CN109413444A - Completeness check data creation method, integrity checking method and the device of video - Google Patents
Completeness check data creation method, integrity checking method and the device of video Download PDFInfo
- Publication number
- CN109413444A CN109413444A CN201811280558.4A CN201811280558A CN109413444A CN 109413444 A CN109413444 A CN 109413444A CN 201811280558 A CN201811280558 A CN 201811280558A CN 109413444 A CN109413444 A CN 109413444A
- Authority
- CN
- China
- Prior art keywords
- frame
- video
- abstract
- completeness check
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 48
- 238000004364 calculation method Methods 0.000 claims abstract description 34
- 238000012795 verification Methods 0.000 claims abstract description 14
- 238000004891 communication Methods 0.000 claims description 10
- 238000010586 diagram Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 5
- 238000012545 processing Methods 0.000 description 5
- 230000006835 compression Effects 0.000 description 4
- 238000007906 compression Methods 0.000 description 4
- 238000012360 testing method Methods 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 235000013399 edible fruits Nutrition 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- 241001269238 Data Species 0.000 description 1
- 238000000151 deposition Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000000802 evaporation-induced self-assembly Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000001052 transient effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
- H04N21/23418—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving operations for analysing video streams, e.g. detecting features or characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
- H04N21/44008—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving operations for analysing video streams, e.g. detecting features or characteristics in the video stream
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses completeness check data creation method, integrity checking method and the devices of video, wherein the completeness check data creation method of video includes the following steps: to calculate using I frame data of the digest calculations algorithm to video, obtains I frame abstract;I frame abstract is encrypted using the first encryption key;Generate the completeness check data of video;Completeness check data include the I frame abstract and the first decruption key corresponding with the first encryption key of encryption.By the abstract and the encryption that generate the I frame of video, generate includes the I frame abstract of encryption and the completeness check data of the first decruption key the I frame abstract of encryption to be decrypted, and since frame abstract is determined by the content of video frame, therefore, whether user can be tampered by the content of the abstract verification I frame of the I frame in completeness check data, so as to improve the confidence level for the video for completing verification by completeness check data.
Description
Technical field
The present invention relates to technical field of multimedia information more particularly to a kind of completeness check data of video are raw
It is filled at the completeness check of method, the integrity checking method of video, the completeness check data generating device of video, video
It sets, computer equipment and computer readable storage medium.
Background technique
With the continuous development of technology, cheap digital product (digital camera, video camera, smart phone) is extensive
It uses, a large amount of rises of the video sharings website such as youku.com, You Tube, the multi-medium datas such as video, image have become me
A part important in daily life.Meanwhile video plays more in the various aspects especially monitoring field of social life
Carry out more important role, and carry out the consistent reproduction of height due to the fact video can occur the past, in public peace
The effect in full field is also increasing.In addition, the standard that video recorded broadcast function also has become video conferencing system is equipped with, use
Family can obtain video file by recording function, recall conference content by video file, be of great significance.However, with
The development of multimedia technology, occur a large amount of powerful multimedia content softwares for editing, such as Adobe in the market
Photoshop and GNU Gimp etc., and these softwares for editing are used, ordinary user can distort in multimedia easily
Hold, this to be flooded with video hard to tell whether it is true or false on network.And after video file is edited by video software, it can
Video record file as mere fact foundation is tampered, forges or deletes, it is possible to cause covering for true truth
Lid is even distorted.Therefore, if can not be verified to the integrality of video record file, it will lead to video record file can
The problem of reduction of reliability.
Summary of the invention
Therefore, the technical problem to be solved in the present invention is that the integrality for solving video file in the prior art can not be by
Verification, the lower problem of confidence level.
For this purpose, according in a first aspect, the present invention provides a kind of completeness check data creation methods of video, including such as
Lower step: being calculated using I frame data of the digest calculations algorithm to video, obtains I frame abstract;Use the first encryption key pair
I frame abstract is encrypted;Generate the completeness check data of video;Completeness check data include encryption I frame abstract and with
Corresponding first decruption key of first encryption key.
Optionally, the completeness check data creation method of video further includes following steps: generating each video frame in video
Frame flag;The frame flag of two adjacent video frames meets default changing rule;Frame flag is carried out using the second encryption key
Encryption;Wherein, completeness check data further include the frame flag and the second decruption key corresponding with the second encryption key of encryption.
Optionally, the completeness check data creation method of video further includes following steps: to the first decruption key and/or
Second decruption key is encrypted;The first decruption key in completeness check data is encrypted first decruption key;With/
Or, the second decruption key in completeness check data is encrypted second decruption key.
Optionally, in video the completeness check data of each video frame be stored in corresponding video frame SEI it is customized
In data.
According to second aspect, the present invention provides a kind of integrity checking method of video, include the following steps: to receive to
Survey video and the corresponding completeness check data of video to be measured;Completeness check data include the I frame abstract of encryption and with the
Corresponding first decruption key of one encryption key, the first encryption key is for encrypting I frame abstract;I frame abstract is counted to use to make a summary
Calculate what the I frame data of the corresponding source video of video to be measured were calculated in algorithm;Using the first decruption key to the I of encryption
Frame abstract is decrypted, and obtains the I frame abstract of source video;It is counted using I frame data of the digest calculations algorithm to video to be measured
It calculates, obtains the I frame abstract of video to be measured;The I frame abstract of the I frame of video to be measured abstract and source video is compared, obtain to
Survey the first completeness check result of video.
Optionally, completeness check data further include the frame flag and corresponding with the second encryption key encrypted of encryption
The second decruption key;Frame flag is for being marked each video frame in source video;The frame mark of two adjacent video frames
Note meets default changing rule.
Optionally, the integrity checking method of video further includes following steps: using the second decruption key to the frame of encryption
Label is decrypted;The frame flag of two adjacent video frames in video more to be measured obtains the second integrality school of video to be measured
Test result.
According to the third aspect, the present invention provides a kind of completeness check data generating devices of video, comprising: the first I
Frame summarization generation module obtains I frame abstract for calculating using I frame data of the digest calculations algorithm to video;First adds
Close module, for being encrypted using the first encryption key to I frame abstract;Data generation module is verified, for generating video
Completeness check data;Completeness check data include that the I frame abstract and corresponding with the first encryption key first of encryption is decrypted
Key.
According to fourth aspect, the present invention provides a kind of completeness check devices of video, comprising: data reception module,
For receiving video to be measured and the corresponding completeness check data of video to be measured;Completeness check data include the I frame of encryption
Abstract and the first decruption key corresponding with the first encryption key, the first encryption key is for encrypting I frame abstract;I frame is made a summary
It is calculated using I frame data of the digest calculations algorithm to the corresponding source video of video to be measured;First deciphering module is used
It is decrypted in using I frame abstract of first decruption key to encryption, obtains the I frame abstract of source video;2nd I frame summarization generation
Module obtains the I frame abstract of video to be measured for calculating using I frame data of the digest calculations algorithm to video to be measured;The
One result-generation module obtains video to be measured for comparing the I frame abstract of the I frame abstract of video to be measured and source video
The first completeness check result.
According to the 5th aspect, the present invention provides a kind of computer equipments, comprising: at least one processor;And with extremely
The memory of few processor communication connection;Wherein, memory is stored with the instruction that can be executed by a processor, instructs quilt
At least one processor executes, so that at least one processor executes all or part of above-mentioned first aspect or second aspect
Method.
According to the 7th aspect, the present invention provides a kind of computer readable storage mediums, are stored thereon with computer instruction,
The step of all or part of method of above-mentioned first aspect, is realized in the instruction when being executed by processor, or realizes above-mentioned second party
The step of all or part of method in face.
Technical solution provided in an embodiment of the present invention, has the advantages that
1, the completeness check data creation method of video provided by the invention, includes the following steps: using digest calculations
Algorithm calculates the I frame data of video, obtains I frame abstract;I frame abstract is encrypted using the first encryption key;It is raw
At the completeness check data of video;Completeness check data include encryption I frame abstract and it is corresponding with the first encryption key
First decruption key.By generating abstract and the encryption of the I frame of video, generates the I frame for including to encrypt and make a summary and to encryption
The completeness check data of the first decruption key that are decrypted of I frame abstract, and since frame abstract is the content by video frame
Determine, therefore, user can by verify to the I frame of the video received carry out I frame abstract that digest calculations obtain with it is complete
Whether whether the identical content to verify I frame is tampered I frame abstract in whole property verification data, to make the complete performance of video
It is enough verified, improve the confidence level that the video of verification is completed by completeness check data.In addition, only to key frame (i.e. I frame)
Digest calculations are carried out, carry out digest calculations relative to the whole frame to video, reduce the generation consumption of completeness check data.
2, the completeness check data creation method of video provided by the invention includes the following steps: to generate each in video
The frame flag of video frame;The frame flag of two adjacent video frames meets default changing rule;Using the second encryption key to frame mark
Remember capable encryption into;Wherein, completeness check data further include that the frame flag of encryption and corresponding with the second encryption key second solve
Key.By generating the frame flag of all video frames in video, and by encrypted frame flag and to encrypted frame
The second decruption key being decrypted is marked to be added in completeness check data, and due to the frame flag of two adjacent video frames
Meet default changing rule, therefore, user can be by verifying the frame flags of two adjacent video frames in the video that receives
Whether default changing rule is met to verify whether the video received is deleted, to enable the integrality of video by school
It tests, improves the confidence level for completing the video of verification by completeness check data.
3, the completeness check data creation method of video provided by the invention, further includes following steps: being decrypted to first
Key and/or the second decruption key are encrypted;The first decruption key in completeness check data is encrypted first solution
Key;And/or the second decruption key in completeness check data is encrypted second decruption key.By to first
Decruption key and/or the second decruption key are encrypted, and can reduce the first decruption key and/or the second decruption key is illegal
A possibility that acquisition, can reduce I frame abstract and/or frame flag a possibility that being illegally accessed, improve completeness check number
According to safety, thus further increase by completeness check data complete verification video confidence level.
Detailed description of the invention
It, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical solution in the prior art
Embodiment or attached drawing needed to be used in the description of the prior art be briefly described, it should be apparent that, it is described below
Attached drawing is some embodiments of the present invention, for those of ordinary skill in the art, before not making the creative labor
It puts, is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of method flow diagram of the completeness check data creation method for video that embodiment 1 provides;
Fig. 2 is the composition schematic diagram of the SEI_NAL byte of the data containing completeness check;
Fig. 3 is a kind of method flow diagram of the integrity checking method for video that embodiment 2 provides;
Fig. 4 is a kind of structural schematic diagram of the completeness check data generating device for video that embodiment 3 provides;
Fig. 5 is a kind of structural schematic diagram of the completeness check device for video that embodiment 4 provides;
Fig. 6 is a kind of hardware structural diagram for computer equipment that embodiment 5 provides.
Specific embodiment
Technical solution of the present invention is clearly and completely described below in conjunction with attached drawing, it is clear that described implementation
Example is a part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill
Personnel's every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
In the description of the present invention, it should be noted that term " first ", " second ", " third " are used for description purposes only,
It is not understood to indicate or imply relative importance.
Embodiment 1
A kind of completeness check data creation method of video is present embodiments provided, as shown in Figure 1.It needs to illustrate
It is that step shown in the flowchart of the accompanying drawings can execute in a computer system such as a set of computer executable instructions,
Also, although logical order is shown in flow charts, and it in some cases, can be to be different from sequence execution herein
Shown or described step.The process includes the following steps:
Step S10 is calculated using I frame data of the digest calculations algorithm to video, obtains I frame abstract.In this implementation
In example, I frame is used to indicate the video pictures of transmission in H.264 compression standard, in addition, H.264 for indicating in compression standard
The video pictures of transmission further include B frame and P frame, wherein I frame is also known as intracoded frame, is a kind of the only of included all information
Vertical frame, can independently be decoded without reference to other images;P frame is also known as inter prediction encoding frame, needs to refer to the I frame of front
Just can be carried out coding, expression be present frame picture Yu former frame (former frame may be that I frame is also likely to be P frame) difference;B frame
Also known as bi-directional predictive coding frame, that is, B frame recording be this frame and before and after frames difference.Wherein, I frame is also key frame, is
Important frame in interframe compression coding, as soon as being a coded frame for full frame compression, when decoding, only uses the data of I frame restructural complete
Image.In the present embodiment, it can be plucked by I frame data of the digest calculations such as the HASH algorithm or SM3 algorithm to video
It calculates.
Step S20 encrypts I frame abstract using the first encryption key.In the present embodiment, symmetrical add can be used
Close algorithm or rivest, shamir, adelman encrypt I frame abstract, it is preferable that are plucked using SM2 rivest, shamir, adelman to I frame
It is encrypted, specifically, I frame abstract is encrypted using SM2 private key, i.e., the first encryption key is to SM2 private key.
Step S30 generates the completeness check data of video.In the present embodiment, completeness check data include encryption
I frame abstract and the first decruption key corresponding with the first encryption key.
In a particular embodiment, by taking the first encryption key is SM2 private key as an example, a pair of of SM2 private key and public key are firstly generated,
Wherein, the SM2 private key of generation to as the first encryption key to be subsequently generated I frame abstract encrypt, SM2 public key to
Encrypted I frame abstract is decrypted as the first decruption key;Then the video frame in reading video data, and judge to read
Whether the video frame taken is I frame;When video is I frame, S10~step S30 is thened follow the steps, the completeness check of video is completed
The generation of data.
Abstract provided in this embodiment by generating the I frame of video and encryption generate the I frame for including to encrypt and make a summary and use
Completeness check data with the first decruption key that the I frame of encryption abstract is decrypted, and since frame abstract is by video
The content of frame determines that therefore, user can carry out the I frame that digest calculations obtain by verifying the I frame to the video received
It makes a summary and whether the identical content to verify I frame is tampered the I frame abstract in completeness check data, to make video
Integrality can be verified, improves the confidence level that the video of verification is completed by completeness check data.In addition, only to key frame
(i.e. I frame) carries out digest calculations, carries out digest calculations relative to the whole frame to video, reduces the life of completeness check data
At consumption.
In an alternate embodiment of the invention, as shown in Figure 1, the completeness check data creation method of video further includes walking as follows
It is rapid:
Step S40 generates the frame flag of each video frame in video.In the present embodiment, the frame mark of two adjacent video frames
Note meets default changing rule.In the present embodiment, it needs to generate frame flag, including all I frames, B to all frames in video
Frame and P frame.In the present embodiment, the frame flag of each video frame can be the number for meeting certain changing rule, word in video
The label such as female or combination, for example, 1,3,5 ... 2n-1,2n+1, a1, a2, a3 ... an, an+1 etc., it is preferable that video
In the frame flag of each video frame be with the increased integer of frame number, the frame flag of the first frame of video is Integer N, subsequent every
One frame successively adds one, i.e. the frame flag of kth frame is N+k+1.
Step S50 encrypts frame flag using the second encryption key.In the present embodiment, completeness check data
It further include the frame flag and the second decruption key corresponding with the second encryption key of encryption.In the present embodiment, it can be used pair
Encryption Algorithm or rivest, shamir, adelman is claimed to encrypt frame flag, it is preferable that using SM2 rivest, shamir, adelman to frame
Label is encrypted, and specifically, is encrypted using SM2 private key to frame flag abstract, i.e., the second encryption key is to SM2 private key.
In a particular embodiment, by taking the second encryption key is SM2 private key as an example, a SM2 private key and correspondence are firstly generated
Public key, wherein for the SM2 private key of generation to encrypt as the second encryption key to the frame flag being subsequently generated, SM2 is public
Key is will be decrypted encrypted frame flag as the second decruption key;Then the video frame in reading video data,
And step S40~step S50 is executed, complete the generation of frame flag and the expansion of completeness check data.It should be noted that
The second encryption key and above-mentioned first encryption key can be the same key in the present embodiment, i.e., can also directly use first
Encryption key encrypts frame flag, correspondingly, encrypted frame flag is decrypted using the first decruption key.
Completeness check data creation method provided in this embodiment, by the frame mark for generating all video frames in video
Note, and by encrypted frame flag and to be added to integrality to the second decruption key that encrypted frame flag is decrypted
It verifies in data, and since the frame flag of two adjacent video frames meets default changing rule, user can pass through school
Whether the frame flag for testing two adjacent video frames in the video received meets default changing rule to verify the video received
Whether deleted, to keep the integrality of video verified, improves the video for completing verification by completeness check data
Confidence level.
In an alternate embodiment of the invention, as shown in Figure 1, the completeness check data creation method of video further includes walking as follows
It is rapid:
Step S60 encrypts the first decruption key and/or the second decruption key.In the present embodiment, integrality school
The first decruption key tested in data is encrypted first decruption key;And/or the second decryption in completeness check data
Key is encrypted second decruption key.In a particular embodiment, using encryption formula to the first decruption key and/or second
Decruption key is encrypted, and encryption formula is the formula that operation is carried out to the first decruption key and/or the second decruption key, example
Such as, to after binary number ring shift left 3 of the first decruption key and/or the second decruption key plus 1.
Completeness check data creation method provided in this embodiment, by being decrypted to the first decruption key and/or second
Key is encrypted, and can be reduced the first decruption key and/or a possibility that the second decruption key is illegally accessed, can be subtracted
A possibility that small I frame abstract and/or frame flag are illegally accessed, improves the safety of completeness check data, thus further
Improve the confidence level that the video of verification is completed by completeness check data.
In an alternate embodiment of the invention, the completeness check data of each video frame are stored in corresponding video frame in video
In SEI self-defining data.In the present embodiment, after the completeness check data of each video frame are stored in SEI self-defining data,
SEI_NAL as shown in Figure 2 is formed, and makes an addition to the last of corresponding original frame data.By by the complete of each video frame
Property verification data be stored in the SEI self-defining data of corresponding video frame, the end without video verifying function can be prevented
The generation for the problem of end can not play the video for carrying completeness check data, improves and carries completeness check data
The broadcasting compatibility of video.
Embodiment 2
A kind of integrity checking method of video is present embodiments provided, as shown in Figure 3.It should be noted that in attached drawing
Process the step of illustrating can execute in a computer system such as a set of computer executable instructions, although also,
Logical order is shown in flow charts, but in some cases, can be executed with the sequence for being different from herein it is shown or
The step of description.The process includes the following steps:
Step S100 receives video to be measured and the corresponding completeness check data of video to be measured.In the present embodiment, complete
Whole property verification data include the I frame abstract and the first decruption key corresponding with the first encryption key of encryption, the first encryption key
For encrypting I frame abstract;I frame abstract is the I frame data progress using digest calculations algorithm to the corresponding source video of video to be measured
It is calculated.In the present embodiment, the completeness check data of each video frame of video to be measured are by corresponding video frame number
According to carrying, it is preferable that the completeness check data of each video frame are directly made an addition to accordingly in the video to be measured received
In the self-defining data of the SEI of video frame.
Step S200 is decrypted using I frame abstract of first decruption key to encryption, obtains the I frame abstract of source video.
Step S300 is calculated using I frame data of the digest calculations algorithm to video to be measured, obtains the I of video to be measured
Frame abstract.In the present embodiment, which calculates with the digest calculations used when carrying out I frame digest calculations to source video
Method is identical, for example, the digest calculations algorithm used when if carrying out I frame digest calculations to source video is a kind of SM2 algorithm, makes
Digest calculations are carried out to the I frame in video to be measured with identical SM2 algorithm, to obtain the I frame abstract of video to be measured.
The I frame abstract of the I frame abstract of video to be measured and source video is compared, obtains video to be measured by step S400
First completeness check result.In the present embodiment, when the I frame of video to be measured abstract is identical with the I frame of source video abstract, to
The the first completeness check result for surveying video is that video to be measured is not tampered with;When the I frame of I the frame abstract and source video of video to be measured
When making a summary different, the first completeness check result of video to be measured is that video to be measured is tampered.
In an alternate embodiment of the invention, the first decruption key in completeness check data is that encrypted first decryption is close
Key, before being decrypted using I frame abstract of first decruption key to encryption, it is also necessary to encrypted first decruption key
It is decrypted.In the present embodiment, when encrypting using encryption formula to the first decruption key, corresponding solution Migong is used
Encrypted first decruption key is decrypted in formula, wherein decryption formula is the inverse process for encrypting formula, in embodiment 1
After described binary number ring shift left 3 to the first decruption key plus for 1 encryption formula, decryption formula is to encryption
The binary number of the first encryption and decryption key afterwards subtract 1 after ring shift right 3.
In an alternate embodiment of the invention, completeness check data further include encryption frame flag and with encrypted second plus
Corresponding second decruption key of key;Frame flag is for being marked each video frame in source video;Two neighboring view
The frame flag of frequency frame meets default changing rule.
In the present embodiment, as shown in figure 3, the integrity checking method of video further includes following steps:
Step S500 is decrypted using frame flag of second decruption key to encryption.In the present embodiment, due to be measured
The completeness check data of each video frame are carried by corresponding video requency frame data in video, therefore, to each video frame
It after frame flag is decrypted, needs to be unifiedly stored in a database, to facilitate the execution of step S600.
In the present embodiment, the second decruption key may be encrypted second decruption key, then is using the second solution
Before the frame flag of close key pair encryption is decrypted, it is also necessary to encrypted second decruption key is decrypted, specifically,
When using encryption formula the second decruption key is encrypted when, encrypted second decruption key is decrypted need using
Corresponding decryption formula.
Step S600, the frame flag of two adjacent video frames in video more to be measured, obtain video to be measured second are complete
Property check results.In the present embodiment, when the frame flag of two adjacent video frames in video to be measured meets adjacent two in source video
When the default changing rule of the frame flag of a video frame, the second obtained integrity of video check results are that video to be measured is not deleted
Subtract;When the frame flag of two adjacent video frames in video to be measured does not meet the pre- of the frame flag of two adjacent video frames in source video
If when changing rule, the second obtained integrity of video check results are that video to be measured is deleted.Specifically, with default variation rule
Rule be the frame flag of each video frame in source video for for the increased integer of frame number, when a video in video to be measured
When the difference of the frame flag of the frame flag and its former frame of frame is 1, then do not deleted between the frame and its former frame;When view to be measured
When the difference of the frame flag of the frame flag and its former frame of a video frame in frequency is not 1, then deleted between the frame and former frame
Subtract.
Embodiment 3
A kind of completeness check data generating device of video is provided in the present embodiment, and the device is for realizing above-mentioned
Embodiment 1 and its preferred embodiment, the descriptions that have already been made will not be repeated.As used below, term " module " can
To realize the combination of the software and/or hardware of predetermined function.Although device described in following embodiment is preferably come with software
It realizes, but the realization of the combination of hardware or software and hardware is also that may and be contemplated.
The present embodiment provides a kind of completeness check data generating devices of video, as shown in Figure 4, comprising: the first I frame is plucked
Want generation module 10, the first encrypting module 20 and verification data generation module 30.
Wherein, 10 pieces of the first I frame summarization generation mould based on being carried out using I frame data of the digest calculations algorithm to video
It calculates, obtains I frame abstract;First encrypting module 20 is used to encrypt I frame abstract using the first encryption key;It is raw to verify data
It is used to generate the completeness check data of video at module 30;Completeness check data include the I frame abstract of encryption and with first
Corresponding first decruption key of encryption key.
In an alternate embodiment of the invention, as shown in figure 4, the completeness check data generating device of video further include: frame flag
Generation module 40 and the second encrypting module 50.
Wherein, frame flag generation module 40 is used to generate the frame flag of each video frame in video;Two adjacent video frames
Frame flag meets default changing rule;Second encrypting module 50 is for encrypting frame flag using the second encryption key.?
In the present embodiment, completeness check data further include that the frame flag encrypted and the second decryption corresponding with the second encryption key are close
Key.
In an alternate embodiment of the invention, the completeness check data generating device of video further include: cipher key encryption block 60 is used
It is encrypted in the first decruption key and/or the second decruption key.In the present embodiment, first in completeness check data
Decruption key is encrypted first decruption key;And/or the second decruption key in completeness check data is encrypted
Second decruption key.
Embodiment 4
A kind of completeness check device of video is provided in the present embodiment, and the device is for realizing above-described embodiment 2
And its preferred embodiment, the descriptions that have already been made will not be repeated.As used below, term " module " may be implemented pre-
Determine the combination of the software and/or hardware of function.Although device described in following embodiment is preferably realized with software,
The realization of the combination of hardware or software and hardware is also that may and be contemplated.
The present embodiment provides a kind of completeness check devices of video, as shown in Figure 5, comprising: data reception module 100,
First deciphering module 200, the 2nd I frame summarization generation module 300 and the first result-generation module 400.
Wherein, data reception module 100 is for receiving video to be measured and the corresponding completeness check data of video to be measured;
Completeness check data include the I frame abstract and the first decruption key corresponding with the first encryption key of encryption, and the first encryption is close
Key is for encrypting I frame abstract;I frame abstract for using digest calculations algorithm to the I frame data of the corresponding source video of video to be measured into
What row was calculated;First deciphering module 200 is used to be decrypted using I frame abstract of first decruption key to encryption, obtains
The I frame of source video is made a summary;2nd I frame summarization generation module 300 is used for the I frame data using digest calculations algorithm to video to be measured
It is calculated, obtains the I frame abstract of video to be measured;First result-generation module 400 is used for the I frame abstract of video to be measured and source
The I frame abstract of video compares, and obtains the first completeness check result of video to be measured.
In an alternate embodiment of the invention, completeness check data further include encryption frame flag and with encrypted second plus
Corresponding second decruption key of key;Frame flag is for being marked each video frame in source video;Two neighboring view
The frame flag of frequency frame meets default changing rule;The completeness check device of video further include: the second deciphering module and the second knot
Fruit generation module;Wherein, the second deciphering module using frame flag of second decruption key to encryption for being decrypted;Second knot
Frame flag of the fruit generation module for two adjacent video frames in video more to be measured, obtains the second integrality school of video to be measured
Test result.
Embodiment 5
The embodiment of the invention provides a kind of computer equipments, as shown in fig. 6, the computer equipment may include: at least
One processor 601, such as CPU (Central Processing Unit, central processing unit), at least one communication interface
603, memory 604, at least one communication bus 602.Wherein, communication bus 602 is for realizing the connection between these components
Communication.Wherein, communication interface 603 may include display screen (Display), keyboard (Keyboard), and optional communication interface 603 is also
It may include standard wireline interface and wireless interface.Memory 604 can be high speed RAM memory (Random Access
Memory, effumability random access memory), it is also possible to non-labile memory (non-volatile memory),
A for example, at least magnetic disk storage.Memory 604 optionally can also be that at least one is located remotely from aforementioned processor 601
Storage device.Application program is wherein stored in memory 604, and processor 601 calls the program generation stored in memory 604
Code, with for either executing in embodiment 1 or embodiment 2 method step, i.e., for performing the following operations:
It is calculated using I frame data of the digest calculations algorithm to video, obtains I frame abstract;Use the first encryption key
I frame abstract is encrypted;Generate the completeness check data of video;Completeness check data include encryption I frame abstract and
The first decruption key corresponding with the first encryption key.
In the embodiment of the present invention, processor 601 calls the program code in memory 604, is also used to execute following operation:
Generate the frame flag of each video frame in video;The frame flag of two adjacent video frames meets default changing rule;Add using second
Close key pair frame flag is encrypted;Wherein, completeness check data further include encryption frame flag and with the second encryption key
Corresponding second decruption key.
In the embodiment of the present invention, processor 601 calls the program code in memory 604, is also used to execute following operation:
First decruption key and/or the second decruption key are encrypted;The first decruption key in completeness check data is encryption
The first decruption key afterwards;And/or the second decruption key in completeness check data is encrypted second decruption key.
In the embodiment of the present invention, processor 601 calls the program code in memory 604, is also used to execute following operation:
Receive video to be measured and the corresponding completeness check data of video to be measured;Completeness check data include the I frame abstract of encryption
The first decruption key corresponding with the first encryption key, the first encryption key is for encrypting I frame abstract;I frame abstract is use
The I frame data of the corresponding source video of video to be measured are calculated in digest calculations algorithm;Use the first decruption key pair
The I frame abstract of encryption is decrypted, and obtains the I frame abstract of source video;Using digest calculations algorithm to the I frame data of video to be measured
It is calculated, obtains the I frame abstract of video to be measured;The I frame abstract of the I frame abstract of video to be measured and source video is compared,
Obtain the first completeness check result of video to be measured.
In the embodiment of the present invention, processor 601 calls the program code in memory 604, is also used to execute following operation:
It is decrypted using frame flag of second decruption key to encryption;The frame flag of two adjacent video frames in video more to be measured,
Obtain the second completeness check result of video to be measured.
Wherein, communication bus 602 can be Peripheral Component Interconnect standard (peripheral component
Interconnect, abbreviation PCI) bus or expanding the industrial standard structure (extended industry standard
Architecture, abbreviation EISA) bus etc..Communication bus 602 can be divided into address bus, data/address bus, control bus etc..
Only to be indicated with a line in Fig. 6, it is not intended that an only bus or a type of bus convenient for indicating.
Wherein, memory 604 may include volatile memory (English: volatile memory), such as arbitrary access
Memory (English: random-access memory, abbreviation: RAM);Memory also may include nonvolatile memory (English
Text: non-volatile memory), for example, flash memory (English: flash memory), hard disk (English: hard disk
Drive, abbreviation: HDD) or solid state hard disk (English: solid-state drive, abbreviation: SSD);Memory 604 can also wrap
Include the combination of the memory of mentioned kind.
Wherein, processor 601 can be central processing unit (English: central processing unit, abbreviation:
CPU), the combination of network processing unit (English: network processor, abbreviation: NP) or CPU and NP.
Wherein, processor 601 can further include hardware chip.Above-mentioned hardware chip can be specific integrated circuit
(English: application-specific integrated circuit, abbreviation: ASIC), programmable logic device (English:
Programmable logic device, abbreviation: PLD) or combinations thereof.Above-mentioned PLD can be Complex Programmable Logic Devices
(English: complex programmable logic device, abbreviation: CPLD), field programmable gate array (English:
Field-programmable gate array, abbreviation: FPGA), Universal Array Logic (English: generic array
Logic, abbreviation: GAL) or any combination thereof.
Embodiment 6
The embodiment of the invention also provides a kind of non-transient computer storage medium, the computer storage medium is stored with
Either embodiment 1 or embodiment 2 method step can be performed in computer executable instructions, the computer executable instructions.Wherein,
The storage medium can be magnetic disk, CD, read-only memory (Read-Only Memory, ROM), random access memory
(Random Access Memory, RAM), flash memory (Flash Memory), hard disk (Hard Disk Drive, contracting
Write: HDD) or solid state hard disk (Solid-State Drive, SSD) etc.;The storage medium can also include depositing for mentioned kind
The combination of reservoir.
Obviously, the above embodiments are merely examples for clarifying the description, and does not limit the embodiments.It is right
For those of ordinary skill in the art, can also make on the basis of the above description it is other it is various forms of variation or
It changes.There is no necessity and possibility to exhaust all the enbodiments.And it is extended from this it is obvious variation or
It changes still within the protection scope of the invention.
Claims (10)
1. a kind of completeness check data creation method of video, which comprises the steps of:
It is calculated using I frame data of the digest calculations algorithm to the video, obtains I frame abstract;
I frame abstract is encrypted using the first encryption key;
Generate the completeness check data of the video;The completeness check data include encryption I frame abstract and with it is described
Corresponding first decruption key of first encryption key.
2. the completeness check data creation method of video according to claim 1, which is characterized in that further include walking as follows
It is rapid:
Generate the frame flag of each video frame in the video;The frame flag of two adjacent video frames meets default changing rule;
The frame flag is encrypted using the second encryption key;
Wherein, the completeness check data further include that the frame flag of encryption and corresponding with second encryption key second solve
Key.
3. the completeness check data creation method of video according to claim 2, which is characterized in that further include walking as follows
It is rapid:
First decruption key and/or second decruption key are encrypted;In the completeness check data
One decruption key is encrypted first decruption key;And/or
The second decruption key in the completeness check data is encrypted second decruption key.
4. a kind of integrity checking method of video, which comprises the steps of:
Receive video to be measured and the corresponding completeness check data of the video to be measured;The completeness check data include adding
Close I frame abstract and the first decruption key corresponding with the first encryption key, first encryption key is for encrypting the I frame
Abstract;I frame abstract is calculates using I frame data of the digest calculations algorithm to the corresponding source video of the video to be measured
It obtains;
It is decrypted using I frame abstract of first decruption key to the encryption, obtains the I frame abstract of the source video;
It is calculated using I frame data of the digest calculations algorithm to the video to be measured, obtains the I frame of the video to be measured
Abstract;
The I frame abstract of the I frame of the video to be measured abstract and the source video is compared, the of the video to be measured is obtained
One completeness check result.
5. the integrity checking method of video according to claim 4, which is characterized in that the completeness check data are also
Frame flag and the second decruption key corresponding with the second encryption key encrypted including encryption;The frame flag for pair
Each video frame in the source video is marked;The frame flag of two adjacent video frames meets default changing rule.
6. the integrity checking method of video according to claim 5, which is characterized in that further include following steps:
The frame flag of the encryption is decrypted using second decruption key;
The frame flag for comparing two adjacent video frames in the video to be measured obtains the second completeness check of the video to be measured
As a result.
7. a kind of completeness check data generating device of video characterized by comprising
First I frame summarization generation module obtains I for calculating using I frame data of the digest calculations algorithm to the video
Frame abstract;
First encrypting module, for being encrypted using the first encryption key to I frame abstract;
Data generation module is verified, for generating the completeness check data of the video;The completeness check data include
The I frame of encryption is made a summary and the first decruption key corresponding with first encryption key.
8. a kind of completeness check device of video characterized by comprising
Data reception module, for receiving video to be measured and the corresponding completeness check data of the video to be measured;It is described complete
Whole property verification data include the I frame abstract and the first decruption key corresponding with the first encryption key of encryption, first encryption
Key is for encrypting the I frame abstract;I frame abstract is regards using digest calculations algorithm to the corresponding source of the video to be measured
What the I frame data of frequency were calculated;
First deciphering module is obtained described for being decrypted using I frame abstract of first decruption key to the encryption
The I frame of source video is made a summary;
2nd I frame summarization generation module, based on being carried out using I frame data of the digest calculations algorithm to the video to be measured
It calculates, obtains the I frame abstract of the video to be measured;
First result-generation module, for carrying out pair the I frame abstract of the I frame of the video to be measured abstract and the source video
Than obtaining the first completeness check result of the video to be measured.
9. a kind of computer equipment characterized by comprising at least one processor;And at least one described processor
The memory of communication connection;Wherein, the memory is stored with the instruction that can be executed by one processor, described instruction quilt
At least one described processor executes, so that any in the execution of at least one described processor the claims 1-3 or 4-6
The method.
10. a kind of computer readable storage medium, is stored thereon with computer instruction, which is characterized in that the instruction is by processor
The step of any the method in the claims 1-3 is realized when execution, or realize any institute in the claims 4-6
The step of stating method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811280558.4A CN109413444A (en) | 2018-10-30 | 2018-10-30 | Completeness check data creation method, integrity checking method and the device of video |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811280558.4A CN109413444A (en) | 2018-10-30 | 2018-10-30 | Completeness check data creation method, integrity checking method and the device of video |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109413444A true CN109413444A (en) | 2019-03-01 |
Family
ID=65470317
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811280558.4A Pending CN109413444A (en) | 2018-10-30 | 2018-10-30 | Completeness check data creation method, integrity checking method and the device of video |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109413444A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110198458A (en) * | 2019-05-31 | 2019-09-03 | 北京文香信息技术有限公司 | A kind of processing method and processing device of encrypted audio/video data |
CN110337010A (en) * | 2019-05-22 | 2019-10-15 | 深圳警圣技术股份有限公司 | Video/audio processing method, law-enforcing recorder, management server and enforcement system |
CN110366049A (en) * | 2019-08-05 | 2019-10-22 | 杭州当虹科技股份有限公司 | A kind of stream-type video completeness protection method |
CN111565331A (en) * | 2020-04-10 | 2020-08-21 | 苏州鑫竹智能建筑科技有限公司 | Optimization method for wireless transmission of video image data |
CN111866547A (en) * | 2020-07-30 | 2020-10-30 | 北京万协通信息技术有限公司 | Novel video tamper-proofing method |
CN112000510A (en) * | 2020-06-29 | 2020-11-27 | 中国电力科学研究院有限公司 | Method and system for detecting file integrity |
CN112597515A (en) * | 2020-12-22 | 2021-04-02 | 深圳市欢太科技有限公司 | Information processing method, device and storage medium |
CN113065168A (en) * | 2021-04-08 | 2021-07-02 | 天地伟业技术有限公司 | Method, device and storage medium for storing and verifying authenticity of video data |
CN115278310A (en) * | 2022-06-23 | 2022-11-01 | 广东博华超高清创新中心有限公司 | Method for expanding source authorization information in AVS3 video |
CN115550328A (en) * | 2022-11-29 | 2022-12-30 | 中京天裕科技(杭州)有限公司 | Digital copyright protection method based on auxiliary enhancement information of H.264 video code stream |
CN117478907B (en) * | 2023-12-28 | 2024-03-19 | 南京博润类脑智能技术有限公司 | Video tamper-proof method, device and medium based on image coding |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1830212A (en) * | 2003-07-26 | 2006-09-06 | 皇家飞利浦电子股份有限公司 | Content identification for broadcast media |
US20080052533A1 (en) * | 2006-08-09 | 2008-02-28 | Fujitsu Limited | Relay apparatus for encrypting and relaying a frame |
CN101203025A (en) * | 2006-12-15 | 2008-06-18 | 上海晨兴电子科技有限公司 | Method for transmitting and receiving safe mobile message |
US20080260047A1 (en) * | 2007-04-17 | 2008-10-23 | Nokia Corporation | Feedback based scalable video coding |
US20100223540A1 (en) * | 2002-03-08 | 2010-09-02 | Uri Elzur | System and method for identifying upper layer protocol message boundaries |
CN102420994A (en) * | 2010-09-27 | 2012-04-18 | 索尼公司 | Device and method for protecting integrity of electronic data as well as data monitoring system |
CN103023862A (en) * | 2011-09-21 | 2013-04-03 | 索尼公司 | Method, server and system used for integrity protection and authentication |
CN105611319A (en) * | 2015-12-24 | 2016-05-25 | 杭州当虹科技有限公司 | Video content anti-tampering method |
CN105959696A (en) * | 2016-04-28 | 2016-09-21 | 成都三零凯天通信实业有限公司 | Video content safety monitoring method based on SIFT characteristic algorithm |
CN107993669A (en) * | 2017-11-20 | 2018-05-04 | 西南交通大学 | Voice content certification and tamper recovery method based on modification least significant digit weight |
-
2018
- 2018-10-30 CN CN201811280558.4A patent/CN109413444A/en active Pending
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100223540A1 (en) * | 2002-03-08 | 2010-09-02 | Uri Elzur | System and method for identifying upper layer protocol message boundaries |
CN1830212A (en) * | 2003-07-26 | 2006-09-06 | 皇家飞利浦电子股份有限公司 | Content identification for broadcast media |
US20080052533A1 (en) * | 2006-08-09 | 2008-02-28 | Fujitsu Limited | Relay apparatus for encrypting and relaying a frame |
CN101203025A (en) * | 2006-12-15 | 2008-06-18 | 上海晨兴电子科技有限公司 | Method for transmitting and receiving safe mobile message |
US20080260047A1 (en) * | 2007-04-17 | 2008-10-23 | Nokia Corporation | Feedback based scalable video coding |
CN101796846A (en) * | 2007-04-17 | 2010-08-04 | 诺基亚公司 | feedback based scalable video coding |
CN102420994A (en) * | 2010-09-27 | 2012-04-18 | 索尼公司 | Device and method for protecting integrity of electronic data as well as data monitoring system |
CN103023862A (en) * | 2011-09-21 | 2013-04-03 | 索尼公司 | Method, server and system used for integrity protection and authentication |
CN105611319A (en) * | 2015-12-24 | 2016-05-25 | 杭州当虹科技有限公司 | Video content anti-tampering method |
CN105959696A (en) * | 2016-04-28 | 2016-09-21 | 成都三零凯天通信实业有限公司 | Video content safety monitoring method based on SIFT characteristic algorithm |
CN107993669A (en) * | 2017-11-20 | 2018-05-04 | 西南交通大学 | Voice content certification and tamper recovery method based on modification least significant digit weight |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110337010A (en) * | 2019-05-22 | 2019-10-15 | 深圳警圣技术股份有限公司 | Video/audio processing method, law-enforcing recorder, management server and enforcement system |
CN110198458A (en) * | 2019-05-31 | 2019-09-03 | 北京文香信息技术有限公司 | A kind of processing method and processing device of encrypted audio/video data |
CN110366049A (en) * | 2019-08-05 | 2019-10-22 | 杭州当虹科技股份有限公司 | A kind of stream-type video completeness protection method |
CN111565331A (en) * | 2020-04-10 | 2020-08-21 | 苏州鑫竹智能建筑科技有限公司 | Optimization method for wireless transmission of video image data |
CN112000510A (en) * | 2020-06-29 | 2020-11-27 | 中国电力科学研究院有限公司 | Method and system for detecting file integrity |
CN112000510B (en) * | 2020-06-29 | 2024-03-19 | 中国电力科学研究院有限公司 | Method and system for detecting file integrity |
CN111866547B (en) * | 2020-07-30 | 2022-07-15 | 北京万协通信息技术有限公司 | Novel video tamper-proofing method |
CN111866547A (en) * | 2020-07-30 | 2020-10-30 | 北京万协通信息技术有限公司 | Novel video tamper-proofing method |
CN112597515A (en) * | 2020-12-22 | 2021-04-02 | 深圳市欢太科技有限公司 | Information processing method, device and storage medium |
CN113065168B (en) * | 2021-04-08 | 2023-09-19 | 天地伟业技术有限公司 | Method, device and storage medium for storing and checking authenticity of video data |
CN113065168A (en) * | 2021-04-08 | 2021-07-02 | 天地伟业技术有限公司 | Method, device and storage medium for storing and verifying authenticity of video data |
CN115278310A (en) * | 2022-06-23 | 2022-11-01 | 广东博华超高清创新中心有限公司 | Method for expanding source authorization information in AVS3 video |
CN115550328A (en) * | 2022-11-29 | 2022-12-30 | 中京天裕科技(杭州)有限公司 | Digital copyright protection method based on auxiliary enhancement information of H.264 video code stream |
CN117478907B (en) * | 2023-12-28 | 2024-03-19 | 南京博润类脑智能技术有限公司 | Video tamper-proof method, device and medium based on image coding |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109413444A (en) | Completeness check data creation method, integrity checking method and the device of video | |
US20230360165A1 (en) | Method and apparatus for protecting digital photos from alteration | |
US11902559B2 (en) | Detection of video tampering | |
CN1287249C (en) | Access control for digital content | |
US11700433B2 (en) | Verifying the rendering of video content at client devices using trusted platform modules | |
CN103427983A (en) | Apparatus and method for content encryption and decryption based on storage device ID | |
EP2352251A1 (en) | Content decoding apparatus, content decoding method and integrated circuit | |
WO2017215148A1 (en) | File protection method and device | |
US9502003B2 (en) | Apparatus and methods to display a modified image | |
CN109274644A (en) | A kind of data processing method, terminal and watermark server | |
WO2023125291A1 (en) | Image display methods, apparatuses and system and device | |
CN104966525A (en) | File encryption method and apparatus, and file decryption method and apparatus | |
Xu et al. | Separable reversible data hiding in encrypted images based on difference histogram modification | |
CN111669650A (en) | Video processing method and device, electronic equipment and storage medium | |
CN114785524A (en) | Electronic seal generation method, device, equipment and medium | |
CN110035319A (en) | A kind of encryption and decryption method of audio, video data, device and playback equipment | |
CN110380843B (en) | Information processing method and related equipment | |
CN115632782A (en) | Random number generation method, system and equipment based on SM4 counter mode | |
JP6797337B2 (en) | Message authentication device, message authentication method and message authentication program | |
CN101917623A (en) | Tamper-proof encryption method, detection method and device of encoding code stream | |
Cao et al. | Texture driven adaptive multi-level block selection based reversible data hiding in encrypted image | |
CN109274902A (en) | Video file treating method and apparatus | |
CN116821941B (en) | Data encryption and decryption method, device, equipment and storage medium | |
CN116702218B (en) | Rendering method, device, terminal and storage medium of three-dimensional model in applet | |
Mokhnache | Implémentation d’algorithmes avancés de traitement de l’information dédiés au cryptage et à la cryptanalyse |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190301 |
|
RJ01 | Rejection of invention patent application after publication |