CN101175201A - Method for recognizing fake real-time video - Google Patents

Method for recognizing fake real-time video Download PDF

Info

Publication number
CN101175201A
CN101175201A CNA200710028574XA CN200710028574A CN101175201A CN 101175201 A CN101175201 A CN 101175201A CN A200710028574X A CNA200710028574X A CN A200710028574XA CN 200710028574 A CN200710028574 A CN 200710028574A CN 101175201 A CN101175201 A CN 101175201A
Authority
CN
China
Prior art keywords
key
central server
time
monitoring central
imaging end
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA200710028574XA
Other languages
Chinese (zh)
Inventor
徐永举
罗笑南
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sun Yat Sen University
National Sun Yat Sen University
Original Assignee
National Sun Yat Sen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National Sun Yat Sen University filed Critical National Sun Yat Sen University
Priority to CNA200710028574XA priority Critical patent/CN101175201A/en
Publication of CN101175201A publication Critical patent/CN101175201A/en
Pending legal-status Critical Current

Links

Images

Abstract

The present invention discloses a method for identifying pseudo real-time images, which relates to the field of digital monitoring technology. The method includes three steps; firstly, an imaging end is added with a clock, a check code generator, a key transceiver and an image encryption module; a monitoring server end is added with a key generator, a key transceiver, a key analyzer and an alarm signal generator. Secondly, according to the key sent by a monitoring center server, the current time recorded by the clock and the initial password set on the imaging end, the method utilizes a key generation algorithm and the check code generator on the imaging end to produce a key time stamp containing a check code, the key time stamp is then transmitted to the monitoring center server; Thirdly, the key analyzer decrypts the key time stamp by a monitoring center and obtains analysis results. The present invention can intelligently identify the authenticity of a real-time image and effectively prevent the real-time image from being intercepted and falsified by an intruder in the course of transmission, so the monitoring is more authentic.

Description

A kind of method of discerning fake real-time video
Technical field
The invention belongs to the digital supervision technical field, particularly relate to and a kind ofly prevent that in digital monitor system other people from utilizing the technology of pseudo-image fraud monitoring system.
Background technology
Digital monitor system is to gather video information by digital photographing apparatus, and be transferred to the equipment of Surveillance center by cable network with digital mode, 100,000,000 and gigabit networking enough network bandwidths can be provided, to support the supervisory control system of new generation of the concurrent video flowing of a plurality of high-quality.
Current, the imaging system of using in monitoring has numerous products, but does not possess the function that real-time sight image is forged in identification.For example in the middle of the transmission line point of intercepting by method fraud monitoring system and monitoring management personnel such as play history video recordings, and the monitor staff of this moment and monitoring system whether can not discern this image information immediately be real real-time imaging.Therefore, need a kind of real-time imaging truth identification technology to solve this problem.
Current at digital monitor system, adopt simple real-time imaging transmission technology mostly, the image that it just can photograph camera does not add on the monitor that any processing directly is transferred to monitoring central server and Surveillance center.Do not change if be monitored scene, the image seen of supervisory control system is without any difference so, and which invador just can come fraud monitoring system and monitoring management personnel by the play history image like this, and makes surveillance malfunctioning.Present digital monitor system also can't be discerned this pseudo-image.If solved this problem, the invador be can find timely, thereby the validity of supervisory control system and the leak of minimizing security monitoring significantly promoted, improve the controllability of protected object.The development that addresses this problem for digital monitor system is to have and important meaning.
Summary of the invention
At above deficiency, the invention provides and a kind ofly prevent that in digital monitor system other people from utilizing pseudo-image fraud monitoring system and monitoring management person's method.
In order to realize the foregoing invention purpose, the technical scheme of employing is as follows:
Prevent that in digital monitor system other people from utilizing pseudo-image fraud monitoring system and monitoring management person's method, this method is to increase a clock, checking code generator, key transceiver and with the module of encrypting (promptly adding a cover the key timestamp to image) to image, at the increase of monitoring server end key generator, key transceiver, key analyzer and an alarm signal generator to imaging end (as monitoring camera).
A kind of method of discerning fake real-time video, its key step comprises:
1) supervisory control system initialization;
2) monitoring central server produces key, and key signal is issued each imaging end;
3) the imaging end carries out associative operation according to the key of monitoring central server to image;
4) monitoring central server is analyzed the information of imaging end, and analysis result is handled.
Described step 1) supervisory control system initialization procedure specifically may further comprise the steps:
11) initial password is set for each imaging end;
12) algorithm that monitoring central server produces key is set;
13) be set the time interval that monitoring central server sends key, wherein monitoring central server start working that send first key constantly.
The password that the imaging end is provided with in the described step 11) can be identical, also can be different, and each password is one 16 a character string, the character in this character string is included among the ASCII character character set.
Described step 2) specifically comprises the steps:
21) key generator of monitoring central server regularly produces a key;
22) the key transceiver of monitoring central server sends a key signal according to the time interval that is provided with to each imaging end.
Described step 3) specifically comprises the steps:
31) the key transceiver of imaging end receives straight in the key signal of monitoring central server;
32) utilize key to produce the checking code generator of algorithm and imaging end, the key of sending according to monitoring central server, the current time of imaging end clock log and the initial password that is arranged on the imaging end produce a key timestamp that contains check code;
33) the key timestamp is added a cover in the appropriate location of image encrypting module on monitoring video of imaging end, described suitable position is received the key time for the imaging termination and is added the position of certain hour section, but must guarantee that this time period sends the time interval of key less than the monitoring central server that is provided with;
34) real-time imaging of having added a cover the key timestamp is spread back monitoring central server with image;
35) the key timestamp is sent to monitoring central server separately.
Described step 4) specifically comprises the steps:
41) the key analyzer of monitoring central server end is decrypted the key timestamp, draws the password of imaging end and imaging end time of clock at that time;
42) the monitoring central server end is according to step 41) password that obtains and the original password and the current time of time contrast imaging end initial setting up, analysis is reached a conclusion, if the legal analysis result of then directly preserving; If occur then starting alarm signal generator unusually, preserve analysis result then.
Beneficial effect of the present invention:
1. discriminating that can be intelligent is except that the true and false of real-time imaging.
2. can when taking place, intrusion event can give the alarm timely and accurately.
3. effectively avoided real-time imaging invaded person in transmission course to hold back and distorted, made monitoring have more authenticity.
Description of drawings
Fig. 1 is the main flow chart of the method for identification fake real-time video;
Fig. 2 is the method flow diagram of digital monitor system identification fake real-time video function.
Embodiment
Below in conjunction with accompanying drawing the present invention is further set forth.
The present invention seeks to by regularly adding a cover the method for the timestamp that contains key, supervisory control system can be discerned the real-time imaging of having distorted, and give a warning, reach and find invador or supervisory control system transmission abnormality timely and accurately to real-time imaging.
Prevent that in digital monitor system other people from utilizing pseudo-image fraud monitoring system and monitoring management person's method, this method is to increase a clock, checking code generator, key transceiver and with the module of encrypting (promptly adding a cover the key timestamp to image) to image, at the increase of monitoring server end key generator, key transceiver, key analyzer and an alarm signal generator to imaging end (as monitoring camera).
As shown in Figure 1, a kind of method of discerning fake real-time video, its key step comprises:
1) supervisory control system initialization;
2) monitoring central server produces key, and key signal is issued each imaging end;
3) the imaging end carries out associative operation according to the key of monitoring central server to image;
4) monitoring central server is analyzed the information of imaging end, and analysis result is handled.
Supervisory control system will be carried out initialization to system after installing, and wherein one of most critical step was for each imaging end a random cipher to be set automatically by monitoring server.After supervisory control system brought into operation, monitoring server regularly produced a key, and this key is sent to each imaging end by the key transceiver.The imaging end generates check code and key timestamp according to the current time of the key that receives, clock and the password of initial setting up.The ad-hoc location that the imaging end is added a cover the key timestamp of current generation in the real-time imaging is delivered to monitoring server together with real-time imaging, simultaneously the key timestamp is sent to monitoring server separately by the key transceiver, monitoring server is analyzed the key timestamp that receives and the key timestamp on the image, if legal then only need to preserve an analysis result and get final product; If not conforming to rule also will give the alarm except preserving analysis result simultaneously.
Method flow of the present invention as shown in Figure 2.Specifically may further comprise the steps:
1) during the supervisory control system initialization, the password of 16 characters being set at first for each imaging end (monitoring camera) to form (annotate: but the character here is meant the character display in the ASCII character character set).
2) algorithm that monitoring central server produces key is set, the time interval that monitoring central server sends key is set.Monitoring central server start working that send first key constantly, later on the frequency by the time interval that is provided with sends key.
3) when supervisory control system is in running order, send a key signal to each imaging end (camera) by the every interval of monitoring central server certain hour.
4) imaging end (camera) key of sending according to monitoring central server that utilizes key to produce algorithm, the current time (this current time is called " key time ") of imaging end clock and the initial password that is arranged on the camera produce a key timestamp (in fact the key timestamp is exactly key) that contains check code.
5) the key time on monitoring video adds 60 seconds position and adds a cover the key timestamp.The process of adding a cover is exactly the overlap-add operation of image and key timestamp.
6) real-time imaging of having added a cover the key timestamp is spread back monitoring central server with image.
7) the key timestamp is sent to monitoring central server separately
8) monitoring central server is analyzed key timestamp that receives and the real-time imaging of having added a cover the key timestamp.
9) if legal then directly preserve analysis result.If find not conform to the rule signal that gives the alarm automatically, preserve analysis result then.

Claims (7)

1. method of discerning fake real-time video, its key step comprises:
1) supervisory control system initialization;
2) monitoring central server produces key, and key signal is issued each imaging end;
3) the imaging end carries out associative operation according to the key of monitoring central server to image;
4) monitoring central server is analyzed the information of imaging end, and analysis result is handled.
2. the method for identification fake real-time video according to claim 1, it is characterized in that, described monitoring central server end has increased a key generator, key transceiver, key analyzer and alarm signal generator, and the imaging end has increased a clock, checking code generator, key transceiver and image encrypting module.
3. the method for identification fake real-time video according to claim 1 is characterized in that, described step 1) supervisory control system initialization procedure specifically may further comprise the steps:
11) initial password is set for each imaging end;
12) algorithm that monitoring central server produces key is set;
13) be set the time interval that monitoring central server sends key, wherein monitoring central server start working that send first key constantly.
4. the method for identification fake real-time video according to claim 3, it is characterized in that the password that the imaging end is provided with in the described step 11) can be identical, also can be different, each password is one 16 a character string, and the character in this character string is included among the ASCII character character set.
5. the method for identification fake real-time video according to claim 1 and 2 is characterized in that, described step 2) specifically comprise the steps:
21) key generator of monitoring central server regularly produces a key;
22) the key transceiver of monitoring central server sends a key signal according to the time interval that is provided with to each imaging end.
6. the method for identification fake real-time video according to claim 1 and 2 is characterized in that, described step 3) specifically comprises the steps:
31) the key transceiver of imaging end receives straight in the key signal of monitoring central server;
32) utilize key to produce the checking code generator of algorithm and imaging end, the key of sending according to monitoring central server, the current time of imaging end clock log and the initial password that is arranged on the imaging end produce a key timestamp that contains check code;
33) the key timestamp is added a cover in the appropriate location of image encrypting module on monitoring video of imaging end, described suitable position is received the key time for the imaging termination and is added the position of certain hour section, but must guarantee that this time period sends the time interval of key less than the monitoring central server that is provided with;
34) real-time imaging of having added a cover the key timestamp is spread back monitoring central server with image;
35) the key timestamp is sent to monitoring central server separately.
7. the method for identification fake real-time video according to claim 1 and 2 is characterized in that, described step 4) specifically comprises the steps:
41) the key analyzer of monitoring central server end is decrypted the key timestamp, draws the password of imaging end and imaging end time of clock at that time;
42) the monitoring central server end is according to step 41) password that obtains and the original password and the current time of time contrast imaging end initial setting up, analysis is reached a conclusion, if the legal analysis result of then directly preserving; If occur then starting alarm signal generator unusually, preserve analysis result then.
CNA200710028574XA 2007-06-14 2007-06-14 Method for recognizing fake real-time video Pending CN101175201A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA200710028574XA CN101175201A (en) 2007-06-14 2007-06-14 Method for recognizing fake real-time video

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA200710028574XA CN101175201A (en) 2007-06-14 2007-06-14 Method for recognizing fake real-time video

Publications (1)

Publication Number Publication Date
CN101175201A true CN101175201A (en) 2008-05-07

Family

ID=39423413

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA200710028574XA Pending CN101175201A (en) 2007-06-14 2007-06-14 Method for recognizing fake real-time video

Country Status (1)

Country Link
CN (1) CN101175201A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102196304A (en) * 2010-03-19 2011-09-21 华为软件技术有限公司 Method, system and equipment for generating secrete key in video monitoring
CN101621661B (en) * 2008-06-30 2013-02-13 北京中星微电子有限公司 Audio-video encryption and decryption transmission system
CN103348674A (en) * 2012-02-09 2013-10-09 株式会社小松制作所 Work vehicle-use peripheral monitoring system and work vehicle
CN111639051A (en) * 2020-04-09 2020-09-08 中车青岛四方机车车辆股份有限公司 Image file processing method for railway vehicle
US10843761B2 (en) 2016-07-08 2020-11-24 Piaggio & C.S.P. A. Tilting forecarriage of a motor vehicle and a related motor vehicle
CN113726782A (en) * 2021-08-31 2021-11-30 江苏食品药品职业技术学院 Computer network monitoring platform

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101621661B (en) * 2008-06-30 2013-02-13 北京中星微电子有限公司 Audio-video encryption and decryption transmission system
CN102196304A (en) * 2010-03-19 2011-09-21 华为软件技术有限公司 Method, system and equipment for generating secrete key in video monitoring
CN102196304B (en) * 2010-03-19 2013-03-20 华为软件技术有限公司 Method, system and equipment for generating secrete key in video monitoring
CN103348674A (en) * 2012-02-09 2013-10-09 株式会社小松制作所 Work vehicle-use peripheral monitoring system and work vehicle
CN103348674B (en) * 2012-02-09 2014-06-11 株式会社小松制作所 Work vehicle-use peripheral monitoring system and work vehicle
US10843761B2 (en) 2016-07-08 2020-11-24 Piaggio & C.S.P. A. Tilting forecarriage of a motor vehicle and a related motor vehicle
CN111639051A (en) * 2020-04-09 2020-09-08 中车青岛四方机车车辆股份有限公司 Image file processing method for railway vehicle
CN111639051B (en) * 2020-04-09 2023-08-25 中车青岛四方机车车辆股份有限公司 Image file processing method for railway vehicle
CN113726782A (en) * 2021-08-31 2021-11-30 江苏食品药品职业技术学院 Computer network monitoring platform
CN113726782B (en) * 2021-08-31 2023-06-27 江苏食品药品职业技术学院 Computer network monitoring platform

Similar Documents

Publication Publication Date Title
CN104967875B (en) The method and apparatus that control monitor video checks permission
CN107393048A (en) A kind of safe fire fighting device method for inspecting
CN113254947B (en) Vehicle data protection method, system, equipment and storage medium
CN201508555U (en) Internet bar management system based on face recognition
CN101175201A (en) Method for recognizing fake real-time video
CN113472547B (en) Safety monitoring system based on block chain
CN108491785B (en) Artificial intelligence image identification attack defense system
CN111882233A (en) Storage risk early warning method, system and device based on block chain and storage medium
US20200329039A1 (en) Securing digital data transmission in a communication network
CN114338171A (en) Black product attack detection method and device
CN110460575A (en) One kind can be realized security audit functional network Security Situation Awareness Systems
KR102365589B1 (en) Method and apparatus for detecting abuse based on log information in closed-circuit television integrated management system
CN103974032A (en) Monitoring and management system of security equipment
US11621977B2 (en) Network forensic system for performing transmission metadata tracking and analysis
CN109696316B (en) Train remote monitoring system
CN114189359B (en) Internet of things equipment capable of avoiding data tampering, data safety transmission method and system
CN109120648B (en) A kind of anti-tamper verifying system of real-time monitoring data
CN113688187A (en) Digital block chain supervision platform for hazardous chemical safety production
CN106162059A (en) A kind of video monitoring alarm method and system
CN112087758A (en) Detection system and method for identifying pseudo base station based on terminal position information
CN111181996B (en) Code detection image implementation method and system based on distributed multi-connection architecture
CN117319521A (en) Data transmission method and system based on privacy computing network
Schürmann et al. Measuring voter lines
CN117910004A (en) Method, system, terminal and storage medium for content security of LED display screen
CN115473711A (en) Data security privacy protection device and protection method based on cloud security service

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Open date: 20080507