an identification code generating module and a picture specific area processing module, wherein the identification code generating module is connected with a floating layer generating module, and the floating layer generating module and the picture specific area processing module are connected with a floating layer adding module.
CN202410108641.2A 2024-01-26 2024-01-26 Video cartoon digital copyright trading platform and copyright right-determining method based on blockchain Active CN117633728B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410108641.2A CN117633728B (en) 2024-01-26 2024-01-26 Video cartoon digital copyright trading platform and copyright right-determining method based on blockchain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410108641.2A CN117633728B (en) 2024-01-26 2024-01-26 Video cartoon digital copyright trading platform and copyright right-determining method based on blockchain

Publications (2)

Publication Number Publication Date
CN117633728A CN117633728A (en) 2024-03-01
CN117633728B true CN117633728B (en) 2024-04-05

Family

ID=90021968

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410108641.2A Active CN117633728B (en) 2024-01-26 2024-01-26 Video cartoon digital copyright trading platform and copyright right-determining method based on blockchain

Country Status (1)

Country Link
CN (1) CN117633728B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108389059A (en) * 2018-02-26 2018-08-10 成都大学 Digital copyrighted work protection, transaction and distributing method based on ownership and system
CN109766673A (en) * 2019-01-18 2019-05-17 四川大学 A kind of alliance's formula audio-video copyright block catenary system and audio-video copyright cochain method
CN111428211A (en) * 2020-03-20 2020-07-17 浙江传媒学院 Evidence storage method for multi-factor authority-determining source tracing of video works facing alliance block chain
CN111563823A (en) * 2020-05-15 2020-08-21 中国银行股份有限公司 Block chain-based network work copyright transaction processing method, device and system
CN112464179A (en) * 2020-11-26 2021-03-09 浙江传媒学院 Short video copyright storage algorithm based on block chain and expression recognition
CN114003871A (en) * 2021-09-29 2022-02-01 合肥高维数据技术有限公司 Video copyright protection method and system based on block chain and digital watermark technology
CN114915809A (en) * 2022-05-17 2022-08-16 浙江广播电视集团 Video file copyright protection method and transaction method based on block chain
CN115795415A (en) * 2022-11-16 2023-03-14 浙江大学 Digital cultural relic evidence and infringement tracing method and system based on block chain digital watermarking

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10467391B1 (en) * 2018-08-23 2019-11-05 Eight Plus Ventures, LLC Manufacture of secure printed image inventories

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108389059A (en) * 2018-02-26 2018-08-10 成都大学 Digital copyrighted work protection, transaction and distributing method based on ownership and system
CN109766673A (en) * 2019-01-18 2019-05-17 四川大学 A kind of alliance's formula audio-video copyright block catenary system and audio-video copyright cochain method
CN111428211A (en) * 2020-03-20 2020-07-17 浙江传媒学院 Evidence storage method for multi-factor authority-determining source tracing of video works facing alliance block chain
CN111563823A (en) * 2020-05-15 2020-08-21 中国银行股份有限公司 Block chain-based network work copyright transaction processing method, device and system
CN112464179A (en) * 2020-11-26 2021-03-09 浙江传媒学院 Short video copyright storage algorithm based on block chain and expression recognition
CN114003871A (en) * 2021-09-29 2022-02-01 合肥高维数据技术有限公司 Video copyright protection method and system based on block chain and digital watermark technology
CN114915809A (en) * 2022-05-17 2022-08-16 浙江广播电视集团 Video file copyright protection method and transaction method based on block chain
CN115795415A (en) * 2022-11-16 2023-03-14 浙江大学 Digital cultural relic evidence and infringement tracing method and system based on block chain digital watermarking

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于区块链的全媒体数字图像版权保护方法研究;徐泽等;《中国传媒科技》;20230116(第12期);第10-16页 *

Also Published As

Publication number Publication date
CN117633728A (en) 2024-03-01

Similar Documents

Publication Publication Date Title
Bartolini et al. Image authentication techniques for surveillance applications
JP2003204429A (en) Device and method for generating and decoding digital watermarking code, program for generating and decoding digital watermarking code, and recording medium recording the program
EP1314312A1 (en) Digital watermarking for multimedia data
KR20120070664A (en) System for tracking illegal distributeur and preventing distribution of illegal content and method thereof
Gugelmann et al. Screen watermarking for data theft investigation and attribution
Dittmann et al. Media-independent Watermarking Classification and the need for combining digital video and audio watermarking for media authentication
KR101677110B1 (en) Watermark extracting and insertion apparatus for video forgery detection and prevention based zero-knowledge and the method thereof
Srinivas et al. Web image authentication using embedding invisible watermarking
JP6716663B2 (en) Encoding method, device and equipment using moving image gene
US10958926B2 (en) Digitally watermarked compressed video image sequences
WO2020237881A1 (en) Method and apparatus for injecting anti-counterfeit information, computer device, and storage medium
CN117633728B (en) Video cartoon digital copyright trading platform and copyright right-determining method based on blockchain
CN114862646B (en) Watermark embedding and extracting method and system for vector tile anti-splicing
Brunton et al. Real-time video watermarking on programmable graphics hardware
JP4652167B2 (en) Image processing apparatus, image processing method, and program
Barni et al. Digital watermarking for the authentication of AVS data
Dadkhah et al. Efficient image authentication and tamper localization algorithm using active watermarking
Lu et al. Multipurpose Multilevel Multichannel Information Hiding Framework for Multimedia Protection, Authentication and Traitor Tracing
CN117499665B (en) Image data embedding and extracting method and device based on gray value quantization
Abdelhedi et al. Toward a Novel LSB-based Collusion-Secure Fingerprinting Schema for 3D Video
Gehani et al. Veil: A system for certifying video provenance
Yalcin et al. Fragile watermarking and unkeyed hash function implementation for image authentication on CNN-UM
CN117499664B (en) Image data embedding and extracting method and device based on bit substitution
Ahuja et al. Video data security: analysis, relevance and open challenges
Chambial et al. Image steganography using CNN

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant