CN111405223A - Video processing method, device and equipment - Google Patents

Video processing method, device and equipment Download PDF

Info

Publication number
CN111405223A
CN111405223A CN201910002443.7A CN201910002443A CN111405223A CN 111405223 A CN111405223 A CN 111405223A CN 201910002443 A CN201910002443 A CN 201910002443A CN 111405223 A CN111405223 A CN 111405223A
Authority
CN
China
Prior art keywords
video
information
access
account book
book information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910002443.7A
Other languages
Chinese (zh)
Inventor
杨波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Communications Ltd Research Institute
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Communications Ltd Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Communications Ltd Research Institute filed Critical China Mobile Communications Group Co Ltd
Priority to CN201910002443.7A priority Critical patent/CN111405223A/en
Publication of CN111405223A publication Critical patent/CN111405223A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/46Embedding additional information in the video signal during the compression process
    • H04N19/467Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • H04N2005/91307Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal
    • H04N2005/91335Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal the copy protection signal being a watermark

Abstract

The invention provides a video processing method, a video processing device and video processing equipment, and relates to the technical field of information processing. The method comprises the following steps: encrypting the received target video according to the first key; storing the encrypted target video and generating a corresponding access address; generating account book information according to the access address and the attribute information of the target video; and storing the account book information into a video monitoring information block chain. The scheme of the invention solves the problem that the traditional video monitoring system lacks convincing evidence for storing the video.

Description

Video processing method, device and equipment
Technical Field
The present invention relates to the field of information processing technologies, and in particular, to a video processing method, apparatus, and device.
Background
At present, video monitoring plays an increasingly important role in social life, public safety and communication. With the popularization of IP cameras (network cameras), the purchase and networking costs of video monitoring equipment are continuously reduced, and the industrial maturity and technical standards are higher and higher. In terms of business, more and more customers use video monitoring systems to realize safety engineering, transparent engineering and relief engineering for the safety of the customers and the service customers, such as: kindergartens, schools, superstores, parks, squares, pavements, dining halls, hotels, and office spaces are almost completely covered by video surveillance.
In a traditional video monitoring system structure, a front end mainly comprises an IP camera and network equipment, and is connected with a rear end through a local area network, and the rear end comprises a video processing server, a control server, storage equipment and a control terminal. In some cases, the monitoring system is connected to an external network via a wide area network, and provides a monitoring terminal to an upper-level department and a remote monitoring terminal to an authorized user using the internet. Some industries, enterprises and places are also provided with video content archiving systems, and data is transmitted to a centralized archiving system.
However, the conventional video monitoring system lacks effective unified archiving for storing the video, and reduces the convenience of video access.
Disclosure of Invention
The invention aims to provide a video processing method, a video processing device and video processing equipment, which are used for solving the problem that the conventional video monitoring system lacks effective unified archiving for storing videos and can finish targeted video access more conveniently.
To achieve the above object, an embodiment of the present invention provides a video processing method, including:
encrypting the received target video according to the first key;
the encrypted target video is stored externally, and a corresponding access address is generated;
generating account book information according to the access address and the attribute information of the target video;
and storing the account book information into a video monitoring information block chain.
The encrypting the received target video according to the first key comprises the following steps:
segmenting received video stream data acquired by cameras belonging to the same node to obtain a target video;
and encrypting the target video through the first key.
Wherein, the externally storing the encrypted target video comprises:
and storing the encrypted target video into an external storage object corresponding to the target video.
Wherein the ledger information comprises at least one of:
video identification;
time information of the video;
monitoring position of the video;
a hash value of the video;
home user and privacy level of the video;
an accessibility deadline of the video;
the access address of the video.
Wherein, after storing the account book information into the video monitoring information block chain, the method further comprises:
signing the account book information;
and broadcasting the signed account book information to a video monitoring block chain network.
Wherein the method further comprises:
extracting the account book information from broadcast information, and checking whether the account book information is recorded in a locally stored video block chain account book;
if the broadcast information is recorded, ignoring the broadcast information;
and if not, verifying the account book information, storing the account book information into a local video block chain account book after the account book information passes verification, and continuously broadcasting the account book information.
Wherein, if not, then verify the account book information, including:
and checking the source validity of the account book information, interacting with an external memory, and determining that a target video corresponding to the account book information is correctly stored and a fingerprint is correct.
Wherein, after storing the account book information into the video monitoring information block chain, the method further comprises:
after the access user passes the authorization verification, generating access initiation information and a digital watermark of the access;
searching a corresponding access video according to the access request of the access user;
and feeding back according to the search result.
Searching for a corresponding access video according to the access request of the access user comprises the following steps:
extracting account book information from the video monitoring information block chain;
matching the account book information with the retrieval information accessed at this time;
and if the matching is successful, extracting the access video according to the access address of the account book information.
Wherein, feedback is carried out according to the search result, and the method comprises the following steps:
if the account book information is not extracted, the feedback information indicates that the video is not stored;
if the account book information is extracted, but no access video is extracted according to the access address of the account book information, the feedback information indicates that the stored video is invalid;
if the access video is extracted, according to whether the first secret key can decrypt the access video, under the condition that decryption fails, feedback information indicates that the access video is not allowed to access; and under the condition of successful decryption, the digital watermark is superposed to the decrypted access video and then output to the playing device.
Wherein, after feeding back according to the search result, the method further comprises the following steps:
generating access information of the current access;
storing the access information into a video monitoring information block chain;
signing the access information;
and broadcasting the signed access information to a video monitoring block chain network.
Wherein the access information comprises at least one of:
the access initiation information;
the digital watermark encrypted using a second key;
accessing time information of the video;
and accessing the account book information identification of the video.
Wherein the method further comprises:
and if the feedback information of the accessed video indicates that the stored video is invalid, extracting historical access information of the current video.
To achieve the above object, an embodiment of the present invention provides a video processing apparatus, including:
the encryption module is used for encrypting the received target video according to the first secret key;
the first processing module is used for externally storing the encrypted target video and generating a corresponding access address;
the account book generating module is used for generating account book information according to the access address and the attribute information of the target video;
and the second processing module is used for storing the account book information into a video monitoring information block chain.
Wherein the encryption module comprises:
the preprocessing submodule is used for segmenting received video stream data acquired by cameras belonging to the same node to obtain a target video;
and the encryption submodule is used for encrypting the target video through the first secret key.
Wherein the first processing module is further configured to:
and storing the encrypted target video into an external storage object corresponding to the target video.
Wherein the ledger information comprises at least one of:
video identification;
time information of the video;
monitoring position of the video;
a hash value of the video;
home user and privacy level of the video;
an accessibility deadline of the video;
the access address of the video.
Wherein the apparatus further comprises:
the account book signing module is used for signing the account book information;
and the account book broadcasting module is used for broadcasting the signed account book information to the video monitoring block chain network.
Wherein the apparatus further comprises:
the account book processing module is used for extracting the account book information from broadcast information and checking whether the account book information is recorded in a locally stored video block chain account book; if the broadcast information is recorded, ignoring the broadcast information; and if not, verifying the account book information, storing the account book information into a local video block chain account book after the account book information passes verification, and continuously broadcasting the account book information.
Wherein, the ledger processing module is further configured to:
and checking the source validity of the account book information, interacting with an external memory, and determining that a target video corresponding to the account book information is correctly stored and a fingerprint is correct.
Wherein the apparatus further comprises:
the third processing module is used for generating access initiating information and digital watermarks of the access after the access user passes the authorization verification;
the searching module is used for searching the corresponding access video according to the access request of the access user;
and the fourth processing module is used for feeding back according to the search result.
Wherein the search module comprises:
the account book extraction submodule is used for extracting account book information from the video monitoring information block chain;
the matching submodule is used for matching the account book information with the retrieval information accessed at the time;
and the video extraction sub-module is used for extracting the access video according to the access address of the account book information if the matching is successful.
Wherein the fourth processing module is further configured to:
if the account book information is not extracted, the feedback information indicates that the video is not stored;
if the account book information is extracted, but no access video is extracted according to the access address of the account book information, the feedback information indicates that the stored video is invalid;
if the access video is extracted, according to whether the first secret key can decrypt the access video, under the condition that decryption fails, feedback information indicates that the access video is not allowed to access; and under the condition of successful decryption, the digital watermark is superposed to the decrypted access video and then output to the playing device.
Wherein the apparatus further comprises:
the access generation module is used for generating access information of the current access;
the fifth processing module is used for storing the access information into a video monitoring information block chain;
the access signature module is used for signing the access information;
and the access broadcasting module is used for broadcasting the signed access information to the video monitoring block chain network.
Wherein the access information comprises at least one of:
the access initiation information;
the digital watermark encrypted using a second key;
accessing time information of the video;
and accessing the account book information identification of the video.
Wherein the apparatus further comprises:
and the sixth processing module is used for extracting historical access information of the current video if the feedback information of the accessed video indicates that the stored video is invalid.
To achieve the above object, an embodiment of the present invention provides a network device, including a transceiver, a memory, a processor, and a computer program stored in the memory and executable on the processor; the processor, when executing the computer program, implements the video processing method as described above.
To achieve the above object, an embodiment of the present invention provides a computer-readable storage medium on which a computer program is stored, which, when executed by a processor, implements the steps in the video processing method as described above.
The technical scheme of the invention has the following beneficial effects:
according to the video processing method, firstly, a first key is used for encrypting a target video; then, externally storing the encrypted target video, and generating a corresponding access address for subsequent video access; and then generating the account book information of the target video according to the access address and the attribute information of the target video, and finally storing the account book information into a video monitoring information block chain. Therefore, efficient management of videos can be achieved through the account book information stored in the block chain, and more convenient video access is achieved.
Drawings
FIG. 1 is a flowchart illustrating a video processing method according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a video surveillance block chain network structure;
FIG. 3 is a diagram of an application of a video processing method according to an embodiment of the present invention;
FIG. 4 is a second flowchart illustrating a video processing method according to an embodiment of the invention;
FIG. 5 is a third flowchart illustrating a video processing method according to an embodiment of the invention;
FIG. 6 is a schematic diagram illustrating access to video extraction decisions;
FIG. 7 is a second application of the video processing method according to the embodiment of the present invention;
fig. 8 is a schematic diagram of a video block chain server to which the video processing method according to the embodiment of the present invention is applied;
FIG. 9 is a block diagram of a video processing apparatus according to an embodiment of the present invention;
fig. 10 is a schematic structural diagram of a network device according to an embodiment of the present invention.
Detailed Description
In order to make the technical problems, technical solutions and advantages of the present invention more apparent, the following detailed description is given with reference to the accompanying drawings and specific embodiments.
As shown in fig. 1, a video processing method according to an embodiment of the present invention includes:
step 101, encrypting a received target video according to a first key;
102, externally storing the encrypted target video and generating a corresponding access address;
103, generating account book information according to the access address and the attribute information of the target video;
and 104, storing the account book information into a video monitoring information block chain.
Through the steps 101-104, the video processing method according to the embodiment of the present invention first encrypts the target video by using the first key; then, externally storing the encrypted target video, and generating a corresponding access address for subsequent video access; and then generating the account book information of the target video according to the access address and the attribute information of the target video, and finally storing the account book information into a video monitoring information block chain. Therefore, efficient management of videos can be achieved through the account book information stored in the block chain, and more convenient video access is achieved.
In the embodiment, the first key is preset, and the video is encrypted by using the first key, so that the security of the video is improved.
It should be appreciated that the video processing method of this embodiment is mainly directed to a surveillance video, and is not limited to the surveillance video. The received surveillance video (target video) is acquired by a surveillance camera such as an IP camera, and a device (such as a separately deployed server or an original management server) applying the video processing method of the embodiment can receive the surveillance video acquired by all the surveillance cameras under a corresponding video surveillance node (such as a local area network region). The scale of the video monitoring nodes can be freely divided according to different physical positions, administrative management areas and security levels. In the video surveillance block chain network, as shown in fig. 2, the video surveillance block chain network includes a plurality of video surveillance nodes, and preferably, the devices to which the video processing method of the embodiment is applied are in one-to-one correspondence with the video surveillance nodes. In the video monitoring block chain network, the data network may be the Internet or a private network (e.g., a local area network, a private network, etc.).
In addition, considering that the camera sends the data stream of real-time monitoring shooting to the device applying the video processing method of this embodiment in a specific channel during continuous operation, for storage, optionally, step 101 includes:
segmenting received video stream data acquired by cameras belonging to the same node to obtain a target video;
and encrypting the target video through the first key.
Here, the received video stream data of each camera belonging to the same node (video monitoring node) as the apparatus to which the video processing method of the embodiment is applied is divided, and the video stream segment is encrypted as the target video. The division is performed based on a set rule, for example, a set time length is used for dividing the video stream data, for example, 5min is used as a unit.
After the encryption is completed, the encrypted target video can be stored externally. In this embodiment, different video monitoring nodes select respective corresponding business cloud storage services or block storage services on a common cloud according to respective service contracts, security level requirements, and business cooperation manners. Therefore, optionally, the encrypted target video is stored externally, including:
and storing the encrypted target video into an external storage object corresponding to the target video.
In this way, the encrypted target video can be stored in a desired location, and based on the external storage object, an access address can be generated so that the target video can be subsequently extracted from the external storage object through the access address.
Of course, for the received video stream data, the received video stream data is buffered and divided into the obtained video stream segments, and before further encryption, the quality of the video can be improved through transcoding, denoising and other processing, and the video description information of the video stream segments is generated. The video description information includes file identification (video summary), capture location, timestamp, time slice, file fingerprint, etc.
Accordingly, the attribute information of the target video includes at least one of: video identification; time information of the video; monitoring position of the video; a hash value of the video; home user and privacy level of the video; the period of accessibility of the video. The video identification ID is the only identification of the target video and can be used for searching the video; the time information of the video comprises a starting time, an ending time, a playing time length and the like; the monitoring position of the video is a monitoring area of the camera corresponding to the video; the hash value of the video is used for preventing the video from being tampered; the home subscriber and the privacy level accessibility period of the video are predetermined, and the home subscriber can be an individual or a unit; the video's accessibility deadline defines the time limit during which the video is accessible.
Therefore, the ledger information generated according to the access address and the attribute information of the target video optionally includes at least one of the following:
video identification;
time information of the video;
monitoring position of the video;
a hash value of the video;
home user and privacy level of the video;
an accessibility deadline of the video;
the access address of the video.
In addition, in this embodiment, the ledger information is packaged in the form of transaction content and submitted to the video monitoring information block chain for evidence storage. After the evidence is formed, through accounting on the blockchain, the content source information and the evidence chain which cannot be tampered are formed, and once a special event occurs, whether the camera video content is stored or not, whether the content on the storage service is extracted or not, and whether the video is subjectively unpublished or not by the party can be confirmed according to the record on the blockchain.
In order to enable other devices, which share the video surveillance information blockchain and apply the video processing method of this embodiment, in the video surveillance blockchain network to perform verification, formula and accounting of this account information, in this embodiment, optionally, after storing the account information in the video surveillance information blockchain, further includes:
signing the account book information;
and broadcasting the signed account book information to a video monitoring block chain network.
Here, the signature uses a preset private key.
Furthermore, a device to which the video processing method of this embodiment is applied can also acquire ledger information broadcasted by other devices through broadcast information, so optionally, the method further includes:
extracting the account book information from broadcast information, and checking whether the account book information is recorded in a locally stored video block chain account book;
if the broadcast information is recorded, ignoring the broadcast information;
and if not, verifying the account book information, storing the account book information into a local video block chain account book after the account book information passes verification, and continuously broadcasting the account book information.
Wherein, if not, then verify the account book information, including:
and checking the source validity of the account book information, interacting with an external memory, and determining that a target video corresponding to the account book information is correctly stored and a fingerprint is correct.
For example, as shown in fig. 3, after a video capture device (camera) in a video monitoring node 1 captures a video, the captured video is transmitted to a video zone chain server 1 (device to which the video processing method of this embodiment is applied) belonging to the video monitoring node 1, the video zone chain server 1 buffers video stream data and divides the divided video stream segments according to a preset rule, and pre-processes the video stream segments, wherein the pre-process includes buffering the video stream segments, encrypting video contents using a first key, and generating video description information, and then the video zone chain server 1 stores the video stream segments after encryption into a corresponding external storage device, wherein if the storage succeeds, a successful response including a storage address (e.g., UR L) is fed back to generate an access address, if the storage is identified, an error process is performed, such as selecting a secondary storage device or retrying, the account chain is prepared (i.e., the account information generated according to the access address and attribute information of the stored video stream segments is stored in a secondary storage device or a retry manner that the account chain server is capable of decrypting the account information stored in a local broadcast chain, and the local video zone chain is capable of being decrypted by a plurality of being stored in a local broadcast node n, and a local broadcast network, the local video zone chain server is capable of being verified, and the local broadcast information is not capable of being stored in a local broadcast, even if the local broadcast, the local broadcast node n is verified by a local broadcast node n, the local video zone chain server, the local video information is not capable of being verified, the local video information is stored in a plurality of being verified in a local broadcast node, the local video chain, the local video zone chain, the local video information is capable of being verified in a local video zone chain, and the local video zone chain, the local video information is capable of being verified in a plurality of being verified, and the local video zone chain, and the local.
It should also be noted that in this embodiment, in order to ensure that the video is not leaked, authorization verification is performed on the access user, so optionally, after storing the ledger information in the video monitoring information block chain, as shown in fig. 4, further including:
105, after the access user passes the authorization verification, generating access initiation information and a digital watermark of the access;
step 106, searching a corresponding access video according to the access request of the access user;
and step 107, feeding back according to the search result.
According to the steps, firstly, access initiating information and digital watermarks of the current access are generated for the access users passing the authorization verification, then corresponding access videos are searched according to the access requests of the access users, and finally the search results are fed back.
The authorization verification of the access user is to perform identity verification on the access user, and comprises identity marking, identity authentication and access authorization check. And for the access user passing the authorization verification, the generated access initiation information is used for recording the access, and the digital watermark is used for overlapping the access video. Specifically, the access initiation information includes: the method comprises the steps that an identifier of a terminal used by an access user for access, a time identifier of the access and an identity identifier of the access user are obtained; the digital watermark includes an identifier (e.g., a UUID or a non-repeating alphanumeric string) of the current access and a watermark P prepared for accessing the video according to the digital watermark generation rule.
In addition, in this embodiment, optionally, as shown in fig. 5, step 106 includes:
step 501, extracting account book information from the video monitoring information block chain;
step 502, matching the account book information with the retrieval information accessed at this time;
step 503, if the matching is successful, extracting the access video according to the access address of the account book information.
Based on the above step 501 and 503, firstly, the account information is extracted from the video monitoring information block chain, and the account information is matched with the retrieval information of the current access, so that the access video is extracted according to the access address in the account information when the matching is successful.
Specifically, the retrieved information is input by the visitor and includes, but is not limited to, a time period, a geographic location, and a privacy requirement. In the matching process, the account book information is sorted according to the storage time sequence based on the identification ID of the account book information in the video monitoring information block chain, and specific information items of the account book information are sequentially analyzed for matching. The extracted access video is encrypted by using the first key, so the first key is also needed to be used for decrypting the video stream segment, and then the digital watermark is superposed on the playing content and output to the playing end. The digital watermark superposition method can adopt a subtitle mode (display at a designated position or a random position) which can be seen by a visitor and can also adopt a frequency domain superposition mode, so that the visitor can not be detected by naked eyes.
However, in this embodiment, corresponding to the current access, there may be a case where the ledger information cannot be extracted, the ledger information is extracted but the access video is not extracted from the access address, and the access video is extracted but cannot be decrypted, so optionally, step 107 includes:
if the account book information is not extracted, the feedback information indicates that the video is not stored;
if the account book information is extracted, but no access video is extracted according to the access address of the account book information, the feedback information indicates that the stored video is invalid;
if the access video is extracted, according to whether the first secret key can decrypt the access video, under the condition that decryption fails, feedback information indicates that the access video is not allowed to access; and under the condition of successful decryption, the digital watermark is superposed to the decrypted access video and then output to the playing device.
Thus, as shown in fig. 6, it may be determined whether there is the ledger information, if the ledger information is not extracted, the accessing user is informed that the camera does not acquire the original data (the video is not stored), if the ledger information is extracted, the accessing user is informed that the accessing video is extracted from the storage device by the accessing address such as UR L, then, if the accessing video is not extracted, the accessing user is informed that the storage device is faulty (the stored video is invalid), if the accessing video is extracted, the first key is used for decryption, then, if the decryption is failed, the accessing user is informed that the accessing user is not willing to open (the accessing video does not allow access), and if the decryption is successful, the accessing user may successfully obtain the video content.
In this embodiment, after step 107, the method further includes:
generating access information of the current access;
storing the access information into a video monitoring information block chain;
signing the access information;
and broadcasting the signed access information to a video monitoring block chain network.
Therefore, corresponding access information is generated for each access, stored in the video monitoring information block chain, and signed and broadcast for tracing when unauthorized video expansion occurs subsequently. The specific implementation of the storage and broadcast of the access information is the same as the storage and broadcast of the account book information, and is not described herein again.
Wherein the access information comprises at least one of:
the access initiation information;
the digital watermark encrypted using a second key;
accessing time information of the video;
and accessing the account book information identification of the video.
Here, the time information of accessing the video includes a time stamp, a time start and a time stop of accessing the video; the account book information identification of the access video is the ID of the account book information recorded in the video monitoring information block chain.
In this embodiment, optionally, the method further includes:
and if the feedback information of the accessed video indicates that the stored video is invalid, extracting historical access information of the current video.
Therefore, in the case of video failure, historical access information is further extracted, so that a user can inquire the failure reason.
As shown in fig. 7, after the access user inputs the retrieval information of the access video, the video block chain server 1 initiates authorization verification for the access user, performs identity authentication and access authorization check for the access user, and records related information. If the access user does not pass the authorization verification, the process is ended; and if the access user passes the authorization verification, generating the access initiation information and the digital watermark of the current access. And then, for the access user passing the authorization verification, searching the corresponding access video. And if the access video in the storage device is successfully extracted, the access video is provided for the access user after caching, decryption and digital watermark superposition. After access-evidence uplink preparation (i.e., access information for a secondary access), the access information is stored in the video surveillance information block chain. And after the access information is signed, the access information is broadcasted in the video monitoring block chain network. In particular, video blockchain server 1 publishes access information to neighbor node P2P in the form of a transactional broadcast using a blockchain communication protocol. And the video zone chain server m belonging to the other node which has received the access information also distributes the access information to the video zone chain server nP2P of the neighbor node in the same manner. The video zone chain server 1, the video zone chain server m, and the video zone chain server n can verify the validity and integrity of access information by using zone chain account data check, source check, and the like. And recording the data passing the validity verification in each node, and forming a consistent deposit and certificate ledger among the nodes. And at this moment, the calling access of a monitoring video is finished, and in the calling process, the data segments are acquired by means of a storage and evidence-keeping account in the block chain, and the processes of decryption and watermarking are carried out in the home video block chain server. The video that is successfully provided to the accessing user is watermarked. The access log (access initiation information) and the watermark ciphertext are recorded in the blockchain in an undistortable manner, so that the source tracing can be realized when unauthorized video diffusion occurs later.
Through the above content, the video block chain server to which the video processing method of the embodiment is applied mainly includes, as shown in fig. 8, a video processing module, a block chain processing module, and a management module, where the video processing module implements a video transmission function, a video caching function, a video segmentation, combination, transcoding function, and a video encryption/decryption function; the block chain processing module realizes a communication function, an intelligent contract function, a common identification accounting function, a digital signature and verification function and a distributed account book storage and synchronization function; the management module realizes configuration management, key storage, authentication and authorization, storage management and access management.
In summary, in the video processing method according to the embodiment of the present invention, the target video is encrypted by using the first key; then, externally storing the encrypted target video, and generating a corresponding access address for subsequent video access; and then generating the account book information of the target video according to the access address and the attribute information of the target video, and finally storing the account book information into a video monitoring information block chain. And for the access request of the access user after the authorization verification, the corresponding access video is searched, and finally, the search result is fed back. Therefore, efficient management of videos can be achieved through the account book information stored in the block chain, more convenient and faster video access is achieved, and meanwhile, video access control for effectively tracing the access behaviors and the propagation behaviors of the videos is achieved.
As shown in fig. 9, a video processing apparatus according to an embodiment of the present invention includes:
an encrypting module 910, configured to encrypt the received target video according to a first key;
the first processing module 920 is configured to store the encrypted target video externally and generate a corresponding access address;
an account book generating module 930, configured to generate account book information according to the access address and the attribute information of the target video;
and a second processing module 940, configured to store the ledger information in a video monitoring information block chain.
Wherein the encryption module comprises:
the preprocessing submodule is used for segmenting received video stream data acquired by cameras belonging to the same node to obtain a target video;
and the encryption submodule is used for encrypting the target video through the first secret key.
Wherein the first processing module is further configured to:
and storing the encrypted target video into an external storage object corresponding to the target video.
Wherein the ledger information comprises at least one of:
video identification;
time information of the video;
monitoring position of the video;
a hash value of the video;
home user and privacy level of the video;
an accessibility deadline of the video;
the access address of the video.
Wherein the apparatus further comprises:
the account book signing module is used for signing the account book information;
and the account book broadcasting module is used for broadcasting the signed account book information to the video monitoring block chain network.
Wherein the apparatus further comprises:
the account book processing module is used for extracting the account book information from broadcast information and checking whether the account book information is recorded in a locally stored video block chain account book; if the broadcast information is recorded, ignoring the broadcast information; and if not, verifying the account book information, storing the account book information into a local video block chain account book after the account book information passes verification, and continuously broadcasting the account book information.
Wherein, the ledger processing module is further configured to:
and checking the source validity of the account book information, interacting with an external memory, and determining that a target video corresponding to the account book information is correctly stored and a fingerprint is correct.
Wherein the apparatus further comprises:
the third processing module is used for generating access initiating information and digital watermarks of the access after the access user passes the authorization verification;
the searching module is used for searching the corresponding access video according to the access request of the access user;
and the fourth processing module is used for feeding back according to the search result.
Wherein the search module comprises:
the account book extraction submodule is used for extracting account book information from the video monitoring information block chain;
the matching submodule is used for matching the account book information with the retrieval information accessed at the time;
and the video extraction sub-module is used for extracting the access video according to the access address of the account book information if the matching is successful.
Wherein the fourth processing module is further configured to:
if the account book information is not extracted, the feedback information indicates that the video is not stored;
if the account book information is extracted, but no access video is extracted according to the access address of the account book information, the feedback information indicates that the stored video is invalid;
if the access video is extracted, according to whether the first secret key can decrypt the access video, under the condition that decryption fails, feedback information indicates that the access video is not allowed to access; and under the condition of successful decryption, the digital watermark is superposed to the decrypted access video and then output to the playing device.
Wherein the apparatus further comprises:
the access generation module is used for generating access information of the current access;
the fifth processing module is used for storing the access information into a video monitoring information block chain;
the access signature module is used for signing the access information;
and the access broadcasting module is used for broadcasting the signed access information to the video monitoring block chain network.
Wherein the access information comprises at least one of:
the access initiation information;
the digital watermark encrypted using a second key;
accessing time information of the video;
and accessing the account book information identification of the video.
Wherein the apparatus further comprises:
and the sixth processing module is used for extracting historical access information of the current video if the feedback information of the accessed video indicates that the stored video is invalid.
The video processing device of the embodiment of the invention uses the first key to encrypt the target video; then, externally storing the encrypted target video, and generating a corresponding access address for subsequent video access; and then generating the account book information of the target video according to the access address and the attribute information of the target video, and finally storing the account book information into a video monitoring information block chain. And for the access request of the access user after the authorization verification, the corresponding access video is searched, and finally, the search result is fed back. Therefore, efficient management of videos can be achieved through the account book information stored in the block chain, more convenient and faster video access is achieved, and meanwhile, video access control for effectively tracing the access behaviors and the propagation behaviors of the videos is achieved.
It should be noted that the device is the device to which the above embodiment is applied, and the implementation manner of the above embodiment is also applicable to the device, and the same technical effects can be achieved.
A network device according to another embodiment of the present invention, as shown in fig. 10, includes a transceiver 1010, a memory 1020, a processor 1000, and a computer program stored in the memory 1020 and executable on the processor 1000; the processor 1000 implements the video processing method described above when executing the computer program.
The transceiver 1010 is used for receiving and transmitting data under the control of the processor 1000.
Where in fig. 10, the bus architecture may include any number of interconnected buses and bridges, with various circuits being linked together, particularly one or more processors represented by processor 1000 and memory represented by memory 1020. The bus architecture may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. The bus interface provides an interface. The transceiver 1010 may be a number of elements including a transmitter and a receiver that provide a means for communicating with various other apparatus over a transmission medium. The processor 1000 is responsible for managing the bus architecture and general processing, and the memory 1020 may store data used by the processor 1000 in performing operations.
The computer-readable storage medium of the embodiment of the present invention stores a computer program thereon, and when the computer program is executed by a processor, the steps in the video processing method described above are implemented, and the same technical effects can be achieved. The computer-readable storage medium may be a Read-only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It is further noted that many of the functional units described in this specification have been labeled as modules, in order to more particularly emphasize their implementation independence.
In embodiments of the present invention, modules may be implemented in software for execution by various types of processors. An identified module of executable code may, for instance, comprise one or more physical or logical blocks of computer instructions which may, for instance, be constructed as an object, procedure, or function. Nevertheless, the executables of an identified module need not be physically located together, but may comprise disparate instructions stored in different bits which, when joined logically together, comprise the module and achieve the stated purpose for the module.
Indeed, a module of executable code may be a single instruction, or many instructions, and may even be distributed over several different code segments, among different programs, and across several memory devices. Likewise, operational data may be identified within the modules and may be embodied in any suitable form and organized within any suitable type of data structure. The operational data may be collected as a single data set, or may be distributed over different locations including over different storage devices, and may exist, at least partially, merely as electronic signals on a system or network.
When a module can be implemented by software, considering the level of existing hardware technology, a module that can be implemented by software can build corresponding hardware circuits including conventional very large scale integration (V L SI) circuits or gate arrays and existing semiconductors such as logic chips, transistors, or other discrete components to implement corresponding functions, without considering the cost.
The exemplary embodiments described above are described with reference to the drawings, and many different forms and embodiments of the invention may be made without departing from the spirit and teaching of the invention, therefore, the invention is not to be construed as limited to the exemplary embodiments set forth herein. Rather, these exemplary embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. In the drawings, the size and relative sizes of elements may be exaggerated for clarity. The terminology used herein is for the purpose of describing particular example embodiments only and is not intended to be limiting. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. Unless otherwise indicated, a range of values, when stated, includes the upper and lower limits of the range and any subranges therebetween.
While the foregoing is directed to the preferred embodiment of the present invention, it will be understood by those skilled in the art that various changes and modifications may be made without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (28)

1. A video processing method, comprising:
encrypting the received target video according to the first key;
the encrypted target video is stored externally, and a corresponding access address is generated;
generating account book information according to the access address and the attribute information of the target video;
and storing the account book information into a video monitoring information block chain.
2. The method of claim 1, wherein encrypting the received target video according to the first key comprises:
segmenting received video stream data acquired by cameras belonging to the same node to obtain a target video;
and encrypting the target video through the first key.
3. The method of claim 1, wherein externally storing the encrypted target video comprises:
and storing the encrypted target video into an external storage object corresponding to the target video.
4. The method of claim 1, wherein the ledger information comprises at least one of:
video identification;
time information of the video;
monitoring position of the video;
a hash value of the video;
home user and privacy level of the video;
an accessibility deadline of the video;
the access address of the video.
5. The method of claim 1, further comprising, after storing the ledger information into a video surveillance information block chain:
signing the account book information;
and broadcasting the signed account book information to a video monitoring block chain network.
6. The method of claim 1, further comprising:
extracting the account book information from broadcast information, and checking whether the account book information is recorded in a locally stored video block chain account book;
if the broadcast information is recorded, ignoring the broadcast information;
and if not, verifying the account book information, storing the account book information into a local video block chain account book after the account book information passes verification, and continuously broadcasting the account book information.
7. The method of claim 6, wherein verifying the ledger information if not recorded comprises:
and checking the source validity of the account book information, interacting with an external memory, and determining that a target video corresponding to the account book information is correctly stored and a fingerprint is correct.
8. The method of claim 1, further comprising, after storing the ledger information into a video surveillance information block chain:
after the access user passes the authorization verification, generating access initiation information and a digital watermark of the access;
searching a corresponding access video according to the access request of the access user;
and feeding back according to the search result.
9. The method of claim 8, wherein searching for the corresponding access video according to the access request of the access user comprises:
extracting account book information from the video monitoring information block chain;
matching the account book information with the retrieval information accessed at this time;
and if the matching is successful, extracting the access video according to the access address of the account book information.
10. The method of claim 9, wherein feeding back according to the search result comprises:
if the account book information is not extracted, the feedback information indicates that the video is not stored;
if the account book information is extracted, but no access video is extracted according to the access address of the account book information, the feedback information indicates that the stored video is invalid;
if the access video is extracted, according to whether the first secret key can decrypt the access video, under the condition that decryption fails, feedback information indicates that the access video is not allowed to access; and under the condition of successful decryption, the digital watermark is superposed to the decrypted access video and then output to the playing device.
11. The method of claim 8, after the feedback according to the search result, further comprising:
generating access information of the current access;
storing the access information into a video monitoring information block chain;
signing the access information;
and broadcasting the signed access information to a video monitoring block chain network.
12. The method of claim 11, wherein the access information comprises at least one of:
the access initiation information;
the digital watermark encrypted using a second key;
accessing time information of the video;
and accessing the account book information identification of the video.
13. The method of claim 11, further comprising:
and if the feedback information of the accessed video indicates that the stored video is invalid, extracting historical access information of the current video.
14. A video processing apparatus, comprising:
the encryption module is used for encrypting the received target video according to the first secret key;
the first processing module is used for externally storing the encrypted target video and generating a corresponding access address;
the account book generating module is used for generating account book information according to the access address and the attribute information of the target video;
and the second processing module is used for storing the account book information into a video monitoring information block chain.
15. The apparatus of claim 14, wherein the encryption module comprises:
the preprocessing submodule is used for segmenting received video stream data acquired by cameras belonging to the same node to obtain a target video;
and the encryption submodule is used for encrypting the target video through the first secret key.
16. The apparatus of claim 14, wherein the first processing module is further configured to:
and storing the encrypted target video into an external storage object corresponding to the target video.
17. The apparatus of claim 14, wherein the ledger information comprises at least one of:
video identification;
time information of the video;
monitoring position of the video;
a hash value of the video;
home user and privacy level of the video;
an accessibility deadline of the video;
the access address of the video.
18. The apparatus of claim 14, further comprising:
the account book signing module is used for signing the account book information;
and the account book broadcasting module is used for broadcasting the signed account book information to the video monitoring block chain network.
19. The apparatus of claim 14, further comprising:
the account book processing module is used for extracting the account book information from broadcast information and checking whether the account book information is recorded in a locally stored video block chain account book; if the broadcast information is recorded, ignoring the broadcast information; and if not, verifying the account book information, storing the account book information into a local video block chain account book after the account book information passes verification, and continuously broadcasting the account book information.
20. The apparatus of claim 19, wherein the ledger processing module is further configured to:
and checking the source validity of the account book information, interacting with an external memory, and determining that a target video corresponding to the account book information is correctly stored and a fingerprint is correct.
21. The apparatus of claim 14, further comprising:
the third processing module is used for generating access initiating information and digital watermarks of the access after the access user passes the authorization verification;
the searching module is used for searching the corresponding access video according to the access request of the access user;
and the fourth processing module is used for feeding back according to the search result.
22. The apparatus of claim 21, wherein the lookup module comprises:
the account book extraction submodule is used for extracting account book information from the video monitoring information block chain;
the matching submodule is used for matching the account book information with the retrieval information accessed at the time;
and the video extraction sub-module is used for extracting the access video according to the access address of the account book information if the matching is successful.
23. The apparatus of claim 22, wherein the fourth processing module is further configured to:
if the account book information is not extracted, the feedback information indicates that the video is not stored;
if the account book information is extracted, but no access video is extracted according to the access address of the account book information, the feedback information indicates that the stored video is invalid;
if the access video is extracted, according to whether the first secret key can decrypt the access video, under the condition that decryption fails, feedback information indicates that the access video is not allowed to access; and under the condition of successful decryption, the digital watermark is superposed to the decrypted access video and then output to the playing device.
24. The apparatus of claim 21, further comprising:
the access generation module is used for generating access information of the current access;
the fifth processing module is used for storing the access information into a video monitoring information block chain;
the access signature module is used for signing the access information;
and the access broadcasting module is used for broadcasting the signed access information to the video monitoring block chain network.
25. The apparatus of claim 24, wherein the access information comprises at least one of:
the access initiation information;
the digital watermark encrypted using a second key;
accessing time information of the video;
and accessing the account book information identification of the video.
26. The apparatus of claim 24, further comprising:
and the sixth processing module is used for extracting historical access information of the current video if the feedback information of the accessed video indicates that the stored video is invalid.
27. A network device comprising a transceiver, a memory, a processor, and a computer program stored on the memory and executable on the processor; characterized in that the processor, when executing the computer program, implements the video processing method according to any of claims 1-13.
28. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the video processing method according to any one of claims 1 to 13.
CN201910002443.7A 2019-01-02 2019-01-02 Video processing method, device and equipment Pending CN111405223A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910002443.7A CN111405223A (en) 2019-01-02 2019-01-02 Video processing method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910002443.7A CN111405223A (en) 2019-01-02 2019-01-02 Video processing method, device and equipment

Publications (1)

Publication Number Publication Date
CN111405223A true CN111405223A (en) 2020-07-10

Family

ID=71436068

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910002443.7A Pending CN111405223A (en) 2019-01-02 2019-01-02 Video processing method, device and equipment

Country Status (1)

Country Link
CN (1) CN111405223A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111918012A (en) * 2020-08-05 2020-11-10 杭州当虹科技股份有限公司 Video encryption and key management method based on private block chain
CN112235543A (en) * 2020-10-14 2021-01-15 重庆紫光华山智安科技有限公司 Video encryption method and system based on block chain
CN113923482A (en) * 2021-09-02 2022-01-11 北京奇艺世纪科技有限公司 Video playing method, system, electronic equipment and storage medium
CN114422117A (en) * 2021-12-14 2022-04-29 杭州宇链科技有限公司 Privacy-protecting video acquisition method and corresponding playing method thereof
CN114449314A (en) * 2020-11-05 2022-05-06 国家广播电视总局广播电视规划院 Audio-visual program management method, device, server equipment and storage medium
CN115119070A (en) * 2022-06-08 2022-09-27 中国银行股份有限公司 Video signing method, device and system based on alliance chain
CN115119070B (en) * 2022-06-08 2024-04-16 中国银行股份有限公司 Video signing method, device and system based on alliance chain

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105975868A (en) * 2016-04-29 2016-09-28 杭州云象网络技术有限公司 Block chain-based evidence preservation method and apparatus
CN107360156A (en) * 2017-07-10 2017-11-17 广东工业大学 P2P network method for cloud storage based on block chain under a kind of big data environment
CN107580196A (en) * 2017-07-28 2018-01-12 国创科视科技股份有限公司 A kind of video data shared system and method
WO2018032374A1 (en) * 2016-08-13 2018-02-22 深圳市樊溪电子有限公司 Encrypted storage system for block chain and method using same
CN107948736A (en) * 2017-11-03 2018-04-20 法信公证云(厦门)科技有限公司 A kind of audio and video preservation of evidence method and system
CN108462885A (en) * 2018-05-09 2018-08-28 广东工业大学 A kind of video storage method, device and medium based on block chain
CN108462568A (en) * 2018-02-11 2018-08-28 西安电子科技大学 A kind of secure file storage and sharing method based on block chain
CN109040012A (en) * 2018-06-19 2018-12-18 西安电子科技大学 A kind of data security protecting and sharing method based on block chain and system and application

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105975868A (en) * 2016-04-29 2016-09-28 杭州云象网络技术有限公司 Block chain-based evidence preservation method and apparatus
WO2018032374A1 (en) * 2016-08-13 2018-02-22 深圳市樊溪电子有限公司 Encrypted storage system for block chain and method using same
CN107360156A (en) * 2017-07-10 2017-11-17 广东工业大学 P2P network method for cloud storage based on block chain under a kind of big data environment
CN107580196A (en) * 2017-07-28 2018-01-12 国创科视科技股份有限公司 A kind of video data shared system and method
CN107948736A (en) * 2017-11-03 2018-04-20 法信公证云(厦门)科技有限公司 A kind of audio and video preservation of evidence method and system
CN108462568A (en) * 2018-02-11 2018-08-28 西安电子科技大学 A kind of secure file storage and sharing method based on block chain
CN108462885A (en) * 2018-05-09 2018-08-28 广东工业大学 A kind of video storage method, device and medium based on block chain
CN109040012A (en) * 2018-06-19 2018-12-18 西安电子科技大学 A kind of data security protecting and sharing method based on block chain and system and application

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111918012A (en) * 2020-08-05 2020-11-10 杭州当虹科技股份有限公司 Video encryption and key management method based on private block chain
CN112235543A (en) * 2020-10-14 2021-01-15 重庆紫光华山智安科技有限公司 Video encryption method and system based on block chain
CN112235543B (en) * 2020-10-14 2023-02-17 重庆紫光华山智安科技有限公司 Video encryption method and system based on block chain
CN114449314A (en) * 2020-11-05 2022-05-06 国家广播电视总局广播电视规划院 Audio-visual program management method, device, server equipment and storage medium
CN113923482A (en) * 2021-09-02 2022-01-11 北京奇艺世纪科技有限公司 Video playing method, system, electronic equipment and storage medium
CN114422117A (en) * 2021-12-14 2022-04-29 杭州宇链科技有限公司 Privacy-protecting video acquisition method and corresponding playing method thereof
CN114422117B (en) * 2021-12-14 2023-09-22 杭州宇链科技有限公司 Privacy-protected video acquisition method and corresponding playing method thereof
CN115119070A (en) * 2022-06-08 2022-09-27 中国银行股份有限公司 Video signing method, device and system based on alliance chain
CN115119070B (en) * 2022-06-08 2024-04-16 中国银行股份有限公司 Video signing method, device and system based on alliance chain

Similar Documents

Publication Publication Date Title
CN110535660B (en) Evidence obtaining service system based on block chain
CN111970129B (en) Data processing method and device based on block chain and readable storage medium
CN111405223A (en) Video processing method, device and equipment
EP3710974B1 (en) Method and arrangement for detecting digital content tampering
CN104255009B (en) System and method for the fragment integrity and authenticity of adaptive stream media
CN111292041B (en) Electronic contract generation method, device, equipment and storage medium
CN111475836B (en) File management method and device based on alliance block chain
KR20010041400A (en) Transmitting reviews with digital signatures
US20140304297A1 (en) Method, Server, and User Terminal for Providing and Acquiring Media Content
CN102427442A (en) Combining request-dependent metadata with media content
CN102045367A (en) Registration method and authentication server of real-name authentication
US8893307B2 (en) Information processing system and method for providing authorized content
CN105335667A (en) Innovation and creativity data processing method, device and system and certificate storing equipment
CN113065961A (en) Power block chain data management system
US20230074748A1 (en) Digital forensic image verification system
CN111193755B (en) Data access method, data encryption method and data encryption and access system
CN113468598A (en) Block chain-based certificate-preserving and security notarization system and method
US11258601B1 (en) Systems and methods for distributed digital rights management with decentralized key management
CN109902495B (en) Data fusion method and device
KR102389690B1 (en) Content delivery system
CN110807210B (en) Information processing method, platform, system and computer storage medium
CN110955909B (en) Personal data protection method and block link point
CN114666060B (en) Hyperledger Fabric-based electronic data security method and system
CN115964730A (en) Block chain information storage method based on alliance chain multi-chain
NL2028778B1 (en) Blockchain electronic contract management system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200710

RJ01 Rejection of invention patent application after publication