CN112203117A - Video source tracing and tamper-proof method based on video coder/decoder - Google Patents
Video source tracing and tamper-proof method based on video coder/decoder Download PDFInfo
- Publication number
- CN112203117A CN112203117A CN202010969492.0A CN202010969492A CN112203117A CN 112203117 A CN112203117 A CN 112203117A CN 202010969492 A CN202010969492 A CN 202010969492A CN 112203117 A CN112203117 A CN 112203117A
- Authority
- CN
- China
- Prior art keywords
- video
- unit
- file
- equipment
- tamper
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 230000006835 compression Effects 0.000 claims abstract description 47
- 238000007906 compression Methods 0.000 claims abstract description 47
- 238000004364 calculation method Methods 0.000 claims abstract description 27
- 238000013461 design Methods 0.000 claims description 5
- 238000004891 communication Methods 0.000 description 10
- 238000012544 monitoring process Methods 0.000 description 6
- 238000004458 analytical method Methods 0.000 description 4
- 238000003672 processing method Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000004148 unit process Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
- H04N21/2343—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements
- H04N21/234309—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements by transcoding between formats or standards, e.g. from MPEG-2 to MPEG-4 or from Quicktime to Realvideo
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/235—Processing of additional data, e.g. scrambling of additional data or processing content descriptors
- H04N21/2353—Processing of additional data, e.g. scrambling of additional data or processing content descriptors specifically adapted to content descriptors, e.g. coding, compressing or processing of metadata
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/433—Content storage operation, e.g. storage operation in response to a pause request, caching operations
- H04N21/4334—Recording operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
- H04N21/4402—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving reformatting operations of video signals for household redistribution, storage or real-time display
- H04N21/440218—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving reformatting operations of video signals for household redistribution, storage or real-time display by transcoding between formats or standards, e.g. from MPEG-2 to MPEG-4
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/835—Generation of protective data, e.g. certificates
- H04N21/8352—Generation of protective data, e.g. certificates involving content or source identification data, e.g. Unique Material Identifier [UMID]
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Library & Information Science (AREA)
- Television Signal Processing For Recording (AREA)
Abstract
The invention discloses a video source tracing and tamper-proofing method based on a video coder/decoder, which is implemented according to the following steps: after the video encoder carries out image coding on original image data collected from a camera, a corresponding video shooting device machine identification code is connected with video compression data and sent to a Hash calculation unit to generate a Hash value which is called a device video label, and the code is stored into a video file; and (3) decoding process: connecting the machine identification code of the video shooting equipment to be traced with the video compressed data extracted from the video file code stream, sending the video compressed data to a Hash calculation unit, generating a Hash value to be verified, comparing the Hash value with the extracted equipment video label, and if the comparison result is the same, determining that the video file is recorded by the video shooting equipment to be traced and the video content is not tampered. The video source tracing and tamper-proofing method based on the video coder/decoder solves the problems of higher algorithm computation complexity and system complexity in the prior art.
Description
Technical Field
The invention belongs to the technical field of video coding and decoding methods, and relates to a video source tracing and tamper-proofing method based on a video coder/decoder.
Background
Video data is a common information carrier in daily life and has very wide application, for example, a monitoring video recorded by a security monitoring camera can be used as strong evidence for dealing with various illegal criminal behaviors.
In the process of collecting and manufacturing video data, firstly, a photosensitive sensor in a camera collects original brightness and color data, then, the collected original image data needs to be subjected to video coding, and then, the video data subjected to the video coding is transmitted and stored, and finally, the use link is reached.
In the links of transmission and storage of video data, along with the increasingly powerful offline editing function of videos, the content of the video data is easily tampered illegally, and particularly in some key use scenes, such as law enforcement investigation, if the content of the monitoring video of a security monitoring camera is tampered illegally and is not identified, serious consequences can be brought.
Therefore, there is a very urgent need to trace back the source of a segment of video data and detect whether the video data has been tampered with. In order to achieve the purpose of video source tracing, a currently common method is to add name and model information and recording time of a video recording device to attributes of a video file, and to prevent attribute data and video content of the video file from being tampered, a hash algorithm and an asymmetric encryption algorithm are usually used to process a complete video file including file attributes and video content, so as to generate a separate video digital signature. When the video file is used in the later period, the original hash value needs to be decrypted from the video digital signature, and the original hash value is compared with the current hash value calculated by using the video file to determine whether the attribute data and the video content of the video file are tampered.
For example, in the above-mentioned common processing method, an additional processing link needs to be added to the video file to modify the file attribute and generate a digital signature for the complete video file by using a hash algorithm and an asymmetric encryption algorithm. In addition, in the common processing method, a hash algorithm and an asymmetric encryption algorithm are used at the same time, the algorithm has higher calculation complexity, and an improvement space is provided. Finally, in the above-mentioned common processing method, a digital signature independent of the video file is generated for the video file, and separate management is required in the transmission and storage processes, which increases the system complexity.
Disclosure of Invention
The invention aims to provide a video source tracing and tamper-proofing method based on a video coder/decoder, and solves the problems of high algorithm computation complexity and system complexity in the prior art.
The invention adopts the technical scheme that a video source tracing and tamper-proofing method based on a video coder/decoder is implemented according to the following steps:
The method comprises the steps that an original image and image parameters collected by video shooting equipment are input to a video compression unit, the video compression unit processes the original image and the image parameters to obtain video parameters and video compression data, a machine identification code and the video compression data of the video shooting equipment are input to a Hash calculation unit, the Hash calculation unit generates a Hash value called an equipment video label, the video compression data and the video parameters are all input to a video file encoding unit to encode video content, and then the encoded video file is stored or transmitted;
Sending the encoded video file into a video file analyzing unit for analyzing, analyzing video parameters, an equipment video tag and video compressed data, inputting the video compressed data and a machine identification code of video shooting equipment to be traced into a Hash calculating unit to generate a Hash value to be verified, comparing the Hash value to be verified with the equipment video tag, if the video compressed data and the machine identification code of the video shooting equipment to be traced are the same, determining that the video file is recorded by the video shooting equipment to be traced, and if the video content is not tampered, inputting the video parameters, the equipment video tag and the video compressed data into a video decoding unit for decoding, and then inputting the decoded video parameters, the equipment video tag and the video compressed data into image display equipment for displaying; if the difference is not the same, the video is proved to be not recorded by the video shooting equipment to be traced or the video content is tampered.
The present invention is also characterized in that,
the video encoder comprises a video compression unit, the video compression unit is in communication connection with a video file encoding unit, the video compression unit is also in communication connection with a Hash calculation unit, and the Hash calculation unit is in communication connection with the video file encoding unit.
The video decoder comprises a video analysis unit, the video analysis unit is in communication connection with a Hash calculation unit and a comparison unit, and the Hash calculation unit and the comparison unit are in common communication connection with a video decoding unit.
The comparison unit is used for comparing the hash value to be verified with the video label of the equipment.
When the video content is coded, the code stream format of the video file is expanded, the device video label generated in the step is used as a coding field to be coded together with the video content, and the coding field and the video content are stored into a single video file.
The invention has the beneficial effects that:
in the video coding stage, the hash algorithm is used, the device video label is generated based on the corresponding video shooting device machine identification code and the video compression data, and the device video label and the video content are coded and stored into a single video file together; the video tag of the device and the video content are stored together into a single video file, so that the digital signature of the file is prevented from being stored and managed separately outside the video file, and the complexity of the system is reduced.
In the video decoding stage, an equipment video label and video compressed data can be extracted from a single video file, the video compressed data and a video shooting equipment machine identification code to be traced are used for calculating a hash value to be verified, and the hash value is compared with the equipment video label, so that whether the video file is recorded by the video shooting equipment to be traced and whether the video content is tampered can be determined.
Drawings
FIG. 1 is a flow chart of the encoding work in the video source tracing and tamper-proofing method based on video codec of the present invention;
FIG. 2 is a flowchart illustrating the decoding operation in the video source tracing and tamper-proofing method based on video codec according to the present invention;
fig. 3 is a schematic diagram of video compression data in the video source tracing and tamper-proofing method based on video codec according to the present invention.
In the figure, 1 is a video compression unit, 2 is a video file encoding unit, 3 is a hash calculation unit, 4 is a video file parsing unit, 5 is a comparison unit, and 6 is a video decoding unit.
Detailed Description
The present invention will be described in detail below with reference to the accompanying drawings and specific embodiments.
The invention relates to a video source tracing and tamper-proofing method based on a video coder/decoder, which is implemented according to the following steps:
The method comprises the steps that an original image and image parameters collected by video shooting equipment are input into a video compression unit 1, the video compression unit 1 processes the original image and the image parameters to obtain video parameters and video compression data, a machine identification code and the video compression data of the video shooting equipment are input into a Hash calculation unit 3, the Hash calculation unit 3 generates a Hash value called an equipment video label, the video compression data and the video parameters are all input into a video file encoding unit 2 to encode video content, and then the encoded video file is stored or transmitted;
Sending the encoded video file into a video file analyzing unit 4 for analyzing, analyzing video parameters, an equipment video tag and video compressed data, inputting the video compressed data and a machine identification code of a video shooting device to be traced into a Hash calculating unit 3 to generate a Hash value to be verified, comparing the Hash value to be verified with the equipment video tag, if the video compressed data and the machine identification code of the video shooting device to be traced are the same, determining that the video file is recorded by the video shooting device to be traced, and the video content is not tampered, inputting the video parameters, the equipment video tag and the video compressed data into a video decoding unit 6 for decoding and then inputting the decoded video parameters, the decoded video tags and the video compressed data into an image display device for displaying; if the difference is not the same, the video is proved to be not recorded by the video shooting equipment to be traced or the video content is tampered.
The video encoder comprises a video compression unit 1, the video compression unit 1 is in communication connection with a video file encoding unit 2, the video compression unit 1 is also in communication connection with a hash calculation unit 3, and the hash calculation unit 3 is in communication connection with the video file encoding unit 2.
The video decoder comprises a video analysis unit 4, the video analysis unit 4 is in communication connection with a hash calculation unit 3 and a comparison unit 5, and the hash calculation unit 3 and the comparison unit 5 are in common communication connection with a video decoding unit 6.
The comparison unit 5 is used for comparing the hash value to be verified with the device video tag.
When the video content is coded, the code stream format of the video file is expanded, the device video label generated in the step is used as a coding field to be coded together with the video content, and the coding field and the video content are stored into a single video file.
The video encoder can generate a hash value, called as an equipment video label, for the machine identification code of the video shooting equipment and the video compression data during video encoding; the method also expands the definition of the video file code stream format, so that the video label of the equipment and the video content can be coded together, and finally a single video file is generated, so that the single video file has the capability of video source tracing and tamper resistance. When the single video file is used in the later period, the video decoder realized by the method can extract the video tag of the device and the video compression data from the video file, and can determine whether the video file is recorded by the video shooting device to be traced and whether the video content is tampered or not by performing hash calculation and comparison with the machine identification code of the video shooting device to be traced.
In order to finally trace whether a section of video content is recorded by a specific video shooting device, the invention firstly proposes that a machine identification code is assigned to the video shooting device, the machine identification code should be assigned by a device manufacturer in a unified way, in order to play a certain secret role, the machine identification code is stored in a built-in memory of the video shooting device in a read-only mode and can be read by a hardware or software video encoder in the video shooting device, and the machine identification code is not visible outside the body of the video shooting device. Meanwhile, the machine identification codes are managed in a confidential mode by the manufacturer in a unified mode, and in the later period, when video content is traced, for example, whether certain video content is shot by a security monitoring camera installed in a certain specific place needs to be determined, the manufacturer can find the machine identification code corresponding to the specific camera from a machine identification code database managed in the confidential mode. Also, to be secure, the machine id should not be discontinuous so that one machine id is not used to infer another. The machine identification code may be in the form of a number and upper and lower case letter, sixteen characters in length, such as "9 aX2w3d5874sKa 69".
When recording a video, firstly, acquiring brightness and color data of an original image by a photosensitive sensor in video shooting equipment, and then performing video compression on the image, wherein the most widely used H.264 video compression coding standard is taken as an example in the invention, as shown in FIG. 3, after the original image is subjected to video compression, output data comprises two parts, namely video parameters (SPS (sequence Parameter set) and PPS (Picture Parameter set), which mainly comprise compression parameters used in the current image compression for later-stage video decoding; the second is video compression data, which comprises a series of IDR frames, I frames, P frames and B frames. The video parameters together with the video compression data are referred to as video content. The video content data is formed into a series of data code streams, such as SPS, PPS, IDR, P, B, I, P, B, P, SPS, PPS, IDR, P, I, B, P.
When the device video tag is generated, the corresponding machine identification code is read from the built-in memory of the video shooting device and is added after a video compressed data GOP, and the format is shown as GOP + "9 aX2w3d5874sKa 69". The invention selects to attach the machine identification code after one GOP of the video compressed data instead of after each IDR, I, P or B, thereby saving the operation resource and the storage space. The invention selects to attach the identification code after a video compression data GOP instead of a single complete video file, so that when video interception is carried out, an intercepted video clip still can contain a device video label.
The video compressed data GOP and the machine identification code need to be hashed together next. A GOP of video compressed data is typically tens of KB (kilobytes) or even larger, and in order to calculate the hash value quickly, the present invention chooses to use a bit-based hash algorithm. The algorithm reads a thirty-two bit number each time and carries out two shift operations and two exclusive OR operations on the thirty-two bit number until all data are read and operated in sequence, and finally a thirty-two bit hash value is obtained. Different hash values can be calculated for different video compressed data GOP data and different machine identification codes. The algorithm can realize higher operation efficiency by using bit operation, and has stronger capability of preventing Hash collision after verification. The thirty-two bit hash value calculated here is the device video tag.
When the video compression data is coded, the code stream format of the video file is expanded, the device video label generated in the step A1 is used as a coding field to be coded together with the video content, and the coded field and the video content are stored into a single complete video file.
According to the specification of the H264 video compression coding standard, the video content comprises video parameters and video compression data, and a data code stream in the form of "SPS, PPS, IDR, P, B, I, P, B, P, SPS, PPS, IDR, P, I, B, P.
According to the specification of H264 video compression coding standard, the format of video file code stream should accord with NAL (network Abstraction layer) format definition, as shown in Table 1, SPS, PPS and IDR correspond to field types 7, 8 and 5 respectively, and types 13 to 23 are reserved and not used.
TABLE 1
Type of field | Description of the invention |
1 | I, P, and |
5 | |
6 | SEI |
7 | SPS |
8 | PPS |
10 | Video sequence end |
13…23 | Remain unused |
By using the method to design and improve the video decoder, two new steps are introduced in the using link of the video, so that the source tracing and the detection of whether the video content is tampered or not can be carried out on the single and complete video file generated in the step 2.
The video decoder implemented by using the method needs to extract the device video tag generated in the step 1 from the video file code stream to be traced, and extract the video compression data to calculate the hash value to be verified.
After the video decoder reads the video file, the extended NAL format definition can extract the standby video label DVI corresponding to the field type 13 from the video file code stream, and simultaneously can extract a series of IDR, I, P or B frame images of the field type 1 or 5 to form one GOP of video compression data.
And connecting the machine identification code of the video shooting equipment to be traced with the video compressed data extracted from the video file code stream, sending the video compressed data to a Hash calculation unit, generating a Hash value to be verified, and comparing the Hash value with the extracted video label of the equipment.
To determine whether a video file was recorded by a particular video capture device, the machine identification code assigned to the particular device is obtained from the manufacturer's secure database. As shown in fig. 2, the machine id is added to the GOP of the video compressed data extracted in step B1, and the resultant is sent to a hash calculation unit, so that a hash value to be verified can be generated.
Comparing the hash value to be verified with the extracted device video label, if the values of the hash value to be verified and the extracted device video label are the same, it is indicated that the video file is recorded by a certain specific video shooting device to be traced, and the video content is not tampered, so that the video content comprises video parameters and video compression data, and can be continuously sent to a video decoding unit for video decoding to obtain an original image; if the hash value to be verified is different from the comparison result value of the video label of the device, it is indicated that the video file is not recorded by a specific video shooting device to be traced or the video content is tampered, the content of the video file is not credible, and video decoding does not need to be continued.
The method connects the machine identification code of the video shooting equipment with the video compression data for Hash calculation to generate the equipment video label, can be used for tracing to the specific video shooting equipment generating the video file, and can detect whether the content of the video file is tampered.
The invention also expands the code stream format of the video file, and can encode and store the video label of the device and the corresponding video content into a single and complete video file. According to the code stream format of the expanded video file, the video label of the device can be smoothly extracted from the video file when the video file is used, so that the tracing and tamper-proof detection can be carried out.
The video codec designed by the invention can generate the device video label based on the corresponding video shooting device machine identification code and the video compression data by using a Hash algorithm in the video coding stage, and codes and stores the device video label and the video content as a single video file. The above process only uses the Hash algorithm without using the asymmetric encryption algorithm, thereby saving the operation resources and improving the real-time processing capability; the video tag of the device and the video content are stored together into a single video file, so that the digital signature of the file is prevented from being stored and managed separately outside the video file, and the complexity of the system is reduced.
In the video decoding stage, the device video tag and the video compressed data can be extracted from the single video file, the hash value to be verified is calculated by using the video compressed data and the machine identification code of the video shooting device to be traced, and the hash value is compared with the device video tag, so that whether the video file is recorded by the video shooting device to be traced and whether the video content is tampered can be determined. Therefore, the machine identification code of the video shooting device is introduced into the calculation of the hash value, the method can be used for detecting whether the video content is falsified or not, and can also be used for tracing to the specific video shooting device recording the video, and the function has important significance in the field of application of the video of the security monitoring camera to law enforcement.
Claims (5)
1. The video source tracing and tamper-proofing method based on the video coder/decoder is characterized by comprising the following steps:
step 1, encoding
The method comprises the steps that an original image and image parameters collected by video shooting equipment are input into a video compression unit (1), the video compression unit (1) processes the original image and the image parameters to obtain video parameters and video compression data, a machine identification code and the video compression data of the video shooting equipment are input into a Hash calculation unit (3), the Hash calculation unit (3) generates a Hash value called an equipment video label, the video compression data and the video parameters are all input into a video file encoding unit (2) to encode video content, and then the encoded video file is stored or transmitted;
step 2, decoding
Sending the coded video file into a video file analyzing unit (4) for analyzing, analyzing video parameters, an equipment video tag and video compressed data, inputting the video compressed data and a machine identification code of video shooting equipment to be traced into a Hash calculating unit (3) to generate a Hash value to be verified, comparing the Hash value to be verified with the equipment video tag, if the video compressed data and the machine identification code of the video shooting equipment to be traced are the same, determining that the video file is recorded by the video shooting equipment to be traced, and if the video content is not tampered, inputting the video parameters, the equipment video tag and the video compressed data into a video decoding unit (6), decoding the video parameters, the equipment video tag and the video compressed data, and inputting the decoded video parameters, the equipment video tag and; if the difference is not the same, the video is proved to be not recorded by the video shooting equipment to be traced or the video content is tampered.
2. The video source tracing and tamper-proofing design method based on video coder/decoder according to claim 1, wherein the video coder comprises a video compression unit (1), the video compression unit (1) is communicatively connected with a video file encoding unit (2), the video compression unit (1) is further communicatively connected with a hash calculation unit (3), and the hash calculation unit (3) is communicatively connected with the video file encoding unit (2).
3. The video source tracing and tamper-proofing design method based on the video coder/decoder as claimed in claim 1, wherein the video decoder comprises a video parsing unit (4), the video parsing unit (4) is communicatively connected with a hash calculation unit (3) and a comparison unit (5), and the hash calculation unit (3) and the comparison unit (5) are communicatively connected with a video decoding unit (6) together.
4. The video traceability and tamper-resistant design method of the video codec of claim 3, wherein the comparison unit (5) is configured to compare the hash value to be verified with the device video tag.
5. The video source tracing and tamper-proofing design method based on the video codec as claimed in claim 1, wherein when the video content is encoded, the format of the video file code stream is expanded, the device video tag generated in the step is encoded together with the video content as an encoding field, and is stored as a single video file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010969492.0A CN112203117A (en) | 2020-09-15 | 2020-09-15 | Video source tracing and tamper-proof method based on video coder/decoder |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010969492.0A CN112203117A (en) | 2020-09-15 | 2020-09-15 | Video source tracing and tamper-proof method based on video coder/decoder |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112203117A true CN112203117A (en) | 2021-01-08 |
Family
ID=74015107
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010969492.0A Pending CN112203117A (en) | 2020-09-15 | 2020-09-15 | Video source tracing and tamper-proof method based on video coder/decoder |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112203117A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115208700A (en) * | 2022-09-15 | 2022-10-18 | 中电信数智科技有限公司 | Data remote display method based on data integrity operation |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101021888A (en) * | 2007-03-20 | 2007-08-22 | 陆小潮 | Monitoring device and method for digital multimedia content playing |
CN101123538A (en) * | 2007-09-11 | 2008-02-13 | 东南大学 | Remote encryption and supervision method for communication interfaces of wireless local network |
CN106686530A (en) * | 2016-12-29 | 2017-05-17 | 深圳市维康宝技术有限公司 | Intelligent transmission method of data, and mobile terminal |
CN107995384A (en) * | 2017-11-23 | 2018-05-04 | 晨星半导体股份有限公司 | Video tamper resistant method, video capture equipment and video verification method |
CN108353005A (en) * | 2015-09-22 | 2018-07-31 | 瑞博股份有限公司 | Method and apparatus for monitoring control system |
CN108833924A (en) * | 2018-06-22 | 2018-11-16 | 东北大学 | It is a kind of based on more security level video encryption algorithms H.265 |
US20190028719A1 (en) * | 2017-07-24 | 2019-01-24 | United States Postal Service | Image encryption through dynamic compression code words |
CN110677714A (en) * | 2019-09-12 | 2020-01-10 | 北京奇艺世纪科技有限公司 | Video data downloading method and device, electronic equipment and storage medium |
CN110677435A (en) * | 2019-10-28 | 2020-01-10 | 上海云赛智联信息科技有限公司 | Monitoring information safety control system and monitoring management system |
-
2020
- 2020-09-15 CN CN202010969492.0A patent/CN112203117A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101021888A (en) * | 2007-03-20 | 2007-08-22 | 陆小潮 | Monitoring device and method for digital multimedia content playing |
CN101123538A (en) * | 2007-09-11 | 2008-02-13 | 东南大学 | Remote encryption and supervision method for communication interfaces of wireless local network |
CN108353005A (en) * | 2015-09-22 | 2018-07-31 | 瑞博股份有限公司 | Method and apparatus for monitoring control system |
CN106686530A (en) * | 2016-12-29 | 2017-05-17 | 深圳市维康宝技术有限公司 | Intelligent transmission method of data, and mobile terminal |
US20190028719A1 (en) * | 2017-07-24 | 2019-01-24 | United States Postal Service | Image encryption through dynamic compression code words |
CN107995384A (en) * | 2017-11-23 | 2018-05-04 | 晨星半导体股份有限公司 | Video tamper resistant method, video capture equipment and video verification method |
CN108833924A (en) * | 2018-06-22 | 2018-11-16 | 东北大学 | It is a kind of based on more security level video encryption algorithms H.265 |
CN110677714A (en) * | 2019-09-12 | 2020-01-10 | 北京奇艺世纪科技有限公司 | Video data downloading method and device, electronic equipment and storage medium |
CN110677435A (en) * | 2019-10-28 | 2020-01-10 | 上海云赛智联信息科技有限公司 | Monitoring information safety control system and monitoring management system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115208700A (en) * | 2022-09-15 | 2022-10-18 | 中电信数智科技有限公司 | Data remote display method based on data integrity operation |
CN115208700B (en) * | 2022-09-15 | 2022-12-20 | 中电信数智科技有限公司 | Data remote display method based on data integrity operation |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Korshunov et al. | Deepfakes: a new threat to face recognition? assessment and detection | |
CN111510752B (en) | Data transmission method, device, server and storage medium | |
CN107004271B (en) | Display method, display apparatus, electronic device, computer program product, and storage medium | |
CN1988669B (en) | Digital marking structure and verifying method in stream medium monitoring and broadcasting | |
CN102932650B (en) | Video data integrity protection and verification method, equipment and system | |
US7747087B2 (en) | Apparatus, method, and article of manufacture used to encode information into an image and to decode information from a captured image | |
CN108650491A (en) | A kind of video watermark detection method towards monitoring system | |
CN105447642A (en) | Engineering digital photograph verification system based on two-dimension code and verification method | |
CN112839244B (en) | Monitoring video grading encryption and decryption method and system based on code stream grade | |
CN111277800A (en) | Monitoring video coding and playing method and device, electronic equipment and storage medium | |
CN113111823A (en) | Abnormal behavior detection method and related device for building construction site | |
CN112203117A (en) | Video source tracing and tamper-proof method based on video coder/decoder | |
CN104902281B (en) | A kind of information concealing method of the HEVC videos based on Hamming code+1 | |
US11490134B2 (en) | Method and system for codec of visual feature data | |
CN101252683A (en) | Multifunctional watermark video camera | |
Meng et al. | Coverless video steganography based on maximum DC coefficients | |
CN102158768B (en) | MP4 file encapsulation format-based video authentication watermark embedding and extraction method | |
CN101442671A (en) | Method and apparatus for embedding and extracting digital information | |
CN100396108C (en) | A method for testing video frame rate of video coding-decoding system | |
CN105069740A (en) | A .SER file format and a .SER file reading method | |
CN114302106A (en) | Real estate registration, certificate-making and supervision method | |
CN113727146A (en) | Cloud television video stream processing device and method based on block chain | |
CN108833921B (en) | Encoding and decoding method and device | |
CN113012033A (en) | Method, device and system for image display processing | |
CN112580644A (en) | Testing method and device based on video stream cutout time and readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210108 |