CN112203117A - Video source tracing and tamper-proof method based on video coder/decoder - Google Patents

Video source tracing and tamper-proof method based on video coder/decoder Download PDF

Info

Publication number
CN112203117A
CN112203117A CN202010969492.0A CN202010969492A CN112203117A CN 112203117 A CN112203117 A CN 112203117A CN 202010969492 A CN202010969492 A CN 202010969492A CN 112203117 A CN112203117 A CN 112203117A
Authority
CN
China
Prior art keywords
video
unit
file
equipment
tamper
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010969492.0A
Other languages
Chinese (zh)
Inventor
徐静
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Polytechnic University
Original Assignee
Xian Polytechnic University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Polytechnic University filed Critical Xian Polytechnic University
Priority to CN202010969492.0A priority Critical patent/CN112203117A/en
Publication of CN112203117A publication Critical patent/CN112203117A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2343Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements
    • H04N21/234309Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements by transcoding between formats or standards, e.g. from MPEG-2 to MPEG-4 or from Quicktime to Realvideo
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/235Processing of additional data, e.g. scrambling of additional data or processing content descriptors
    • H04N21/2353Processing of additional data, e.g. scrambling of additional data or processing content descriptors specifically adapted to content descriptors, e.g. coding, compressing or processing of metadata
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/433Content storage operation, e.g. storage operation in response to a pause request, caching operations
    • H04N21/4334Recording operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4402Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving reformatting operations of video signals for household redistribution, storage or real-time display
    • H04N21/440218Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving reformatting operations of video signals for household redistribution, storage or real-time display by transcoding between formats or standards, e.g. from MPEG-2 to MPEG-4
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • H04N21/8352Generation of protective data, e.g. certificates involving content or source identification data, e.g. Unique Material Identifier [UMID]

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Library & Information Science (AREA)
  • Television Signal Processing For Recording (AREA)

Abstract

The invention discloses a video source tracing and tamper-proofing method based on a video coder/decoder, which is implemented according to the following steps: after the video encoder carries out image coding on original image data collected from a camera, a corresponding video shooting device machine identification code is connected with video compression data and sent to a Hash calculation unit to generate a Hash value which is called a device video label, and the code is stored into a video file; and (3) decoding process: connecting the machine identification code of the video shooting equipment to be traced with the video compressed data extracted from the video file code stream, sending the video compressed data to a Hash calculation unit, generating a Hash value to be verified, comparing the Hash value with the extracted equipment video label, and if the comparison result is the same, determining that the video file is recorded by the video shooting equipment to be traced and the video content is not tampered. The video source tracing and tamper-proofing method based on the video coder/decoder solves the problems of higher algorithm computation complexity and system complexity in the prior art.

Description

Video source tracing and tamper-proof method based on video coder/decoder
Technical Field
The invention belongs to the technical field of video coding and decoding methods, and relates to a video source tracing and tamper-proofing method based on a video coder/decoder.
Background
Video data is a common information carrier in daily life and has very wide application, for example, a monitoring video recorded by a security monitoring camera can be used as strong evidence for dealing with various illegal criminal behaviors.
In the process of collecting and manufacturing video data, firstly, a photosensitive sensor in a camera collects original brightness and color data, then, the collected original image data needs to be subjected to video coding, and then, the video data subjected to the video coding is transmitted and stored, and finally, the use link is reached.
In the links of transmission and storage of video data, along with the increasingly powerful offline editing function of videos, the content of the video data is easily tampered illegally, and particularly in some key use scenes, such as law enforcement investigation, if the content of the monitoring video of a security monitoring camera is tampered illegally and is not identified, serious consequences can be brought.
Therefore, there is a very urgent need to trace back the source of a segment of video data and detect whether the video data has been tampered with. In order to achieve the purpose of video source tracing, a currently common method is to add name and model information and recording time of a video recording device to attributes of a video file, and to prevent attribute data and video content of the video file from being tampered, a hash algorithm and an asymmetric encryption algorithm are usually used to process a complete video file including file attributes and video content, so as to generate a separate video digital signature. When the video file is used in the later period, the original hash value needs to be decrypted from the video digital signature, and the original hash value is compared with the current hash value calculated by using the video file to determine whether the attribute data and the video content of the video file are tampered.
For example, in the above-mentioned common processing method, an additional processing link needs to be added to the video file to modify the file attribute and generate a digital signature for the complete video file by using a hash algorithm and an asymmetric encryption algorithm. In addition, in the common processing method, a hash algorithm and an asymmetric encryption algorithm are used at the same time, the algorithm has higher calculation complexity, and an improvement space is provided. Finally, in the above-mentioned common processing method, a digital signature independent of the video file is generated for the video file, and separate management is required in the transmission and storage processes, which increases the system complexity.
Disclosure of Invention
The invention aims to provide a video source tracing and tamper-proofing method based on a video coder/decoder, and solves the problems of high algorithm computation complexity and system complexity in the prior art.
The invention adopts the technical scheme that a video source tracing and tamper-proofing method based on a video coder/decoder is implemented according to the following steps:
step 1, encoding
The method comprises the steps that an original image and image parameters collected by video shooting equipment are input to a video compression unit, the video compression unit processes the original image and the image parameters to obtain video parameters and video compression data, a machine identification code and the video compression data of the video shooting equipment are input to a Hash calculation unit, the Hash calculation unit generates a Hash value called an equipment video label, the video compression data and the video parameters are all input to a video file encoding unit to encode video content, and then the encoded video file is stored or transmitted;
step 2, decoding
Sending the encoded video file into a video file analyzing unit for analyzing, analyzing video parameters, an equipment video tag and video compressed data, inputting the video compressed data and a machine identification code of video shooting equipment to be traced into a Hash calculating unit to generate a Hash value to be verified, comparing the Hash value to be verified with the equipment video tag, if the video compressed data and the machine identification code of the video shooting equipment to be traced are the same, determining that the video file is recorded by the video shooting equipment to be traced, and if the video content is not tampered, inputting the video parameters, the equipment video tag and the video compressed data into a video decoding unit for decoding, and then inputting the decoded video parameters, the equipment video tag and the video compressed data into image display equipment for displaying; if the difference is not the same, the video is proved to be not recorded by the video shooting equipment to be traced or the video content is tampered.
The present invention is also characterized in that,
the video encoder comprises a video compression unit, the video compression unit is in communication connection with a video file encoding unit, the video compression unit is also in communication connection with a Hash calculation unit, and the Hash calculation unit is in communication connection with the video file encoding unit.
The video decoder comprises a video analysis unit, the video analysis unit is in communication connection with a Hash calculation unit and a comparison unit, and the Hash calculation unit and the comparison unit are in common communication connection with a video decoding unit.
The comparison unit is used for comparing the hash value to be verified with the video label of the equipment.
When the video content is coded, the code stream format of the video file is expanded, the device video label generated in the step is used as a coding field to be coded together with the video content, and the coding field and the video content are stored into a single video file.
The invention has the beneficial effects that:
in the video coding stage, the hash algorithm is used, the device video label is generated based on the corresponding video shooting device machine identification code and the video compression data, and the device video label and the video content are coded and stored into a single video file together; the video tag of the device and the video content are stored together into a single video file, so that the digital signature of the file is prevented from being stored and managed separately outside the video file, and the complexity of the system is reduced.
In the video decoding stage, an equipment video label and video compressed data can be extracted from a single video file, the video compressed data and a video shooting equipment machine identification code to be traced are used for calculating a hash value to be verified, and the hash value is compared with the equipment video label, so that whether the video file is recorded by the video shooting equipment to be traced and whether the video content is tampered can be determined.
Drawings
FIG. 1 is a flow chart of the encoding work in the video source tracing and tamper-proofing method based on video codec of the present invention;
FIG. 2 is a flowchart illustrating the decoding operation in the video source tracing and tamper-proofing method based on video codec according to the present invention;
fig. 3 is a schematic diagram of video compression data in the video source tracing and tamper-proofing method based on video codec according to the present invention.
In the figure, 1 is a video compression unit, 2 is a video file encoding unit, 3 is a hash calculation unit, 4 is a video file parsing unit, 5 is a comparison unit, and 6 is a video decoding unit.
Detailed Description
The present invention will be described in detail below with reference to the accompanying drawings and specific embodiments.
The invention relates to a video source tracing and tamper-proofing method based on a video coder/decoder, which is implemented according to the following steps:
step 1, encoding
The method comprises the steps that an original image and image parameters collected by video shooting equipment are input into a video compression unit 1, the video compression unit 1 processes the original image and the image parameters to obtain video parameters and video compression data, a machine identification code and the video compression data of the video shooting equipment are input into a Hash calculation unit 3, the Hash calculation unit 3 generates a Hash value called an equipment video label, the video compression data and the video parameters are all input into a video file encoding unit 2 to encode video content, and then the encoded video file is stored or transmitted;
step 2, decoding
Sending the encoded video file into a video file analyzing unit 4 for analyzing, analyzing video parameters, an equipment video tag and video compressed data, inputting the video compressed data and a machine identification code of a video shooting device to be traced into a Hash calculating unit 3 to generate a Hash value to be verified, comparing the Hash value to be verified with the equipment video tag, if the video compressed data and the machine identification code of the video shooting device to be traced are the same, determining that the video file is recorded by the video shooting device to be traced, and the video content is not tampered, inputting the video parameters, the equipment video tag and the video compressed data into a video decoding unit 6 for decoding and then inputting the decoded video parameters, the decoded video tags and the video compressed data into an image display device for displaying; if the difference is not the same, the video is proved to be not recorded by the video shooting equipment to be traced or the video content is tampered.
The video encoder comprises a video compression unit 1, the video compression unit 1 is in communication connection with a video file encoding unit 2, the video compression unit 1 is also in communication connection with a hash calculation unit 3, and the hash calculation unit 3 is in communication connection with the video file encoding unit 2.
The video decoder comprises a video analysis unit 4, the video analysis unit 4 is in communication connection with a hash calculation unit 3 and a comparison unit 5, and the hash calculation unit 3 and the comparison unit 5 are in common communication connection with a video decoding unit 6.
The comparison unit 5 is used for comparing the hash value to be verified with the device video tag.
When the video content is coded, the code stream format of the video file is expanded, the device video label generated in the step is used as a coding field to be coded together with the video content, and the coding field and the video content are stored into a single video file.
The video encoder can generate a hash value, called as an equipment video label, for the machine identification code of the video shooting equipment and the video compression data during video encoding; the method also expands the definition of the video file code stream format, so that the video label of the equipment and the video content can be coded together, and finally a single video file is generated, so that the single video file has the capability of video source tracing and tamper resistance. When the single video file is used in the later period, the video decoder realized by the method can extract the video tag of the device and the video compression data from the video file, and can determine whether the video file is recorded by the video shooting device to be traced and whether the video content is tampered or not by performing hash calculation and comparison with the machine identification code of the video shooting device to be traced.
In order to finally trace whether a section of video content is recorded by a specific video shooting device, the invention firstly proposes that a machine identification code is assigned to the video shooting device, the machine identification code should be assigned by a device manufacturer in a unified way, in order to play a certain secret role, the machine identification code is stored in a built-in memory of the video shooting device in a read-only mode and can be read by a hardware or software video encoder in the video shooting device, and the machine identification code is not visible outside the body of the video shooting device. Meanwhile, the machine identification codes are managed in a confidential mode by the manufacturer in a unified mode, and in the later period, when video content is traced, for example, whether certain video content is shot by a security monitoring camera installed in a certain specific place needs to be determined, the manufacturer can find the machine identification code corresponding to the specific camera from a machine identification code database managed in the confidential mode. Also, to be secure, the machine id should not be discontinuous so that one machine id is not used to infer another. The machine identification code may be in the form of a number and upper and lower case letter, sixteen characters in length, such as "9 aX2w3d5874sKa 69".
When recording a video, firstly, acquiring brightness and color data of an original image by a photosensitive sensor in video shooting equipment, and then performing video compression on the image, wherein the most widely used H.264 video compression coding standard is taken as an example in the invention, as shown in FIG. 3, after the original image is subjected to video compression, output data comprises two parts, namely video parameters (SPS (sequence Parameter set) and PPS (Picture Parameter set), which mainly comprise compression parameters used in the current image compression for later-stage video decoding; the second is video compression data, which comprises a series of IDR frames, I frames, P frames and B frames. The video parameters together with the video compression data are referred to as video content. The video content data is formed into a series of data code streams, such as SPS, PPS, IDR, P, B, I, P, B, P, SPS, PPS, IDR, P, I, B, P.
When the device video tag is generated, the corresponding machine identification code is read from the built-in memory of the video shooting device and is added after a video compressed data GOP, and the format is shown as GOP + "9 aX2w3d5874sKa 69". The invention selects to attach the machine identification code after one GOP of the video compressed data instead of after each IDR, I, P or B, thereby saving the operation resource and the storage space. The invention selects to attach the identification code after a video compression data GOP instead of a single complete video file, so that when video interception is carried out, an intercepted video clip still can contain a device video label.
The video compressed data GOP and the machine identification code need to be hashed together next. A GOP of video compressed data is typically tens of KB (kilobytes) or even larger, and in order to calculate the hash value quickly, the present invention chooses to use a bit-based hash algorithm. The algorithm reads a thirty-two bit number each time and carries out two shift operations and two exclusive OR operations on the thirty-two bit number until all data are read and operated in sequence, and finally a thirty-two bit hash value is obtained. Different hash values can be calculated for different video compressed data GOP data and different machine identification codes. The algorithm can realize higher operation efficiency by using bit operation, and has stronger capability of preventing Hash collision after verification. The thirty-two bit hash value calculated here is the device video tag.
When the video compression data is coded, the code stream format of the video file is expanded, the device video label generated in the step A1 is used as a coding field to be coded together with the video content, and the coded field and the video content are stored into a single complete video file.
According to the specification of the H264 video compression coding standard, the video content comprises video parameters and video compression data, and a data code stream in the form of "SPS, PPS, IDR, P, B, I, P, B, P, SPS, PPS, IDR, P, I, B, P.
According to the specification of H264 video compression coding standard, the format of video file code stream should accord with NAL (network Abstraction layer) format definition, as shown in Table 1, SPS, PPS and IDR correspond to field types 7, 8 and 5 respectively, and types 13 to 23 are reserved and not used.
TABLE 1
Type of field Description of the invention
1 I, P, and B
5 IDR
6 SEI
7 SPS
8 PPS
10 Video sequence end
13…23 Remain unused
By using the method to design and improve the video decoder, two new steps are introduced in the using link of the video, so that the source tracing and the detection of whether the video content is tampered or not can be carried out on the single and complete video file generated in the step 2.
The video decoder implemented by using the method needs to extract the device video tag generated in the step 1 from the video file code stream to be traced, and extract the video compression data to calculate the hash value to be verified.
After the video decoder reads the video file, the extended NAL format definition can extract the standby video label DVI corresponding to the field type 13 from the video file code stream, and simultaneously can extract a series of IDR, I, P or B frame images of the field type 1 or 5 to form one GOP of video compression data.
And connecting the machine identification code of the video shooting equipment to be traced with the video compressed data extracted from the video file code stream, sending the video compressed data to a Hash calculation unit, generating a Hash value to be verified, and comparing the Hash value with the extracted video label of the equipment.
To determine whether a video file was recorded by a particular video capture device, the machine identification code assigned to the particular device is obtained from the manufacturer's secure database. As shown in fig. 2, the machine id is added to the GOP of the video compressed data extracted in step B1, and the resultant is sent to a hash calculation unit, so that a hash value to be verified can be generated.
Comparing the hash value to be verified with the extracted device video label, if the values of the hash value to be verified and the extracted device video label are the same, it is indicated that the video file is recorded by a certain specific video shooting device to be traced, and the video content is not tampered, so that the video content comprises video parameters and video compression data, and can be continuously sent to a video decoding unit for video decoding to obtain an original image; if the hash value to be verified is different from the comparison result value of the video label of the device, it is indicated that the video file is not recorded by a specific video shooting device to be traced or the video content is tampered, the content of the video file is not credible, and video decoding does not need to be continued.
The method connects the machine identification code of the video shooting equipment with the video compression data for Hash calculation to generate the equipment video label, can be used for tracing to the specific video shooting equipment generating the video file, and can detect whether the content of the video file is tampered.
The invention also expands the code stream format of the video file, and can encode and store the video label of the device and the corresponding video content into a single and complete video file. According to the code stream format of the expanded video file, the video label of the device can be smoothly extracted from the video file when the video file is used, so that the tracing and tamper-proof detection can be carried out.
The video codec designed by the invention can generate the device video label based on the corresponding video shooting device machine identification code and the video compression data by using a Hash algorithm in the video coding stage, and codes and stores the device video label and the video content as a single video file. The above process only uses the Hash algorithm without using the asymmetric encryption algorithm, thereby saving the operation resources and improving the real-time processing capability; the video tag of the device and the video content are stored together into a single video file, so that the digital signature of the file is prevented from being stored and managed separately outside the video file, and the complexity of the system is reduced.
In the video decoding stage, the device video tag and the video compressed data can be extracted from the single video file, the hash value to be verified is calculated by using the video compressed data and the machine identification code of the video shooting device to be traced, and the hash value is compared with the device video tag, so that whether the video file is recorded by the video shooting device to be traced and whether the video content is tampered can be determined. Therefore, the machine identification code of the video shooting device is introduced into the calculation of the hash value, the method can be used for detecting whether the video content is falsified or not, and can also be used for tracing to the specific video shooting device recording the video, and the function has important significance in the field of application of the video of the security monitoring camera to law enforcement.

Claims (5)

1. The video source tracing and tamper-proofing method based on the video coder/decoder is characterized by comprising the following steps:
step 1, encoding
The method comprises the steps that an original image and image parameters collected by video shooting equipment are input into a video compression unit (1), the video compression unit (1) processes the original image and the image parameters to obtain video parameters and video compression data, a machine identification code and the video compression data of the video shooting equipment are input into a Hash calculation unit (3), the Hash calculation unit (3) generates a Hash value called an equipment video label, the video compression data and the video parameters are all input into a video file encoding unit (2) to encode video content, and then the encoded video file is stored or transmitted;
step 2, decoding
Sending the coded video file into a video file analyzing unit (4) for analyzing, analyzing video parameters, an equipment video tag and video compressed data, inputting the video compressed data and a machine identification code of video shooting equipment to be traced into a Hash calculating unit (3) to generate a Hash value to be verified, comparing the Hash value to be verified with the equipment video tag, if the video compressed data and the machine identification code of the video shooting equipment to be traced are the same, determining that the video file is recorded by the video shooting equipment to be traced, and if the video content is not tampered, inputting the video parameters, the equipment video tag and the video compressed data into a video decoding unit (6), decoding the video parameters, the equipment video tag and the video compressed data, and inputting the decoded video parameters, the equipment video tag and; if the difference is not the same, the video is proved to be not recorded by the video shooting equipment to be traced or the video content is tampered.
2. The video source tracing and tamper-proofing design method based on video coder/decoder according to claim 1, wherein the video coder comprises a video compression unit (1), the video compression unit (1) is communicatively connected with a video file encoding unit (2), the video compression unit (1) is further communicatively connected with a hash calculation unit (3), and the hash calculation unit (3) is communicatively connected with the video file encoding unit (2).
3. The video source tracing and tamper-proofing design method based on the video coder/decoder as claimed in claim 1, wherein the video decoder comprises a video parsing unit (4), the video parsing unit (4) is communicatively connected with a hash calculation unit (3) and a comparison unit (5), and the hash calculation unit (3) and the comparison unit (5) are communicatively connected with a video decoding unit (6) together.
4. The video traceability and tamper-resistant design method of the video codec of claim 3, wherein the comparison unit (5) is configured to compare the hash value to be verified with the device video tag.
5. The video source tracing and tamper-proofing design method based on the video codec as claimed in claim 1, wherein when the video content is encoded, the format of the video file code stream is expanded, the device video tag generated in the step is encoded together with the video content as an encoding field, and is stored as a single video file.
CN202010969492.0A 2020-09-15 2020-09-15 Video source tracing and tamper-proof method based on video coder/decoder Pending CN112203117A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010969492.0A CN112203117A (en) 2020-09-15 2020-09-15 Video source tracing and tamper-proof method based on video coder/decoder

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010969492.0A CN112203117A (en) 2020-09-15 2020-09-15 Video source tracing and tamper-proof method based on video coder/decoder

Publications (1)

Publication Number Publication Date
CN112203117A true CN112203117A (en) 2021-01-08

Family

ID=74015107

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010969492.0A Pending CN112203117A (en) 2020-09-15 2020-09-15 Video source tracing and tamper-proof method based on video coder/decoder

Country Status (1)

Country Link
CN (1) CN112203117A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115208700A (en) * 2022-09-15 2022-10-18 中电信数智科技有限公司 Data remote display method based on data integrity operation

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101021888A (en) * 2007-03-20 2007-08-22 陆小潮 Monitoring device and method for digital multimedia content playing
CN101123538A (en) * 2007-09-11 2008-02-13 东南大学 Remote encryption and supervision method for communication interfaces of wireless local network
CN106686530A (en) * 2016-12-29 2017-05-17 深圳市维康宝技术有限公司 Intelligent transmission method of data, and mobile terminal
CN107995384A (en) * 2017-11-23 2018-05-04 晨星半导体股份有限公司 Video tamper resistant method, video capture equipment and video verification method
CN108353005A (en) * 2015-09-22 2018-07-31 瑞博股份有限公司 Method and apparatus for monitoring control system
CN108833924A (en) * 2018-06-22 2018-11-16 东北大学 It is a kind of based on more security level video encryption algorithms H.265
US20190028719A1 (en) * 2017-07-24 2019-01-24 United States Postal Service Image encryption through dynamic compression code words
CN110677714A (en) * 2019-09-12 2020-01-10 北京奇艺世纪科技有限公司 Video data downloading method and device, electronic equipment and storage medium
CN110677435A (en) * 2019-10-28 2020-01-10 上海云赛智联信息科技有限公司 Monitoring information safety control system and monitoring management system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101021888A (en) * 2007-03-20 2007-08-22 陆小潮 Monitoring device and method for digital multimedia content playing
CN101123538A (en) * 2007-09-11 2008-02-13 东南大学 Remote encryption and supervision method for communication interfaces of wireless local network
CN108353005A (en) * 2015-09-22 2018-07-31 瑞博股份有限公司 Method and apparatus for monitoring control system
CN106686530A (en) * 2016-12-29 2017-05-17 深圳市维康宝技术有限公司 Intelligent transmission method of data, and mobile terminal
US20190028719A1 (en) * 2017-07-24 2019-01-24 United States Postal Service Image encryption through dynamic compression code words
CN107995384A (en) * 2017-11-23 2018-05-04 晨星半导体股份有限公司 Video tamper resistant method, video capture equipment and video verification method
CN108833924A (en) * 2018-06-22 2018-11-16 东北大学 It is a kind of based on more security level video encryption algorithms H.265
CN110677714A (en) * 2019-09-12 2020-01-10 北京奇艺世纪科技有限公司 Video data downloading method and device, electronic equipment and storage medium
CN110677435A (en) * 2019-10-28 2020-01-10 上海云赛智联信息科技有限公司 Monitoring information safety control system and monitoring management system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115208700A (en) * 2022-09-15 2022-10-18 中电信数智科技有限公司 Data remote display method based on data integrity operation
CN115208700B (en) * 2022-09-15 2022-12-20 中电信数智科技有限公司 Data remote display method based on data integrity operation

Similar Documents

Publication Publication Date Title
Korshunov et al. Deepfakes: a new threat to face recognition? assessment and detection
CN111510752B (en) Data transmission method, device, server and storage medium
CN107004271B (en) Display method, display apparatus, electronic device, computer program product, and storage medium
CN1988669B (en) Digital marking structure and verifying method in stream medium monitoring and broadcasting
CN102932650B (en) Video data integrity protection and verification method, equipment and system
US7747087B2 (en) Apparatus, method, and article of manufacture used to encode information into an image and to decode information from a captured image
CN108650491A (en) A kind of video watermark detection method towards monitoring system
CN105447642A (en) Engineering digital photograph verification system based on two-dimension code and verification method
CN112839244B (en) Monitoring video grading encryption and decryption method and system based on code stream grade
CN111277800A (en) Monitoring video coding and playing method and device, electronic equipment and storage medium
CN113111823A (en) Abnormal behavior detection method and related device for building construction site
CN112203117A (en) Video source tracing and tamper-proof method based on video coder/decoder
CN104902281B (en) A kind of information concealing method of the HEVC videos based on Hamming code+1
US11490134B2 (en) Method and system for codec of visual feature data
CN101252683A (en) Multifunctional watermark video camera
Meng et al. Coverless video steganography based on maximum DC coefficients
CN102158768B (en) MP4 file encapsulation format-based video authentication watermark embedding and extraction method
CN101442671A (en) Method and apparatus for embedding and extracting digital information
CN100396108C (en) A method for testing video frame rate of video coding-decoding system
CN105069740A (en) A .SER file format and a .SER file reading method
CN114302106A (en) Real estate registration, certificate-making and supervision method
CN113727146A (en) Cloud television video stream processing device and method based on block chain
CN108833921B (en) Encoding and decoding method and device
CN113012033A (en) Method, device and system for image display processing
CN112580644A (en) Testing method and device based on video stream cutout time and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210108