CN110427781A - Tamper resistant method, terminal device and the storage medium of media data - Google Patents

Tamper resistant method, terminal device and the storage medium of media data Download PDF

Info

Publication number
CN110427781A
CN110427781A CN201910642832.6A CN201910642832A CN110427781A CN 110427781 A CN110427781 A CN 110427781A CN 201910642832 A CN201910642832 A CN 201910642832A CN 110427781 A CN110427781 A CN 110427781A
Authority
CN
China
Prior art keywords
frame
data
media data
tamper resistant
resistant method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910642832.6A
Other languages
Chinese (zh)
Inventor
吕超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Dahua Technology Co Ltd
Original Assignee
Zhejiang Dahua Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Dahua Technology Co Ltd filed Critical Zhejiang Dahua Technology Co Ltd
Priority to CN201910642832.6A priority Critical patent/CN110427781A/en
Publication of CN110427781A publication Critical patent/CN110427781A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing For Digital Recording And Reproducing (AREA)

Abstract

This application discloses a kind of tamper resistant method of media data, terminal device and storage mediums.The tamper resistant method includes the transmission information for monitoring media data, to obtain monitoring result;According to monitoring result from media data fetching portion data frame;Partial data frame is digitally signed using hash algorithm.In this way, the flexibility ratio and false distinguishing efficiency of media data false distinguishing be can be improved.

Description

Tamper resistant method, terminal device and the storage medium of media data
Technical field
This application involves multi-media safety technical fields, tamper resistant method, terminal more particularly to a kind of media data Equipment and storage medium.
Background technique
With the continuous development of computer technology, more and more easier is had become to distorting for media data.Therefore, media number According in transmission process, it is often necessary to real-time perfoming false distinguishing.For example media data is forwarded by third-party agent service or net Network environment is complicated, and there are when network attack hidden danger, need the real-time authentication detection technology of high-performance to carry out false distinguishing processing to media data.
Present inventor has found that current media data authentication detection technology mainly has mean value Kazakhstan in long-term R&D process Uncommon repeating frame detection and the technologies such as anti-tamper, but these technologies are that the processing of full dose Hash abstract is carried out to media data, The data volume of Hash is too big, is affected to the performance of real time media data, and any information of media data can not all be changed. Therefore, existing media data authentication detection technology is difficult to carry out false distinguishing adjustment, and flexibility ratio is lower, and false distinguishing efficiency is lower.
Summary of the invention
How the application is mainly solving the technical problems that improve the flexibility ratio and false distinguishing efficiency of media data false distinguishing.
In order to solve the above technical problems, the technical solution that the application uses is: providing a kind of the anti-of media data and usurp Change method, which includes: the transmission information for monitoring media data, to obtain monitoring result;According to monitoring result from Fetching portion data frame in media data;Partial data frame is digitally signed using hash algorithm.
In one embodiment, it is above-mentioned using hash algorithm partial data frame is digitally signed the step of it Afterwards, above-mentioned tamper resistant method further comprises: media data and digital signature are pushed to receiving end.
In one embodiment, the above-mentioned fetching portion data frame from media data according to monitoring result the step of it Before, above-mentioned tamper resistant method further comprises: pushing media data to receiving end;It is above-mentioned according to monitoring result from media data The step of fetching portion data frame includes: to be obtained from media data during the push of media data according to monitoring result Partial data frame;After above-mentioned the step of being digitally signed using hash algorithm to partial data frame, above-mentioned anti-tamper side Method further comprises: pushing digital signature to receiving end.
In one embodiment, above-mentioned to be wrapped the step of fetching portion data frame from media data according to monitoring result It includes: according to the frame number of monitoring result fetching portion data frame;According to frame number from media data fetching portion data frame.
In one embodiment, the step of transmission information of above-mentioned monitoring media data includes: that monitoring media data passes The data transmission quality of transmission link and/or the loading condition of receiving end;Wherein, data transmission quality includes at least data transmission speed Rate or the bit error rate.
In one embodiment, above-mentioned partial data frame includes key frame and non-key frame, and non-key frame includes prediction Frame and/or ancillary frame, if above-mentioned includes: data transmission the step of fetching portion data frame from media data according to monitoring result Rate is less than scheduled rate, then sets the first frame number for the frame number for predicting frame and/or ancillary frame;If message transmission rate is greater than Or be equal to scheduled rate, then the second frame number is set by the frame number for predicting frame and/or ancillary frame, wherein the first frame number is less than the Two frame numbers;The fetching portion data frame from media data according to the first frame number or the second frame number.
In one embodiment, partial data frame includes key frame and non-key frame, and the non-key frame includes prediction Frame and/or ancillary frame, above-mentioned the step of being digitally signed using hash algorithm to partial data frame includes: from partial data frame Middle acquisition key frame, and Hash operation is carried out to key frame, to generate the first hash value;The prediction is obtained from the first data Frame and/or the ancillary frame, and Hash operation is carried out to prediction frame and/or ancillary frame, to generate the second hash value;According to first Hash value and the second hash value generate digital signature.
In one embodiment, above-mentioned anti-before the step of media data and digital signature are pushed to receiving end Tampering methods further comprise: media data and digital signature are carried out mutual decoupling processing.
In order to solve the above technical problems, the technical solution that the application uses is: providing a kind of terminal device, the terminal Equipment includes that processor and the memory with processor coupling, processor are used to monitor the transmission information of media data, to obtain Monitoring result, and fetching portion data frame, processor are used for using hash algorithm to portion from media data according to monitoring result Divided data frame is digitally signed.
In order to solve the above technical problems, the technical solution that the application uses is: providing a kind of storage medium, deposit thereon Program data is contained, program data is performed the tamper resistant method for realizing above-mentioned media data.
The beneficial effect of the application is: being different from the prior art, the tamper resistant method packet of the embodiment of the present application media data It includes: the transmission information of media data is monitored, to obtain monitoring result;According to monitoring result from media data fetching portion data Frame;Partial data frame is digitally signed using hash algorithm.In this way, the embodiment of the present application can be according to media The transmission information acquiring portion data frame of data, and the partial data frame is digitally signed.Therefore, the embodiment of the present application energy It is enough that media data is digitally signed according to the transmission information of media data, it can be adjusted flexibly what needs were digitally signed Data frame is digitally signed without all data frames to media data, can be improved media data false distinguishing flexibility ratio and False distinguishing efficiency.
Detailed description of the invention
Fig. 1 is the flow diagram of the tamper resistant method first embodiment of the application media data;
Fig. 2 is an idiographic flow schematic diagram of step S102 in the tamper resistant method of Fig. 1 embodiment media data;
Fig. 3 is another idiographic flow schematic diagram of step S102 in the tamper resistant method of Fig. 1 embodiment media data;
Fig. 4 is the idiographic flow schematic diagram of step S103 in the tamper resistant method of Fig. 1 embodiment media data;
Fig. 5 is the flow diagram of the tamper resistant method second embodiment of the application media data;
Fig. 6 is the flow diagram of the tamper resistant method 3rd embodiment of the application media data;
Fig. 7 is the structural schematic diagram of one embodiment of the application terminal device;
Fig. 8 is the structural schematic diagram of one embodiment of the application storage medium.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment belongs to the range of the application protection.
Media data authentication detection technology mainly has mean value Hash repeating frame to detect and the technologies such as anti-tamper.With multimedia skill The development of art not only contains simple audio-video frequency content, i.e. key frame information in media data, and further comprises structure Change each middle auxiliary informations such as data, environmental information, i.e. auxiliary frame information;The prior art is to carry out full dose Hash to media data Abstract processing, causes any information of media data that can not all change, but in the fields such as security protection, the wall solution party in security protection video In case, video data is in web camera (Internet Protocol Camera, IPC), network hard disk video recorder When flowing in (Network Video Recorder, NVR), decoder and office, provinces and cities net, often need to modify auxiliary frame information, And key frame information requirement is anti-tamper.If handled according to existing full dose Hash method video data, nothing will lead to Method change auxiliary frame information, and the data volume of Hash is too big, is affected to the performance of real time video data, causes to aggravate video The delay of upper wall.
The application proposes a kind of tamper resistant method of media data first, as shown in Figure 1, Fig. 1 is the application media data Tamper resistant method first embodiment flow diagram.The tamper resistant method of the present embodiment media data the following steps are included:
Step S101: the transmission information of media data is monitored, to obtain monitoring result.
The media data of the present embodiment includes video data.In other embodiments, media data can also include text Information or audio-frequency information etc..
The transmission information of the transmitting terminal monitoring media data of media data, and obtain the monitoring result of transmission information.Wherein, Transport packet includes the data transmission quality of media data transmission link, for example, the bit error rate perhaps transmission rate etc. or including The information of receiving end, for example, the loading condition of receiving end or the user type of receiving end etc..
Step S102: according to monitoring result from media data fetching portion data frame.
Transmitting terminal fetching portion data frame from video data according to above-mentioned monitoring result.
The video sequence that the present embodiment video data is made of multiple data frames, these data frames include key frame, pre- Survey frame, ancillary frame;Wherein, prediction frame includes inter prediction encoding frame and/or bi-directional predictive coding frame again;In video sequence One frame is key frame, and the key frame that inter prediction encoding frame needs to refer to front just can be carried out coding, indicates current frame number According to the difference with former frame, the bi-directional predictive coding frame recording difference of this frame and before and after frames;Ancillary frame has recorded structuring number According to various auxiliary informations such as, environmental informations.
Wherein, the partial data frame of the present embodiment includes key frame and non-key frame, non-key frame include prediction frame and/or Ancillary frame.
Optionally, the present embodiment can realize above-mentioned steps S102, the method for the present embodiment by method as shown in Figure 2 Including step S201 to step S202.
S201: according to the frame number of monitoring result fetching portion data frame.
The frame number of partial data frame includes the frame number of key frame and the frame number of non-key frame.
As the above analysis, key frame contains the content of media data, and content cannot be tampered, therefore During media false distinguishing, it is necessary to carry out hash algorithm to key frame.Transmitting terminal obtains the frame number of the key frame from media data.
In an application scenarios, the present embodiment can obtain prediction by step S301 as shown in Figure 3 and step S302 The frame number of frame and/or ancillary frame.
S301: if message transmission rate is less than scheduled rate, first is set by the frame number for predicting frame and/or ancillary frame Frame number.
S302: if message transmission rate is greater than or equal to scheduled rate, the frame number for predicting frame and/or ancillary frame is arranged For the second frame number, wherein the first frame number is less than the second frame number.
The message transmission rate of transmission link is compared by transmitting terminal with scheduled rate;If transmitting terminal judges that data are transmitted Rate is less than scheduled rate, then the first frame number is set by the frame number of partial data frame, if transmitting terminal judges message transmission rate More than or equal to scheduled rate, then the second frame number is set by the frame number for predicting frame and/or ancillary frame, wherein the first frame number is small In the second frame number, to guarantee when message transmission rate is smaller, the digital signature to data frame is reduced, to improve receiving end reception The real-time of media data.
Transmitting terminal can also be according to the frame number of the monitoring result fetching portion data frame of multiple transmission information.Specifically, may be used To obtain the corresponding frame number of each transmission information respectively according to the above method, then according to the weight and frame number of each transmission data Obtain frame number of the weighted mean of multiple transmission information as final partial data.
S202: according to frame number from media data fetching portion data frame.
Specifically, step S202 can be realized by step S303 as shown in Figure 3.
S303: the fetching portion data frame from media data according to the first frame number or the second frame number.
In another embodiment, transmitting terminal can also determine media data another part data frame according to the needs of users, To obtain the partial data frame.Such as transmitting terminal retains some specific auxiliary in media data according to the requirement of public security department Frame is without Hash operation, in order to which information of the public security department to these specific ancillary frames is modified.
The present embodiment can be according to different transmission information fetching portion data frames from media data of media data, with choosing Selecting property is digitally signed prediction frame and/or ancillary frame.
Step S103: partial data frame is digitally signed using hash algorithm.
Specifically, the present embodiment can realize step S103 by method as shown in Figure 4, and the method for the present embodiment includes Step S401 to step S405.
S401: key frame is obtained from partial data frame, and Hash operation is carried out to key frame, to generate the first Hash Value.
As the above analysis, it is according to certain that media data, which includes key frame, prediction frame and ancillary frame, these data frames, Sequence arrangement (frame ID).Transmitting terminal can obtain key frame according to frame ID from partial data frame, and carry out to key frame Hash operation, to generate the first hash value.
Hash algorithm, also referred to as md5-challenge, it can generate a unique verification verifying to any data frame Code, during data frame transfer, if its content is damaged or is tampered, the check code of this data frame just changes, and leads to It crosses and the check code of data frame is verified, it can be determined that whether the data frame is complete reliable.
The hash algorithm of the present embodiment can be MD2, MD4, MD5, HAVAL or SHA etc..
S402: prediction frame and/or ancillary frame are obtained from partial data, and Hash is carried out to prediction frame and/or ancillary frame Operation, to generate the second hash value.
Sending end can obtain prediction frame and/or ancillary frame according to frame ID from partial data frame, and to prediction frame and/or auxiliary Frame is helped to carry out Hash operation, to generate the second hash value.
To key frame use hash algorithm with to prediction frame and/or ancillary frame use hash algorithm can it is identical or Difference, specifically without limitation.
In other embodiments, do not limit step S401 and step S402 executes sequence.
S403: digital signature is generated according to the first hash value and the second hash value.
First hash value and the second hash value can be formed according to pre-defined rule and be made a summary by transmitting terminal, and with private key pair Abstract encryption, to form digital signature.
It is different from the prior art, the present embodiment can be and right according to the transmission information acquiring portion data frame of media data Partial data frame is digitally signed.Therefore, the embodiment of the present application can be according to the transmission information of media data to media data It is digitally signed, the data frame for needing to be digitally signed can be adjusted flexibly, without all data frames to media data It is digitally signed, can be improved the flexibility ratio and false distinguishing efficiency of media data false distinguishing
Optionally, the present embodiment can further include step S104: media data and digital signature are pushed to view Frequency receiving end.
Receiving end receiving media data and its digital signature are digitally signed verifying, to judge whether media data is usurped Change.Specifically, digital signature is decrypted in the public keys of receiving end transmitting terminal, while carrying out Hash fortune to media data Calculation forms hash value;The hash value of digital signature and media data after decryption is compared, such as the two is consistent, then illustrates to pass Media data is not damaged or distorts during sending, otherwise not so.
The present embodiment is digitally signed media data before pushing media data to receiving device, then by media Data and digital signature are pushed to receiving device simultaneously.
The application it is further proposed that the media data of second embodiment tamper resistant method, as shown in figure 5, the present embodiment matchmaker The tamper resistant method of volume data the following steps are included:
Step S501: the transmission information of media data is monitored, to obtain monitoring result.
Step S501 is similar with above-mentioned steps S101, does not repeat here.
Step S502: media data is pushed to receiving end.
Media data includes key frame, prediction frame and ancillary frame, and each data frame has unique frame ID, transmitting terminal according to Frame ID successively pushes these data frames to receiving end.
In other embodiments, do not limit step S501 and step S502 executes sequence, i.e. transmitting terminal can monitor matchmaker Transmission information before volume data push also can detecte transmission information when media data push.
Step S503: during the push of media data, middle acquisition unit score is drawn from media data according to monitoring result According to frame.
Step S503 is similar with above-mentioned steps S102, does not repeat here.
It is unlike the embodiments above, the present embodiment be during the push of media data, according to monitoring result from Fetching portion data frame in media data.
Step S504: partial data frame is digitally signed using hash algorithm.
Step S505: digital signature will be pushed to receiving end.
Step S504 to step S505 is similar to step S104 with above-mentioned steps S103, does not repeat here.
It is different from the prior art, the present embodiment can be and right according to the transmission information acquiring portion data frame of media data First data frame is digitally signed.Therefore, the embodiment of the present application can be according to the transmission information of media data to media data It is digitally signed, the data frame for needing to be digitally signed can be adjusted flexibly, without all data frames to media data It is digitally signed, can be improved the flexibility ratio and false distinguishing efficiency of media data false distinguishing.
The present embodiment be to receiving end push media data when, to media data carry out data signature, and simultaneously to The digital signature of receiving end push media data.
In another embodiment, as shown in fig. 6, transmitting terminal pushes Media Stream (including a series of matchmaker to recipient simultaneously Volume data) and false distinguishing stream, Media Stream is normal video traffic, the matter that false distinguishing stream can be transmitted according to current network data The loading condition of amount and other side adjust the size of sliding window, reduce false distinguishing operand and transmission quantity.Meanwhile false distinguishing stream can root It needs for prediction frame or ancillary frame etc. to be put into sliding window according to business, the range for reaching Jianzhen can flexibly cut purpose.
Each data frame of media data has unique frame ID, and transmitting terminal can identify key frame according to frame ID, can be with According to frame ID fetching portion data frame.Transmitting terminal by the frame ID of key frame and needs to carry out false distinguishing according to the frame number of partial data frame The frame (or ancillary frame) that prestores be put into sliding window, i.e., in frame ID array, transmitting terminal is corresponding for the frame ID in frame ID array Data frame carries out Hash operation.
Receiving end can also be obtained from media data corresponding with the first data frame in digital signature authentication according to frame ID Data frame, only need to be digitally signed verifying to the first data frame, all carried out without the left and right data frame to media data Digital signature authentication can be improved the real-time of media data.
The present embodiment does not limit the connection type of Media Stream Yu false distinguishing stream, and does not limit whether the two sets in the same terminal It is standby.
It in another embodiment, can also be before media data and its digital signature be pushed to receiving end, further Media data and digital signature are subjected to mutual decoupling processing, that is to say, that digital signature can be according to the business need of media data It turns on or off, and the regular traffic of media data is unaffected.
The embodiment of the present application is capable of providing the anti-of real time media data that one kind is flexible, intensity is adjustable, can cut and usurps Change method.
In other embodiments, it can also be set by the terminal in other transmission nodes in media data transmission link Standby to be monitored to the transmission information of media data, for example, in safety-security area, the terminal device of public security organ can be to from any The media data that transmitting terminal is pushed out carries out safety monitoring, etc..
The application is it is further proposed that a kind of terminal device, as shown in fig. 7, Fig. 7 is one embodiment of the application terminal device Structural schematic diagram.The present embodiment terminal device 701 includes processor 702 and the memory 703 with the coupling of processor 702, processing Device 702 is used to monitor the transmission information of media data, to obtain monitoring result, and is obtained from media data according to monitoring result Partial data frame, processor 702 are used to be digitally signed partial data frame using hash algorithm.
The present embodiment terminal device 701 is the sending ending equipment of above-described embodiment, can be used for realizing the above method, here not It repeats.
Terminal device 701 can be laptop, palm PC, personal digital assistant, portable media player, lead The mobile terminals, and DTV, desktop computer, server such as boat device, wearable device, pedometer etc. are fixed eventually End.
It is different from the prior art, the present embodiment can carry out digital label to media data according to the transmission information of media data The data frame for needing to be digitally signed can be adjusted flexibly in name, carry out digital label without all data frames to media data Name, can be improved the flexibility ratio and false distinguishing efficiency of media data false distinguishing.
The application is it is further proposed that a kind of storage medium, as shown in figure 8, Fig. 8 is one embodiment of the application storage medium Structural schematic diagram.The present embodiment storage medium 801 is used to store the related data 802 and program data 803 of above-described embodiment, In, related data 802 includes at least above-mentioned media data etc., and program data 803 can be performed in the above way embodiment The tamper resistant method of media data.Related data 802 and program data 803 have carried out in above method embodiment detailed Narration, does not repeat here.
It is soft that the present embodiment storage medium 801 can be, but not limited to, USB flash disk, SD card, PD CD-ROM drive, mobile hard disk, large capacity Drive, flash memory, multimedia memory card, server etc..
It is different from the prior art, the tamper resistant method of the embodiment of the present application media data includes: the biography for monitoring media data Defeated information, to obtain monitoring result;According to monitoring result from media data fetching portion data frame;Using hash algorithm to portion Divided data frame is digitally signed.In this way, the embodiment of the present application can be according to the transmission acquisition of information of media data Partial data frame, and partial data frame is digitally signed.Therefore, the embodiment of the present application can be according to the transmission of media data Information is digitally signed media data, and the data frame for needing to be digitally signed can be adjusted flexibly, without to media number According to all data frames be digitally signed, can be improved the flexibility ratio and false distinguishing efficiency of media data false distinguishing.
If in addition, above-mentioned function realized in the form of software function and as stand-alone product when selling or using, can deposit Storage is in a mobile terminal read/write memory medium, that is, and the application also provides a kind of storage device for being stored with program data, The method that described program data can be performed to realize above-described embodiment, the storage device can be for such as USB flash disk, CD, services Device etc..That is, the application can be embodied in the form of software products comprising some instructions are used so that an intelligence Energy terminal executes all or part of the steps of each embodiment the method.
In the description of the present application, reference term " one embodiment ", " some embodiments ", " example ", " specific example ", Or the description of " some examples " etc. means particular features, structures, materials, or characteristics packet described in conjunction with this embodiment or example In at least one embodiment or example contained in the application.In the present specification, schematic expression of the above terms are necessarily It is directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be at any one Or it can be combined in any suitable manner in multiple embodiment or examples.In addition, without conflicting with each other, those skilled in the art Member the feature of different embodiments or examples described in this specification and different embodiments or examples can be combined and Combination.
In addition, term " first ", " second " are used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance Or implicitly indicate the quantity of indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or Implicitly include at least one this feature.In the description of the present application, the meaning of " plurality " is at least two, such as two, three It is a etc., unless otherwise specifically defined.
Any process described otherwise above or method description are construed as in flow chart or herein, and expression includes It is one or more for realizing specific logical function or process the step of executable instruction code module, segment or portion Point, and the range of the preferred embodiment of the application includes other realization, wherein can not press shown or discussed suitable Sequence, including according to related function by it is basic simultaneously in the way of or in the opposite order, Lai Zhihang function, this should be by the application Embodiment person of ordinary skill in the field understood.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for Instruction execution system, device or equipment (can be personal computer, server, the network equipment or other can be from instruction execution System, device or equipment instruction fetch and the system executed instruction) it uses, or combine these instruction execution systems, device or equipment And it uses.For the purpose of this specification, " computer-readable medium " can be it is any may include, store, communicate, propagate, or transport Program is for instruction execution system, device or equipment or the device used in conjunction with these instruction execution systems, device or equipment. The more specific example (non-exhaustive list) of computer-readable medium include the following: there is the electrical connection of one or more wirings Portion's (electronic device), portable computer diskette box (magnetic device), random access memory (RAM), read-only memory (ROM) can It wipes editable read-only memory (EPROM or flash memory), fiber device and portable optic disk read-only storage (CDROM).In addition, computer-readable medium can even is that the paper that can print described program on it or other suitable Jie Matter, because can then be edited, be interpreted or when necessary with other for example by carrying out optical scanner to paper or other media Suitable method is handled electronically to obtain described program, is then stored in computer storage.
The foregoing is merely presently filed embodiments, are not intended to limit the scope of the patents of the application, all to utilize this Equivalent structure or equivalent flow shift made by application specification and accompanying drawing content, it is relevant to be applied directly or indirectly in other Technical field similarly includes in the scope of patent protection of the application.

Claims (10)

1. a kind of tamper resistant method of media data, which is characterized in that the tamper resistant method includes:
The transmission information of the media data is monitored, to obtain monitoring result;
According to monitoring result from the media data fetching portion data frame;
The partial data frame is digitally signed using hash algorithm.
2. tamper resistant method according to claim 1, which is characterized in that use hash algorithm to the part number described After the step of being digitally signed according to frame, the tamper resistant method further comprises:
The media data and the digital signature are pushed into receiving end.
3. tamper resistant method according to claim 1, which is characterized in that it is described according to monitoring result from the media number Before the step of middle fetching portion data frame, the tamper resistant method further comprises:
The media data is pushed to receiving end;
It is described to include: the step of fetching portion data frame from the media data according to monitoring result
During the push of the media data, according to monitoring result from the media data fetching portion data frame;
It is described using hash algorithm the partial data frame is digitally signed the step of after, the tamper resistant method into One step includes:
The digital signature is pushed to the receiving end.
4. tamper resistant method according to claim 3, which is characterized in that it is described according to monitoring result from the media data The step of middle fetching portion data frame includes:
The frame number of the partial data frame is obtained according to monitoring result;
According to the frame number from the media data fetching portion data frame.
5. tamper resistant method according to claim 4, which is characterized in that the transmission information of the monitoring media data The step of include:
Monitor the data transmission quality of media data transmission link and/or the loading condition of the receiving end;
Wherein, the data transmission quality includes at least message transmission rate or the bit error rate.
6. tamper resistant method according to claim 5, which is characterized in that the partial data frame includes key frame and non-pass Key frame, the non-key frame include prediction frame and/or ancillary frame, it is described according to monitoring result from the media data acquisition unit The step of divided data frame includes:
If the message transmission rate is less than scheduled rate, set the frame number of the prediction frame and/or the ancillary frame to First frame number;
If the message transmission rate is greater than or equal to the scheduled rate, by the prediction frame and/or the ancillary frame Frame number is set as the second frame number, wherein first frame number is less than second frame number;
The fetching portion data frame from the media data according to first frame number or second frame number.
7. tamper resistant method according to claim 1, which is characterized in that the partial data frame includes key frame and non-pass Key frame, the non-key frame includes predicting frame and/or ancillary frame, described to be counted using hash algorithm to the partial data frame Word sign the step of include:
The key frame is obtained from the partial data frame, and Hash operation is carried out to the key frame, to generate first Hash value;
Obtain the prediction frame and/or the ancillary frame from the partial data frame, and to the prediction frame and/or described auxiliary Frame is helped to carry out Hash operation, to generate the second hash value;
The digital signature is generated according to first hash value and second hash value.
8. tamper resistant method according to claim 2, which is characterized in that described by the media data and the number Before the step of signature pushes to receiving end, the tamper resistant method further comprises:
The media data and the digital signature are subjected to mutual decoupling processing.
9. a kind of terminal device, which is characterized in that the terminal device includes processor and the storage with processor coupling Device, the processor are used to monitor the transmission information of the media data, to obtain monitoring result, and according to monitoring result from institute Fetching portion data frame in media data is stated, the processor is used to carry out number to the partial data frame using hash algorithm Signature.
10. a kind of storage medium, which is characterized in that be stored thereon with program data, described program data are performed realization power Benefit requires the tamper resistant method of the described in any item media datas of 1-8.
CN201910642832.6A 2019-07-16 2019-07-16 Tamper resistant method, terminal device and the storage medium of media data Pending CN110427781A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910642832.6A CN110427781A (en) 2019-07-16 2019-07-16 Tamper resistant method, terminal device and the storage medium of media data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910642832.6A CN110427781A (en) 2019-07-16 2019-07-16 Tamper resistant method, terminal device and the storage medium of media data

Publications (1)

Publication Number Publication Date
CN110427781A true CN110427781A (en) 2019-11-08

Family

ID=68409766

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910642832.6A Pending CN110427781A (en) 2019-07-16 2019-07-16 Tamper resistant method, terminal device and the storage medium of media data

Country Status (1)

Country Link
CN (1) CN110427781A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101667999A (en) * 2008-09-04 2010-03-10 华为技术有限公司 Method and system for transmitting peer-to-peer broadcast stream, data signature device and client
CN102395034A (en) * 2011-12-22 2012-03-28 东北大学 MPEG-4video chaotic encryption method based on intra prediction
CN108777688A (en) * 2018-06-07 2018-11-09 中国联合网络通信集团有限公司 Video security monitoring method and system
US20190116163A1 (en) * 2013-07-29 2019-04-18 Mobitv, Inc. Efficient common storage of partially encrypted content

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101667999A (en) * 2008-09-04 2010-03-10 华为技术有限公司 Method and system for transmitting peer-to-peer broadcast stream, data signature device and client
CN102395034A (en) * 2011-12-22 2012-03-28 东北大学 MPEG-4video chaotic encryption method based on intra prediction
US20190116163A1 (en) * 2013-07-29 2019-04-18 Mobitv, Inc. Efficient common storage of partially encrypted content
CN108777688A (en) * 2018-06-07 2018-11-09 中国联合网络通信集团有限公司 Video security monitoring method and system

Similar Documents

Publication Publication Date Title
EP3070630B1 (en) Data system and method
US20210200903A1 (en) Capture and presentation of authenticated data
US20110066723A1 (en) Generating statistics of popular content
Karie et al. Toward a general ontology for digital forensic disciplines
US20120078864A1 (en) Electronic data integrity protection device and method and data monitoring system
CN110505141A (en) Processing method, device, readable medium and the electronic equipment of instant communication information
US20220284130A1 (en) Content Playlist Integrity
CN103152363B (en) For the method and system that the self adaptation of state snapshot produces
JP4740706B2 (en) Fraud image detection apparatus, method, and program
WO2023142957A1 (en) Method and apparatus for verifying display terminal, storage medium, and electronic device
CN113656825B (en) Text watermark embedding method, text tampering detection method, text watermark embedding device, text tampering detection device and electronic equipment
CN108683946A (en) The method for realizing Online Video education based on recognition of face and caching mechanism
Lockwood et al. Text based steganography
CN110929230A (en) Work management method, device, equipment and storage medium
CN109688123A (en) The method and system of one-way data transfer between inter-network system based on GM two dimensional code
Boyar et al. Quotable signatures for authenticating shared quotes
CN117313759A (en) Method, device, equipment and storage medium for data security transmission
CN110427781A (en) Tamper resistant method, terminal device and the storage medium of media data
Li et al. Lost in the digital wild: Hiding information in digital activities
Wang et al. Perceptual hashing-based robust image authentication scheme for wireless multimedia sensor networks
CN104011718B (en) For method, computer-readable medium and the computer of the message groups for selecting identification
CN113779304A (en) Method and device for detecting infringement video
CN113994360A (en) Using crowdsourcing to combat spurious information
Sun et al. Improving the security and quality of real-time multimedia transmission in cyber-physical-social systems
CN117592124B (en) Low-overhead anti-leakage and counterfeit certification method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191108