CN109831696A - Handle method, apparatus, electronic equipment and the storage medium of violation video content - Google Patents

Handle method, apparatus, electronic equipment and the storage medium of violation video content Download PDF

Info

Publication number
CN109831696A
CN109831696A CN201811626292.4A CN201811626292A CN109831696A CN 109831696 A CN109831696 A CN 109831696A CN 201811626292 A CN201811626292 A CN 201811626292A CN 109831696 A CN109831696 A CN 109831696A
Authority
CN
China
Prior art keywords
time
violation
screenshot
video content
identification method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811626292.4A
Other languages
Chinese (zh)
Other versions
CN109831696B (en
Inventor
龙淑敏
林里鑫
谢浩明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Huaduo Network Technology Co Ltd
Original Assignee
Guangzhou Huaduo Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Huaduo Network Technology Co Ltd filed Critical Guangzhou Huaduo Network Technology Co Ltd
Priority to CN201811626292.4A priority Critical patent/CN109831696B/en
Publication of CN109831696A publication Critical patent/CN109831696A/en
Application granted granted Critical
Publication of CN109831696B publication Critical patent/CN109831696B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

This application discloses a kind of method, apparatus, electronic equipment and storage mediums for handling violation video content, this method include obtain at the first time, at the first time characterization with the first identification method identify from video content include at first along video playing progress violation information time;Obtained for the second time, the second time representation with the second identification method identify from video content include at first along video playing progress violation information time;The safe period of time at the first time between the second time is obtained, safe period of time, first time and the second time are based on, obtains the violation timeliness of the second identification method, default processing is carried out to video content according to the violation identification timeliness got.By the safe period of time between removal live streaming violation screenshot and the time of the live streaming violation screenshot of machine recognition not including violation information, obtain the timeliness of machine recognition violation, video content break according to violation identification timeliness and broadcasts or break processing, can reduce the exposure time of violation information.

Description

Handle method, apparatus, electronic equipment and the storage medium of violation video content
Technical field
This application involves network direct broadcasting technical fields, more particularly, to a kind of method for handling violation video content, dress It sets, electronic equipment and storage medium.
Background technique
With the fast development of internet and internet video live broadcasting technology, facilitates more and more users and passed by video Information is broadcast, user experience is enhanced, but some problems also occurs, for example, some criminals disseminate bad disobey by video Information is advised, huge negative effect can be brought to society.For miscellaneous live content, if cannot fast and accurately area It separates normal live streaming and is broadcast live in violation of rules and regulations, it will generate situations such as largely failing to report or report by mistake, reduce user experience.
Summary of the invention
In view of the above problems, it the method, apparatus of violation video content, electronic equipment is handled and deposits present applicant proposes a kind of Storage media, to improve the above problem.
In a first aspect, the embodiment of the present application provides a kind of method for handling violation video content, this method comprises: obtaining At the first time, it characterizes at the first time with what the first identification method identified from video content and includes at first along video playing progress The time of violation information, the first identification method are identification method trusty;Obtained for the second time, the second time representation is with second What identification method identified from video content includes the time of violation information, the second identification method along video playing progress at first For identification method to be detected;The safe period of time at the first time between the second time is obtained, safe period of time characterization is at the first time It does not include the period of violation information in video content between the second time;When based on safe period of time, first time and second Between, the violation for obtaining the second identification method identifies timeliness;Video content is preset according to the violation identification timeliness got Processing, to reduce the exposure time of video content.
Second aspect, the embodiment of the present application provide a kind of device for handling violation video content, which includes: first Module is obtained, for obtaining first time, the edge view that first time characterization is identified from video content with the first identification method Frequency playback progress includes the time of violation information at first, and the first identification method is identification method trusty;Second obtains module, For obtaining for the second time, the second time representation with the second identification method identify from video content along video playing progress It at first include the time of violation information, the second identification method is identification method to be detected;Third obtains module, for obtaining the Safe period of time between one time and the second time, safe period of time characterization is at the first time in the video content between the second time It does not include the period of violation information;4th obtains module, for being based on the safe period of time, the first time and described second Time, the violation for obtaining second identification method identify timeliness;Processing module, for identifying timeliness according to the violation got Default processing is carried out to video content, to reduce the exposure time of video content.
The third aspect, the embodiment of the present application provide a kind of electronic equipment, including memory and one or more processing Device;One or more programs are stored in memory and are configured as being performed by one or more processors, one or more Program is configured to carry out method described in above-mentioned first aspect.
Fourth aspect, the embodiment of the present application provide a kind of computer readable storage medium, computer readable storage medium In be stored with program code, wherein method described in above-mentioned first aspect is executed when program code is run as processor.
A kind of method, apparatus, electronic equipment and storage medium handling violation video content provided by the embodiments of the present application, It is related to network direct broadcasting technical field.This method is by obtaining at the first time, and characterization is with the first identification method from video at the first time What is identified in content includes the time of violation information along video playing progress at first, and the first identification method is identification trusty Mode;Then obtained for the second time, the second time representation is broadcast with what the second identification method identified from video content along video Degree of putting into includes the time of violation information at first, and the second identification method is identification method to be detected;Obtain again at the first time with Safe period of time between second time, it does not include disobeying that safe period of time, which characterizes in the video content between the second time at the first time, Advise the period of information;It is then based on safe period of time, first time and the second time, when obtaining the violation identification of the second identification method Effect;Default processing is carried out to video content according to the violation identification timeliness got, to reduce the exposure time of video content. This method is disobeyed by obtaining the live streaming violation screenshot time and obtaining the live streaming violation screenshot time of machine recognition by removal live streaming Do not include the safe period of time of violation information between rule screenshot time and the live streaming violation screenshot time of machine recognition, obtains machine knowledge The timeliness of other violation carries out default processing to video content according to violation identification timeliness, can reduce in video content and believe in violation of rules and regulations The exposure time of breath.
Detailed description of the invention
In order to more clearly explain the technical solutions in the embodiments of the present application, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, the drawings in the following description are only some examples of the present application, for For those skilled in the art, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 shows a kind of application environment schematic diagram provided by the embodiments of the present application.
Fig. 2 shows the audit logics suitable for the method for processing violation video content provided by the embodiments of the present application to show It is intended to.
Fig. 3 shows a kind of flow chart of the method for processing violation video content of one embodiment of the application offer.
Fig. 4 shows a kind of flow chart of the method for processing violation video content that another embodiment of the application provides.
Fig. 5 shows the flow chart of the method for the step S210 in Fig. 4.
Fig. 6 shows the flow chart of the method for the step S220 in Fig. 4.
Fig. 7 shows the detection logical schematic suitable for the embodiment of the present application violation timeliness.
Fig. 8 shows a kind of structural block diagram of device for handling violation video content provided by the embodiments of the present application.
Fig. 9 shows the structural block diagram of a kind of electronic equipment provided by the embodiments of the present application.
Figure 10 shows disobeying for saving or carrying realization according to the processing of the embodiment of the present application for the embodiment of the present application Advise the storage unit of the program code of the method for video content.
Specific embodiment
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application Attached drawing, the technical scheme in the embodiment of the application is clearly and completely described.
With the rapid development of information technology, network direct broadcasting is with its novel form, the abundant in content extensive pass by people Note, can improve the spread speed of information by network direct broadcasting with real-time delivery information, but also bring many negative shadows simultaneously It rings.For network direct broadcasting since its threshold is low, more and more users can become the main broadcaster of network direct broadcasting platform, therefore network direct broadcasting Information category emerge one after another, some criminals are disseminated for example using network direct broadcasting: pornographic, violence, sham publicity etc. are bad Information has upset the normal life of people.
As a kind of mode, platform, which is broadcast live, can be carried out some violation informations being spread out in video content by machine Audit, however the violation information of a live video is not necessarily continuously, disseminate in the live video of violation information there is also Not content in violation of rules and regulations, and machine recognition come out the violation time be usually all later than live video content it is practical beginning violation when Between, i.e. the recognition capability of machine is insufficient, cause machine recognition video content whether violation when there are time delay, recognition efficiencies It is low, it is therefore desirable to the method that one kind can accurately measure the identification timeliness of machine recognition violation.
In view of the above-mentioned problems, inventor has found by long-term research, since a live streaming intercutting violation information to separated Rule information is come out by machine recognition, and there is a time difference in centre, and the recognition capability of machine is stronger, this time difference is shorter. In order to reduce exposure period of the violation information in live video, to reduce violation information bring adverse effect, further The recognition capability of machine is improved, inventors have found that first barrier of the machine recognition as live streaming audit, it can be by filtering out Safe sample (the safe sample in the embodiment of the present application between violation time started to the violation time started of machine recognition is broadcast live Refer to the video content not comprising violation information), and the sample of " doubtful violation " that machine recognition obtains is sent to doing some training very often People examine (i.e. manual examination and verification) and carry out secondary audit, calculate the identification timeliness of machine recognition violation, it is possible to reduce violation information Exposure time in video content further increases machine recognition ability.
Therefore, it is proposed to a kind of method, apparatus for handling violation video content provided by the embodiments of the present application, electronic equipment And storage medium, by not including in violation of rules and regulations between removal live streaming violation screenshot time and the live streaming violation screenshot time of machine recognition The safe period of time of information obtains the timeliness of machine recognition violation, demonstrates the ability of the timeliness of machine recognition violation;Furthermore root Video content break according to violation identification timeliness and broadcasts or breaks processing, and then can reduce the exposure time of violation information.
For the ease of application scheme is described in detail, ring first is applied to one of the embodiment of the present application in conjunction with attached drawing below Border is introduced.
Referring to Fig. 1, showing for a kind of application environment of method for handling violation video content provided by the embodiments of the present application It is intended to, as shown in Figure 1, the application environment can be understood as a kind of network system 10 of the offer of the embodiment of the present application, the network System 10 includes: server 11 and electronic equipment 12.Wherein, server 11 can be a server (network insertion service Device), it is also possible to the server cluster (Cloud Server) consisted of several servers, or can be a cloud computing center (database server).Electronic equipment 12 can be any equipment for having communication and store function, including but not limited to PC (Personal Computer, personal computer), PDA (tablet computer), smart television, smart phone, intelligent wearable device Or other intelligent communication devices with network connecting function.
Optionally, it is mounted with that the client can configured with the client of network direct broadcasting platform application in electronic equipment 12 To be application client (the video playing application program in such as cell phone application), it is also possible to webpage client (such as network Platform is broadcast live).
As a kind of mode, server 11 can be established by network and electronic equipment 12 and be communicated to connect, optionally, the net Network can be wireless network, be also possible to cable network.The user account that registration can be used in user logs in electronic equipment 12 Client or internet, the client can have information input interface, user inputs text information in the interface, and And text information is shown in the chat interface of client.
It should be noted that method in the embodiment of the present application is applied to server, as a kind of mode, server can be with It is a server 11 as shown in Figure 1, is also possible to the server being made of several servers 11 (only showing one in figure) Cluster can install the live streaming auditing system of network direct broadcasting platform, be audited by the live streaming as a kind of mode in server 11 System can the video content to network direct broadcasting platform audited in real time.
In one embodiment, live streaming auditing system can be provided in advance comprising several violation pictures, text and/ Or the database of the classifications violation information such as video, these violation informations can include according to video content by live streaming auditing system The violation severity of violation information is divided into different discipline ratings, then when recognizing in the video comprising any violation information Rong Shi, live streaming auditing system can construct corresponding violation work order according to the discipline rating of video content, and violation work order is mentioned It hands over the background management system to network direct broadcasting platform to be audited again, the accuracy of identification violation content can be increased.
The audit logic suitable for the method for processing violation video content provided by the embodiments of the present application is carried out below Explanation.
Referring to Fig. 2, being patrolled for the audit suitable for the method for processing violation video content provided by the embodiments of the present application Collect schematic diagram.As a kind of mode, machine can the content to live video screenshot was carried out with 3 seconds frequencies, and to each The content of screenshot is identified judge whether it includes the violation information stored in the database for be broadcast live auditing system.In one kind In implementation, when the content for identifying certain screenshot does not include above-mentioned violation information, live streaming auditing system can be by this Screenshot is determined as " safe sample ", and should " safe sample " abandoned.In another implementation, when identifying certain When the content of screenshot includes above-mentioned violation information, this screenshot can be determined as " doubtful violation " sample by live streaming auditing system, And should " doubtful violation " sample send to people to examine and carry out secondary audit at (manual examination and verification).
As a kind of mode, it is sent to people and tries and punishes " doubtful violation " sample for carrying out secondary audit, if audit passes through, then It can directly be abandoned corresponding screenshot as safe sample;If the audit fails, then can be true by corresponding screenshot It is set to the screenshot comprising violation information, and it is punished.
For example, in a specific application scenarios, if by " doubtful violation " sample of machine recognition through artificial secondary careful It is found after core not comprising violation information, then corresponding screenshot can be abandoned, i.e., is considered as the content of corresponding screenshot Normal video content;If being found to include violation information after artificial secondary audit by " doubtful violation " sample of machine recognition, So corresponding screenshot can be determined as in violation of rules and regulations by live streaming auditing system, i.e., the content of corresponding screenshot is considered as in improper video Hold, in this case, live streaming auditing system can punish these video contents for including violation information, such as disconnected It broadcasts, break;Or warning or fine etc..
It should be noted that above-mentioned " machine can content to live video with 3 seconds frequencies carry out screenshot " enumerated Only to facilitate explanation, is not intended as limiting, for example, being also possible to machine in actual implementation to the content of live video with 10 The frequency of second carries out screenshot etc., does not repeat excessively herein.
It is understood that the audit logic signal in the method for processing violation video content provided by the embodiments of the present application Figure is only for convenience of understanding, and the embodiment of the present application can be applicable in a variety of audit logics, therefore the side of above-mentioned processing violation video content Audit logical schematic in method, which is not constituted this programme, to be limited.
Present embodiments are specifically described below in conjunction with attached drawing.
Referring to Fig. 3, a kind of flow chart of method for handling violation video content provided by the embodiments of the present application is shown, The present embodiment provides a kind of methods for handling violation video content, can apply above-mentioned electronic equipment, this method comprises:
Step S110: obtaining at the first time, and the first time characterization is identified from video content with the first identification method Out include at first along video playing progress violation information time, first identification method be identification method trusty.
Wherein, the first identification method in the present embodiment can be manual identified, be also possible to manual identified auxiliary machinery Identification.It should be noted that the first identification method can be the identification method trusty by manual verification, it is also possible to lead to Cross the identification method trusty of manual verification's auxiliary machinery verifying.As a kind of mode, auditing system is broadcast live can be with first Whether identification method includes that violation information identifies, and then can will identify with first to the video content of network direct broadcasting platform What mode identified from video content includes the time of violation information as at the first time along video playing progress at first.
As an implementation, if the first identification method is manual identified, then can be by manually in video content Time addition comprising violation information marks in violation of rules and regulations, and using the time for occurring violation information at first along video playing progress as the One time.By manual identified violation information, so mark time of violation at first as at the first time, can allow result more Accurately.
As another embodiment, if the first identification method is the identification of manual identified auxiliary machinery, then can be by machine Device is first classified to the video content of entire video by preconfigured violation information disaggregated model, obtains including in violation of rules and regulations The video content of information and do not include violation information video content.Optionally, machine can after first subseries include in violation of rules and regulations The video content of information is sent to people and tries and punishes carry out secondary-confirmation, by manually in the video including violation information of machine judgement Appearance is judged again, at first includes in violation of rules and regulations when then people can be tried disconnected if it includes violation information that people's trial is disconnected optionally The time of information is as at the first time;If it does not include violation information that people's trial is disconnected, then can using corresponding video content as Safe sample is abandoned.Artificial secondary judgement is transferred to again by machine judgement, will examine the secondary packet at first for judging to obtain through people The time of violation information is included as at the first time, it is ensured that when acquisition first time more quick and precisely, reduce error.
It should be noted that the manual identified and the identification of manual identified auxiliary machinery in the first identification method are credible The identification method appointed, and two kinds of identification methods can obtain reliable first time.
Step S120: obtaining for the second time, and second time representation is identified from video content with the second identification method Out include at first along video playing progress violation information time, second identification method be identification method to be detected.
Wherein, the second identification method in the present embodiment is machine recognition, as a kind of mode, the second identification method be to The identification method of detection.Live streaming auditing system audit network direct broadcasting platform video content whether include violation information process In, since the model of machine recognition is people's setting, the type of machine recognition may less comprehensively, when the view of network direct broadcasting platform When occurring new (the machine recognition type being set is not covered with) violation information type in frequency content, machine recognition Violation information is it is possible that situations such as failing to report, report by mistake or identify delay.
For example, being made whether by machine to video content in the review process comprising violation information, when in video content When the violation information of appearance is not in the range of machine recognition model covers, machine will not recognize these new violation letters Breath;Whether machine is during identifying video content includes violation information, due to some limitations etc. of machine learning algorithm Reason can always have time delay, thus it is necessary to go acquisition machine recognition to go out the time that video content includes violation information.
As a kind of mode, auditing system is broadcast live can be with video content of second identification method to network direct broadcasting platform It is no to be identified comprising violation information, so can by with the second identification method identify from video content along video playing Progress includes the time of violation information as the second time at first.
Step S130: the safe period of time between the first time and second time, the safe period of time table are obtained Levy do not include in the video content between the first time and second time violation information period.
As a kind of mode, edge in the video content identified due to machine recognition there are error, the first identification method Video playing progress include at first in the first time of violation information and video content that machine recognition obtains along video playing into Inevitably there is the safe period of time for not including violation information between the second time including violation information at first in degree, can also be with It is interpreted as therebetween in the presence of the video content for not including violation information, then when live streaming auditing system can be by obtaining first Between between the second time do not include violation information video content, and then between available first time and the second time Safe period of time.
It should be noted that the second time in the embodiment of the present application is greater than at the first time.It can be appreciated that machine is known Not Chu video content include violation information time be later than and actually violation information occur in video content at the beginning of.
Step S140: being based on the safe period of time, the first time and second time, obtains second identification The violation of mode identifies timeliness.
As a kind of mode, the present embodiment can be used the second time, the difference with the sum of first time and safe period of time It is worth and identifies timeliness as the violation of the second identification method.Specifically, including violation information since machine recognition goes out video content Time is later than actually there is violation information in video content at the beginning of, and at the first time and the second time between exist do not wrap The video content corresponding period of violation information is included, therefore, machine really identifies the timeliness of violation in order to obtain, can be by Between one time and the second time do not include that the safe period of time of violation information is rejected, then, understandable to be, Ke Yitong It crosses and knows the sum of the second time and safe period of time and first time as the violation that difference obtains the second identification method (i.e. machine recognition) Other timeliness.
Optionally, " T2 " can be set by the value of the second time, sets " T1 " for the value of first time, when will be safe The value of section is set as " T3 ", then the violation identification timeliness of above-mentioned second identification method can be expressed as " T2- (T1+T3) ", it can Choosing, it is understood that be " T2-T1-T3 ".
For example, in a specific application scenarios, it is assumed that by first including believing in the video content of manual identified in violation of rules and regulations The screenshot time of breath is video to the 5th second started is played, by first including violation information in the video content of machine recognition The screenshot time be video to play start the 10th second, optionally, between the 5th second and the 10th second in the presence of 2 seconds do not include violation The video content of information, then can be by the sum of 10 and 5 and 2 difference " 3 " disobeying as the second identification method (machine recognition) Rule identification timeliness.
Step S150: carrying out default processing to the video content according to the violation identification timeliness got, to Reduce the exposure time of the video content.
Wherein, as a kind of mode, if having got the violation identification timeliness of above-mentioned second identification method (machine recognition), It so can be determined that there are time delays when the second identification method identifies the violation information of video content.Optionally, in order to avoid Violation information brings adverse effect to people's lives, can be carried out according to the specific value of violation identification timeliness to video content Default processing.
As an implementation, the threshold value for identifying timeliness in violation of rules and regulations can be preset, optionally, when violation identifies timeliness When lower than the threshold value, the corresponding video content comprising violation information can slightly be punished, such as alert or penalize Money etc.;When violation identification timeliness is not less than told threshold value, can break to the corresponding video content comprising violation information Processing is broadcast or broken, so as to reduce the exposure time of violation information, promotes user experience.
A kind of method handling violation video content provided in this embodiment, by obtaining at the first time;Then is obtained Two times;The safe period of time at the first time between the second time is obtained again;It is then based on safe period of time, first time and second Time, the violation for obtaining the second identification method identify timeliness;Video content is carried out according to the violation identification timeliness got pre- If processing, to reduce the exposure time of video content.This method is known by obtaining the live streaming violation screenshot time and obtaining machine Other live streaming violation screenshot time, by between removal live streaming violation screenshot time and the live streaming violation screenshot time of machine recognition Do not include the safe period of time of violation information, obtain the timeliness of machine recognition violation, demonstrates the energy of the timeliness of machine recognition violation Power break to video content and broadcasts or break processing, can reduce the exposure time of violation information according to violation identification timeliness.
Referring to Fig. 4, showing a kind of stream of the method for processing violation video content that another embodiment of the application provides Cheng Tu, the present embodiment provides a kind of methods for handling violation video content, can be applied to above-mentioned electronic equipment, this method comprises:
Step S210: obtaining first object unit screenshot, using the screenshot time of the first object unit screenshot as the One time, the first object unit screenshot are to be identified from multiple unit screenshots that video content includes with the first identification method Out include at first along video playing progress violation information unit screenshot.
Referring to Fig. 5, step S210 may include:
Step S211: the list that the violation label of the first identification method is carried in multiple unit screenshots of video content is obtained First screenshot.
Optionally, for all video contents of network direct broadcasting platform, from the live streaming start and ending of video content, live streaming Auditing system can carry out live video with preset frequency by machine cutting figure, obtain multiple video content screenshots.For example, For one section of live video, auditing system is broadcast live can carry out cutting figure with content of 3 seconds frequency intervals to live video, It can carry out cutting figure with content of 10 seconds frequency intervals to live video, obtain 3 seconds or 10 seconds comprising multiple video contents Frequency screenshot.It therefore, can be using each screenshot in obtained multiple video content screenshots as one as a kind of mode Unit screenshot.
As a kind of mode, network direct broadcasting platform can construct labeling system, which can be used for straight to network All video content screenshot additions comprising violation information identify in violation of rules and regulations in broadcasting.It optionally, may include data in labeling system Module is obtained, can be used for from internet grabbing and storing in real time includes but is not limited to relate to Huang, suspected illegal, bad advertisement etc. The violation information of related category, wherein the format of violation information can be picture format, video/audio, text etc., herein not It limits.It should be noted that the violation information in data acquisition module is also possible to by being manually entered, or manually to having deposited The violation information that the violation information of storage obtains after modifying or adjusting.
As an implementation, above-mentioned labeling system can include different brackets according to the violation information building got And include the violation mark of multiple classifications, for example, labeling system can be serious according to the violation of violation information as a kind of mode Degree, setting " critical violation ", " generally in violation of rules and regulations ", " the violation mark of the three grades such as slight violation, for each violation etc. Multiple violation classification logotypes can be respectively set in grade.
Alternatively, different violation marks can be arranged in labeling system according to the violation classification of violation information, And the violation mark of each classification may include that one or more subclasses identify in violation of rules and regulations, such as " erotica content " is arranged, " violates method Rule " etc. classification logotypes, for the classification logotypes such as " erotica content ", " contrary to law " can be respectively set it includes one or more A sub- classification logotype optionally can also be arranged next stage classification logotype under subclass mark, can carry out according to the actual situation Selection.There can be reference frame abundant in mark in order to auditor, can also be improved the justice to verifying video content Property (avoid certain video contents including violation information due to identified category is very little labeled as in violation of rules and regulations or will actually including The video content spill tag of violation information).
For example, in a specific application scenarios, if labeling system is distinguished according to the violation severity of violation information Grade 1 violation mark provided with " critical violation ", " general violation ", " slight violation ", then " seriously being disobeyed for level-one mark Rule ", it is " dressing is indecency " etc. that its second level sub-mark, which can be set,;For sub-mark " dressing is indecency ", its next stage can be set Sub-mark (three-level mark) is " exposure should not naked position " etc..Optionally, the classification of mark and quantity can be according to realities Border situation and be adjusted, details are not described herein.
In another specific application scenarios, if labeling system is according to the violation classification of violation information provided with " vulgar Relate to Huang ", " porno advertisement ", the classifications such as " seriously relating to political affairs " violation mark can then be the mark of " vulgar to relate to Huang " for classification It is " vulgar movement " etc. so that the sub-mark that it includes is arranged, is the mark of " porno advertisement " for classification, it, which can be set, includes Sub-mark be " netpage color pop-up ", " the small card of contact method " etc., can be with for the marks that classification is " seriously relating to political affairs " It is " personage " etc. that the sub-mark that it includes, which is arranged,.
Step S212: along video playing progress in the unit screenshot that the violation for carrying the first identification method is marked The unit screenshot occurred earliest is as first object unit screenshot, using the screenshot time of the first object unit screenshot as One time.
As a kind of mode, auditor can add pending video content screenshot according to the violation mark set Corresponding violation is added to identify, it, can convenient for electronic equipment by being identified in violation of rules and regulations to the video content screenshot addition for including violation information Whether it is the content screenshot for including violation information with rapid identification video content, memory cost can be saved, then carried There is the video interception of corresponding mark in violation of rules and regulations.So in such a case, it is possible to obtain from multiple screenshots that video content includes What is identified includes the screenshot of violation information along video playing progress at first, using the screenshot as first object unit screenshot, into And it can be using the screenshot time of first object unit screenshot as at the first time.It should be noted that indicating live streaming at the first time The content of the video practical time for starting violation.
Step S220: obtaining the second object element screenshot, using the screenshot time of the second object element screenshot as the Two times, the second object element screenshot are to be identified from multiple unit screenshots that video content includes with the second identification method Out include at first along video playing progress violation information unit screenshot.
Referring to Fig. 6, step S220 may include:
Step S221: the list that the violation label of the second identification method is carried in multiple unit screenshots of video content is obtained First screenshot.
It should be noted that the second identification method in the present embodiment includes machine recognition.So obtain video content The unit screenshot that the violation label of the second identification method is carried in multiple unit screenshots may include: to obtain with machine recognition side What formula was identified from multiple unit screenshots that video content includes includes the unit of violation information along video playing progress at first Screenshot, using these unit screenshots as the second target screenshot.
As a kind of mode, for the timeliness of verifier identification violation information, live streaming auditing system can allow machine pair Above-mentioned includes that multiple video interceptions are identified.Optionally, machine can be according to model trained in advance in video content Whether identified comprising violation information.Optionally, machine can obtain the video content screenshot comprising violation information to identification It is marked, it should be noted that the label of machine addition can be any form of and can be different from the first identification method The label identified obtains the video interception for carrying label in violation of rules and regulations.
In a specific application scenarios, when multiple video frame screenshots of the machine to certain section of video content identify When, machine can be allowed to mark the video interception addition for carrying violation information recognized in violation of rules and regulations, obtain taking for machine recognition Video interception with violation label, can be using the video interception for carrying label in violation of rules and regulations of these machine recognitions as carrying The unit screenshot of the violation label of second identification method.
Step S222: along video playing progress in the unit screenshot that the violation for carrying the second identification method is marked The unit screenshot occurred earliest is as the second object element screenshot, using the screenshot time of the second object element screenshot as Two times.
As a kind of mode, auditing system is broadcast live can obtain the violation label for carrying the second identification method by machine Video interception in, the video interception occurred earliest along video playing progress as the second object element screenshot, and then can will The screenshot time of second object element screenshot is as the second time.
Step S230: the safe period of time between the first time and second time, the safe period of time table are obtained Levy do not include in the video content between the first time and second time violation information period.
It is understood that violation information can be continuously for each section there are the video content of violation information, Can be it is discontinuous, if that the video content between screenshots directly by adjacent two comprising violation information is ignored, that It is likely to cause the discontinuous of normal video content, brings disagreeableness viewing experience to user, therefore, it is necessary to go to obtain Take the period between the video content comprising discontinuous violation information.
As a kind of mode, auditor can be based on first time obtained above and the second time, when screening first Between do not include in video content between the second time violation information the safe screenshot period, as first time and Safe period of time between two times.
Step S240: known based on the safe period of time, from first identification method that same levels mark in violation of rules and regulations Not Chu the second time for being identified of first time and second identification method, obtain the violation of second identification method Identify timeliness.
As a kind of mode, auditing system is broadcast live can be by the second time, and at the first time and the sum of safe screenshot period Difference, as the second identification method violation identify timeliness.Optionally, with reference to foregoing description it is found that violation information packet A variety of grades are included, then as an implementation, during the violation for calculating the second identification method identifies timeliness, first Time and the second time need to be from the violation informations of same levels, that is, can disobey based on safe period of time, from same levels The second time that first time for being identified of the first identification method of rule information and the second identification method are identified obtains the The violation of two identification methods identifies timeliness.
For example, to Mr. Yu's section video, electronic equipment is getting first object unit in a specific application scenarios After screenshot and the second object element screenshot, it can first judge that first object unit screenshot and the second object element screenshot are each From included violation information discipline rating it is whether identical, however, it is determined that first object unit screenshot and the second object element Respectively in the identical situation of discipline rating of included violation information, the screenshot time of first object unit screenshot is made for screenshot For that at the first time, using the screenshot time of the second object element screenshot as the second time, and then can guarantee to handle violation video The fairness of content.
Step S250: carrying out default processing to the video content according to the violation identification timeliness got, to Reduce the exposure time of the video content.
Wherein, as a kind of mode, auditing system, which is broadcast live, can preset the threshold value for identifying timeliness in violation of rules and regulations, for obtaining The violation identification timeliness arrived, it can be determined that whether identification timeliness is greater than given threshold in violation of rules and regulations.As a kind of mode, if more than that Video content can be carried out breaking and broadcast or break processing;Alternatively, if being not more than, then can be to video content Carry out other processing, such as warning or fine etc..
In a specific application scenarios, if live streaming auditing system has preset the threshold value of machine recognition violation timeliness It is 30 seconds, is broadcast live in latter 30 minutes of a length of 1 hour video content when certain section of auditing system interception comprising violation information, this 30 minutes video content informations practical time for starting violation is the 45th minute afterwards, and this latter 30 minutes that machine recognition obtains Video content to start the time of violation be the 45th point include that there is no in the video of violation information in 10 seconds between 55 seconds, this 55 seconds Hold, then the violation identification timeliness of this rear 30 minutes video content of machine recognition be " 45 points 55 seconds -45 points -10 seconds=45 Second ", since 45 seconds greater than 30 seconds, this rear 30 minutes video content can be carried out breaking and broadcast or break processing.It can keep away Exempt from excessive video content violation information to expose for a long time in live streaming platform, and then user experience can be promoted.
It is understood that if identification timeliness is less than given threshold in violation of rules and regulations, it, can be by live streaming audit system as a kind of mode The video content that violation information will be present in system plays out after being filtered.
The present embodiment identifies timeliness by calculating the violation of the second identification method, it can be determined that the recognition capability of machine is made For a kind of mode, identify that timeliness is bigger in violation of rules and regulations, machine recognition ability is weaker, identifies that timeliness is smaller in violation of rules and regulations, machine recognition ability is got over By force.Further, identification timeliness is smaller in violation of rules and regulations, it is possible to determine that machine recognition ability is more accurate.
It should be noted that identifying timeliness for the violation that the present embodiment obtains, can be used for according to identification timeliness to straight The broadcasting situation for broadcasting video is adjusted, for example, if it is detected that can include violation to corresponding when identification timeliness is larger in violation of rules and regulations The video content of information, which break, broadcasts or breaks processing.Further, timeliness is identified by the violation of computing machine, it can be into one Which step analysis be the violation information that machine is not covered with when whether machine recognition video content includes violation information there are also Identification model, and then the ability of violation information can be identified with hoisting machine.
The present embodiment is illustratively illustrated by taking Fig. 7 as an example below:
Referring to Fig. 7, in a specific application scenarios, it is assumed that Fig. 7 is rear 30 minutes views of one section of live video Frequency content, live streaming auditing system have been carried out carrying out cutting figure with 3 seconds frequencies, obtained comprising multiple by machine to the video content The video content of screenshot.As a kind of mode, " 1 " in Fig. 7 indicate by auditor by labeling system mark it is above-mentioned after First is marked with the screenshot of violation reason in 30 minutes video content screenshots, it should be noted that the screenshot time is straight Broadcast the time T1 that practical violation starts." 2 " indicate to be obtained by machine recognition it is above-mentioned after the in 30 minutes video content screenshots One is marked with the screenshot of violation reason, and optionally, which indicates that the machine recognition screenshot is doubtful violation.
Optionally, in the presence of the safe screenshot period for not including violation information between screenshot " 1 " and screenshot " 2 ", as one Kind of mode, can be by obtaining that the first screenshot time comprising violation information subtracts auditor's mark for machine recognition One includes the screenshot time of violation information, then subtracts the safe screenshot period between screenshot " 1 " and screenshot " 2 ", can obtain Violation to machine recognition identifies timeliness.The current video content comprising violation information can be carried out according to violation identification timeliness Processing, such as break and broadcast or break processing etc..
It should be noted that the first identification method of description in the present embodiment and the recognition sequence between the second identification method Not as restriction, can be adjusted according to the actual situation.
A kind of method handling violation video content provided in this embodiment, by obtaining at the first time;Then is obtained Two times;The safe period of time at the first time between the second time is obtained again;It is then based on safe period of time, first time and second Time obtains the violation timeliness of the second identification method;Default place is carried out to video content according to the violation identification timeliness got Reason, to reduce the exposure time of video content.This method is by obtaining the live streaming violation screenshot time and obtaining machine recognition The violation screenshot time is broadcast live, by not wrapping between removal live streaming violation screenshot time and the live streaming violation screenshot time of machine recognition The safe period of time for including violation information obtains the timeliness of machine recognition violation, demonstrates the ability of the timeliness of machine recognition violation, root Video content break according to violation identification timeliness and broadcasts or break processing, can reduce the exposure time of violation information.
Referring to Fig. 8, for a kind of structural block diagram for the device for handling violation video content provided by the embodiments of the present application, this Embodiment provides a kind of device 300 for handling violation video content, runs on electronic equipment, and described device 300 includes: first to obtain Modulus block 310, second obtains module 320, third obtains module 330 and the 4th obtains module 340:
First obtains module 310, and for obtaining at the first time, first time characterization is with the first identification method from video What is identified in content includes the time of violation information along video playing progress at first, and first identification method is trusty Identification method.
As a kind of mode, the first acquisition module 310 can be used for obtaining first object unit screenshot, by first object list The screenshot time of first screenshot is as at the first time, wherein the first object unit screenshot in the present embodiment is with the first identification side What formula was identified from multiple unit screenshots that video content includes includes the unit of violation information along video playing progress at first Screenshot.
Optionally, the first acquisition module 310, which can be used for obtaining in multiple unit screenshots of video content, carries first The unit screenshot of the violation label of identification method;It will carry in the unit screenshot of the violation label of the first identification method along video The unit screenshot that playback progress occurs earliest makees the screenshot time of first object unit screenshot as first object unit screenshot For at the first time.
Second obtains module 320, and for obtaining for the second time, second time representation is with the second identification method from video What is identified in content includes the time of violation information along video playing progress at first, and second identification method is to be detected Identification method.
As a kind of mode, the second acquisition module 320 can be used for obtaining the second object element screenshot, by the second target list The screenshot time of first screenshot is as the second time, wherein the second object element screenshot in the present embodiment is with the second identification side What formula was identified from multiple unit screenshots that video content includes includes the unit of violation information along video playing progress at first Screenshot.
Optionally, the second acquisition module 320, which can be used for obtaining in multiple unit screenshots of video content, carries second The unit screenshot of the violation label of identification method;It will carry in the unit screenshot of the violation label of the second identification method along video The unit screenshot that playback progress occurs earliest makees the screenshot time of the second object element screenshot as the second object element screenshot For the second time.
In one implementation, the second identification method may include machine recognition mode, and second obtains module 320 can be with For obtain identified from multiple unit screenshots that video content includes in a manner of machine recognition along video playing progress most It first include the unit screenshot of violation information;Using the unit screenshot as the second target screenshot.
Third obtains module 330, described for obtaining the safe period of time between the first time and second time Safe period of time characterize do not include in the video content between the first time and second time violation information period.
As a kind of mode, third, which obtains module 330, can be used for obtaining the safety between the second time at the first time The screenshot period, it does not include believing in violation of rules and regulations which, which can characterize in the video content between the second time at the first time, The unit screenshot of breath.
4th obtains module 340, for being based on the safe period of time, the first time and second time, obtains The violation of second identification method identifies timeliness.
Optionally, label may include that the violation of multiple grades marks in violation of rules and regulations, obtain module as a kind of mode, the 4th 340 can be used for based on safe period of time, the first time identified from the first identification method that same levels mark in violation of rules and regulations The second time identified with the second identification method, the violation for obtaining the second identification method identify timeliness.
As an implementation, the 4th acquisition module 340 can be used for first time and safety cutting for the second time The difference for scheming the sum of period, the violation as the second identification method identify timeliness.
Processing module 350, for carrying out default place to the video content according to the violation identification timeliness got Reason, to reduce the exposure time of the video content.
As a kind of mode, when getting identification timeliness in violation of rules and regulations, when processing module 350 can be used for judging identifying in violation of rules and regulations Whether effect is greater than given threshold, optionally, broadcasts or break processing if so, can so carry out breaking to video content;If it is not, that Warning processing or fine processing etc. can be carried out, to video content so as to reduce the video content for including violation information Exposure time.
A kind of device handling violation video content provided in this embodiment, by obtaining at the first time;Then is obtained Two times;The safe period of time at the first time between the second time is obtained again;It is then based on safe period of time, first time and second Time, the violation for obtaining the second identification method identify timeliness;Video content is carried out according to the violation identification timeliness got pre- If processing, to reduce the exposure time of video content.By obtaining the live streaming violation screenshot time and obtaining the straight of machine recognition The violation screenshot time is broadcast, by not including between removal live streaming violation screenshot time and the live streaming violation screenshot time of machine recognition The safe period of time of violation information obtains the timeliness of machine recognition violation, demonstrates the ability of the timeliness of machine recognition violation, then Person break to video content and broadcasts or break processing, can reduce the exposure time of violation information according to violation identification timeliness.
It is apparent to those skilled in the art that for convenience and simplicity of description, foregoing description device and The specific work process of module, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, the mutual coupling of shown or discussed module or direct coupling It closes or communication connection can be through some interfaces, the indirect coupling or communication connection of device or module can be electrical property, mechanical Or other forms.
It, can also be in addition, can integrate in a processing module in each functional module in each embodiment of the application It is that modules physically exist alone, can also be integrated in two or more modules in a module.Above-mentioned integrated mould Block both can take the form of hardware realization, can also be realized in the form of software function module.
Referring to Fig. 9, the method and device based on above-mentioned processing violation video content, the embodiment of the present application also provides A kind of electronic equipment 12 for the method that can execute aforementioned processing violation video content.Electronic equipment 12 include memory 122 with And one or more (one is only shown in the figure) processor 124 to intercouple, lead between memory 122 and processor 124 Believe connection.The program that can execute content in previous embodiment is stored in memory 122, and processor 124 can be held The program stored in line storage 122.
Wherein, processor 124 may include one or more processing core.Processor 124 utilizes various interfaces and route The various pieces in entire electronic equipment 12 are connected, by running or executing the instruction being stored in memory 122, program, generation Code collection or instruction set, and the data being stored in memory 122 are called, execute the various functions and processing of electronic equipment 12 Data.Optionally, processor 124 can use Digital Signal Processing (Digital Signal Processing, DSP), show Field programmable gate array (Field-Programmable Gate Array, FPGA), programmable logic array At least one of (Programmable Logic Array, PLA) example, in hardware is realized.Processor 124 can integrating central Processor (Central Processing Unit, CPU), image processor (Graphics Processing Unit, GPU) With the combination of one or more of modem etc..Wherein, the main processing operation system of CPU, user interface and apply journey Sequence etc.;GPU is for being responsible for the rendering and drafting of display content;Modem is for handling wireless communication.It is understood that Above-mentioned modem can not also be integrated into processor 124, be realized separately through one piece of communication chip.
Memory 122 may include random access memory (Random Access Memory, RAM), also may include read-only Memory (Read-Only Memory).Memory 122 can be used for store instruction, program, code, code set or instruction set.It deposits Reservoir 122 may include storing program area and storage data area, wherein the finger that storing program area can store for realizing operating system Enable, for realizing at least one function instruction (such as touch function, sound-playing function, image player function etc.), be used for Realize the instruction etc. of foregoing individual embodiments.Storage data area can also store the data that electronic equipment 12 is created in use (such as phone directory, audio, video data, chat record data) etc..
Referring to FIG. 10, it illustrates a kind of structural frames of computer readable storage medium provided by the embodiments of the present application Figure.Program code is stored in the computer readable storage medium 400, said program code can call execution above-mentioned by processor Method described in embodiment of the method.
Computer readable storage medium 400 can be such as flash memory, EEPROM (electrically erasable programmable read-only memory), The electronic memory of EPROM, hard disk or ROM etc.Optionally, computer readable storage medium 400 includes non-transient meter Calculation machine readable medium (non-transitory computer-readable storage medium).Computer-readable storage Medium 400 has the memory space for the program code 410 for executing any method and step in the above method.These program codes can With from reading or be written in one or more computer program product in this one or more computer program product. Program code 410 can for example be compressed in a suitable form.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is contained at least one embodiment or example of the application.In the present specification, schematic expression of the above terms are not It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office It can be combined in any suitable manner in one or more embodiment or examples.In addition, without conflicting with each other, the skill of this field Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples It closes and combines.
Finally, it should be noted that above embodiments are only to illustrate the technical solution of the application, rather than its limitations;Although The application is described in detail with reference to the foregoing embodiments, those skilled in the art are when understanding: it still can be with It modifies the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features;And These are modified or replaceed, do not drive corresponding technical solution essence be detached from each embodiment technical solution of the application spirit and Range.

Claims (11)

1. a kind of method for handling violation video content, which is characterized in that the described method includes:
Obtain at the first time, first time characterization with the first identification method identify from video content along video playing Progress includes the time of violation information at first, and first identification method is identification method trusty;
Obtained for the second time, second time representation with the second identification method identify from video content along video playing Progress includes the time of violation information at first, and second identification method is identification method to be detected;
The safe period of time between the first time and second time is obtained, the safe period of time characterizes the first time It does not include the period of violation information in video content between second time;
Based on the safe period of time, the first time and second time, the violation for obtaining second identification method is known Other timeliness;
Default processing is carried out to the video content according to the violation identification timeliness got, to reduce in the video The exposure time of appearance.
2. the method as described in claim 1, which is characterized in that the violation identification timeliness that the basis is got is to described Video content carries out presetting the step of handling
Judge whether the violation identification timeliness is greater than given threshold;
Processing is broadcast or broken if so, break to the video content.
3. the method as described in claim 1, which is characterized in that the step of acquisition first time includes:
First object unit screenshot is obtained, using the screenshot time of the first object unit screenshot as first time, described the One object element screenshot is to be broadcast with what the first identification method was identified from multiple unit screenshots that video content includes along video Degree of putting into includes the unit screenshot of violation information at first;
The step of second time of the acquisition includes:
The second object element screenshot is obtained, using the screenshot time of the second object element screenshot as the second time, described Two object element screenshots are to be broadcast with what the second identification method was identified from multiple unit screenshots that video content includes along video Degree of putting into includes the unit screenshot of violation information at first.
4. method as claimed in claim 3, which is characterized in that the acquisition first object unit screenshot, by first mesh Mark unit screenshot the screenshot time include: as the step of first time
Obtain the unit screenshot that the violation label of the first identification method is carried in multiple unit screenshots of video content;
The list that will occur earliest in the unit screenshot of the violation label for carrying the first identification method along video playing progress First screenshot is as first object unit screenshot, using the screenshot time of the first object unit screenshot as at the first time;
The second object element screenshot of the acquisition, using the screenshot time of the second object element screenshot as the step of the second time Suddenly include:
Obtain the unit screenshot that the violation label of the second identification method is carried in multiple unit screenshots of video content;
The list that will occur earliest in the unit screenshot of the violation label for carrying the second identification method along video playing progress First screenshot is as the second object element screenshot, using the screenshot time of the second object element screenshot as the second time.
5. method as claimed in claim 4, which is characterized in that the violation label includes that the violation of multiple grades marks, institute State the violation identification that second identification method is obtained based on the safe period of time, the first time and second time The step of timeliness includes:
Based on the safe period of time, the first time identified from first identification method that same levels mark in violation of rules and regulations The second time identified with second identification method, the violation for obtaining second identification method identify timeliness.
6. method as claimed in claim 3, which is characterized in that second identification method includes machine recognition mode, is obtained Second object element screenshot, the screenshot time using the second object element screenshot includes: as the step of the second time
Obtain identified from multiple unit screenshots that video content includes in a manner of machine recognition along video playing progress most It first include the unit screenshot of violation information;
Using the unit screenshot as the second target screenshot.
7. method as claimed in claim 3, which is characterized in that between the acquisition first time and second time Safe period of time the step of include:
The safe screenshot period between the first time and second time is obtained, described in the safe screenshot period characterization It does not at the first time include the unit screenshot of violation information in the video content between second time.
8. the method for claim 7, which is characterized in that described to be based on the safe screenshot period, the first time With second time, obtain second method violation identification timeliness the step of include:
By second time, difference with the sum of the first time and the safe screenshot period, as the second identification side The violation of formula identifies timeliness.
9. a kind of device for handling violation video content characterized by comprising
First obtains module, and for obtaining at the first time, the first time is characterized with the first identification method from video content What is identified includes the time of violation information along video playing progress at first, and first identification method is identification side trusty Formula;
Second obtain module, for obtain the second time, second time representation with the second identification method from video content What is identified includes the time of violation information along video playing progress at first, and second identification method is identification side to be detected Formula;
Third obtains module, for obtaining the safe period of time between the first time and second time, when described safe Segment table levy do not include in the video content between the first time and second time violation information period;
4th obtains module, for being based on the safe period of time, the first time and second time, obtains described second The violation of identification method identifies timeliness;
Processing module, for carrying out default processing to the video content according to the violation identification timeliness got, to Reduce the exposure time of the video content.
10. a kind of electronic equipment, which is characterized in that including memory;
One or more processors;
One or more programs are stored in the memory and are configured as being executed by one or more of processors, institute It states one or more programs and is configured to carry out any method of claim 1-8.
11. a kind of computer readable storage medium, which is characterized in that be stored with program generation in the computer readable storage medium Code, wherein perform claim requires any method of 1-8 when said program code is run by processor.
CN201811626292.4A 2018-12-28 2018-12-28 Method and device for processing illegal video content, electronic equipment and storage medium Active CN109831696B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811626292.4A CN109831696B (en) 2018-12-28 2018-12-28 Method and device for processing illegal video content, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811626292.4A CN109831696B (en) 2018-12-28 2018-12-28 Method and device for processing illegal video content, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109831696A true CN109831696A (en) 2019-05-31
CN109831696B CN109831696B (en) 2021-03-12

Family

ID=66860598

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811626292.4A Active CN109831696B (en) 2018-12-28 2018-12-28 Method and device for processing illegal video content, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109831696B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111866605A (en) * 2020-07-09 2020-10-30 北京齐尔布莱特科技有限公司 Video auditing method and server
CN112911321A (en) * 2021-01-22 2021-06-04 上海七牛信息技术有限公司 Real Time Clock (RTC) -based audio and video live broadcast control method and system

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103914530A (en) * 2014-03-31 2014-07-09 北京中科模识科技有限公司 Method and system for monitoring rule-violating advertisements in broadcasting and TV programs
CN106454492A (en) * 2016-10-12 2017-02-22 武汉斗鱼网络科技有限公司 Live pornographic content audit system and method based on delayed transmission
US20170142181A1 (en) * 2015-11-16 2017-05-18 Le Holdings (Beijing) Co., Ltd. Webcasting method, device and system
CN107609598A (en) * 2017-09-27 2018-01-19 武汉斗鱼网络科技有限公司 Image authentication model training method, device and readable storage medium storing program for executing
CN108154134A (en) * 2018-01-11 2018-06-12 天格科技(杭州)有限公司 Internet live streaming pornographic image detection method based on depth convolutional neural networks
CN108419091A (en) * 2018-03-02 2018-08-17 北京未来媒体科技股份有限公司 A kind of verifying video content method and device based on machine learning
US20180247305A1 (en) * 2007-12-19 2018-08-30 At&T Intellectual Property I, L.P. Systems and methods to identify target video content
CN108833962A (en) * 2018-05-25 2018-11-16 咪咕音乐有限公司 Display information processing method and device and storage medium
CN108900910A (en) * 2018-07-16 2018-11-27 上海艾策通讯科技股份有限公司 Monitor the method and system of IPTV service content legality

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180247305A1 (en) * 2007-12-19 2018-08-30 At&T Intellectual Property I, L.P. Systems and methods to identify target video content
CN103914530A (en) * 2014-03-31 2014-07-09 北京中科模识科技有限公司 Method and system for monitoring rule-violating advertisements in broadcasting and TV programs
US20170142181A1 (en) * 2015-11-16 2017-05-18 Le Holdings (Beijing) Co., Ltd. Webcasting method, device and system
CN106454492A (en) * 2016-10-12 2017-02-22 武汉斗鱼网络科技有限公司 Live pornographic content audit system and method based on delayed transmission
CN107609598A (en) * 2017-09-27 2018-01-19 武汉斗鱼网络科技有限公司 Image authentication model training method, device and readable storage medium storing program for executing
CN108154134A (en) * 2018-01-11 2018-06-12 天格科技(杭州)有限公司 Internet live streaming pornographic image detection method based on depth convolutional neural networks
CN108419091A (en) * 2018-03-02 2018-08-17 北京未来媒体科技股份有限公司 A kind of verifying video content method and device based on machine learning
CN108833962A (en) * 2018-05-25 2018-11-16 咪咕音乐有限公司 Display information processing method and device and storage medium
CN108900910A (en) * 2018-07-16 2018-11-27 上海艾策通讯科技股份有限公司 Monitor the method and system of IPTV service content legality

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
韩子寅: "《互联网视频监管系统影标识别算法的研究》", 《中国优秀硕士学位论文全文数据库》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111866605A (en) * 2020-07-09 2020-10-30 北京齐尔布莱特科技有限公司 Video auditing method and server
CN111866605B (en) * 2020-07-09 2022-10-18 北京齐尔布莱特科技有限公司 Video auditing method and server
CN112911321A (en) * 2021-01-22 2021-06-04 上海七牛信息技术有限公司 Real Time Clock (RTC) -based audio and video live broadcast control method and system

Also Published As

Publication number Publication date
CN109831696B (en) 2021-03-12

Similar Documents

Publication Publication Date Title
US8583509B1 (en) Method of and system for fact checking with a camera device
CN111640436B (en) Method for providing dynamic customer portraits of conversation objects to agents
CN110689438A (en) Enterprise financial risk scoring method and device, computer equipment and storage medium
CN113383362B (en) User identification method and related product
CN105869008A (en) Targeted delivery method and device of advertisement
CN107807941A (en) Information processing method and device
CN108399565A (en) Financial product recommendation apparatus, method and computer readable storage medium
CN109803152A (en) Violation checking method, device, electronic equipment and storage medium
CN109766472A (en) Signal auditing method, device, electronic equipment and storage medium
CN111008887B (en) Skill service bidding system
CN111476653A (en) Risk information identification, determination and model training method and device
US20200211061A1 (en) Method and system for targeted advertising in an over-the-top (ott) ecosystem
CN109831696A (en) Handle method, apparatus, electronic equipment and the storage medium of violation video content
CN112307464A (en) Fraud identification method and device and electronic equipment
CN113129012A (en) Payment data processing method, device, equipment and system
CN111695357A (en) Text labeling method and related product
CN114119030A (en) Fraud prevention method and device, electronic equipment and storage medium
KR101972660B1 (en) System and Method for Checking Fact
Angus et al. The Australian Ad Observatory technical and data report
CN113010785A (en) User recommendation method and device
King et al. Lying about lying on social media: a case study of the 2019 Canadian Elections
CN116362534A (en) Emergency management method and system for violations and risks of online customer service contents in railway field
CN114239561A (en) Supply relation obtaining method and device, storage medium and electronic equipment
CN111105263B (en) User identification method, device, electronic equipment and storage medium
CN113449506A (en) Data detection method, device and equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20190531

Assignee: GUANGZHOU CUBESILI INFORMATION TECHNOLOGY Co.,Ltd.

Assignor: GUANGZHOU HUADUO NETWORK TECHNOLOGY Co.,Ltd.

Contract record no.: X2021440000032

Denomination of invention: Method, device, electronic device and storage medium for processing illegal video content

License type: Common License

Record date: 20210125

GR01 Patent grant
GR01 Patent grant