CN110020253A - The method and its system of the harmful video of the identification of video copy based on content - Google Patents

The method and its system of the harmful video of the identification of video copy based on content Download PDF

Info

Publication number
CN110020253A
CN110020253A CN201711499889.2A CN201711499889A CN110020253A CN 110020253 A CN110020253 A CN 110020253A CN 201711499889 A CN201711499889 A CN 201711499889A CN 110020253 A CN110020253 A CN 110020253A
Authority
CN
China
Prior art keywords
video
weight factor
domain name
harmful
database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711499889.2A
Other languages
Chinese (zh)
Inventor
蔡昭权
胡松
胡辉
蔡映雪
陈伽
黄翰
梁椅辉
罗伟
黄思博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huizhou University
Original Assignee
Huizhou University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huizhou University filed Critical Huizhou University
Priority to CN201711499889.2A priority Critical patent/CN110020253A/en
Priority to PCT/CN2018/072241 priority patent/WO2019127657A1/en
Publication of CN110020253A publication Critical patent/CN110020253A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/70Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F16/78Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/783Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/70Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F16/78Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/783Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
    • G06F16/7834Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content using audio features
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • G06F16/9566URL specific, e.g. using aliases, detecting broken or misspelled links
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/40Scenes; Scene-specific elements in video content
    • G06V20/41Higher-level, semantic clustering, classification or understanding of video scenes, e.g. detection, labelling or Markovian modelling of sport events or news items
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L25/00Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00
    • G10L25/48Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00 specially adapted for particular use
    • G10L25/51Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00 specially adapted for particular use for comparison or discrimination
    • G10L25/57Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00 specially adapted for particular use for comparison or discrimination for processing of video signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4505Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
    • H04L61/4511Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL

Abstract

A kind of method and its system identifying harmful video, which comprises obtain the path URL of video, and then obtain domain name, IP address according to the path URL, and the first weight factor, the second weight factor are exported based on the relevant inquiring of the IP address and domain name;Also, video file when minimum image quality is obtained, and video copy detection is carried out to the video file of the minimum image quality in the harmful video database pre-established, third weight factor is exported according to the result of monitoring;Comprehensive first weight factor and the second weight factor and third weight factor, identify to whether the video belongs to harmful video.The disclosure can provide a kind of scheme for identifying harmful video using various modes in conjunction with the database that big data is made, use image processing means few as far as possible.

Description

The method and its system of the harmful video of the identification of video copy based on content
Technical field
The disclosure belongs to information security field, such as is related to a kind of method and its system for identifying harmful video.
Background technique
In information-intensive society, it is full of information flow, including but not limited to text, video, audio, picture etc. everywhere.Wherein, video File frequently includes auditory information and visual information, and ability to express is more comprehensive.However, with universal, the net of mobile Internet A large amount of harmful video contents are full of on network, the features such as due to vision intuitive, impact, harmfulness is more more than harmful text Originally, harmful picture and harmful audio etc., therefore these harmful videos are identified, and then be filtered, delete, eliminating danger Evil, is very necessary.
Identification for network nocuousness video, present technology mainly have and can be divided into two major classes, one is conventional method, It wherein again include two classes: (1) recognition methods based on single mode feature.Such methods are mainly to extract the visual signature of video, According to these features come structural classification device.Such as in violence video identification, common feature have video motion vector, color, Texture and shape etc..(2) recognition methods based on multi-modal Fusion Features, such methods are mainly to extract multiple moulds of video The feature of state is merged with structural classification device.Such as in violence video identification, other than video features, many methods are also Extract audio frequency characteristics, including short-time energy, burst of sound etc..Some methods also contemplate the text around network video, from this Continue to extract some features in a little texts for fusion recognition.Another kind is the method for deep learning: (1) CNN utilizes convolution mind Identifying processing is carried out to the harmful image of sensitivity in data bank through network, the internal feature of harmful objectionable video is obtained, utilizes Whether there is harmful information in the video frame that the harmful video frame practised judges.(2) RNN Recognition with Recurrent Neural Network directly will Harmful video information, frame of the study to harmful video, benefit are identified in video sequence input Recognition with Recurrent Neural Network in data bank Judge identify whether new video is harmful video with the harmful video frame learnt.(3) CNN+RNN is learnt using CNN Spatial-domain information in video in picture frame is finally combined the two using the time domain information in RNN identification video sequence Identification judgement is carried out, video is identified using the frame learnt.
Existing image processing means mainly have following two method: conventional method and deep learning method.It is wherein traditional Classical method word packet model, the model are made of four parts in method: (1) feature extraction phases (2) feature of bottom is compiled Code (3) feature convergence (4) is classified using suitable classifier.Deep learning model is the model of another image procossing, Mainly there is self-encoding encoder, is limited Boltzmann machine, deepness belief network, convolutional neural networks, Recognition with Recurrent Neural Network etc..With meter Calculation machine hardware is constantly progressive, database it is perfect, using traditional method calculating process compared to for deep learning more Simply, deep learning method can learn to more meaningful data, and constantly carry out parameter adjustment according to task, so for In terms of image procossing, deep learning model has more powerful feature representation ability.
Existing recognition methods is all insufficient on recognition efficiency, in the situation of big data and Artificial Intelligence Development Under, how harmful video is efficiently identified, with regard to becoming a problem in need of consideration.
Summary of the invention
Present disclose provides a kind of methods for identifying harmful video, comprising:
Step a) obtains the path URL of video, and then obtains domain name, the address IP according to the path URL, and based on described IP address, inquiry whether there is the address IP or same network segment IP address, and looking into according to IP address in first database It askes result and exports the first weight factor relevant to IP;
Step b) is based on domain name, whois inquiry is carried out in the second database, and defeated according to whois query result The second weight factor relevant to domain name out;
Step c), the online minimum image quality played in setting in the path URL and the video based on the video, Video file when minimum image quality is obtained, and utilizes the video copy detection technology based on content, is had what is pre-established Video copy detection is carried out to the video file of the minimum image quality in evil video database, and defeated according to the result of detection Third weight factor out;
Step d), comprehensive first weight factor and the second weight factor and third weight factor, to the video whether Belong to harmful video to be identified.
In addition, the disclosure further discloses a kind of system for identifying harmful video, comprising:
First weight factor generation module, is used for: obtain the path URL of video, and then according to the path URL obtain domain name, IP address, and it is based on the IP address, it is inquired with the presence or absence of the IP address or same network segment IP in first database Location, and the first weight factor relevant to IP is exported according to the query result of IP address;
Second weight factor generation module, is used for: it is based on domain name, whois inquiry is carried out in the second database, and The second weight factor relevant to domain name is exported according to whois query result;
Third weight factor generation module, is used for: the online broadcasting in the path URL and the video based on the video is set Minimum image quality in setting obtains video file when minimum image quality, and utilizes the video copy detection based on content Technology carries out video copy inspection to the video file of the minimum image quality in the harmful video database pre-established It surveys, and third weight factor is exported according to the result of detection;
Identification module, for integrating the first weight factor and the second weight factor and third weight factor, to the view Whether frequency, which belongs to harmful video, is identified.
By the method and its system, the disclosure can be in conjunction with the database that big data is made, use figure few as far as possible As processing means, a kind of more efficient scheme for identifying harmful video is provided.
Detailed description of the invention
Fig. 1 is the schematic diagram of one embodiment the method in the disclosure;
Fig. 2 is the schematic diagram of system described in one embodiment in the disclosure.
Specific embodiment
In order to make those skilled in the art understand that technical solution disclosed by the disclosure, below in conjunction with embodiment and related The technical solution of each embodiment is described in attached drawing, and described embodiment is a part of this disclosure embodiment, without It is whole embodiments.Term " first " used by the disclosure, " second " etc. rather than are used for for distinguishing different objects Particular order is described.In addition, " comprising " and " having " and their any deformation, it is intended that covering and non-exclusive packet Contain.Such as contain the process of a series of steps or units or method or system or product or equipment are not limited to arrange Out the step of or unit, but optionally further include the steps that not listing or unit, or further includes optionally for these mistakes Other intrinsic step or units of journey, method, system, product or equipment.
Referenced herein " embodiment " is it is meant that a particular feature, structure, or characteristic described can wrap in conjunction with the embodiments It is contained at least one embodiment of the disclosure.Each position in the description occur the phrase might not each mean it is identical Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.It will be appreciated by those skilled in the art that , embodiment described herein can combine with other embodiments.
It is a kind of process signal of the method for identification nocuousness video that one embodiment provides in the disclosure referring to Fig. 1, Fig. 1 Figure.As shown in the figure, which comprises
Step S100 obtains the path URL of video, and then obtains domain name, IP address according to the path URL, and be based on institute IP address is stated, inquiry whether there is the IP address or same network segment IP address in first database, and according to IP address Query result exports the first weight factor relevant to IP;
It is understood that first database maintenance is known, issued the IP address inventory of harmful video.
For example, in the case of IP address is 192.168.10.3:
If recording the IP address in first database, the first weight factor property of can be exemplified is 1.0;
If the IP address recorded in database only has 192.168.10.4,192.168.10.3 then to be cherished by moderate Standby address suspected of the video affiliated web site or the address replaced recently, the first weight factor property of can be exemplified are 0.6;
If the IP address recorded in database has 192.168.10.4 and 192.168.10.5, or even describes 192.168.10.X all IP address of network segment, then 192.168.10.3 is then the video affiliated web site by strong suspicion Standby address or the address replaced recently, the first weight factor property of can be exemplified are 0.9;
If including multiple 192.168.X.X network segments in the IP address recorded in database, without 192.168.10.X Network segment, then 192.168.10.3 is then the address of harmful video affiliated web site by careful suspection, the first weight factor can be shown Example property is 0.4.
Step S200 is based on domain name, whois inquiry is carried out in the second database, and according to whois query result Export the second weight factor relevant to domain name;
It is understood that the second database maintenance is known, issued the domain name inventory of harmful video.
Whois inquiry is to investigate domain name registration people with nocuousness video and be associated with situation.Second database can be safeguarded Following information: largely issued in domain name, internet the domain name registration people of harmful video information and corresponding harmful video Mark.
For example, in the case of domain name is www.a.com:
If recording the mark and its whois information of the domain name addresses, corresponding harmful video in the second database, that The second weight factor property of can be exemplified is 1.0;
If not recording the mark of any harmful video of above-mentioned domain name www.a.com in the second database, but energy Enough inquire the domain name of other websites of the domain name registration people of the domain name and the domain name registration people registration of the domain name, and second Database includes the mark that harmful video is largely issued in other described websites on the internet;, even when in the second database Do not record the mark of any harmful video of above-mentioned domain name www.a.com, the corresponding website of the www.a.com domain name still by Strong suspicion is the source of harmful video, and the second weight factor property of can be exemplified is 0.9;
If not recording the mark of any harmful video of above-mentioned domain name www.a.com in the second database, but energy The domain name for other websites that the domain name registration people of the domain name registration people and the domain name that enough inquire the domain name register, however the Two databases do not include any mark about other website orientation nocuousness videos, and second weight factor can be shown Example property is 0;
It is readily appreciated that, if not recording the mark of any harmful video of above-mentioned domain name www.a.com in the second database Know, the domain name of other websites of the domain name registration people registration less than the domain name is also inquired, then second weight factor can also With it is exemplary be 0.
Step S300, the online minimum picture matter played in setting in the path URL and the video based on the video Amount, obtains video file when minimum image quality, and the video copy detection based on content, in preset harmful video data Video copy detection is carried out to the video file of the minimum image quality in library, and third weight is exported according to the result of monitoring The factor;
Step S300 is the video copy detection based on content, and exported by the result of monitoring third weight because Son.It is understood that preset nocuousness video database includes conventional harmful video or other decadent contents etc., and described Preset nocuousness video database can be established in conjunction with big data technology, and can be thus continually updated.If the minimum picture The video file when quality of face is monitored result identification are as follows: the doubtful copy of certain video in preset harmful video database Version, then third weight factor can be embodied.It is understood that third weight factor may when meeting corresponding threshold condition It is 1.0, it is also possible to 0.8 or 0.4, depending on specific threshold condition.
In addition, it is necessary to, it is emphasized that for computing resource and time cost needed for reducing the present embodiment, to image file It is the online minimum picture played in setting in the path URL and the video based on the video when being made whether harmful identification Face quality obtains video file when minimum image quality.Obviously, inventor takes full advantage of in current video playing setting Video content corresponding to minimum image quality carries out efficiently video copy detection.But it is not intended that it must pass through It plays and is arranged to obtain minimum picture or low image quality picture, because can also be obtained corresponding to low image quality by various samplings Video content simultaneously further implements video copy detection.
It is understood that the step S300, both can carry out video processing in conjunction with traditional method, and can also combine depth Learning model carries out video processing, and then identifies to harmful video.
Step S400, comprehensive first weight factor and the second weight factor and third weight factor are to the video It is no to belong to harmful video and identified.
Illustratively, if the first weight factor is x, the second weight factor is y, and third weight factor is z, wherein 0≤x≤ 1,0≤y≤1,0≤z≤1, can according to the following formula in summary weight factor calculate video harmful coefficient W:
W=a × x+b × y+c × z, wherein a+b+c=1, a, b, c then respectively indicate the weight of each weight factor.
For example, a=b=c=1/3;
It, specifically can be according to each weight factor and the actual conditions of identification harmful content more for example, a, b, c are unequal And it adjusts.
It is understood that W is closer to 1, the probability that associated video belongs to harmful video is bigger.
The above formula for calculating W belongs to linear formula, however when practical application, it is also possible to use non-linear formula.
Further, either linear formula or non-linear formula, it is contemplated that being determined by training or be fitted Correlation formula and its parameter.
To sum up, for above-described embodiment, only step S300 has carried out image procossing, and remaining step is then separately to ward off footpath Diameter is utilized relevant inquiring, obtains relevant weight factor.Then comprehensive (alternatively referred to as merging) the multiple weight factors of step S400 Carry out the identification of harmful video.Those skilled in the art know, are handled for each frame image of video, identify right and wrong Normal elapsed time cost, and inquire and then in contrast more save time cost.It is clear that above-described embodiment proposes one The rich efficient method for identifying harmful video of kind.In addition, above-described embodiment obviously can be further combined with big data and/or people Work is intelligently established, updates the first database, the second database and other databases.
In another embodiment, second database is third party database.
For example, in terms of the list of websites of harmful video of numerous websites and third party's maintenance of progress whois inquiry Database.
In another embodiment, for being determined as harmful video after identification, for network address (such as the forum in its source Or webpage), it collects the IP address information of the publisher for the harmful video recorded in the network address and updates first database. This is because harmful video generally will form some sticky users, these users some can participate in propagating harmful video and Most IP address can be relatively fixed, if address correlation itself describes the IP address letter of the publisher of harmful video Breath, the disclosure then update aforementioned first database by collecting its IP address information.
In another embodiment, step S200 further include:
Further, the safety of domain name is inquired in third party's domain name safe list so as to the output safety factor, And second weight factor relevant to domain name is modified by the factor of safety.
Such as virustotal.com this third party's domain name safe screen looks into website.It is understood that if third party's information In think associated dns name include virus or wooden horse, then should improve the second weight factor, it is uneasy to have its source in related web site Entirely.
It is understood that the embodiment is laid particular emphasis on from the second weight factor of network security angle modification, prevent user from meeting with By unknown losses.This is because privacy and proprietary of the network security concerning user, if the related web site of harmful video exists Network Security Vulnerabilities, then also bringing the harm of privacy leakage or property loss to user other than the harm of harmful video.
In another embodiment, in step S300 obtain minimum image quality when video file, including obtain view The video content of frequency file run-out.
For the embodiment, it means that obtain video content when, in order to reduce to the greatest extent acquisition video content it is big It is small, the preferential video content for selecting video file run-out.This is because run-out is often plot for harmful video Climax parts, and the disseminator of these harmful videos generally less may be used either for favourite hobby or other bad motivation The climax parts of run-out can be deleted.That is, for the present embodiment, which greatly reduce the work of video copy detection Amount.You need to add is that the embodiment is preferred embodiment, it is not meant to that video content 1/3 cannot be broadcast before video Period selection corresponding contents are put, or choose corresponding contents from intermediate 1/3 play time section.
Preferably, the video content of run-out can be the corresponding contents chosen in the 1/3 play time section of end of video.More Good, the video content of run-out can be the content in end a few minutes of video, such as 3 minutes, 5 minutes, 10 minutes;No matter It is a few minutes, naturally corresponding interior preferably in 1/3 play time section of end if 1/3 play time length of end is smaller Hold.
In another embodiment, in step S300
Video file when minimum image quality is obtained, further includes as follows:
Step c1): extract the audio in video;
Step c2): it whether include harmful content in identification audio, if so, then obtaining institute according to the beginning and ending time of audio State the video content in the beginning and ending time.
For the embodiment, if recognizing in audio includes the harmful content, its time is positioned, from audio Beginning and ending time be foundation, obtain the beginning and ending time in video content.It can more targetedly find so related harmful Picture.
As it was noted above, if in conjunction with big data technology, the disclosure being capable of the multiple dimensions of fruitful combination, Duo Zhongmo Formula quickly identifies harmful video in conjunction with IP information, domain-name information, image information, audio-frequency information.
Further, above-described embodiment can be implemented in router side or network provider side, filter in advance Associated video.
Corresponding with method, referring to fig. 2, the disclosure discloses in another embodiment a kind of identifies harmful video System, comprising:
First weight factor generation module, is used for: obtain the path URL of video, and then according to the path URL obtain domain name, IP address, and it is based on the IP address, it is inquired with the presence or absence of the IP address or same network segment IP in first database Location, and the first weight factor relevant to IP is exported according to the query result of IP address;
Second weight factor generation module, is used for: it is based on domain name, whois inquiry is carried out in the second database, and The second weight factor relevant to domain name is exported according to whois query result;
Third weight factor generation module, is used for: the online broadcasting in the path URL and the video based on the video is set Minimum image quality in setting obtains video file when minimum image quality, and utilizes the video copy detection based on content Technology carries out video copy inspection to the video file of the minimum image quality in the harmful video database pre-established It surveys, and third weight factor is exported according to the result of detection;
Identification module, for integrating the first weight factor and the second weight factor and third weight factor, to the view Whether frequency, which belongs to harmful video, is identified.
It is similar with the embodiment of each method above,
Preferably, second database is third party database.
It is furthermore preferred that the second weight factor generation module further include:
Amending unit is used for: it is further, inquired in third party's domain name safe list the safety of domain name so as to The output safety factor, and second weight factor relevant to domain name is modified by the factor of safety.
It is furthermore preferred that in the third weight factor generation module obtain minimum image quality when video file, packet Include the video content for obtaining video file run-out.
It is furthermore preferred that also by as when lower unit obtains minimum image quality in the third weight factor generation module Video file:
Audio extraction unit, for extracting the audio in video;
Audio identification unit, for identification in audio whether include harmful content, if so, then according to the start-stop of audio when Between obtain video content in the beginning and ending time.
The disclosure discloses a kind of system for identifying harmful video in another embodiment, comprising:
Processor and memory, are stored with executable instruction in the memory, the processor execute these instructions with Execute following operation:
Step a) obtains the path URL of video, and then obtains domain name, the address IP according to the path URL, and based on described IP address, inquiry whether there is the address IP or same network segment IP address, and looking into according to IP address in first database It askes result and exports the first weight factor relevant to IP;
Step b) is based on domain name, whois inquiry is carried out in the second database, and defeated according to whois query result The second weight factor relevant to domain name out;
Step c), the online minimum image quality played in setting in the path URL and the video based on the video, Video file when minimum image quality is obtained, and utilizes the video copy detection technology based on content, is had what is pre-established Video copy detection is carried out to the video file of the minimum image quality in evil video database, and defeated according to the result of detection Third weight factor out;
Step d), comprehensive first weight factor and the second weight factor and third weight factor, to the video whether Belong to harmful video to be identified.
The disclosure further discloses a kind of computer storage medium in another embodiment, is stored with executable instruction, institute Instruction is stated for executing the following method for identifying harmful video:
Step a) obtains the path URL of video, and then obtains domain name, the address IP according to the path URL, and based on described IP address, inquiry whether there is the address IP or same network segment IP address, and looking into according to IP address in first database It askes result and exports the first weight factor relevant to IP;
Step b) is based on domain name, whois inquiry is carried out in the second database, and defeated according to whois query result The second weight factor relevant to domain name out;
Step c), the online minimum image quality played in setting in the path URL and the video based on the video, Video file when minimum image quality is obtained, and utilizes the video copy detection technology based on content, is had what is pre-established Video copy detection is carried out to the video file of the minimum image quality in evil video database, and defeated according to the result of detection Third weight factor out;
Step d), comprehensive first weight factor and the second weight factor and third weight factor, to the video whether Belong to harmful video to be identified.
It may include: at least one processor (such as CPU) for above system, at least one sensor (such as plus Speedometer, gyroscope, GPS module or other locating modules), at least one processor, at least one communication bus, at least one Microphone, wherein communication bus is for realizing the connection communication between various components, and microphone is for acquiring audio input.Institute Stating equipment can also include at least one receiver, at least one transmitter, wherein receiver and transmitter can be wired hair Sending end mouth is also possible to wireless device (for example including antenna assembly), for carrying out signaling or data with other node devices Transmission.The memory can be high speed RAM memory, be also possible to non-labile memory (Non-volatile Memory), a for example, at least magnetic disk storage.Memory optionally can be at least one and be located remotely from aforementioned processor Storage device.Batch processing code is stored in memory, and the processor can be called and be stored in memory by communication bus Code to execute relevant function.
Embodiment of the disclosure also provides a kind of computer storage medium, wherein the computer storage medium can store journey Sequence, the program include the part or complete for any method for identifying harmful video recorded in above method embodiment when executing Portion's step.
Step in embodiment of the disclosure method can be sequentially adjusted, merged and deleted according to actual needs.
Module and unit in embodiment of the disclosure system can be combined, divided and deleted according to actual needs. It should be noted that for the various method embodiments described above, for simple description, therefore, it is stated as a series of action groups It closes, but those skilled in the art should understand that, the present invention is not limited by the sequence of acts described, because according to this hair Bright, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art should also know that, specification Described in embodiment belong to preferred embodiment, related movement, module, unit not necessarily present invention institute are necessary 's.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment Point, reference can be made to the related descriptions of other embodiments.
In several embodiments provided by the disclosure, it should be understood that disclosed system, it can be by another way It realizes.For example, embodiments described above is only illustrative, such as the division of the unit, only a kind of logic function It can divide, there may be another division manner in actual implementation, such as multiple units or components can be combined or be can integrate To another system, or some features can be ignored or not executed.Another point, each unit or the mutual coupling of component or Direct-coupling or communication connection can be through some interfaces, and the indirect coupling or communication connection of device or unit can be electricity Property or other form.
The unit as illustrated by the separation member may or may not be physically separated, and can both be located at One place, or may be distributed over multiple network units.Can select according to the actual needs part therein or Whole units achieve the purpose of the solution of this embodiment.
It, can also be in addition, each functional unit in each embodiment of the disclosure can integrate in one processing unit It is each unit individualism, can also be integrated in one unit with two or more units.Above-mentioned integrated unit was both It can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, the technical solution of the disclosure is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can be smart phone, personal digital assistant, wearable device, laptop, tablet computer) executes each of the disclosure The all or part of the steps of a embodiment the method.And storage medium above-mentioned include: USB flash disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), mobile hard disk, magnetic disk or The various media that can store program code such as CD.
The above, above embodiments are only to illustrate the technical solution of the disclosure, rather than its limitations;Although referring to before Embodiment is stated the disclosure is described in detail, it should be understood by those skilled in the art that: it still can be to aforementioned each reality Technical solution documented by example is applied to modify or equivalent replacement of some of the technical features;And these modification or Person's replacement, the range for the presently disclosed embodiments technical solution that it does not separate the essence of the corresponding technical solution.

Claims (10)

1. a kind of method for identifying harmful video, comprising:
Step a) obtains the path URL of video, and then obtains domain name, IP address according to the path URL, and based on the IP Location, inquiry whether there is the IP address or same network segment IP address in first database, and according to the inquiry knot of IP address Fruit exports the first weight factor relevant to IP;
Step b), be based on domain name, in the second database carry out whois inquiry, and according to whois query result output with Relevant second weight factor of domain name;
Step c), the online minimum image quality played in setting in the path URL and the video based on the video, obtains Video file when minimum image quality, and the video copy detection technology based on content is utilized, in the nocuousness view pre-established Video copy detection carried out to the video file of the minimum image quality in frequency database, and according to the result of detection output the Three weight factors;
Whether step d), comprehensive first weight factor and the second weight factor and third weight factor, belong to the video Harmful video is identified.
2. according to the method described in claim 1, wherein, it is preferred that second database is third party database.
3. according to the method described in claim 1, wherein, step b) further include:
Further, the safety of domain name is inquired in third party's domain name safe list so as to the output safety factor, and led to The factor of safety is crossed to be modified second weight factor relevant to domain name.
4. according to the method described in claim 1, wherein, video file when obtaining minimum image quality in step c), packet Include the video content for obtaining video file run-out.
5. according to the method described in claim 1, wherein, video file when obtaining minimum image quality in step c), also Include the following:
Step c1): extract the audio in video;
Step c2): it whether include harmful content in identification audio, if so, then obtaining described rise according to the beginning and ending time of audio The only video content in the time.
6. a kind of system for identifying harmful video, comprising:
First weight factor generation module, is used for: obtaining the path URL of video, and then with obtaining domain name, IP according to the path URL Location, and it is based on the IP address, inquiry whether there is the IP address or same network segment IP address in first database, and The first weight factor relevant to IP is exported according to the query result of IP address;
Second weight factor generation module, is used for: it is based on domain name, the progress whois inquiry in the second database, and according to Whois query result exports the second weight factor relevant to domain name;
Third weight factor generation module, is used for: in the online broadcasting setting in the path URL and the video based on the video Minimum image quality, obtain video file when minimum image quality, and utilize the video copy detection technology based on content, Video copy detection, and root are carried out to the video file of the minimum image quality in the harmful video database pre-established Third weight factor is exported according to the result of detection;
Identification module is to the video for integrating the first weight factor and the second weight factor and third weight factor It is no to belong to harmful video and identified.
7. system according to claim 6, wherein preferred, second database is third party database.
8. system according to claim 6, wherein the second weight factor generation module further include:
Amending unit is used for: it is further, the safety of domain name is inquired in third party's domain name safe list to export Factor of safety, and second weight factor relevant to domain name is modified by the factor of safety.
9. system according to claim 6, wherein the minimum picture matter of acquisition in the third weight factor generation module Video file when amount, the video content including obtaining video file run-out.
10. system according to claim 6, wherein also by such as lower unit in the third weight factor generation module Obtain video file when minimum image quality:
Audio extraction unit, for extracting the audio in video;
Whether audio identification unit includes for identification harmful content in audio, if so, then being obtained according to the beginning and ending time of audio Take the video content in the beginning and ending time.
CN201711499889.2A 2017-12-30 2017-12-30 The method and its system of the harmful video of the identification of video copy based on content Pending CN110020253A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201711499889.2A CN110020253A (en) 2017-12-30 2017-12-30 The method and its system of the harmful video of the identification of video copy based on content
PCT/CN2018/072241 WO2019127657A1 (en) 2017-12-30 2018-01-11 Method and system for identifying harmful video through content-based video copy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711499889.2A CN110020253A (en) 2017-12-30 2017-12-30 The method and its system of the harmful video of the identification of video copy based on content

Publications (1)

Publication Number Publication Date
CN110020253A true CN110020253A (en) 2019-07-16

Family

ID=67064961

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711499889.2A Pending CN110020253A (en) 2017-12-30 2017-12-30 The method and its system of the harmful video of the identification of video copy based on content

Country Status (2)

Country Link
CN (1) CN110020253A (en)
WO (1) WO2019127657A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101853377A (en) * 2010-05-13 2010-10-06 复旦大学 Method for identifying content of digital video
CN104615760A (en) * 2015-02-13 2015-05-13 北京瑞星信息技术有限公司 Phishing website recognizing method and phishing website recognizing system
CN106055574A (en) * 2016-05-19 2016-10-26 微梦创科网络科技(中国)有限公司 Method and device for recognizing illegal URL
CN106354800A (en) * 2016-08-26 2017-01-25 中国互联网络信息中心 Undesirable website detection method based on multi-dimensional feature

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100787972B1 (en) * 2006-08-11 2007-12-24 주식회사 에스원 System, apparatus and method for informing emergency based on voice/video
KR101027617B1 (en) * 2009-05-20 2011-04-11 주식회사 엔에스에이치씨 System and method for protecting pornograph
CN102567101A (en) * 2012-01-12 2012-07-11 郑州金惠计算机系统工程有限公司 Multi-process management system for recognizing and monitoring pornographic images of WAP (wireless application protocol) mobile phone media
CN103634317A (en) * 2013-11-28 2014-03-12 北京奇虎科技有限公司 Method and system of performing safety appraisal on malicious web site information on basis of cloud safety
CN103838835B (en) * 2014-02-25 2017-11-21 中国科学院自动化研究所 A kind of network sensitive video detection method
CN104268284A (en) * 2014-10-21 2015-01-07 合肥星服信息科技有限责任公司 Web browse filtering softdog device special for juveniles
CN104766014B (en) * 2015-04-30 2017-12-01 安一恒通(北京)科技有限公司 For detecting the method and system of malice network address

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101853377A (en) * 2010-05-13 2010-10-06 复旦大学 Method for identifying content of digital video
CN104615760A (en) * 2015-02-13 2015-05-13 北京瑞星信息技术有限公司 Phishing website recognizing method and phishing website recognizing system
CN106055574A (en) * 2016-05-19 2016-10-26 微梦创科网络科技(中国)有限公司 Method and device for recognizing illegal URL
CN106354800A (en) * 2016-08-26 2017-01-25 中国互联网络信息中心 Undesirable website detection method based on multi-dimensional feature

Also Published As

Publication number Publication date
WO2019127657A1 (en) 2019-07-04

Similar Documents

Publication Publication Date Title
US20200349385A1 (en) Multimedia resource matching method and apparatus, storage medium, and electronic apparatus
CN106789888A (en) A kind of fishing webpage detection method of multiple features fusion
CN106716964A (en) Privacy-preserving cookies for personalization without user tracking
CN104899306B (en) Information processing method, information display method and device
CN115357748A (en) Head-mounted device
CN108829715A (en) For detecting the method, equipment and computer readable storage medium of abnormal data
CN103164698A (en) Method and device of generating fingerprint database and method and device of fingerprint matching of text to be tested
CN108959323A (en) Video classification methods and device
Basavaraju et al. Supervised learning techniques in mobile device apps for Androids
CN108763313A (en) On-line training method, server and the storage medium of model
CN104731937A (en) User behavior data processing method and device
CN110019892A (en) A kind of method and its system identifying harmful picture based on User ID
CN110020256A (en) The method and system of the harmful video of identification based on User ID and trailer content
CN110020252A (en) The method and its system of the harmful video of identification based on trailer content
CN110020254A (en) The method and system of the harmful video of identification based on User IP and video copy
Vidya et al. Web mining-concepts and application
CN110019946A (en) A kind of method and its system identifying harmful video
CN110020253A (en) The method and its system of the harmful video of the identification of video copy based on content
CN109993036A (en) A kind of method and its system identifying harmful video based on User ID
CN112231700B (en) Behavior recognition method and apparatus, storage medium, and electronic device
CN109271706A (en) Hair style generation method and device
CN110020257A (en) The method and system of the harmful video of identification based on User ID and video copy
CN110020251A (en) The method and system of the harmful video of identification based on User IP and trailer content
CN110020255A (en) A kind of method and its system identifying harmful video based on User IP
CN104484417B (en) A kind of generation method and device of collection information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination