CN109040781B - Video authentication method, device, system, electronic equipment and readable medium - Google Patents

Video authentication method, device, system, electronic equipment and readable medium Download PDF

Info

Publication number
CN109040781B
CN109040781B CN201810983669.5A CN201810983669A CN109040781B CN 109040781 B CN109040781 B CN 109040781B CN 201810983669 A CN201810983669 A CN 201810983669A CN 109040781 B CN109040781 B CN 109040781B
Authority
CN
China
Prior art keywords
video
video data
target object
key point
time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810983669.5A
Other languages
Chinese (zh)
Other versions
CN109040781A (en
Inventor
张全志
杨业飞
刘春伟
孙海波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201810983669.5A priority Critical patent/CN109040781B/en
Publication of CN109040781A publication Critical patent/CN109040781A/en
Application granted granted Critical
Publication of CN109040781B publication Critical patent/CN109040781B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/23418Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving operations for analysing video streams, e.g. detecting features or characteristics
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/02Agriculture; Fishing; Forestry; Mining
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/44008Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving operations for analysing video streams, e.g. detecting features or characteristics in the video stream

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Marine Sciences & Fisheries (AREA)
  • Animal Husbandry (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Health & Medical Sciences (AREA)
  • Tourism & Hospitality (AREA)
  • Mining & Mineral Resources (AREA)
  • Human Resources & Organizations (AREA)
  • Agronomy & Crop Science (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Finance (AREA)
  • Storage Device Security (AREA)

Abstract

The application provides a video authentication method, a device, a system, an electronic device and a readable medium, wherein the method comprises the following steps: acquiring first video data to be checked and first time; extracting a first key point in the first video data; acquiring second video data in a block chain according to the first time; extracting a second key point in the second video data; and when the first key point is consistent with the second key point in comparison, determining that the first video is an authenticated video. The video authentication method, the video authentication device, the video authentication system, the electronic equipment and the readable medium can provide a tracing scheme for cooperation of the label and the video so as to confirm the authenticity of a target object and ensure the authenticity of video information.

Description

Video authentication method, device, system, electronic equipment and readable medium
Technical Field
The present application relates to the field of agricultural product tracing, and in particular, to a video authentication method, apparatus, system, electronic device, and computer readable medium.
Background
In the current agricultural product anti-counterfeiting tracing scheme, a video scheme and a label scheme are generally adopted. The video scheme takes video data generated by shooting a target object as anti-counterfeiting evidence. The label scheme binds the target object with the sensor or other labels, and the target object is identified through sensor data or the labels.
However, the above two schemes have certain disadvantages, and in the video scheme, whether the video itself is forged or not cannot be confirmed as a live information recording method. If the video data itself is forged, the entire trace back is not trusted. In addition, the distinguishability of some target objects is small, and when the target objects are chickens and pigs, it is difficult for human beings to judge that the target objects in the video are the target objects through the video. In the tag scheme, the tag may confirm the correctness of the target object, but may not provide authentic process information. For example, what is experienced during the growth of the chicken, under what conditions it is growing.
Disclosure of Invention
In view of this, the present application provides a video authentication method, apparatus, system, electronic device and computer readable medium, which can provide a tracing scheme for cooperation between a tag and a video to confirm the authenticity of a target object and ensure the authenticity of video information.
Other features and advantages of the present application will be apparent from the following detailed description, or may be learned by practice of the application.
According to a first aspect of an embodiment of the present application, a video authentication method is provided, where the method includes: acquiring first video data to be checked and first time; extracting a first key point in the first video data; acquiring second video data in a block chain according to the first time; extracting a second key point in the second video data; and when the first key point is consistent with the second key point in comparison, determining that the first video is an authenticated video.
In an exemplary embodiment of the present application, further comprising: and verifying the target object in the first video data.
In an exemplary embodiment of the present application, verifying the target object in the first video data comprises: extracting a target object in the first video data; determining label information corresponding to the target object through the first video; and verifying the target object according to the label information.
In an exemplary embodiment of the present application, the tag information includes display information and a timestamp corresponding to the display information; the tag information is stored in the block chain.
In an exemplary embodiment of the present application, authenticating the target object according to the tag information includes: determining a second time; acquiring label alignment display information through a block chain according to the second time; extracting display information in the label information corresponding to the target object according to the second time; and comparing the logo display information with the display information to verify the target object.
In an exemplary embodiment of the present application, further comprising: performing consistency verification on a plurality of third video data to generate the second video data; and storing the second video data to the blockchain.
In an exemplary embodiment of the present application, the performing consistency verification on the third video data to generate the second video data includes: acquiring a plurality of third video data; respectively extracting third key points in the plurality of third video data; and performing consistency verification on third key points in the plurality of third video data to generate the second video data.
In an exemplary embodiment of the present application, further comprising: acquiring the first video through first video acquisition equipment; acquiring the third video through third video acquisition equipment; and the first video and the third video both comprise video images of a predetermined area.
In an exemplary embodiment of the present application, the first key point, the second key point, and the third key point are designated recognizable objects.
According to a second aspect of embodiments of the present application, there is provided a video authentication apparatus, including: the first video module is used for acquiring first video data to be checked and first time; the first key point module is used for extracting first key points in the first video data; the second video module is used for acquiring second video data in the block chain according to the first time; the second key point module is used for extracting second key points in the second video data; and the comparison module is used for determining that the first video is the authenticated video when the first key point is compared with the second key point in a consistent manner.
In an exemplary embodiment of the present application, further comprising: and the object verification module is used for verifying the target object in the first video data.
According to a third aspect of the embodiments of the present application, a video authentication system is provided, which includes: the first video acquisition equipment is used for acquiring and acquiring a first video; the plurality of third video acquisition devices are used for acquiring a plurality of third videos; the verification system is used for verifying the plurality of third videos and generating second videos after the verification is passed; and a blockchain system for storing the second video and providing verified second video data to verify the first video.
According to a fourth aspect of embodiments of the present application, there is provided an electronic apparatus, including: one or more processors; storage means for storing one or more programs; when executed by the one or more processors, cause the one or more processors to implement the video authentication method of any of the above.
According to a fifth aspect of embodiments of the present application, a computer-readable medium is provided, on which a computer program is stored, wherein the program, when executed by a processor, implements a video authentication method as in any one of the above.
According to the video authentication method, the video authentication device, the video authentication system, the electronic equipment and the computer readable medium, a tracing scheme of cooperation of the label and the video can be provided so as to confirm the authenticity of the target object and ensure the authenticity of video information.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application. The drawings described below are only some embodiments of the present application, and other drawings may be derived from those drawings by those skilled in the art without inventive effort.
Fig. 1 is a system block diagram illustrating a video authentication method and apparatus according to an example embodiment.
Fig. 2 is a flow diagram illustrating a video authentication method according to an example embodiment.
Fig. 3 is a flow diagram illustrating a method of video authentication in accordance with an example embodiment.
Fig. 4 is a flow diagram illustrating a method of video authentication in accordance with an example embodiment.
Fig. 5 is a flow diagram illustrating a method of video authentication in accordance with an example embodiment.
Fig. 6 is a flow chart illustrating a method of video authentication according to another example embodiment.
Fig. 7 is a flow chart illustrating a method of video authentication according to another example embodiment.
Fig. 8 is a flow chart illustrating a method of video authentication according to another example embodiment.
Fig. 9 is a schematic diagram illustrating a video authentication method according to another exemplary embodiment.
Fig. 10 is a block diagram illustrating a video authentication apparatus according to an example embodiment.
Fig. 11 is a block diagram illustrating a video authentication system in accordance with an example embodiment.
Fig. 12 is a block diagram illustrating an electronic device for video authentication in accordance with an example embodiment.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The same reference numerals denote the same or similar parts in the drawings, and thus, a repetitive description thereof will be omitted.
The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to provide a thorough understanding of embodiments of the invention. One skilled in the relevant art will recognize, however, that the invention may be practiced without one or more of the specific details, or with other methods, components, devices, steps, and so forth. In other instances, well-known methods, devices, implementations or operations have not been shown or described in detail to avoid obscuring aspects of the invention.
The drawings are merely schematic illustrations of the present invention, in which the same reference numerals denote the same or similar parts, and thus, a repetitive description thereof will be omitted. Some of the block diagrams shown in the figures do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
The flow charts shown in the drawings are merely illustrative and do not necessarily include all of the contents and steps, nor do they necessarily have to be performed in the order described. For example, some steps may be decomposed, and some steps may be combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
The following detailed description of exemplary embodiments of the invention refers to the accompanying drawings.
Fig. 1 is a system block diagram illustrating a video authentication method and apparatus according to an example embodiment.
The server 105 may be a server providing various services, such as a background management server (for example only) providing support for a video authentication system operated by a user with the terminal device 101, 102, 103. The backend management server may analyze and otherwise process the received data such as the video authentication request, and feed back a processing result (e.g., an authentication result, second video data — just an example) to the terminal device.
The server 105 may, for example, obtain first video data to be verified and a first time; the server 105 may, for example, extract a first keypoint in the first video data; the server 105 may obtain the second video data in the blockchain, for example, according to the first time. The server 105 may, for example, extract a second keypoint in the second video data. The server 105 may determine that the first video is an authenticated video, for example, when the first keypoint is aligned with the second keypoint.
The server 105 may be a server of one entity, and may also be composed of a plurality of servers, for example, a part of the server 105 may be used as a to-be-authenticated video submission system in the present application, for obtaining a to-be-authenticated video; and a part of the server 105 may also be used, for example, as a video authentication system in the present application, for obtaining first video data to be verified and a first time; extracting a first key point in the first video data; acquiring second video data in a block chain according to the first time; extracting a second key point in the second video data; and when the first key point is consistent with the second key point in comparison, determining that the first video is an authenticated video.
It should be noted that the video authentication method provided in the embodiment of the present application may be executed by the server 105, and accordingly, the video authentication apparatus may be disposed in the server 105. And the request end provided for the user to submit the video authentication task and obtain the video authentication result is generally located in the terminal equipment 101, 102, 103.
Fig. 2 is a flow diagram illustrating a video authentication method according to an example embodiment. According to the video authentication method shown in fig. 2, a tracing scheme in which the tag cooperates with the video can be provided to confirm the authenticity of the target object and ensure the authenticity of the video information. Next, a video authentication method in an exemplary embodiment of the present application will be described with reference to fig. 2.
In step S210, first video data to be checked and a first time are obtained. The first video may be video data to be verified containing a target object, such as video data containing a current agricultural product. The first time may be a certain time in the shooting time period of the first video data, for example, a shooting start time or an intermediate time of the first video data may be used as the first time, and the present invention is not particularly limited thereto.
According to an example embodiment, the first video may be acquired by a first video capture device, wherein the first video includes a video image of a predetermined area.
In step S220, a first keypoint in the first video data is extracted. According to an example embodiment, the first keypoint may be a designated recognizable object, and the first keypoint may be, for example, a photographed item, and may also be other objects in the photographing scene, such as a light, a movable object, and the like.
In step S230, second video data is acquired in the blockchain according to the first time. And the second video data is credible video data related to the video to be authenticated. According to an example embodiment, the second video data may be generated by performing consistency verification on a plurality of third video data; and storing the second video data to the blockchain. Wherein the third video data is a video object waiting to be verified as real data. For example, the verification process may be the following steps: acquiring a plurality of third video data; respectively extracting third key points in the plurality of third video data; and performing consistency verification on third key points in the plurality of third video data to generate the second video data. Wherein the third key point may be a designated recognizable object.
According to an example embodiment, the third video may be acquired by a third video capture device. The third video includes a video image of a predetermined area, for example, a plurality of third video capturing devices are installed at a plurality of positions in the predetermined area to capture a plurality of third videos.
The second video data can be acquired by deploying a certain number of video acquisition points in the peripheral range of the target object video acquisition area and submitting the video data acquired by the acquisition points to a block chain consensus node, wherein the consensus node comprises a trusted node of a third party. And at the block chain consensus node, extracting key points of the data acquired by each video data acquisition point, comparing based on the key points, if the key points are consistent, achieving consensus, and storing the video data into the block chain after carrying out hash operation to form second video data, otherwise, rejecting the data.
In step S240, a second keypoint in the second video data is extracted. According to an example embodiment, the second keypoint may be a designated identifiable object.
In step S250, when the first key point and the second key point are identical, it is determined that the first video is an authenticated video. For example, a first key point extracted from the first video data is a red pillar beside the target object, a second key point extracted from the second video data collected from another shooting point in the shooting area is also a red pillar, and when the first key point and the second key point are found to have a coincident part through comparison, the first key point and the second key point are considered to be in accordance through comparison, and at this time, the first video is determined to be an authenticated video.
According to an example embodiment, the target object in the first video data may also be verified. For example, the following steps can be decomposed: extracting a target object in the first video data; determining label information corresponding to the target object through the first video; and verifying the target object according to the label information. The tag information comprises display information and a timestamp corresponding to the display information; the tag information is stored in the block chain. For example, a tag may be bound to the target object, the tag cannot be opened without inputting a password or a password error, the tag may display random numerical information, or display a random specific color, and the display manner includes displaying a number or other form of code through a display screen of the tag; at the same time, the tag can save the specific number or other form of encoded information that is displayed and upload the encoded information containing the time stamp to the blockchain.
According to an example embodiment, authenticating the target object according to the tag information may include: determining a second time; acquiring label alignment display information through a block chain according to the second time; extracting display information in the label information corresponding to the target object according to the second time; and comparing the logo display information with the display information to verify the target object. The second time may be a random time, for example, a certain time within the shooting time period of the first video data. And the label display information in the block chain can be acquired through the second video data and also can be acquired through a label with a communication function.
According to the video authentication method, by comparing the first key point information with the second key point information and comparing the display information extracted from the label display information and the first video, a tracing scheme for the cooperation of the label and the video can be provided, so that the authenticity of a target object can be confirmed, and the authenticity of the video information can be ensured.
Fig. 3 is a flow diagram illustrating a method of video authentication in accordance with an example embodiment. Referring to fig. 3, the video authentication method may include:
step S310, extracting a target object in the first video data. The target object in the first video data is an object to be confirmed.
Step S320, determining the tag information corresponding to the target object through the first video. The target object is bound with a label, and corresponding label information can be obtained through a picture identification mode.
And step S330, verifying the target object according to the label information. The block chain may store encoded information including a time stamp extracted from display information of a tag of the target object. The authenticity of the first video may be verified by extracting the logo display information in the blockchain for comparison with the logo information in the first video.
Fig. 4 is a flow diagram illustrating a method of video authentication in accordance with an example embodiment. Referring to fig. 4, the process of authenticating the target object according to the tag information may include:
in step S410, a second time is determined. The second time may be, for example, a certain time within the shooting period of the first video data.
And step S420, obtaining the logo display information through the block chain according to the second time. For example, the encoded information stored in the block chain and including the time stamp may be searched according to the second time to obtain the target display information.
And step S430, extracting display information in the label information corresponding to the target object according to the second time. For example, a corresponding picture at a second time point in the second video may be determined, and corresponding tag information may be extracted in the corresponding picture to extract display information from the tag information.
Step S440, comparing the logo-aligning display information with the display information to verify the target object. By comparison, when the display information of the alignment mark is confirmed to be consistent with the display information content in the first video, the first video data can be verified as the real video recorded with the target object. If the comparison result is inconsistent, the first video data may be fake video data.
Fig. 5 is a flow diagram illustrating a method of video authentication in accordance with an example embodiment. Referring to fig. 5, the generating of the second video data may include:
in step S510, a plurality of third video data are acquired. And the third video data is alternative data to be verified as the second video data. For example, a plurality of third video capture devices may be installed at a plurality of locations within the predetermined area to capture a plurality of third video data.
Step S520, respectively extracting third key points in the plurality of third video data. Wherein the third key point may be a designated recognizable object.
Step S530, performing consistency verification on third key points in the plurality of third video data to generate the second video data. For example, a plurality of third video capture devices may be installed within a peripheral area of a video capture area of the target object to capture third video data, and the third video data may be submitted to the blockchain consensus node, where the consensus node includes a trusted node of a third party. And at the block chain consensus node, extracting key points of the data acquired by each video data acquisition point, comparing based on the key points, if the key points are consistent, achieving consensus, and storing the video data into the block chain after carrying out hash operation to form second video data, otherwise, rejecting the data.
Fig. 6 is a flow chart illustrating a method of video authentication according to another example embodiment. Referring to fig. 6, the video authentication method may include:
in step S610, video data of the target object is photographed as video data to be verified. The video data to be verified in this step may be first video data, for example, video data acquired by video acquisition equipment in the area two in fig. 9.
Step S620, extracting key information in the video data to be verified. Such as light, movable objects, etc.
Step S630, video data corresponding to the video time point to be verified is searched in the block chain, and key point information is extracted. The video data in the block chain of this step may be the second video data.
And step S640, comparing the video to be verified with the key information in the block chain. And if the video data to be verified are consistent, the video data to be verified are considered to be real data, and if the video data to be verified are inconsistent, the video data to be verified are considered to be fake data.
Fig. 7 is a flow chart illustrating a method of video authentication according to another example embodiment. Referring to fig. 7, the video authentication method may include:
step S710, acquiring real video data containing the target object. The data may be the first video data that has been authenticated as the real data through the verification step shown in fig. 6. For example, the first video data of this step, i.e., the video data verified as real data acquired by the video acquisition device in the area two in fig. 9, is obtained.
In step S720, tag code information of the target object is acquired. Wherein, a label can be bound on the target object, and random digital information or other forms of codes or random specific colors can be displayed on the target object. The transition coding information of this step may be stored in a blockchain.
In step S730, the time of the video is aligned with the time of the tag encoding. That is, a time point is selected, and the video data segment and the code in the tag information at the time point are searched.
Step S740, verifying the consistency between the tag encoding information and the encoding information in the video. If the verification results are consistent, the real video shooting object is confirmed to be a target object; and if the video images are inconsistent, the real video shooting object is considered not to be the target object.
Fig. 8 is a flow chart illustrating a method of video authentication according to another example embodiment. Referring to fig. 8, the video authentication method may include:
and step S810, uploading the video information to the consensus node by each video acquisition point. And each video acquisition point is a deployment point in the peripheral range of the target video acquisition area. For example, the video data acquired by the video acquisition device in the area three in fig. 9 may be obtained.
And step S820, extracting key information of the video information uploaded by each acquisition point. The key information may be, for example, light, a movable object, etc.
Step S830, performing consistency verification on the key information of each video point information. If the verification result is constant, adding the video to be verified into the block chain; and if the block chains are inconsistent, refusing to join the block chain.
According to the video authentication method, video information of adjacent or overlapped areas of a video acquisition area to be verified is stored in a block chain mode and is used as a data source for verifying video authenticity; and comparing key points contained in the video information through the consensus achievement of the plurality of acquisition points to acquire a real video; and then the correctness of the target object in the real video is verified through the correspondence between the random code of the marker attached to the target in the real video and the code information contained in the video data, and a tracing scheme of the cooperation of the label and the video can be provided so as to confirm the authenticity of the target object and ensure the authenticity of the video information. In summary, the video authentication method of the present application first verifies whether the video is forged or not on the basis of the block chain, and then confirms the target object by comparing the random code (including digital code, random specific color or other form code) of the tag with the consistency of the random code information of the tag in the video on the basis of the real video data, thereby achieving the purpose of real tracing of the target.
Fig. 10 is a block diagram illustrating a video authentication apparatus according to an example embodiment. Referring to fig. 10, the video authentication apparatus may include: a first video module 1010, a first keypoint module 1020, a second video module 1030, a second keypoint module 1040, and an alignment module 1050.
In the video authentication apparatus, the first video module 1010 is used for acquiring first video data to be verified and a first time. The first video may be video data to be verified containing a target object, such as video data containing a current agricultural product. The first time may be a certain time in the shooting time period of the first video data, for example, a shooting start time or an intermediate time of the first video data may be used as the first time, and the present invention is not particularly limited thereto.
The first keypoint module 1020 is for extracting first keypoints in the first video data. According to an example embodiment, the first keypoint may be a designated recognizable object, and the first keypoint may be, for example, a photographed item, and may also be other objects in the photographing scene, such as a light, a movable object, and the like.
The second video module 1030 is configured to obtain second video data in the blockchain according to the first time. And the second video data is credible video data related to the video to be authenticated. According to an example embodiment, the second video data may be generated by performing consistency verification on a plurality of third video data; and storing the second video data to the blockchain. Wherein the third video data is a video object waiting to be verified as real data. For example, the verification process may be the following steps: acquiring a plurality of third video data; respectively extracting third key points in the plurality of third video data; and performing consistency verification on third key points in the plurality of third video data to generate the second video data. Wherein the third key point may be a designated recognizable object.
The second keypoint module 1040 extracts second keypoints in the second video data. According to an example embodiment, the second keypoint may be a designated identifiable object.
The comparison module 1050 is configured to determine that the first video is an authenticated video when the first key point is in accordance with the second key point. For example, a first key point extracted from the first video data is a red pillar beside the target object, a second key point extracted from the second video data collected from another shooting point in the shooting area is also a red pillar, and when the first key point and the second key point are found to have a coincident part through comparison, the first key point and the second key point are considered to be in accordance through comparison, and at this time, the first video is determined to be an authenticated video.
According to an example embodiment, the video authentication apparatus may further include an object verification module for verifying the target object in the first video data. For example, the steps shown in fig. 3, 7 are performed.
According to the video authentication device, the information of the first key point and the information of the second key point are compared, the display information extracted from the label display information and the first video is compared, a tracing scheme for the cooperation of the label and the video can be provided, the authenticity of a target object can be confirmed, and the authenticity of the video information can be guaranteed.
Fig. 11 is a block diagram illustrating a video authentication system in accordance with an example embodiment. Referring to fig. 11, the video authentication system may include: a first video capture device 1110, a plurality of third video capture devices 1120, a verification system 1130, and a blockchain system 1140.
In the video authentication system, a first video capture device 1110 is used to capture and capture a first video. The data acquired by the first video acquisition device is data to be verified for authenticity, and the first video acquisition device may be, for example, a video acquisition device in a second area in fig. 9.
The plurality of third video capture devices 1120 are configured to obtain a plurality of third videos. The third video capture device may be, for example, the video capture device of the area three in fig. 9.
The verification system 1130 is configured to verify the plurality of third videos and generate a second video after verification. Wherein the second video is data verified by the consensus mechanism and can be considered as credible video data about the target object.
The blockchain system 1140 is used to store the second video and provide verified second video data to verify the first video. The blockchain system 1140 may also be used to extract logo display information in the second video.
According to the video authentication system, the information of the first key point and the second key point is compared, the display information extracted from the label display information and the first video is compared, a tracing scheme of the cooperation of the label and the video can be provided, the authenticity of the target object can be confirmed, and the authenticity of the video information can be guaranteed.
Fig. 12 is a block diagram illustrating an electronic device for video authentication in accordance with an example embodiment.
An electronic device 1200 according to this embodiment of the present application is described below with reference to fig. 12. The electronic device 1200 shown in fig. 12 is only an example and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 12, the computer system 1200 includes a Central Processing Unit (CPU)1201, which can perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)1202 or a program loaded from a storage section 1208 into a Random Access Memory (RAM) 1203. For example, the central processing unit 1201 may perform the steps as shown in one or more of fig. 2, 3, 4, 5, 6, 7, 8.
In the RAM1203, various programs and data necessary for system operation, such as first video data, second video data, and the like, are also stored. The CPU 1201, ROM 1202, and RAM1203 are connected to each other by a bus 1204. An input/output (I/O) interface 1205 is also connected to bus 1204.
The following components are connected to the I/O interface 1205: an input section 1206 including a touch panel, a keyboard, and the like; an output portion 1207 including a display such as a Liquid Crystal Display (LCD) and a speaker; a storage section 1208 including a flash memory and the like; and a communication section 1209 including such as a wireless network card, a high-speed network card, and the like. The communication section 1209 performs communication processing via a network such as the internet. A driver 1210 is also connected to the I/O interface 1205 as needed. A removable medium 1211, such as a semiconductor memory, a magnetic disk, or the like, is mounted on the drive 1210 as necessary, so that a computer program read out therefrom is mounted into the storage section 1208 as necessary.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution of the embodiment of the present invention may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.), and includes several instructions for enabling a computing device (which may be a personal computer, a server, a mobile terminal, or a smart device, etc.) to execute the method according to the embodiment of the present invention, such as the steps shown in one or more of fig. 2, fig. 3, fig. 4, fig. 5, fig. 6, fig. 7, and fig. 8.
Furthermore, the above-described figures are merely schematic illustrations of processes involved in methods according to exemplary embodiments of the invention, and are not intended to be limiting. It will be readily understood that the processes shown in the above figures are not intended to indicate or limit the chronological order of the processes. In addition, it is also readily understood that these processes may be performed synchronously or asynchronously, e.g., in multiple modules.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It is to be understood that the invention is not limited to the details of construction, arrangement of drawings, or method of implementation, which have been set forth herein, but on the contrary, is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.

Claims (14)

1. A method of video authentication, comprising:
acquiring first video data to be checked and first time, wherein the first time is a certain time in a shooting time period of the first video data; extracting a first key point in the first video data;
acquiring second video data in a block chain according to the first time;
extracting a second key point in the second video data; and
when the first key point is consistent with the second key point in comparison, determining that the first video is an authenticated video; wherein the comparing of the first key point and the second key point is consistent, comprising: the first and second keypoints comprise a common target object.
2. The method of claim 1, further comprising:
and verifying the target object in the first video data.
3. The method of claim 2, wherein verifying the target object in the first video data comprises:
extracting a target object in the first video data;
determining label information corresponding to the target object through the first video; and
and verifying the target object according to the label information.
4. The method of claim 3, wherein the tag information includes display information and a timestamp corresponding to the display information; the tag information is stored in the block chain.
5. The method of claim 4, wherein authenticating the target object based on the tag information comprises:
determining a second time, wherein the second time is a certain time in a shooting time period of the first video data;
acquiring label alignment display information through a block chain according to the second time;
extracting display information in the label information corresponding to the target object according to the second time; and
and comparing the logo display information with the display information to verify the target object.
6. The method of claim 1, further comprising:
performing consistency verification on a plurality of third video data to generate the second video data; and
storing the second video data to the blockchain.
7. The method of claim 6, wherein performing consistency verification on third video data to generate the second video data comprises:
acquiring a plurality of third video data;
respectively extracting third key points in the plurality of third video data; and
and performing consistency verification on third key points in the plurality of third video data to generate the second video data.
8. The method of claim 1, further comprising:
acquiring the first video through first video acquisition equipment;
acquiring the third video through third video acquisition equipment; and
the first video and the third video both comprise video images of a predetermined area.
9. The method of claim 1 or 6, wherein the first keypoint, the second keypoint, and the third keypoint are designated identifiable objects.
10. A video authentication apparatus, comprising:
the system comprises a first video module, a second video module and a third video module, wherein the first video module is used for acquiring first video data to be detected and first time, and the first time is a certain time in a shooting time period of the first video data;
the first key point module is used for extracting first key points in the first video data;
the second video module is used for acquiring second video data in the block chain according to the first time;
the second key point module is used for extracting second key points in the second video data; and
a comparison module, configured to determine that the first video is an authenticated video when the first key point is consistent with the second key point in comparison, where the first key point is consistent with the second key point in comparison, and the determining includes: the first and second keypoints comprise a common target object.
11. The apparatus of claim 10, further comprising:
and the object verification module is used for verifying the target object in the first video data.
12. A video authentication system, comprising:
the first video acquisition equipment is used for acquiring and acquiring a first video;
the plurality of third video acquisition devices are used for acquiring a plurality of third videos;
the verification system is used for verifying the plurality of third videos and generating second videos after the verification is passed; and
a blockchain system for storing the second video and providing verified second video data to verify the first video.
13. An electronic device, comprising:
one or more processors;
storage means for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-9.
14. A computer-readable medium, on which a computer program is stored, which, when being executed by a processor, carries out the method according to any one of claims 1-9.
CN201810983669.5A 2018-08-27 2018-08-27 Video authentication method, device, system, electronic equipment and readable medium Active CN109040781B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810983669.5A CN109040781B (en) 2018-08-27 2018-08-27 Video authentication method, device, system, electronic equipment and readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810983669.5A CN109040781B (en) 2018-08-27 2018-08-27 Video authentication method, device, system, electronic equipment and readable medium

Publications (2)

Publication Number Publication Date
CN109040781A CN109040781A (en) 2018-12-18
CN109040781B true CN109040781B (en) 2021-04-30

Family

ID=64624768

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810983669.5A Active CN109040781B (en) 2018-08-27 2018-08-27 Video authentication method, device, system, electronic equipment and readable medium

Country Status (1)

Country Link
CN (1) CN109040781B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11039205B2 (en) * 2019-10-09 2021-06-15 Sony Interactive Entertainment Inc. Fake video detection using block chain
CN111563726A (en) * 2020-04-30 2020-08-21 平安国际智慧城市科技股份有限公司 Enterprise rectification supervision method, device, equipment and computer readable storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106529969A (en) * 2016-10-08 2017-03-22 惠州Tcl移动通信有限公司 Method and system for carrying out fake checking and tracing by using NFC (near field communication)
CN106599876A (en) * 2016-12-28 2017-04-26 重庆金鑫科技产业发展有限公司 Information processing method and device based on biological feature recognition
CN107832384A (en) * 2017-10-28 2018-03-23 北京安妮全版权科技发展有限公司 Infringement detection method, device, storage medium and electronic equipment

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104506933B (en) * 2014-12-23 2018-10-02 方正宽带网络服务有限公司 A kind of whether identical method and device of verification video file
CN106022804A (en) * 2016-05-24 2016-10-12 苏州铭冠软件科技有限公司 Quality safety tracing method of agricultural product
CN106339880A (en) * 2016-08-23 2017-01-18 白大文 Product production method and system for users to trace and examine filling process easily
US10592639B2 (en) * 2016-09-06 2020-03-17 Intel Corporation Blockchain-based shadow images to facilitate copyright protection of digital content
US10176309B2 (en) * 2016-10-28 2019-01-08 Acronis International Gmbh Systems and methods for authenticating video using watermarks
CN106792267B (en) * 2016-12-28 2019-11-05 北京真信网络科技有限公司 A kind of picture and video information authenticity mark and the system and method that identify
US10753754B2 (en) * 2017-01-19 2020-08-25 Andrew DeLizio Managing autonomous vehicles
CN107948603A (en) * 2017-12-07 2018-04-20 北海市天硌打印耗材有限公司 A kind of production monitoring video sharing method
CN108427874A (en) * 2018-03-12 2018-08-21 平安科技(深圳)有限公司 Identity identifying method, server and computer readable storage medium
CN108259835A (en) * 2018-03-12 2018-07-06 广东弘栎电子设备有限公司 Less radio-frequency acquisition method and its system with audio-video collection function
CN108416590A (en) * 2018-04-08 2018-08-17 程昔恩 A kind of block chain technical certification method based on topography

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106529969A (en) * 2016-10-08 2017-03-22 惠州Tcl移动通信有限公司 Method and system for carrying out fake checking and tracing by using NFC (near field communication)
CN106599876A (en) * 2016-12-28 2017-04-26 重庆金鑫科技产业发展有限公司 Information processing method and device based on biological feature recognition
CN107832384A (en) * 2017-10-28 2018-03-23 北京安妮全版权科技发展有限公司 Infringement detection method, device, storage medium and electronic equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《基于区块链的农产品溯源系统》;张延华等;《情报工程》;20180302;全文 *

Also Published As

Publication number Publication date
CN109040781A (en) 2018-12-18

Similar Documents

Publication Publication Date Title
US8724856B1 (en) Method, system and computer program for comparing images
CN109075971A (en) System and method for document information authenticity verification
CN109801192A (en) Electron contract method, apparatus, computer equipment and storage medium
CN108717543B (en) Invoice identification method and device and computer storage medium
CN102622549B (en) Electronic seal implementation system and method
CN109446905A (en) Sign electronically checking method, device, computer equipment and storage medium
CN109508404B (en) Maintenance teaching video management method and device, terminal equipment and storage medium
CN108429745B (en) Login authentication method and system, and webpage login method and system
CN109086834B (en) Character recognition method, character recognition device, electronic equipment and storage medium
CN111464307B (en) Method for acquiring electronic signature, computer storage medium and electronic device
US10769247B2 (en) System and method for interacting with information posted in the media
CN109040781B (en) Video authentication method, device, system, electronic equipment and readable medium
CN110247898B (en) Identity verification method, identity verification device, identity verification medium and electronic equipment
JP2017509949A (en) Upload form attachment
CN110659569A (en) Electronic signature method, device, storage medium and electronic equipment
CN110266469A (en) A kind of remote online electronic signature method based on WEB script data stream operation
CN112668453A (en) Video identification method and related equipment
Hong et al. Unsupervised face domain transfer for low-resolution face recognition
CN113391867B (en) Big data service processing method and service server based on digitization and visualization
CN113255505A (en) Certificate photo generation method, device, equipment and storage medium
CN115294505B (en) Risk object detection and training method and device for model thereof and electronic equipment
CN113033243A (en) Face recognition method, device and equipment
CN113658010B (en) Electronic insurance policy generation method, device, equipment and storage medium
CN111814714B (en) Image recognition method, device, equipment and storage medium based on audio and video recording
CN112380577A (en) Multiparty-supported electronic contract repeated signing method and device and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant