CN110427781A - Tamper resistant method, terminal device and the storage medium of media data - Google Patents
Tamper resistant method, terminal device and the storage medium of media data Download PDFInfo
- Publication number
- CN110427781A CN110427781A CN201910642832.6A CN201910642832A CN110427781A CN 110427781 A CN110427781 A CN 110427781A CN 201910642832 A CN201910642832 A CN 201910642832A CN 110427781 A CN110427781 A CN 110427781A
- Authority
- CN
- China
- Prior art keywords
- frame
- data
- media data
- tamper resistant
- resistant method
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
Abstract
This application discloses a kind of tamper resistant method of media data, terminal device and storage mediums.The tamper resistant method includes the transmission information for monitoring media data, to obtain monitoring result;According to monitoring result from media data fetching portion data frame;Partial data frame is digitally signed using hash algorithm.In this way, the flexibility ratio and false distinguishing efficiency of media data false distinguishing be can be improved.
Description
Technical field
This application involves multi-media safety technical fields, tamper resistant method, terminal more particularly to a kind of media data
Equipment and storage medium.
Background technique
With the continuous development of computer technology, more and more easier is had become to distorting for media data.Therefore, media number
According in transmission process, it is often necessary to real-time perfoming false distinguishing.For example media data is forwarded by third-party agent service or net
Network environment is complicated, and there are when network attack hidden danger, need the real-time authentication detection technology of high-performance to carry out false distinguishing processing to media data.
Present inventor has found that current media data authentication detection technology mainly has mean value Kazakhstan in long-term R&D process
Uncommon repeating frame detection and the technologies such as anti-tamper, but these technologies are that the processing of full dose Hash abstract is carried out to media data,
The data volume of Hash is too big, is affected to the performance of real time media data, and any information of media data can not all be changed.
Therefore, existing media data authentication detection technology is difficult to carry out false distinguishing adjustment, and flexibility ratio is lower, and false distinguishing efficiency is lower.
Summary of the invention
How the application is mainly solving the technical problems that improve the flexibility ratio and false distinguishing efficiency of media data false distinguishing.
In order to solve the above technical problems, the technical solution that the application uses is: providing a kind of the anti-of media data and usurp
Change method, which includes: the transmission information for monitoring media data, to obtain monitoring result;According to monitoring result from
Fetching portion data frame in media data;Partial data frame is digitally signed using hash algorithm.
In one embodiment, it is above-mentioned using hash algorithm partial data frame is digitally signed the step of it
Afterwards, above-mentioned tamper resistant method further comprises: media data and digital signature are pushed to receiving end.
In one embodiment, the above-mentioned fetching portion data frame from media data according to monitoring result the step of it
Before, above-mentioned tamper resistant method further comprises: pushing media data to receiving end;It is above-mentioned according to monitoring result from media data
The step of fetching portion data frame includes: to be obtained from media data during the push of media data according to monitoring result
Partial data frame;After above-mentioned the step of being digitally signed using hash algorithm to partial data frame, above-mentioned anti-tamper side
Method further comprises: pushing digital signature to receiving end.
In one embodiment, above-mentioned to be wrapped the step of fetching portion data frame from media data according to monitoring result
It includes: according to the frame number of monitoring result fetching portion data frame;According to frame number from media data fetching portion data frame.
In one embodiment, the step of transmission information of above-mentioned monitoring media data includes: that monitoring media data passes
The data transmission quality of transmission link and/or the loading condition of receiving end;Wherein, data transmission quality includes at least data transmission speed
Rate or the bit error rate.
In one embodiment, above-mentioned partial data frame includes key frame and non-key frame, and non-key frame includes prediction
Frame and/or ancillary frame, if above-mentioned includes: data transmission the step of fetching portion data frame from media data according to monitoring result
Rate is less than scheduled rate, then sets the first frame number for the frame number for predicting frame and/or ancillary frame;If message transmission rate is greater than
Or be equal to scheduled rate, then the second frame number is set by the frame number for predicting frame and/or ancillary frame, wherein the first frame number is less than the
Two frame numbers;The fetching portion data frame from media data according to the first frame number or the second frame number.
In one embodiment, partial data frame includes key frame and non-key frame, and the non-key frame includes prediction
Frame and/or ancillary frame, above-mentioned the step of being digitally signed using hash algorithm to partial data frame includes: from partial data frame
Middle acquisition key frame, and Hash operation is carried out to key frame, to generate the first hash value;The prediction is obtained from the first data
Frame and/or the ancillary frame, and Hash operation is carried out to prediction frame and/or ancillary frame, to generate the second hash value;According to first
Hash value and the second hash value generate digital signature.
In one embodiment, above-mentioned anti-before the step of media data and digital signature are pushed to receiving end
Tampering methods further comprise: media data and digital signature are carried out mutual decoupling processing.
In order to solve the above technical problems, the technical solution that the application uses is: providing a kind of terminal device, the terminal
Equipment includes that processor and the memory with processor coupling, processor are used to monitor the transmission information of media data, to obtain
Monitoring result, and fetching portion data frame, processor are used for using hash algorithm to portion from media data according to monitoring result
Divided data frame is digitally signed.
In order to solve the above technical problems, the technical solution that the application uses is: providing a kind of storage medium, deposit thereon
Program data is contained, program data is performed the tamper resistant method for realizing above-mentioned media data.
The beneficial effect of the application is: being different from the prior art, the tamper resistant method packet of the embodiment of the present application media data
It includes: the transmission information of media data is monitored, to obtain monitoring result;According to monitoring result from media data fetching portion data
Frame;Partial data frame is digitally signed using hash algorithm.In this way, the embodiment of the present application can be according to media
The transmission information acquiring portion data frame of data, and the partial data frame is digitally signed.Therefore, the embodiment of the present application energy
It is enough that media data is digitally signed according to the transmission information of media data, it can be adjusted flexibly what needs were digitally signed
Data frame is digitally signed without all data frames to media data, can be improved media data false distinguishing flexibility ratio and
False distinguishing efficiency.
Detailed description of the invention
Fig. 1 is the flow diagram of the tamper resistant method first embodiment of the application media data;
Fig. 2 is an idiographic flow schematic diagram of step S102 in the tamper resistant method of Fig. 1 embodiment media data;
Fig. 3 is another idiographic flow schematic diagram of step S102 in the tamper resistant method of Fig. 1 embodiment media data;
Fig. 4 is the idiographic flow schematic diagram of step S103 in the tamper resistant method of Fig. 1 embodiment media data;
Fig. 5 is the flow diagram of the tamper resistant method second embodiment of the application media data;
Fig. 6 is the flow diagram of the tamper resistant method 3rd embodiment of the application media data;
Fig. 7 is the structural schematic diagram of one embodiment of the application terminal device;
Fig. 8 is the structural schematic diagram of one embodiment of the application storage medium.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on
Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment belongs to the range of the application protection.
Media data authentication detection technology mainly has mean value Hash repeating frame to detect and the technologies such as anti-tamper.With multimedia skill
The development of art not only contains simple audio-video frequency content, i.e. key frame information in media data, and further comprises structure
Change each middle auxiliary informations such as data, environmental information, i.e. auxiliary frame information;The prior art is to carry out full dose Hash to media data
Abstract processing, causes any information of media data that can not all change, but in the fields such as security protection, the wall solution party in security protection video
In case, video data is in web camera (Internet Protocol Camera, IPC), network hard disk video recorder
When flowing in (Network Video Recorder, NVR), decoder and office, provinces and cities net, often need to modify auxiliary frame information,
And key frame information requirement is anti-tamper.If handled according to existing full dose Hash method video data, nothing will lead to
Method change auxiliary frame information, and the data volume of Hash is too big, is affected to the performance of real time video data, causes to aggravate video
The delay of upper wall.
The application proposes a kind of tamper resistant method of media data first, as shown in Figure 1, Fig. 1 is the application media data
Tamper resistant method first embodiment flow diagram.The tamper resistant method of the present embodiment media data the following steps are included:
Step S101: the transmission information of media data is monitored, to obtain monitoring result.
The media data of the present embodiment includes video data.In other embodiments, media data can also include text
Information or audio-frequency information etc..
The transmission information of the transmitting terminal monitoring media data of media data, and obtain the monitoring result of transmission information.Wherein,
Transport packet includes the data transmission quality of media data transmission link, for example, the bit error rate perhaps transmission rate etc. or including
The information of receiving end, for example, the loading condition of receiving end or the user type of receiving end etc..
Step S102: according to monitoring result from media data fetching portion data frame.
Transmitting terminal fetching portion data frame from video data according to above-mentioned monitoring result.
The video sequence that the present embodiment video data is made of multiple data frames, these data frames include key frame, pre-
Survey frame, ancillary frame;Wherein, prediction frame includes inter prediction encoding frame and/or bi-directional predictive coding frame again;In video sequence
One frame is key frame, and the key frame that inter prediction encoding frame needs to refer to front just can be carried out coding, indicates current frame number
According to the difference with former frame, the bi-directional predictive coding frame recording difference of this frame and before and after frames;Ancillary frame has recorded structuring number
According to various auxiliary informations such as, environmental informations.
Wherein, the partial data frame of the present embodiment includes key frame and non-key frame, non-key frame include prediction frame and/or
Ancillary frame.
Optionally, the present embodiment can realize above-mentioned steps S102, the method for the present embodiment by method as shown in Figure 2
Including step S201 to step S202.
S201: according to the frame number of monitoring result fetching portion data frame.
The frame number of partial data frame includes the frame number of key frame and the frame number of non-key frame.
As the above analysis, key frame contains the content of media data, and content cannot be tampered, therefore
During media false distinguishing, it is necessary to carry out hash algorithm to key frame.Transmitting terminal obtains the frame number of the key frame from media data.
In an application scenarios, the present embodiment can obtain prediction by step S301 as shown in Figure 3 and step S302
The frame number of frame and/or ancillary frame.
S301: if message transmission rate is less than scheduled rate, first is set by the frame number for predicting frame and/or ancillary frame
Frame number.
S302: if message transmission rate is greater than or equal to scheduled rate, the frame number for predicting frame and/or ancillary frame is arranged
For the second frame number, wherein the first frame number is less than the second frame number.
The message transmission rate of transmission link is compared by transmitting terminal with scheduled rate;If transmitting terminal judges that data are transmitted
Rate is less than scheduled rate, then the first frame number is set by the frame number of partial data frame, if transmitting terminal judges message transmission rate
More than or equal to scheduled rate, then the second frame number is set by the frame number for predicting frame and/or ancillary frame, wherein the first frame number is small
In the second frame number, to guarantee when message transmission rate is smaller, the digital signature to data frame is reduced, to improve receiving end reception
The real-time of media data.
Transmitting terminal can also be according to the frame number of the monitoring result fetching portion data frame of multiple transmission information.Specifically, may be used
To obtain the corresponding frame number of each transmission information respectively according to the above method, then according to the weight and frame number of each transmission data
Obtain frame number of the weighted mean of multiple transmission information as final partial data.
S202: according to frame number from media data fetching portion data frame.
Specifically, step S202 can be realized by step S303 as shown in Figure 3.
S303: the fetching portion data frame from media data according to the first frame number or the second frame number.
In another embodiment, transmitting terminal can also determine media data another part data frame according to the needs of users,
To obtain the partial data frame.Such as transmitting terminal retains some specific auxiliary in media data according to the requirement of public security department
Frame is without Hash operation, in order to which information of the public security department to these specific ancillary frames is modified.
The present embodiment can be according to different transmission information fetching portion data frames from media data of media data, with choosing
Selecting property is digitally signed prediction frame and/or ancillary frame.
Step S103: partial data frame is digitally signed using hash algorithm.
Specifically, the present embodiment can realize step S103 by method as shown in Figure 4, and the method for the present embodiment includes
Step S401 to step S405.
S401: key frame is obtained from partial data frame, and Hash operation is carried out to key frame, to generate the first Hash
Value.
As the above analysis, it is according to certain that media data, which includes key frame, prediction frame and ancillary frame, these data frames,
Sequence arrangement (frame ID).Transmitting terminal can obtain key frame according to frame ID from partial data frame, and carry out to key frame
Hash operation, to generate the first hash value.
Hash algorithm, also referred to as md5-challenge, it can generate a unique verification verifying to any data frame
Code, during data frame transfer, if its content is damaged or is tampered, the check code of this data frame just changes, and leads to
It crosses and the check code of data frame is verified, it can be determined that whether the data frame is complete reliable.
The hash algorithm of the present embodiment can be MD2, MD4, MD5, HAVAL or SHA etc..
S402: prediction frame and/or ancillary frame are obtained from partial data, and Hash is carried out to prediction frame and/or ancillary frame
Operation, to generate the second hash value.
Sending end can obtain prediction frame and/or ancillary frame according to frame ID from partial data frame, and to prediction frame and/or auxiliary
Frame is helped to carry out Hash operation, to generate the second hash value.
To key frame use hash algorithm with to prediction frame and/or ancillary frame use hash algorithm can it is identical or
Difference, specifically without limitation.
In other embodiments, do not limit step S401 and step S402 executes sequence.
S403: digital signature is generated according to the first hash value and the second hash value.
First hash value and the second hash value can be formed according to pre-defined rule and be made a summary by transmitting terminal, and with private key pair
Abstract encryption, to form digital signature.
It is different from the prior art, the present embodiment can be and right according to the transmission information acquiring portion data frame of media data
Partial data frame is digitally signed.Therefore, the embodiment of the present application can be according to the transmission information of media data to media data
It is digitally signed, the data frame for needing to be digitally signed can be adjusted flexibly, without all data frames to media data
It is digitally signed, can be improved the flexibility ratio and false distinguishing efficiency of media data false distinguishing
Optionally, the present embodiment can further include step S104: media data and digital signature are pushed to view
Frequency receiving end.
Receiving end receiving media data and its digital signature are digitally signed verifying, to judge whether media data is usurped
Change.Specifically, digital signature is decrypted in the public keys of receiving end transmitting terminal, while carrying out Hash fortune to media data
Calculation forms hash value;The hash value of digital signature and media data after decryption is compared, such as the two is consistent, then illustrates to pass
Media data is not damaged or distorts during sending, otherwise not so.
The present embodiment is digitally signed media data before pushing media data to receiving device, then by media
Data and digital signature are pushed to receiving device simultaneously.
The application it is further proposed that the media data of second embodiment tamper resistant method, as shown in figure 5, the present embodiment matchmaker
The tamper resistant method of volume data the following steps are included:
Step S501: the transmission information of media data is monitored, to obtain monitoring result.
Step S501 is similar with above-mentioned steps S101, does not repeat here.
Step S502: media data is pushed to receiving end.
Media data includes key frame, prediction frame and ancillary frame, and each data frame has unique frame ID, transmitting terminal according to
Frame ID successively pushes these data frames to receiving end.
In other embodiments, do not limit step S501 and step S502 executes sequence, i.e. transmitting terminal can monitor matchmaker
Transmission information before volume data push also can detecte transmission information when media data push.
Step S503: during the push of media data, middle acquisition unit score is drawn from media data according to monitoring result
According to frame.
Step S503 is similar with above-mentioned steps S102, does not repeat here.
It is unlike the embodiments above, the present embodiment be during the push of media data, according to monitoring result from
Fetching portion data frame in media data.
Step S504: partial data frame is digitally signed using hash algorithm.
Step S505: digital signature will be pushed to receiving end.
Step S504 to step S505 is similar to step S104 with above-mentioned steps S103, does not repeat here.
It is different from the prior art, the present embodiment can be and right according to the transmission information acquiring portion data frame of media data
First data frame is digitally signed.Therefore, the embodiment of the present application can be according to the transmission information of media data to media data
It is digitally signed, the data frame for needing to be digitally signed can be adjusted flexibly, without all data frames to media data
It is digitally signed, can be improved the flexibility ratio and false distinguishing efficiency of media data false distinguishing.
The present embodiment be to receiving end push media data when, to media data carry out data signature, and simultaneously to
The digital signature of receiving end push media data.
In another embodiment, as shown in fig. 6, transmitting terminal pushes Media Stream (including a series of matchmaker to recipient simultaneously
Volume data) and false distinguishing stream, Media Stream is normal video traffic, the matter that false distinguishing stream can be transmitted according to current network data
The loading condition of amount and other side adjust the size of sliding window, reduce false distinguishing operand and transmission quantity.Meanwhile false distinguishing stream can root
It needs for prediction frame or ancillary frame etc. to be put into sliding window according to business, the range for reaching Jianzhen can flexibly cut purpose.
Each data frame of media data has unique frame ID, and transmitting terminal can identify key frame according to frame ID, can be with
According to frame ID fetching portion data frame.Transmitting terminal by the frame ID of key frame and needs to carry out false distinguishing according to the frame number of partial data frame
The frame (or ancillary frame) that prestores be put into sliding window, i.e., in frame ID array, transmitting terminal is corresponding for the frame ID in frame ID array
Data frame carries out Hash operation.
Receiving end can also be obtained from media data corresponding with the first data frame in digital signature authentication according to frame ID
Data frame, only need to be digitally signed verifying to the first data frame, all carried out without the left and right data frame to media data
Digital signature authentication can be improved the real-time of media data.
The present embodiment does not limit the connection type of Media Stream Yu false distinguishing stream, and does not limit whether the two sets in the same terminal
It is standby.
It in another embodiment, can also be before media data and its digital signature be pushed to receiving end, further
Media data and digital signature are subjected to mutual decoupling processing, that is to say, that digital signature can be according to the business need of media data
It turns on or off, and the regular traffic of media data is unaffected.
The embodiment of the present application is capable of providing the anti-of real time media data that one kind is flexible, intensity is adjustable, can cut and usurps
Change method.
In other embodiments, it can also be set by the terminal in other transmission nodes in media data transmission link
Standby to be monitored to the transmission information of media data, for example, in safety-security area, the terminal device of public security organ can be to from any
The media data that transmitting terminal is pushed out carries out safety monitoring, etc..
The application is it is further proposed that a kind of terminal device, as shown in fig. 7, Fig. 7 is one embodiment of the application terminal device
Structural schematic diagram.The present embodiment terminal device 701 includes processor 702 and the memory 703 with the coupling of processor 702, processing
Device 702 is used to monitor the transmission information of media data, to obtain monitoring result, and is obtained from media data according to monitoring result
Partial data frame, processor 702 are used to be digitally signed partial data frame using hash algorithm.
The present embodiment terminal device 701 is the sending ending equipment of above-described embodiment, can be used for realizing the above method, here not
It repeats.
Terminal device 701 can be laptop, palm PC, personal digital assistant, portable media player, lead
The mobile terminals, and DTV, desktop computer, server such as boat device, wearable device, pedometer etc. are fixed eventually
End.
It is different from the prior art, the present embodiment can carry out digital label to media data according to the transmission information of media data
The data frame for needing to be digitally signed can be adjusted flexibly in name, carry out digital label without all data frames to media data
Name, can be improved the flexibility ratio and false distinguishing efficiency of media data false distinguishing.
The application is it is further proposed that a kind of storage medium, as shown in figure 8, Fig. 8 is one embodiment of the application storage medium
Structural schematic diagram.The present embodiment storage medium 801 is used to store the related data 802 and program data 803 of above-described embodiment,
In, related data 802 includes at least above-mentioned media data etc., and program data 803 can be performed in the above way embodiment
The tamper resistant method of media data.Related data 802 and program data 803 have carried out in above method embodiment detailed
Narration, does not repeat here.
It is soft that the present embodiment storage medium 801 can be, but not limited to, USB flash disk, SD card, PD CD-ROM drive, mobile hard disk, large capacity
Drive, flash memory, multimedia memory card, server etc..
It is different from the prior art, the tamper resistant method of the embodiment of the present application media data includes: the biography for monitoring media data
Defeated information, to obtain monitoring result;According to monitoring result from media data fetching portion data frame;Using hash algorithm to portion
Divided data frame is digitally signed.In this way, the embodiment of the present application can be according to the transmission acquisition of information of media data
Partial data frame, and partial data frame is digitally signed.Therefore, the embodiment of the present application can be according to the transmission of media data
Information is digitally signed media data, and the data frame for needing to be digitally signed can be adjusted flexibly, without to media number
According to all data frames be digitally signed, can be improved the flexibility ratio and false distinguishing efficiency of media data false distinguishing.
If in addition, above-mentioned function realized in the form of software function and as stand-alone product when selling or using, can deposit
Storage is in a mobile terminal read/write memory medium, that is, and the application also provides a kind of storage device for being stored with program data,
The method that described program data can be performed to realize above-described embodiment, the storage device can be for such as USB flash disk, CD, services
Device etc..That is, the application can be embodied in the form of software products comprising some instructions are used so that an intelligence
Energy terminal executes all or part of the steps of each embodiment the method.
In the description of the present application, reference term " one embodiment ", " some embodiments ", " example ", " specific example ",
Or the description of " some examples " etc. means particular features, structures, materials, or characteristics packet described in conjunction with this embodiment or example
In at least one embodiment or example contained in the application.In the present specification, schematic expression of the above terms are necessarily
It is directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be at any one
Or it can be combined in any suitable manner in multiple embodiment or examples.In addition, without conflicting with each other, those skilled in the art
Member the feature of different embodiments or examples described in this specification and different embodiments or examples can be combined and
Combination.
In addition, term " first ", " second " are used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance
Or implicitly indicate the quantity of indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or
Implicitly include at least one this feature.In the description of the present application, the meaning of " plurality " is at least two, such as two, three
It is a etc., unless otherwise specifically defined.
Any process described otherwise above or method description are construed as in flow chart or herein, and expression includes
It is one or more for realizing specific logical function or process the step of executable instruction code module, segment or portion
Point, and the range of the preferred embodiment of the application includes other realization, wherein can not press shown or discussed suitable
Sequence, including according to related function by it is basic simultaneously in the way of or in the opposite order, Lai Zhihang function, this should be by the application
Embodiment person of ordinary skill in the field understood.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use
In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for
Instruction execution system, device or equipment (can be personal computer, server, the network equipment or other can be from instruction execution
System, device or equipment instruction fetch and the system executed instruction) it uses, or combine these instruction execution systems, device or equipment
And it uses.For the purpose of this specification, " computer-readable medium " can be it is any may include, store, communicate, propagate, or transport
Program is for instruction execution system, device or equipment or the device used in conjunction with these instruction execution systems, device or equipment.
The more specific example (non-exhaustive list) of computer-readable medium include the following: there is the electrical connection of one or more wirings
Portion's (electronic device), portable computer diskette box (magnetic device), random access memory (RAM), read-only memory (ROM) can
It wipes editable read-only memory (EPROM or flash memory), fiber device and portable optic disk read-only storage
(CDROM).In addition, computer-readable medium can even is that the paper that can print described program on it or other suitable Jie
Matter, because can then be edited, be interpreted or when necessary with other for example by carrying out optical scanner to paper or other media
Suitable method is handled electronically to obtain described program, is then stored in computer storage.
The foregoing is merely presently filed embodiments, are not intended to limit the scope of the patents of the application, all to utilize this
Equivalent structure or equivalent flow shift made by application specification and accompanying drawing content, it is relevant to be applied directly or indirectly in other
Technical field similarly includes in the scope of patent protection of the application.
Claims (10)
1. a kind of tamper resistant method of media data, which is characterized in that the tamper resistant method includes:
The transmission information of the media data is monitored, to obtain monitoring result;
According to monitoring result from the media data fetching portion data frame;
The partial data frame is digitally signed using hash algorithm.
2. tamper resistant method according to claim 1, which is characterized in that use hash algorithm to the part number described
After the step of being digitally signed according to frame, the tamper resistant method further comprises:
The media data and the digital signature are pushed into receiving end.
3. tamper resistant method according to claim 1, which is characterized in that it is described according to monitoring result from the media number
Before the step of middle fetching portion data frame, the tamper resistant method further comprises:
The media data is pushed to receiving end;
It is described to include: the step of fetching portion data frame from the media data according to monitoring result
During the push of the media data, according to monitoring result from the media data fetching portion data frame;
It is described using hash algorithm the partial data frame is digitally signed the step of after, the tamper resistant method into
One step includes:
The digital signature is pushed to the receiving end.
4. tamper resistant method according to claim 3, which is characterized in that it is described according to monitoring result from the media data
The step of middle fetching portion data frame includes:
The frame number of the partial data frame is obtained according to monitoring result;
According to the frame number from the media data fetching portion data frame.
5. tamper resistant method according to claim 4, which is characterized in that the transmission information of the monitoring media data
The step of include:
Monitor the data transmission quality of media data transmission link and/or the loading condition of the receiving end;
Wherein, the data transmission quality includes at least message transmission rate or the bit error rate.
6. tamper resistant method according to claim 5, which is characterized in that the partial data frame includes key frame and non-pass
Key frame, the non-key frame include prediction frame and/or ancillary frame, it is described according to monitoring result from the media data acquisition unit
The step of divided data frame includes:
If the message transmission rate is less than scheduled rate, set the frame number of the prediction frame and/or the ancillary frame to
First frame number;
If the message transmission rate is greater than or equal to the scheduled rate, by the prediction frame and/or the ancillary frame
Frame number is set as the second frame number, wherein first frame number is less than second frame number;
The fetching portion data frame from the media data according to first frame number or second frame number.
7. tamper resistant method according to claim 1, which is characterized in that the partial data frame includes key frame and non-pass
Key frame, the non-key frame includes predicting frame and/or ancillary frame, described to be counted using hash algorithm to the partial data frame
Word sign the step of include:
The key frame is obtained from the partial data frame, and Hash operation is carried out to the key frame, to generate first
Hash value;
Obtain the prediction frame and/or the ancillary frame from the partial data frame, and to the prediction frame and/or described auxiliary
Frame is helped to carry out Hash operation, to generate the second hash value;
The digital signature is generated according to first hash value and second hash value.
8. tamper resistant method according to claim 2, which is characterized in that described by the media data and the number
Before the step of signature pushes to receiving end, the tamper resistant method further comprises:
The media data and the digital signature are subjected to mutual decoupling processing.
9. a kind of terminal device, which is characterized in that the terminal device includes processor and the storage with processor coupling
Device, the processor are used to monitor the transmission information of the media data, to obtain monitoring result, and according to monitoring result from institute
Fetching portion data frame in media data is stated, the processor is used to carry out number to the partial data frame using hash algorithm
Signature.
10. a kind of storage medium, which is characterized in that be stored thereon with program data, described program data are performed realization power
Benefit requires the tamper resistant method of the described in any item media datas of 1-8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910642832.6A CN110427781A (en) | 2019-07-16 | 2019-07-16 | Tamper resistant method, terminal device and the storage medium of media data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910642832.6A CN110427781A (en) | 2019-07-16 | 2019-07-16 | Tamper resistant method, terminal device and the storage medium of media data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110427781A true CN110427781A (en) | 2019-11-08 |
Family
ID=68409766
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910642832.6A Pending CN110427781A (en) | 2019-07-16 | 2019-07-16 | Tamper resistant method, terminal device and the storage medium of media data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110427781A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101667999A (en) * | 2008-09-04 | 2010-03-10 | 华为技术有限公司 | Method and system for transmitting peer-to-peer broadcast stream, data signature device and client |
CN102395034A (en) * | 2011-12-22 | 2012-03-28 | 东北大学 | MPEG-4video chaotic encryption method based on intra prediction |
CN108777688A (en) * | 2018-06-07 | 2018-11-09 | 中国联合网络通信集团有限公司 | Video security monitoring method and system |
US20190116163A1 (en) * | 2013-07-29 | 2019-04-18 | Mobitv, Inc. | Efficient common storage of partially encrypted content |
-
2019
- 2019-07-16 CN CN201910642832.6A patent/CN110427781A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101667999A (en) * | 2008-09-04 | 2010-03-10 | 华为技术有限公司 | Method and system for transmitting peer-to-peer broadcast stream, data signature device and client |
CN102395034A (en) * | 2011-12-22 | 2012-03-28 | 东北大学 | MPEG-4video chaotic encryption method based on intra prediction |
US20190116163A1 (en) * | 2013-07-29 | 2019-04-18 | Mobitv, Inc. | Efficient common storage of partially encrypted content |
CN108777688A (en) * | 2018-06-07 | 2018-11-09 | 中国联合网络通信集团有限公司 | Video security monitoring method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3070630B1 (en) | Data system and method | |
US20210200903A1 (en) | Capture and presentation of authenticated data | |
US20110066723A1 (en) | Generating statistics of popular content | |
Karie et al. | Toward a general ontology for digital forensic disciplines | |
US20120078864A1 (en) | Electronic data integrity protection device and method and data monitoring system | |
CN110505141A (en) | Processing method, device, readable medium and the electronic equipment of instant communication information | |
US20220284130A1 (en) | Content Playlist Integrity | |
CN103152363B (en) | For the method and system that the self adaptation of state snapshot produces | |
JP4740706B2 (en) | Fraud image detection apparatus, method, and program | |
WO2023142957A1 (en) | Method and apparatus for verifying display terminal, storage medium, and electronic device | |
CN113656825B (en) | Text watermark embedding method, text tampering detection method, text watermark embedding device, text tampering detection device and electronic equipment | |
CN108683946A (en) | The method for realizing Online Video education based on recognition of face and caching mechanism | |
Lockwood et al. | Text based steganography | |
CN110929230A (en) | Work management method, device, equipment and storage medium | |
CN109688123A (en) | The method and system of one-way data transfer between inter-network system based on GM two dimensional code | |
Boyar et al. | Quotable signatures for authenticating shared quotes | |
CN117313759A (en) | Method, device, equipment and storage medium for data security transmission | |
CN110427781A (en) | Tamper resistant method, terminal device and the storage medium of media data | |
Li et al. | Lost in the digital wild: Hiding information in digital activities | |
Wang et al. | Perceptual hashing-based robust image authentication scheme for wireless multimedia sensor networks | |
CN104011718B (en) | For method, computer-readable medium and the computer of the message groups for selecting identification | |
CN113779304A (en) | Method and device for detecting infringement video | |
CN113994360A (en) | Using crowdsourcing to combat spurious information | |
Sun et al. | Improving the security and quality of real-time multimedia transmission in cyber-physical-social systems | |
CN117592124B (en) | Low-overhead anti-leakage and counterfeit certification method, device, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191108 |