CN109413444A - Completeness check data creation method, integrity checking method and the device of video - Google Patents

Completeness check data creation method, integrity checking method and the device of video Download PDF

Info

Publication number
CN109413444A
CN109413444A CN201811280558.4A CN201811280558A CN109413444A CN 109413444 A CN109413444 A CN 109413444A CN 201811280558 A CN201811280558 A CN 201811280558A CN 109413444 A CN109413444 A CN 109413444A
Authority
CN
China
Prior art keywords
frame
video
abstract
completeness check
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811280558.4A
Other languages
Chinese (zh)
Inventor
王展
胡小鹏
顾振华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Keda Technology Co Ltd
Original Assignee
Suzhou Keda Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Keda Technology Co Ltd filed Critical Suzhou Keda Technology Co Ltd
Priority to CN201811280558.4A priority Critical patent/CN109413444A/en
Publication of CN109413444A publication Critical patent/CN109413444A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/23418Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving operations for analysing video streams, e.g. detecting features or characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/44008Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving operations for analysing video streams, e.g. detecting features or characteristics in the video stream

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses completeness check data creation method, integrity checking method and the devices of video, wherein the completeness check data creation method of video includes the following steps: to calculate using I frame data of the digest calculations algorithm to video, obtains I frame abstract;I frame abstract is encrypted using the first encryption key;Generate the completeness check data of video;Completeness check data include the I frame abstract and the first decruption key corresponding with the first encryption key of encryption.By the abstract and the encryption that generate the I frame of video, generate includes the I frame abstract of encryption and the completeness check data of the first decruption key the I frame abstract of encryption to be decrypted, and since frame abstract is determined by the content of video frame, therefore, whether user can be tampered by the content of the abstract verification I frame of the I frame in completeness check data, so as to improve the confidence level for the video for completing verification by completeness check data.

Description

Completeness check data creation method, integrity checking method and the device of video
Technical field
The present invention relates to technical field of multimedia information more particularly to a kind of completeness check data of video are raw It is filled at the completeness check of method, the integrity checking method of video, the completeness check data generating device of video, video It sets, computer equipment and computer readable storage medium.
Background technique
With the continuous development of technology, cheap digital product (digital camera, video camera, smart phone) is extensive It uses, a large amount of rises of the video sharings website such as youku.com, You Tube, the multi-medium datas such as video, image have become me A part important in daily life.Meanwhile video plays more in the various aspects especially monitoring field of social life Carry out more important role, and carry out the consistent reproduction of height due to the fact video can occur the past, in public peace The effect in full field is also increasing.In addition, the standard that video recorded broadcast function also has become video conferencing system is equipped with, use Family can obtain video file by recording function, recall conference content by video file, be of great significance.However, with The development of multimedia technology, occur a large amount of powerful multimedia content softwares for editing, such as Adobe in the market Photoshop and GNU Gimp etc., and these softwares for editing are used, ordinary user can distort in multimedia easily Hold, this to be flooded with video hard to tell whether it is true or false on network.And after video file is edited by video software, it can Video record file as mere fact foundation is tampered, forges or deletes, it is possible to cause covering for true truth Lid is even distorted.Therefore, if can not be verified to the integrality of video record file, it will lead to video record file can The problem of reduction of reliability.
Summary of the invention
Therefore, the technical problem to be solved in the present invention is that the integrality for solving video file in the prior art can not be by Verification, the lower problem of confidence level.
For this purpose, according in a first aspect, the present invention provides a kind of completeness check data creation methods of video, including such as Lower step: being calculated using I frame data of the digest calculations algorithm to video, obtains I frame abstract;Use the first encryption key pair I frame abstract is encrypted;Generate the completeness check data of video;Completeness check data include encryption I frame abstract and with Corresponding first decruption key of first encryption key.
Optionally, the completeness check data creation method of video further includes following steps: generating each video frame in video Frame flag;The frame flag of two adjacent video frames meets default changing rule;Frame flag is carried out using the second encryption key Encryption;Wherein, completeness check data further include the frame flag and the second decruption key corresponding with the second encryption key of encryption.
Optionally, the completeness check data creation method of video further includes following steps: to the first decruption key and/or Second decruption key is encrypted;The first decruption key in completeness check data is encrypted first decruption key;With/ Or, the second decruption key in completeness check data is encrypted second decruption key.
Optionally, in video the completeness check data of each video frame be stored in corresponding video frame SEI it is customized In data.
According to second aspect, the present invention provides a kind of integrity checking method of video, include the following steps: to receive to Survey video and the corresponding completeness check data of video to be measured;Completeness check data include the I frame abstract of encryption and with the Corresponding first decruption key of one encryption key, the first encryption key is for encrypting I frame abstract;I frame abstract is counted to use to make a summary Calculate what the I frame data of the corresponding source video of video to be measured were calculated in algorithm;Using the first decruption key to the I of encryption Frame abstract is decrypted, and obtains the I frame abstract of source video;It is counted using I frame data of the digest calculations algorithm to video to be measured It calculates, obtains the I frame abstract of video to be measured;The I frame abstract of the I frame of video to be measured abstract and source video is compared, obtain to Survey the first completeness check result of video.
Optionally, completeness check data further include the frame flag and corresponding with the second encryption key encrypted of encryption The second decruption key;Frame flag is for being marked each video frame in source video;The frame mark of two adjacent video frames Note meets default changing rule.
Optionally, the integrity checking method of video further includes following steps: using the second decruption key to the frame of encryption Label is decrypted;The frame flag of two adjacent video frames in video more to be measured obtains the second integrality school of video to be measured Test result.
According to the third aspect, the present invention provides a kind of completeness check data generating devices of video, comprising: the first I Frame summarization generation module obtains I frame abstract for calculating using I frame data of the digest calculations algorithm to video;First adds Close module, for being encrypted using the first encryption key to I frame abstract;Data generation module is verified, for generating video Completeness check data;Completeness check data include that the I frame abstract and corresponding with the first encryption key first of encryption is decrypted Key.
According to fourth aspect, the present invention provides a kind of completeness check devices of video, comprising: data reception module, For receiving video to be measured and the corresponding completeness check data of video to be measured;Completeness check data include the I frame of encryption Abstract and the first decruption key corresponding with the first encryption key, the first encryption key is for encrypting I frame abstract;I frame is made a summary It is calculated using I frame data of the digest calculations algorithm to the corresponding source video of video to be measured;First deciphering module is used It is decrypted in using I frame abstract of first decruption key to encryption, obtains the I frame abstract of source video;2nd I frame summarization generation Module obtains the I frame abstract of video to be measured for calculating using I frame data of the digest calculations algorithm to video to be measured;The One result-generation module obtains video to be measured for comparing the I frame abstract of the I frame abstract of video to be measured and source video The first completeness check result.
According to the 5th aspect, the present invention provides a kind of computer equipments, comprising: at least one processor;And with extremely The memory of few processor communication connection;Wherein, memory is stored with the instruction that can be executed by a processor, instructs quilt At least one processor executes, so that at least one processor executes all or part of above-mentioned first aspect or second aspect Method.
According to the 7th aspect, the present invention provides a kind of computer readable storage mediums, are stored thereon with computer instruction, The step of all or part of method of above-mentioned first aspect, is realized in the instruction when being executed by processor, or realizes above-mentioned second party The step of all or part of method in face.
Technical solution provided in an embodiment of the present invention, has the advantages that
1, the completeness check data creation method of video provided by the invention, includes the following steps: using digest calculations Algorithm calculates the I frame data of video, obtains I frame abstract;I frame abstract is encrypted using the first encryption key;It is raw At the completeness check data of video;Completeness check data include encryption I frame abstract and it is corresponding with the first encryption key First decruption key.By generating abstract and the encryption of the I frame of video, generates the I frame for including to encrypt and make a summary and to encryption The completeness check data of the first decruption key that are decrypted of I frame abstract, and since frame abstract is the content by video frame Determine, therefore, user can by verify to the I frame of the video received carry out I frame abstract that digest calculations obtain with it is complete Whether whether the identical content to verify I frame is tampered I frame abstract in whole property verification data, to make the complete performance of video It is enough verified, improve the confidence level that the video of verification is completed by completeness check data.In addition, only to key frame (i.e. I frame) Digest calculations are carried out, carry out digest calculations relative to the whole frame to video, reduce the generation consumption of completeness check data.
2, the completeness check data creation method of video provided by the invention includes the following steps: to generate each in video The frame flag of video frame;The frame flag of two adjacent video frames meets default changing rule;Using the second encryption key to frame mark Remember capable encryption into;Wherein, completeness check data further include that the frame flag of encryption and corresponding with the second encryption key second solve Key.By generating the frame flag of all video frames in video, and by encrypted frame flag and to encrypted frame The second decruption key being decrypted is marked to be added in completeness check data, and due to the frame flag of two adjacent video frames Meet default changing rule, therefore, user can be by verifying the frame flags of two adjacent video frames in the video that receives Whether default changing rule is met to verify whether the video received is deleted, to enable the integrality of video by school It tests, improves the confidence level for completing the video of verification by completeness check data.
3, the completeness check data creation method of video provided by the invention, further includes following steps: being decrypted to first Key and/or the second decruption key are encrypted;The first decruption key in completeness check data is encrypted first solution Key;And/or the second decruption key in completeness check data is encrypted second decruption key.By to first Decruption key and/or the second decruption key are encrypted, and can reduce the first decruption key and/or the second decruption key is illegal A possibility that acquisition, can reduce I frame abstract and/or frame flag a possibility that being illegally accessed, improve completeness check number According to safety, thus further increase by completeness check data complete verification video confidence level.
Detailed description of the invention
It, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical solution in the prior art Embodiment or attached drawing needed to be used in the description of the prior art be briefly described, it should be apparent that, it is described below Attached drawing is some embodiments of the present invention, for those of ordinary skill in the art, before not making the creative labor It puts, is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of method flow diagram of the completeness check data creation method for video that embodiment 1 provides;
Fig. 2 is the composition schematic diagram of the SEI_NAL byte of the data containing completeness check;
Fig. 3 is a kind of method flow diagram of the integrity checking method for video that embodiment 2 provides;
Fig. 4 is a kind of structural schematic diagram of the completeness check data generating device for video that embodiment 3 provides;
Fig. 5 is a kind of structural schematic diagram of the completeness check device for video that embodiment 4 provides;
Fig. 6 is a kind of hardware structural diagram for computer equipment that embodiment 5 provides.
Specific embodiment
Technical solution of the present invention is clearly and completely described below in conjunction with attached drawing, it is clear that described implementation Example is a part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill Personnel's every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
In the description of the present invention, it should be noted that term " first ", " second ", " third " are used for description purposes only, It is not understood to indicate or imply relative importance.
Embodiment 1
A kind of completeness check data creation method of video is present embodiments provided, as shown in Figure 1.It needs to illustrate It is that step shown in the flowchart of the accompanying drawings can execute in a computer system such as a set of computer executable instructions, Also, although logical order is shown in flow charts, and it in some cases, can be to be different from sequence execution herein Shown or described step.The process includes the following steps:
Step S10 is calculated using I frame data of the digest calculations algorithm to video, obtains I frame abstract.In this implementation In example, I frame is used to indicate the video pictures of transmission in H.264 compression standard, in addition, H.264 for indicating in compression standard The video pictures of transmission further include B frame and P frame, wherein I frame is also known as intracoded frame, is a kind of the only of included all information Vertical frame, can independently be decoded without reference to other images;P frame is also known as inter prediction encoding frame, needs to refer to the I frame of front Just can be carried out coding, expression be present frame picture Yu former frame (former frame may be that I frame is also likely to be P frame) difference;B frame Also known as bi-directional predictive coding frame, that is, B frame recording be this frame and before and after frames difference.Wherein, I frame is also key frame, is Important frame in interframe compression coding, as soon as being a coded frame for full frame compression, when decoding, only uses the data of I frame restructural complete Image.In the present embodiment, it can be plucked by I frame data of the digest calculations such as the HASH algorithm or SM3 algorithm to video It calculates.
Step S20 encrypts I frame abstract using the first encryption key.In the present embodiment, symmetrical add can be used Close algorithm or rivest, shamir, adelman encrypt I frame abstract, it is preferable that are plucked using SM2 rivest, shamir, adelman to I frame It is encrypted, specifically, I frame abstract is encrypted using SM2 private key, i.e., the first encryption key is to SM2 private key.
Step S30 generates the completeness check data of video.In the present embodiment, completeness check data include encryption I frame abstract and the first decruption key corresponding with the first encryption key.
In a particular embodiment, by taking the first encryption key is SM2 private key as an example, a pair of of SM2 private key and public key are firstly generated, Wherein, the SM2 private key of generation to as the first encryption key to be subsequently generated I frame abstract encrypt, SM2 public key to Encrypted I frame abstract is decrypted as the first decruption key;Then the video frame in reading video data, and judge to read Whether the video frame taken is I frame;When video is I frame, S10~step S30 is thened follow the steps, the completeness check of video is completed The generation of data.
Abstract provided in this embodiment by generating the I frame of video and encryption generate the I frame for including to encrypt and make a summary and use Completeness check data with the first decruption key that the I frame of encryption abstract is decrypted, and since frame abstract is by video The content of frame determines that therefore, user can carry out the I frame that digest calculations obtain by verifying the I frame to the video received It makes a summary and whether the identical content to verify I frame is tampered the I frame abstract in completeness check data, to make video Integrality can be verified, improves the confidence level that the video of verification is completed by completeness check data.In addition, only to key frame (i.e. I frame) carries out digest calculations, carries out digest calculations relative to the whole frame to video, reduces the life of completeness check data At consumption.
In an alternate embodiment of the invention, as shown in Figure 1, the completeness check data creation method of video further includes walking as follows It is rapid:
Step S40 generates the frame flag of each video frame in video.In the present embodiment, the frame mark of two adjacent video frames Note meets default changing rule.In the present embodiment, it needs to generate frame flag, including all I frames, B to all frames in video Frame and P frame.In the present embodiment, the frame flag of each video frame can be the number for meeting certain changing rule, word in video The label such as female or combination, for example, 1,3,5 ... 2n-1,2n+1, a1, a2, a3 ... an, an+1 etc., it is preferable that video In the frame flag of each video frame be with the increased integer of frame number, the frame flag of the first frame of video is Integer N, subsequent every One frame successively adds one, i.e. the frame flag of kth frame is N+k+1.
Step S50 encrypts frame flag using the second encryption key.In the present embodiment, completeness check data It further include the frame flag and the second decruption key corresponding with the second encryption key of encryption.In the present embodiment, it can be used pair Encryption Algorithm or rivest, shamir, adelman is claimed to encrypt frame flag, it is preferable that using SM2 rivest, shamir, adelman to frame Label is encrypted, and specifically, is encrypted using SM2 private key to frame flag abstract, i.e., the second encryption key is to SM2 private key.
In a particular embodiment, by taking the second encryption key is SM2 private key as an example, a SM2 private key and correspondence are firstly generated Public key, wherein for the SM2 private key of generation to encrypt as the second encryption key to the frame flag being subsequently generated, SM2 is public Key is will be decrypted encrypted frame flag as the second decruption key;Then the video frame in reading video data, And step S40~step S50 is executed, complete the generation of frame flag and the expansion of completeness check data.It should be noted that The second encryption key and above-mentioned first encryption key can be the same key in the present embodiment, i.e., can also directly use first Encryption key encrypts frame flag, correspondingly, encrypted frame flag is decrypted using the first decruption key.
Completeness check data creation method provided in this embodiment, by the frame mark for generating all video frames in video Note, and by encrypted frame flag and to be added to integrality to the second decruption key that encrypted frame flag is decrypted It verifies in data, and since the frame flag of two adjacent video frames meets default changing rule, user can pass through school Whether the frame flag for testing two adjacent video frames in the video received meets default changing rule to verify the video received Whether deleted, to keep the integrality of video verified, improves the video for completing verification by completeness check data Confidence level.
In an alternate embodiment of the invention, as shown in Figure 1, the completeness check data creation method of video further includes walking as follows It is rapid:
Step S60 encrypts the first decruption key and/or the second decruption key.In the present embodiment, integrality school The first decruption key tested in data is encrypted first decruption key;And/or the second decryption in completeness check data Key is encrypted second decruption key.In a particular embodiment, using encryption formula to the first decruption key and/or second Decruption key is encrypted, and encryption formula is the formula that operation is carried out to the first decruption key and/or the second decruption key, example Such as, to after binary number ring shift left 3 of the first decruption key and/or the second decruption key plus 1.
Completeness check data creation method provided in this embodiment, by being decrypted to the first decruption key and/or second Key is encrypted, and can be reduced the first decruption key and/or a possibility that the second decruption key is illegally accessed, can be subtracted A possibility that small I frame abstract and/or frame flag are illegally accessed, improves the safety of completeness check data, thus further Improve the confidence level that the video of verification is completed by completeness check data.
In an alternate embodiment of the invention, the completeness check data of each video frame are stored in corresponding video frame in video In SEI self-defining data.In the present embodiment, after the completeness check data of each video frame are stored in SEI self-defining data, SEI_NAL as shown in Figure 2 is formed, and makes an addition to the last of corresponding original frame data.By by the complete of each video frame Property verification data be stored in the SEI self-defining data of corresponding video frame, the end without video verifying function can be prevented The generation for the problem of end can not play the video for carrying completeness check data, improves and carries completeness check data The broadcasting compatibility of video.
Embodiment 2
A kind of integrity checking method of video is present embodiments provided, as shown in Figure 3.It should be noted that in attached drawing Process the step of illustrating can execute in a computer system such as a set of computer executable instructions, although also, Logical order is shown in flow charts, but in some cases, can be executed with the sequence for being different from herein it is shown or The step of description.The process includes the following steps:
Step S100 receives video to be measured and the corresponding completeness check data of video to be measured.In the present embodiment, complete Whole property verification data include the I frame abstract and the first decruption key corresponding with the first encryption key of encryption, the first encryption key For encrypting I frame abstract;I frame abstract is the I frame data progress using digest calculations algorithm to the corresponding source video of video to be measured It is calculated.In the present embodiment, the completeness check data of each video frame of video to be measured are by corresponding video frame number According to carrying, it is preferable that the completeness check data of each video frame are directly made an addition to accordingly in the video to be measured received In the self-defining data of the SEI of video frame.
Step S200 is decrypted using I frame abstract of first decruption key to encryption, obtains the I frame abstract of source video.
Step S300 is calculated using I frame data of the digest calculations algorithm to video to be measured, obtains the I of video to be measured Frame abstract.In the present embodiment, which calculates with the digest calculations used when carrying out I frame digest calculations to source video Method is identical, for example, the digest calculations algorithm used when if carrying out I frame digest calculations to source video is a kind of SM2 algorithm, makes Digest calculations are carried out to the I frame in video to be measured with identical SM2 algorithm, to obtain the I frame abstract of video to be measured.
The I frame abstract of the I frame abstract of video to be measured and source video is compared, obtains video to be measured by step S400 First completeness check result.In the present embodiment, when the I frame of video to be measured abstract is identical with the I frame of source video abstract, to The the first completeness check result for surveying video is that video to be measured is not tampered with;When the I frame of I the frame abstract and source video of video to be measured When making a summary different, the first completeness check result of video to be measured is that video to be measured is tampered.
In an alternate embodiment of the invention, the first decruption key in completeness check data is that encrypted first decryption is close Key, before being decrypted using I frame abstract of first decruption key to encryption, it is also necessary to encrypted first decruption key It is decrypted.In the present embodiment, when encrypting using encryption formula to the first decruption key, corresponding solution Migong is used Encrypted first decruption key is decrypted in formula, wherein decryption formula is the inverse process for encrypting formula, in embodiment 1 After described binary number ring shift left 3 to the first decruption key plus for 1 encryption formula, decryption formula is to encryption The binary number of the first encryption and decryption key afterwards subtract 1 after ring shift right 3.
In an alternate embodiment of the invention, completeness check data further include encryption frame flag and with encrypted second plus Corresponding second decruption key of key;Frame flag is for being marked each video frame in source video;Two neighboring view The frame flag of frequency frame meets default changing rule.
In the present embodiment, as shown in figure 3, the integrity checking method of video further includes following steps:
Step S500 is decrypted using frame flag of second decruption key to encryption.In the present embodiment, due to be measured The completeness check data of each video frame are carried by corresponding video requency frame data in video, therefore, to each video frame It after frame flag is decrypted, needs to be unifiedly stored in a database, to facilitate the execution of step S600.
In the present embodiment, the second decruption key may be encrypted second decruption key, then is using the second solution Before the frame flag of close key pair encryption is decrypted, it is also necessary to encrypted second decruption key is decrypted, specifically, When using encryption formula the second decruption key is encrypted when, encrypted second decruption key is decrypted need using Corresponding decryption formula.
Step S600, the frame flag of two adjacent video frames in video more to be measured, obtain video to be measured second are complete Property check results.In the present embodiment, when the frame flag of two adjacent video frames in video to be measured meets adjacent two in source video When the default changing rule of the frame flag of a video frame, the second obtained integrity of video check results are that video to be measured is not deleted Subtract;When the frame flag of two adjacent video frames in video to be measured does not meet the pre- of the frame flag of two adjacent video frames in source video If when changing rule, the second obtained integrity of video check results are that video to be measured is deleted.Specifically, with default variation rule Rule be the frame flag of each video frame in source video for for the increased integer of frame number, when a video in video to be measured When the difference of the frame flag of the frame flag and its former frame of frame is 1, then do not deleted between the frame and its former frame;When view to be measured When the difference of the frame flag of the frame flag and its former frame of a video frame in frequency is not 1, then deleted between the frame and former frame Subtract.
Embodiment 3
A kind of completeness check data generating device of video is provided in the present embodiment, and the device is for realizing above-mentioned Embodiment 1 and its preferred embodiment, the descriptions that have already been made will not be repeated.As used below, term " module " can To realize the combination of the software and/or hardware of predetermined function.Although device described in following embodiment is preferably come with software It realizes, but the realization of the combination of hardware or software and hardware is also that may and be contemplated.
The present embodiment provides a kind of completeness check data generating devices of video, as shown in Figure 4, comprising: the first I frame is plucked Want generation module 10, the first encrypting module 20 and verification data generation module 30.
Wherein, 10 pieces of the first I frame summarization generation mould based on being carried out using I frame data of the digest calculations algorithm to video It calculates, obtains I frame abstract;First encrypting module 20 is used to encrypt I frame abstract using the first encryption key;It is raw to verify data It is used to generate the completeness check data of video at module 30;Completeness check data include the I frame abstract of encryption and with first Corresponding first decruption key of encryption key.
In an alternate embodiment of the invention, as shown in figure 4, the completeness check data generating device of video further include: frame flag Generation module 40 and the second encrypting module 50.
Wherein, frame flag generation module 40 is used to generate the frame flag of each video frame in video;Two adjacent video frames Frame flag meets default changing rule;Second encrypting module 50 is for encrypting frame flag using the second encryption key.? In the present embodiment, completeness check data further include that the frame flag encrypted and the second decryption corresponding with the second encryption key are close Key.
In an alternate embodiment of the invention, the completeness check data generating device of video further include: cipher key encryption block 60 is used It is encrypted in the first decruption key and/or the second decruption key.In the present embodiment, first in completeness check data Decruption key is encrypted first decruption key;And/or the second decruption key in completeness check data is encrypted Second decruption key.
Embodiment 4
A kind of completeness check device of video is provided in the present embodiment, and the device is for realizing above-described embodiment 2 And its preferred embodiment, the descriptions that have already been made will not be repeated.As used below, term " module " may be implemented pre- Determine the combination of the software and/or hardware of function.Although device described in following embodiment is preferably realized with software, The realization of the combination of hardware or software and hardware is also that may and be contemplated.
The present embodiment provides a kind of completeness check devices of video, as shown in Figure 5, comprising: data reception module 100, First deciphering module 200, the 2nd I frame summarization generation module 300 and the first result-generation module 400.
Wherein, data reception module 100 is for receiving video to be measured and the corresponding completeness check data of video to be measured; Completeness check data include the I frame abstract and the first decruption key corresponding with the first encryption key of encryption, and the first encryption is close Key is for encrypting I frame abstract;I frame abstract for using digest calculations algorithm to the I frame data of the corresponding source video of video to be measured into What row was calculated;First deciphering module 200 is used to be decrypted using I frame abstract of first decruption key to encryption, obtains The I frame of source video is made a summary;2nd I frame summarization generation module 300 is used for the I frame data using digest calculations algorithm to video to be measured It is calculated, obtains the I frame abstract of video to be measured;First result-generation module 400 is used for the I frame abstract of video to be measured and source The I frame abstract of video compares, and obtains the first completeness check result of video to be measured.
In an alternate embodiment of the invention, completeness check data further include encryption frame flag and with encrypted second plus Corresponding second decruption key of key;Frame flag is for being marked each video frame in source video;Two neighboring view The frame flag of frequency frame meets default changing rule;The completeness check device of video further include: the second deciphering module and the second knot Fruit generation module;Wherein, the second deciphering module using frame flag of second decruption key to encryption for being decrypted;Second knot Frame flag of the fruit generation module for two adjacent video frames in video more to be measured, obtains the second integrality school of video to be measured Test result.
Embodiment 5
The embodiment of the invention provides a kind of computer equipments, as shown in fig. 6, the computer equipment may include: at least One processor 601, such as CPU (Central Processing Unit, central processing unit), at least one communication interface 603, memory 604, at least one communication bus 602.Wherein, communication bus 602 is for realizing the connection between these components Communication.Wherein, communication interface 603 may include display screen (Display), keyboard (Keyboard), and optional communication interface 603 is also It may include standard wireline interface and wireless interface.Memory 604 can be high speed RAM memory (Random Access Memory, effumability random access memory), it is also possible to non-labile memory (non-volatile memory), A for example, at least magnetic disk storage.Memory 604 optionally can also be that at least one is located remotely from aforementioned processor 601 Storage device.Application program is wherein stored in memory 604, and processor 601 calls the program generation stored in memory 604 Code, with for either executing in embodiment 1 or embodiment 2 method step, i.e., for performing the following operations:
It is calculated using I frame data of the digest calculations algorithm to video, obtains I frame abstract;Use the first encryption key I frame abstract is encrypted;Generate the completeness check data of video;Completeness check data include encryption I frame abstract and The first decruption key corresponding with the first encryption key.
In the embodiment of the present invention, processor 601 calls the program code in memory 604, is also used to execute following operation: Generate the frame flag of each video frame in video;The frame flag of two adjacent video frames meets default changing rule;Add using second Close key pair frame flag is encrypted;Wherein, completeness check data further include encryption frame flag and with the second encryption key Corresponding second decruption key.
In the embodiment of the present invention, processor 601 calls the program code in memory 604, is also used to execute following operation: First decruption key and/or the second decruption key are encrypted;The first decruption key in completeness check data is encryption The first decruption key afterwards;And/or the second decruption key in completeness check data is encrypted second decruption key.
In the embodiment of the present invention, processor 601 calls the program code in memory 604, is also used to execute following operation: Receive video to be measured and the corresponding completeness check data of video to be measured;Completeness check data include the I frame abstract of encryption The first decruption key corresponding with the first encryption key, the first encryption key is for encrypting I frame abstract;I frame abstract is use The I frame data of the corresponding source video of video to be measured are calculated in digest calculations algorithm;Use the first decruption key pair The I frame abstract of encryption is decrypted, and obtains the I frame abstract of source video;Using digest calculations algorithm to the I frame data of video to be measured It is calculated, obtains the I frame abstract of video to be measured;The I frame abstract of the I frame abstract of video to be measured and source video is compared, Obtain the first completeness check result of video to be measured.
In the embodiment of the present invention, processor 601 calls the program code in memory 604, is also used to execute following operation: It is decrypted using frame flag of second decruption key to encryption;The frame flag of two adjacent video frames in video more to be measured, Obtain the second completeness check result of video to be measured.
Wherein, communication bus 602 can be Peripheral Component Interconnect standard (peripheral component Interconnect, abbreviation PCI) bus or expanding the industrial standard structure (extended industry standard Architecture, abbreviation EISA) bus etc..Communication bus 602 can be divided into address bus, data/address bus, control bus etc.. Only to be indicated with a line in Fig. 6, it is not intended that an only bus or a type of bus convenient for indicating.
Wherein, memory 604 may include volatile memory (English: volatile memory), such as arbitrary access Memory (English: random-access memory, abbreviation: RAM);Memory also may include nonvolatile memory (English Text: non-volatile memory), for example, flash memory (English: flash memory), hard disk (English: hard disk Drive, abbreviation: HDD) or solid state hard disk (English: solid-state drive, abbreviation: SSD);Memory 604 can also wrap Include the combination of the memory of mentioned kind.
Wherein, processor 601 can be central processing unit (English: central processing unit, abbreviation: CPU), the combination of network processing unit (English: network processor, abbreviation: NP) or CPU and NP.
Wherein, processor 601 can further include hardware chip.Above-mentioned hardware chip can be specific integrated circuit (English: application-specific integrated circuit, abbreviation: ASIC), programmable logic device (English: Programmable logic device, abbreviation: PLD) or combinations thereof.Above-mentioned PLD can be Complex Programmable Logic Devices (English: complex programmable logic device, abbreviation: CPLD), field programmable gate array (English: Field-programmable gate array, abbreviation: FPGA), Universal Array Logic (English: generic array Logic, abbreviation: GAL) or any combination thereof.
Embodiment 6
The embodiment of the invention also provides a kind of non-transient computer storage medium, the computer storage medium is stored with Either embodiment 1 or embodiment 2 method step can be performed in computer executable instructions, the computer executable instructions.Wherein, The storage medium can be magnetic disk, CD, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), flash memory (Flash Memory), hard disk (Hard Disk Drive, contracting Write: HDD) or solid state hard disk (Solid-State Drive, SSD) etc.;The storage medium can also include depositing for mentioned kind The combination of reservoir.
Obviously, the above embodiments are merely examples for clarifying the description, and does not limit the embodiments.It is right For those of ordinary skill in the art, can also make on the basis of the above description it is other it is various forms of variation or It changes.There is no necessity and possibility to exhaust all the enbodiments.And it is extended from this it is obvious variation or It changes still within the protection scope of the invention.

Claims (10)

1. a kind of completeness check data creation method of video, which comprises the steps of:
It is calculated using I frame data of the digest calculations algorithm to the video, obtains I frame abstract;
I frame abstract is encrypted using the first encryption key;
Generate the completeness check data of the video;The completeness check data include encryption I frame abstract and with it is described Corresponding first decruption key of first encryption key.
2. the completeness check data creation method of video according to claim 1, which is characterized in that further include walking as follows It is rapid:
Generate the frame flag of each video frame in the video;The frame flag of two adjacent video frames meets default changing rule;
The frame flag is encrypted using the second encryption key;
Wherein, the completeness check data further include that the frame flag of encryption and corresponding with second encryption key second solve Key.
3. the completeness check data creation method of video according to claim 2, which is characterized in that further include walking as follows It is rapid:
First decruption key and/or second decruption key are encrypted;In the completeness check data One decruption key is encrypted first decruption key;And/or
The second decruption key in the completeness check data is encrypted second decruption key.
4. a kind of integrity checking method of video, which comprises the steps of:
Receive video to be measured and the corresponding completeness check data of the video to be measured;The completeness check data include adding Close I frame abstract and the first decruption key corresponding with the first encryption key, first encryption key is for encrypting the I frame Abstract;I frame abstract is calculates using I frame data of the digest calculations algorithm to the corresponding source video of the video to be measured It obtains;
It is decrypted using I frame abstract of first decruption key to the encryption, obtains the I frame abstract of the source video;
It is calculated using I frame data of the digest calculations algorithm to the video to be measured, obtains the I frame of the video to be measured Abstract;
The I frame abstract of the I frame of the video to be measured abstract and the source video is compared, the of the video to be measured is obtained One completeness check result.
5. the integrity checking method of video according to claim 4, which is characterized in that the completeness check data are also Frame flag and the second decruption key corresponding with the second encryption key encrypted including encryption;The frame flag for pair Each video frame in the source video is marked;The frame flag of two adjacent video frames meets default changing rule.
6. the integrity checking method of video according to claim 5, which is characterized in that further include following steps:
The frame flag of the encryption is decrypted using second decruption key;
The frame flag for comparing two adjacent video frames in the video to be measured obtains the second completeness check of the video to be measured As a result.
7. a kind of completeness check data generating device of video characterized by comprising
First I frame summarization generation module obtains I for calculating using I frame data of the digest calculations algorithm to the video Frame abstract;
First encrypting module, for being encrypted using the first encryption key to I frame abstract;
Data generation module is verified, for generating the completeness check data of the video;The completeness check data include The I frame of encryption is made a summary and the first decruption key corresponding with first encryption key.
8. a kind of completeness check device of video characterized by comprising
Data reception module, for receiving video to be measured and the corresponding completeness check data of the video to be measured;It is described complete Whole property verification data include the I frame abstract and the first decruption key corresponding with the first encryption key of encryption, first encryption Key is for encrypting the I frame abstract;I frame abstract is regards using digest calculations algorithm to the corresponding source of the video to be measured What the I frame data of frequency were calculated;
First deciphering module is obtained described for being decrypted using I frame abstract of first decruption key to the encryption The I frame of source video is made a summary;
2nd I frame summarization generation module, based on being carried out using I frame data of the digest calculations algorithm to the video to be measured It calculates, obtains the I frame abstract of the video to be measured;
First result-generation module, for carrying out pair the I frame abstract of the I frame of the video to be measured abstract and the source video Than obtaining the first completeness check result of the video to be measured.
9. a kind of computer equipment characterized by comprising at least one processor;And at least one described processor The memory of communication connection;Wherein, the memory is stored with the instruction that can be executed by one processor, described instruction quilt At least one described processor executes, so that any in the execution of at least one described processor the claims 1-3 or 4-6 The method.
10. a kind of computer readable storage medium, is stored thereon with computer instruction, which is characterized in that the instruction is by processor The step of any the method in the claims 1-3 is realized when execution, or realize any institute in the claims 4-6 The step of stating method.
CN201811280558.4A 2018-10-30 2018-10-30 Completeness check data creation method, integrity checking method and the device of video Pending CN109413444A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811280558.4A CN109413444A (en) 2018-10-30 2018-10-30 Completeness check data creation method, integrity checking method and the device of video

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811280558.4A CN109413444A (en) 2018-10-30 2018-10-30 Completeness check data creation method, integrity checking method and the device of video

Publications (1)

Publication Number Publication Date
CN109413444A true CN109413444A (en) 2019-03-01

Family

ID=65470317

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811280558.4A Pending CN109413444A (en) 2018-10-30 2018-10-30 Completeness check data creation method, integrity checking method and the device of video

Country Status (1)

Country Link
CN (1) CN109413444A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110198458A (en) * 2019-05-31 2019-09-03 北京文香信息技术有限公司 A kind of processing method and processing device of encrypted audio/video data
CN110337010A (en) * 2019-05-22 2019-10-15 深圳警圣技术股份有限公司 Video/audio processing method, law-enforcing recorder, management server and enforcement system
CN110366049A (en) * 2019-08-05 2019-10-22 杭州当虹科技股份有限公司 A kind of stream-type video completeness protection method
CN111565331A (en) * 2020-04-10 2020-08-21 苏州鑫竹智能建筑科技有限公司 Optimization method for wireless transmission of video image data
CN111866547A (en) * 2020-07-30 2020-10-30 北京万协通信息技术有限公司 Novel video tamper-proofing method
CN112000510A (en) * 2020-06-29 2020-11-27 中国电力科学研究院有限公司 Method and system for detecting file integrity
CN112597515A (en) * 2020-12-22 2021-04-02 深圳市欢太科技有限公司 Information processing method, device and storage medium
CN113065168A (en) * 2021-04-08 2021-07-02 天地伟业技术有限公司 Method, device and storage medium for storing and verifying authenticity of video data
CN115278310A (en) * 2022-06-23 2022-11-01 广东博华超高清创新中心有限公司 Method for expanding source authorization information in AVS3 video
CN115550328A (en) * 2022-11-29 2022-12-30 中京天裕科技(杭州)有限公司 Digital copyright protection method based on auxiliary enhancement information of H.264 video code stream
CN117478907B (en) * 2023-12-28 2024-03-19 南京博润类脑智能技术有限公司 Video tamper-proof method, device and medium based on image coding

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1830212A (en) * 2003-07-26 2006-09-06 皇家飞利浦电子股份有限公司 Content identification for broadcast media
US20080052533A1 (en) * 2006-08-09 2008-02-28 Fujitsu Limited Relay apparatus for encrypting and relaying a frame
CN101203025A (en) * 2006-12-15 2008-06-18 上海晨兴电子科技有限公司 Method for transmitting and receiving safe mobile message
US20080260047A1 (en) * 2007-04-17 2008-10-23 Nokia Corporation Feedback based scalable video coding
US20100223540A1 (en) * 2002-03-08 2010-09-02 Uri Elzur System and method for identifying upper layer protocol message boundaries
CN102420994A (en) * 2010-09-27 2012-04-18 索尼公司 Device and method for protecting integrity of electronic data as well as data monitoring system
CN103023862A (en) * 2011-09-21 2013-04-03 索尼公司 Method, server and system used for integrity protection and authentication
CN105611319A (en) * 2015-12-24 2016-05-25 杭州当虹科技有限公司 Video content anti-tampering method
CN105959696A (en) * 2016-04-28 2016-09-21 成都三零凯天通信实业有限公司 Video content safety monitoring method based on SIFT characteristic algorithm
CN107993669A (en) * 2017-11-20 2018-05-04 西南交通大学 Voice content certification and tamper recovery method based on modification least significant digit weight

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100223540A1 (en) * 2002-03-08 2010-09-02 Uri Elzur System and method for identifying upper layer protocol message boundaries
CN1830212A (en) * 2003-07-26 2006-09-06 皇家飞利浦电子股份有限公司 Content identification for broadcast media
US20080052533A1 (en) * 2006-08-09 2008-02-28 Fujitsu Limited Relay apparatus for encrypting and relaying a frame
CN101203025A (en) * 2006-12-15 2008-06-18 上海晨兴电子科技有限公司 Method for transmitting and receiving safe mobile message
US20080260047A1 (en) * 2007-04-17 2008-10-23 Nokia Corporation Feedback based scalable video coding
CN101796846A (en) * 2007-04-17 2010-08-04 诺基亚公司 feedback based scalable video coding
CN102420994A (en) * 2010-09-27 2012-04-18 索尼公司 Device and method for protecting integrity of electronic data as well as data monitoring system
CN103023862A (en) * 2011-09-21 2013-04-03 索尼公司 Method, server and system used for integrity protection and authentication
CN105611319A (en) * 2015-12-24 2016-05-25 杭州当虹科技有限公司 Video content anti-tampering method
CN105959696A (en) * 2016-04-28 2016-09-21 成都三零凯天通信实业有限公司 Video content safety monitoring method based on SIFT characteristic algorithm
CN107993669A (en) * 2017-11-20 2018-05-04 西南交通大学 Voice content certification and tamper recovery method based on modification least significant digit weight

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110337010A (en) * 2019-05-22 2019-10-15 深圳警圣技术股份有限公司 Video/audio processing method, law-enforcing recorder, management server and enforcement system
CN110198458A (en) * 2019-05-31 2019-09-03 北京文香信息技术有限公司 A kind of processing method and processing device of encrypted audio/video data
CN110366049A (en) * 2019-08-05 2019-10-22 杭州当虹科技股份有限公司 A kind of stream-type video completeness protection method
CN111565331A (en) * 2020-04-10 2020-08-21 苏州鑫竹智能建筑科技有限公司 Optimization method for wireless transmission of video image data
CN112000510A (en) * 2020-06-29 2020-11-27 中国电力科学研究院有限公司 Method and system for detecting file integrity
CN112000510B (en) * 2020-06-29 2024-03-19 中国电力科学研究院有限公司 Method and system for detecting file integrity
CN111866547B (en) * 2020-07-30 2022-07-15 北京万协通信息技术有限公司 Novel video tamper-proofing method
CN111866547A (en) * 2020-07-30 2020-10-30 北京万协通信息技术有限公司 Novel video tamper-proofing method
CN112597515A (en) * 2020-12-22 2021-04-02 深圳市欢太科技有限公司 Information processing method, device and storage medium
CN113065168B (en) * 2021-04-08 2023-09-19 天地伟业技术有限公司 Method, device and storage medium for storing and checking authenticity of video data
CN113065168A (en) * 2021-04-08 2021-07-02 天地伟业技术有限公司 Method, device and storage medium for storing and verifying authenticity of video data
CN115278310A (en) * 2022-06-23 2022-11-01 广东博华超高清创新中心有限公司 Method for expanding source authorization information in AVS3 video
CN115550328A (en) * 2022-11-29 2022-12-30 中京天裕科技(杭州)有限公司 Digital copyright protection method based on auxiliary enhancement information of H.264 video code stream
CN117478907B (en) * 2023-12-28 2024-03-19 南京博润类脑智能技术有限公司 Video tamper-proof method, device and medium based on image coding

Similar Documents

Publication Publication Date Title
CN109413444A (en) Completeness check data creation method, integrity checking method and the device of video
US20230360165A1 (en) Method and apparatus for protecting digital photos from alteration
US11902559B2 (en) Detection of video tampering
CN1287249C (en) Access control for digital content
US11700433B2 (en) Verifying the rendering of video content at client devices using trusted platform modules
CN103427983A (en) Apparatus and method for content encryption and decryption based on storage device ID
EP2352251A1 (en) Content decoding apparatus, content decoding method and integrated circuit
WO2017215148A1 (en) File protection method and device
US9502003B2 (en) Apparatus and methods to display a modified image
CN109274644A (en) A kind of data processing method, terminal and watermark server
WO2023125291A1 (en) Image display methods, apparatuses and system and device
CN104966525A (en) File encryption method and apparatus, and file decryption method and apparatus
Xu et al. Separable reversible data hiding in encrypted images based on difference histogram modification
CN111669650A (en) Video processing method and device, electronic equipment and storage medium
CN114785524A (en) Electronic seal generation method, device, equipment and medium
CN110035319A (en) A kind of encryption and decryption method of audio, video data, device and playback equipment
CN110380843B (en) Information processing method and related equipment
CN115632782A (en) Random number generation method, system and equipment based on SM4 counter mode
JP6797337B2 (en) Message authentication device, message authentication method and message authentication program
CN101917623A (en) Tamper-proof encryption method, detection method and device of encoding code stream
Cao et al. Texture driven adaptive multi-level block selection based reversible data hiding in encrypted image
CN109274902A (en) Video file treating method and apparatus
CN116821941B (en) Data encryption and decryption method, device, equipment and storage medium
CN116702218B (en) Rendering method, device, terminal and storage medium of three-dimensional model in applet
Mokhnache Implémentation d’algorithmes avancés de traitement de l’information dédiés au cryptage et à la cryptanalyse

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190301

RJ01 Rejection of invention patent application after publication