CN109120648A - A kind of anti-tamper verifying system of real-time monitoring data - Google Patents
A kind of anti-tamper verifying system of real-time monitoring data Download PDFInfo
- Publication number
- CN109120648A CN109120648A CN201811284699.3A CN201811284699A CN109120648A CN 109120648 A CN109120648 A CN 109120648A CN 201811284699 A CN201811284699 A CN 201811284699A CN 109120648 A CN109120648 A CN 109120648A
- Authority
- CN
- China
- Prior art keywords
- video
- data
- strategy
- concentration
- unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 68
- 238000013139 quantization Methods 0.000 claims description 16
- 238000000605 extraction Methods 0.000 claims description 7
- 230000033001 locomotion Effects 0.000 claims description 4
- 239000000284 extract Substances 0.000 claims description 3
- 238000012163 sequencing technique Methods 0.000 claims description 3
- 239000000203 mixture Substances 0.000 claims description 2
- 238000000034 method Methods 0.000 abstract description 6
- 230000005540 biological transmission Effects 0.000 abstract description 4
- 238000007796 conventional method Methods 0.000 abstract description 2
- 238000010586 diagram Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000004422 calculation algorithm Methods 0.000 description 2
- 238000010606 normalization Methods 0.000 description 2
- 230000002123 temporal effect Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000033772 system development Effects 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
- H04N21/4408—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- Closed-Circuit Television Systems (AREA)
Abstract
The present invention relates to a kind of anti-tamper verifying systems of real-time monitoring data, including monitoring client and server-side;The server-side includes key management module, checking request module, restoration disposal module and comparison module;The monitoring client includes that video transfers unit, the first video upgrading unit, the first data reduction unit and the first DEU data encryption unit, video, which is concentrated in monitoring field, can be effectively compressed original video length, retain the effective ways of original video change information simultaneously, the target retrieval problem common to field of video monitoring is helpful.The present invention relates to a kind of methods that guarantee original video is anti-tamper, and video concentration is applied to the anti-tamper verifying of real-time video, can substantially reduce the operand for the conventional method that encrypted transmission decryption plays directly on original video.
Description
Technical field
The present invention relates to monitoring system fields, more specifically to a kind of anti-tamper verifying system of real-time monitoring data.
Background technique
Typical TV monitor system is mainly by front end supervision equipment, transmission device, rear end storage, control and display equipment
This five most of composition, wherein rear end equipment can be further divided into central control equipment and sub-control control equipment.Front and back ends equipment has
A variety of constituted modes, connection (also referred to as Transmission system) between them can by the various ways such as cable, optical fiber, microwave come
It realizes.
And monitoring system is in security system using most one of systems, the building site monitoring being more suitble on the market now
System is handheld video communication equipment, and video monitoring is mainstream now.From earliest simulation monitoring to burning hot number prison a few years ago
Control Network Video Surveillance in the ascendant till now again, has occurred earth-shaking variation.Gradually unify global today in IP technology, I
It is necessary to re-recognize video monitoring system developing history.From the technical point of view, video monitoring system development is divided into the
Generation analog video monitoring system (CCTV) is based on " PC+ multimedia card " digital video monitor system (DVR) to the second generation, arrives
The third generation is based entirely on IP network video monitoring system (IPVS).
And presently promotion of the monitoring system due to being dedicated to clarity, so it is bigger compared to previous data volume, and
Needs are caused to be locally stored in monitoring client, in this way there have been the risk for being easy to be tampered to data in monitoring system,
And since data volume is more huge, it is stored so cloud can not be uploaded in real time, so one kind is needed to be able to detect local
The system whether storage is tampered.
Summary of the invention
In view of this, it is an object of the present invention to provide a kind of anti-tamper verifying systems of real-time monitoring data, to solve above-mentioned ask
Topic.
In order to solve the above-mentioned technical problem, the technical scheme is that
A kind of anti-tamper verifying system of real-time monitoring data, including monitoring client and server-side;
The server-side includes key management module, checking request module, restoration disposal module and comparison mould
Block;
The key management module is used to generate first key and the second key corresponding with first key, and will be described
First key is sent to corresponding monitoring client;
The checking solicited message is sent to the prison for generating checking solicited message by the checking request module
Control end;
The monitoring client includes that video transfers unit, the first video concentration list for shooting monitor video, the monitoring client
Member, the first data reduction unit and the first DEU data encryption unit;
The video transfers unit for obtaining the monitor video of a preset length to generate original video;
The first video upgrading unit is concentrated to obtain first the original video by the first concentration strategy
Video is concentrated;
Side of first data reduction unit by the first data reduction strategy to the first concentration video to quantify
Formula is simplified to obtain the first data sequence;
First DEU data encryption unit encrypts to obtain first data sequence by the first key
First encrypted cipher text;
First encrypted cipher text is uploaded to the server-side after the first encrypted cipher text of the monitoring client acquisition;
After the monitoring client receives checking solicited message, the original video is sent to the server-side;
The restoration disposal module includes the second video upgrading unit and the second data reduction unit;
The second video upgrading unit is concentrated to obtain the original video by the second video concentration strategy
The second concentration video, the second video concentration strategy are corresponding with first video concentration strategy;
Side of second data reduction unit by the second data reduction strategy to the second concentration video to quantify
Formula is simplified to obtain the second data sequence, and second data reduction strategy is corresponding with first data reduction strategy;
The comparison module includes pretreatment unit and comparison unit;
The pretreatment unit decrypts first encrypted cipher text by the second key to obtain the first data sequence;
The comparison unit compares first data sequence and the second data sequence by a preset comparison strategy
Column judge that original video is not modified if the result for comparing strategy meets the corresponding comparison condition of the comparison strategy;If than
The corresponding comparison condition of the comparison strategy is unsatisfactory for the result of strategy, then judges that original video is modified.
Further, the first video concentration strategy and second video are concentrated strategy and plan are concentrated using same video
Slightly.
Further, video concentration strategy the following steps are included:
Original background extraction step, from the original video background image extracted in the original video in video information;
Motion feature extraction step is divided from the original video according to original video background image and obtains moving person
Image information;
Target association step respectively establishes the time shaft that the corresponding image information of each moving person corresponds to original video
Time marks to obtain target dynamic associated images;
Video step is concentrated, the original video is added by the time shaft of original video in the target dynamic associated images
To obtain corresponding concentration video in background image.
Further, second data reduction strategy and first data reduction strategy use same data reduction plan
Slightly.
Further, the data reduction strategy the following steps are included:
Image simplification step extracts each frame image information in concentration video, and will extract obtained image information letter
Change obtains the simplification image information with preset resolution ratio;
Binary image step carries out binaryzation to the simplified image information by brightness value to obtain corresponding two-value
Change image information, the luminance threshold of binaryzation is the average value of the brightness value of all picture points of simplification image;
Image quantization step arranges binary image information in a predetermined sequence to obtain image quantization data;
Sequence generation step carries out each obtained described image quantized data according to the time sequencing in concentration video
Arrangement is to generate corresponding data sequence.
Further, the preset resolution ratio is 64*64.
Further, each first data sequence is made of several first image quantization data, corresponding, Mei Yisuo
The second data sequence is stated to be made of several second image quantization data;If corresponding first image quantization data and the second image volume
There are preset error values in change data, then judgement is unsatisfactory for the comparison condition;Meet the comparison item conversely, being then judged as
Part.
Further, the preset error value is that five bits are inconsistent.
Further, the monitoring client is used to store the concentration video of the first upgrading unit generation configured with memory module.
Further, the memory module is also used to store the first data sequence that first data reduction unit generates
Column.
The technology of the present invention effect major embodiment is in the following areas: in Large Scale Video Monitoring System, front-end camera, i.e. side
Edge equipment, the media server for obtaining original video and original video being transmitted to video surveillance management center, in monitoring system
In, the authenticity of original video is most important.Video, which is concentrated in monitoring field, can be effectively compressed original video length, protect simultaneously
The effective ways for staying original video change information, the target retrieval problem common to field of video monitoring are helpful.The present invention
It is related to a kind of method that guarantee original video is anti-tamper, video concentration is applied to the anti-tamper verifying of real-time video, it can be significantly
Reduce the operand for the conventional method that encrypted transmission decryption plays directly on original video.
Detailed description of the invention
It in order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, below will be to institute in embodiment
Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the invention
Example, for those of ordinary skill in the art, without creative efforts, can also obtain according to these attached drawings
Obtain other attached drawings.
Fig. 1: the system architecture schematic diagram of the anti-tamper verifying system of real-time monitoring data of the invention;
Fig. 2: the monitoring client schematic diagram of the anti-tamper verifying system of real-time monitoring data of the invention;
Fig. 3: the server-side schematic diagram of the anti-tamper verifying system of real-time monitoring data of the invention;
Fig. 4: the video compression principles figure of the anti-tamper verifying system of real-time monitoring data of the invention.
Appended drawing reference: 100, monitoring client;111, video transfers unit;112, the first video upgrading unit;113, the first number
According to simplified element;114, the first DEU data encryption unit;120, memory module;200, server-side;210, key management module;220,
Checking request module;230, restoration disposal module;231, the second video upgrading unit;232, the second data reduction unit;240,
Comparison module.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art's every other embodiment obtained belong to what the present invention protected
Range.
Below in conjunction with attached drawing, a specific embodiment of the invention is described in further detail, so that technical solution of the present invention is more
It should be readily appreciated that and grasp.
Shown in referring to Fig.1, a kind of anti-tamper verifying system of real-time monitoring data, including monitoring client 100 and server-side
200;
The server-side 200 include key management module 210, checking request module 220, restoration disposal module 230 with
And comparison module 240;
The key management module 210 is used to generate first key and the second key corresponding with first key, and will
The first key is sent to corresponding monitoring client 100;Second key is for unlocking the ciphertext generated after first key encryption
, that is to say, that after encrypting by first key, there is the second key can unlock, guarantees the safety of data in this way.
The checking solicited message is sent to institute for generating checking solicited message by the checking request module 220
State monitoring client 100;Checking solicited message is then to be verified according to thing demand to monitoring client 100.
The monitoring client 100 includes that video transfers the view of unit 111, first for shooting monitor video, the monitoring client 100
Frequency upgrading unit 112, the first data reduction unit 113 and the first DEU data encryption unit 114;
The video transfers unit 111 for obtaining the monitor video of a preset length to generate original video;This length
Degree can not do and limit to according to the configuration and parameter definition of monitoring client 100.
The first video upgrading unit 112 is concentrated the original video by the first concentration strategy to obtain the
One concentration video;And video is concentrated and is referred to illustrate, preferably, first video concentration strategy and second view
Strategy is concentrated using same video concentration strategy in frequency.Video concentration strategy the following steps are included: original background extraction step,
From the original video background image extracted in the original video in video information;Motion feature extraction step, according to original view
Frequency background image is divided from the original video obtains the image information of moving person;Target association step, respectively will be each
The time shaft settling time that the corresponding image information of moving person corresponds to original video marks to obtain target dynamic associated images;
Video step is concentrated, the original video background image is added by the time shaft of original video in the target dynamic associated images
In to obtain corresponding concentration video.The data volume stored in this way is much smaller than the data volume of original video, can by redundant arithmetic
To greatly reduce data volume.It is specific as follows, it is first that original video establishes background, is partitioned into main movement with Algorithms for Background Extraction
Target;The moving target that its secondary tracking is each partitioned into;The each moving target being partitioned into carries temporal information, moving target
Index data base is stored in the respective value of temporal information;Multiple moving targets and background are reconfigured, according to time order and function
It is combined into a series of image sequence frames;Image sequence frame is successively stitched together to obtain concentration video.The data of video are concentrated
Amount is far smaller than original video.It, can be with the original video of quick-searching to specific objective according to index data base and concentration video.
First data reduction unit 113 quantifies the first concentration video by the first data reduction strategy
Mode is simplified to obtain the first data sequence;By the quantization to image information, guarantee that data simplify enough, so
Ensuring that the data for verifying can upload in time.Preferably, second data reduction strategy and described first
Data reduction strategy uses same data reduction strategy.The data reduction strategy mentions the following steps are included: image simplification step
Each frame image information in concentration video is taken, and obtains that there is preset resolution ratio for obtained image information simplification is extracted
Simplify image information;Binary image step carries out binaryzation to the simplified image information by brightness value to be corresponded to
Binary image information, the luminance threshold of binaryzation is the average value of the brightness value of all picture points of simplification image;Image volume
Change step, binary image information is arranged in a predetermined sequence to obtain image quantization data;Sequence generation step, root
Each obtained described image quantized data is arranged to generate corresponding data sequence according to the time sequencing in concentration video
Column.The preset resolution ratio is 64*64.HASH algorithm can be specifically used, the method that Hash (HSAH) calculates is used and is based on
The calculation method of the low collision of the sequence frame of video is concentrated.In particular, can for example be realized using following fast method.It is right
Each frame image of above-mentioned concentration video carries out 64X 64 to the resolution ratio of image first and normalizes;Then normalization is calculated
The luminance picture of image afterwards;Calculate the average value of luminance picture all the points;To each of the luminance picture after normalization
Pixel is compared with above-mentioned average value, is greater than or equal to average value, otherwise it is 0 that being worth, which is 1,;64 values of above-mentioned 64X are pressed
It is cascaded according to particular order, obtains one 4096 integers, here it is the Hash of this frame image (HSAH) values;According to upper
Hash (HSAH) value that method calculates the concentration each frame image of video is stated, Hash (HSAH) sequence, that is, first are obtained
Data sequence and the second data sequence.
First DEU data encryption unit 114 encrypts to obtain first data sequence by the first key
Obtain the first encrypted cipher text;
First encrypted cipher text is uploaded to the server-side 200 after first encrypted cipher text of the acquisition of monitoring client 100;
After the monitoring client 100 receives checking solicited message, the original video is sent to the server-side
200;
The restoration disposal module 230 includes the second video upgrading unit 231 and the second data reduction unit 232;
The second video upgrading unit 231 is concentrated to obtain the original video by the second video concentration strategy
The second concentration video is obtained, the second video concentration strategy is tactful corresponding with first video concentration;
Second data reduction unit 232 quantifies the second concentration video by the second data reduction strategy
Mode is simplified to obtain the second data sequence, second data reduction strategy and first data reduction strategy pair
It answers;
The comparison module 240 includes pretreatment unit and comparison unit;
The pretreatment unit decrypts first encrypted cipher text by the second key to obtain the first data sequence;
The comparison unit compares first data sequence and the second data sequence by a preset comparison strategy
Column judge that original video is not modified if the result for comparing strategy meets the corresponding comparison condition of the comparison strategy;If than
The corresponding comparison condition of the comparison strategy is unsatisfactory for the result of strategy, then judges that original video is modified.So
Available first data sequence and the second data sequence, if original video is modified, the second data sequence will
There is apparent difference with the first data sequence.
Each first data sequence is made of several first image quantization data, corresponding, each second number
It is made of according to sequence several second image quantization data;If in corresponding first image quantization data and the second image quantization data
There are preset error values, then judgement is unsatisfactory for the comparison condition;Meet the comparison condition conversely, being then judged as.It is described pre-
If error amount is that five bits are inconsistent.
The monitoring client 100 is used to store the concentration video of the first upgrading unit generation configured with memory module 120.It is described
Memory module 120 is also used to store the first data sequence that first data reduction unit 113 generates.
Certainly, above is representative instance of the invention, and in addition to this, the present invention can also have other a variety of specific implementations
Mode, all technical solutions formed using equivalent substitution or equivalent transformation, is all fallen within the scope of protection of present invention.
Claims (10)
1. a kind of anti-tamper verifying system of real-time monitoring data, it is characterised in that: including monitoring client and server-side;
The server-side includes key management module, checking request module, restoration disposal module and comparison module;
The key management module is for generating first key and the second key corresponding with first key, and by described first
Key is sent to corresponding monitoring client;
The checking solicited message is sent to the monitoring for generating checking solicited message by the checking request module
End;
For the monitoring client for shooting monitor video, the monitoring client includes that video transfers unit, the first video upgrading unit, the
One data reduction unit and the first DEU data encryption unit;
The video transfers unit for obtaining the monitor video of a preset length to generate original video;
The first video upgrading unit is concentrated the original video by the first concentration strategy to obtain the first concentration
Video;
First data reduction unit the first data reduction strategy to it is described first concentration video in a manner of quantifying into
Row simplifies to obtain the first data sequence;
First DEU data encryption unit encrypts to obtain first first data sequence by the first key
Encrypted cipher text;
First encrypted cipher text is uploaded to the server-side after the first encrypted cipher text of the monitoring client acquisition;
After the monitoring client receives checking solicited message, the original video is sent to the server-side;
The restoration disposal module includes the second video upgrading unit and the second data reduction unit;
The second video upgrading unit is concentrated the original video by the second video concentration strategy with described in obtaining
Second concentration video, the second video concentration strategy are corresponding with first video concentration strategy;
Second data reduction unit the second data reduction strategy to it is described second concentration video in a manner of quantifying into
Row simplifies to obtain the second data sequence, and second data reduction strategy is corresponding with first data reduction strategy;
The comparison module includes pretreatment unit and comparison unit;
The pretreatment unit decrypts first encrypted cipher text by the second key to obtain the first data sequence;
The comparison unit compares first data sequence and the second data sequence by a preset comparison strategy, if
The result for comparing strategy meets the corresponding comparison condition of the comparison strategy, then judges that original video is not modified;If comparing countermeasure
Result slightly is unsatisfactory for the corresponding comparison condition of the comparison strategy, then judges that original video is modified.
2. a kind of anti-tamper verifying system of real-time monitoring data as described in claim 1, which is characterized in that first video
Concentration strategy and second video concentration strategy are using same video concentration strategy.
3. a kind of anti-tamper verifying system of real-time monitoring data as claimed in claim 2, which is characterized in that the video concentration
Strategy the following steps are included:
Original background extraction step, from the original video background image extracted in the original video in video information;
Motion feature extraction step is divided from the original video according to original video background image and obtains the figure of moving person
As information;
The corresponding image information of each moving person is corresponded to the time shaft settling time of original video by target association step respectively
Label is to obtain target dynamic associated images;
Video step is concentrated, the original video background is added by the time shaft of original video in the target dynamic associated images
To obtain corresponding concentration video in image.
4. a kind of anti-tamper verifying system of real-time monitoring data as described in claim 1, which is characterized in that second data
Simplified strategy and first data reduction strategy use same data reduction strategy.
5. a kind of anti-tamper verifying system of real-time monitoring data as claimed in claim 4, which is characterized in that the data reduction
Strategy the following steps are included:
Image simplification step extracts each frame image information in concentration video, and it is simplified to extract obtained image information
To the simplification image information with preset resolution ratio;
Binary image step carries out binaryzation to the simplified image information by brightness value to obtain corresponding binary picture
As information, the luminance threshold of binaryzation is the average value of the brightness value of all picture points of simplification image;
Image quantization step arranges binary image information in a predetermined sequence to obtain image quantization data;
Sequence generation step arranges each obtained described image quantized data according to the time sequencing in concentration video
To generate corresponding data sequence.
6. a kind of anti-tamper verifying system of real-time monitoring data as claimed in claim 5, which is characterized in that described preset point
Resolution is 64*64.
7. a kind of anti-tamper verifying system of real-time monitoring data as described in claim 1, which is characterized in that each described first
Data sequence is made of several first image quantization data, corresponding, and each second data sequence is by several second images
Quantized data composition;If in corresponding first image quantization data and the second image quantization data, there are preset error values, sentence
It is disconnected to be unsatisfactory for the comparison condition;Meet the comparison condition conversely, being then judged as.
8. a kind of anti-tamper verifying system of real-time monitoring data as claimed in claim 7, which is characterized in that the default error
Value is that five bits are inconsistent.
9. a kind of anti-tamper verifying system of real-time monitoring data as described in claim 1, which is characterized in that the monitoring client is matched
Memory module is equipped with for storing the concentration video of the first upgrading unit generation.
10. a kind of anti-tamper verifying system of real-time monitoring data as claimed in claim 9, which is characterized in that the storage mould
Block is also used to store the first data sequence that first data reduction unit generates.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811284699.3A CN109120648B (en) | 2018-10-31 | 2018-10-31 | A kind of anti-tamper verifying system of real-time monitoring data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811284699.3A CN109120648B (en) | 2018-10-31 | 2018-10-31 | A kind of anti-tamper verifying system of real-time monitoring data |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109120648A true CN109120648A (en) | 2019-01-01 |
CN109120648B CN109120648B (en) | 2019-08-02 |
Family
ID=64855849
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811284699.3A Active CN109120648B (en) | 2018-10-31 | 2018-10-31 | A kind of anti-tamper verifying system of real-time monitoring data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109120648B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110035327A (en) * | 2019-04-17 | 2019-07-19 | 深圳市摩天之星企业管理有限公司 | A kind of safe playback method |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102905133A (en) * | 2012-10-15 | 2013-01-30 | 南京邮电大学 | Video stream-oriented hybrid encoding and encrypting method |
CN104244026A (en) * | 2014-09-04 | 2014-12-24 | 浙江宇视科技有限公司 | Secret key distribution device in video monitoring system |
CN104270614A (en) * | 2014-10-16 | 2015-01-07 | 浙江宇视科技有限公司 | Video encryption and decryption method and device |
CN204350190U (en) * | 2015-01-27 | 2015-05-20 | 国家电网公司 | A kind of video data enciphering/deciphering system of quick access security access platform |
US20160080332A1 (en) * | 2013-05-02 | 2016-03-17 | Telefonaktiebolaget L M Ericsson (Publ) | Handling of Performance Monitoring Data |
CN107027007A (en) * | 2017-04-12 | 2017-08-08 | 南京三宝弘正视觉科技有限公司 | A kind of video sharing method and system |
-
2018
- 2018-10-31 CN CN201811284699.3A patent/CN109120648B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102905133A (en) * | 2012-10-15 | 2013-01-30 | 南京邮电大学 | Video stream-oriented hybrid encoding and encrypting method |
US20160080332A1 (en) * | 2013-05-02 | 2016-03-17 | Telefonaktiebolaget L M Ericsson (Publ) | Handling of Performance Monitoring Data |
CN104244026A (en) * | 2014-09-04 | 2014-12-24 | 浙江宇视科技有限公司 | Secret key distribution device in video monitoring system |
CN104270614A (en) * | 2014-10-16 | 2015-01-07 | 浙江宇视科技有限公司 | Video encryption and decryption method and device |
CN204350190U (en) * | 2015-01-27 | 2015-05-20 | 国家电网公司 | A kind of video data enciphering/deciphering system of quick access security access platform |
CN107027007A (en) * | 2017-04-12 | 2017-08-08 | 南京三宝弘正视觉科技有限公司 | A kind of video sharing method and system |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110035327A (en) * | 2019-04-17 | 2019-07-19 | 深圳市摩天之星企业管理有限公司 | A kind of safe playback method |
Also Published As
Publication number | Publication date |
---|---|
CN109120648B (en) | 2019-08-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20120195425A1 (en) | Security video transmission apparatus, video data reception apparatus, and key generation method thereof | |
US11374933B2 (en) | Securing digital data transmission in a communication network | |
KR101460552B1 (en) | Masking and Recovering Method of Privacy Region | |
CN107241585B (en) | Video monitoring method and system | |
CN113762034A (en) | Video classification method and device, storage medium and electronic equipment | |
CN107027007B (en) | A kind of video sharing method and system | |
CN109120648B (en) | A kind of anti-tamper verifying system of real-time monitoring data | |
KR20210084806A (en) | Method for Restoring Distortion Video Based on Iris Recognition | |
KR101331201B1 (en) | Cctv media secure transmission system and method thereof | |
CN101175201A (en) | Method for recognizing fake real-time video | |
CN109165317B (en) | A kind of real time monitoring aspect indexing inquiry system | |
CN109951690B (en) | Robot body security system and method based on image analysis of camera array | |
CN116756750A (en) | Medical sensitive data acquisition desensitization method | |
CN108234467B (en) | Method and system for judging authenticity of engineering construction photo | |
CN114650156B (en) | Real-time data transmission method and system for Internet of things | |
CN115412292A (en) | Privacy protection method and device suitable for security monitoring and storage medium | |
Wei et al. | Trustworthy authentication on scalable surveillance video with background model support | |
CN113762970A (en) | Data processing method and device, computer readable storage medium and computer equipment | |
KR20210084805A (en) | Method for Restoring Distortion Video Based on Finger Print Recognition | |
JP2022013298A (en) | Information processing system | |
CN111818237A (en) | Video monitoring analysis system and method | |
KR20210084804A (en) | Method for Restoring Distortion Video Based on Identification Card Recognition | |
CN117216039B (en) | Method for constructing three-dimensional base of building based on three-dimensional cadastral database | |
CN117834952B (en) | Video conference content secure transmission method, device and medium | |
KR102524271B1 (en) | System and method for video integrity verification and original recovery based on Blockchain network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |