CN112492248A - Video verification method and device - Google Patents

Video verification method and device Download PDF

Info

Publication number
CN112492248A
CN112492248A CN201910860057.1A CN201910860057A CN112492248A CN 112492248 A CN112492248 A CN 112492248A CN 201910860057 A CN201910860057 A CN 201910860057A CN 112492248 A CN112492248 A CN 112492248A
Authority
CN
China
Prior art keywords
verification data
video
target verification
recorded
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910860057.1A
Other languages
Chinese (zh)
Other versions
CN112492248B (en
Inventor
许良烽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Hikvision Digital Technology Co Ltd
Original Assignee
Hangzhou Hikvision Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Hikvision Digital Technology Co Ltd filed Critical Hangzhou Hikvision Digital Technology Co Ltd
Priority to CN201910860057.1A priority Critical patent/CN112492248B/en
Publication of CN112492248A publication Critical patent/CN112492248A/en
Application granted granted Critical
Publication of CN112492248B publication Critical patent/CN112492248B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • H04N2005/91307Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • H04N2005/91307Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal
    • H04N2005/91335Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal the copy protection signal being a watermark

Abstract

The application provides a video verification method and equipment. According to the method and the device, the first target verification data and the second target verification data which correspond to each other are added into the recorded video frame through the video recording equipment, so that whether the video frame recorded by the video recording equipment is artificially modified or not can be verified by the video verification equipment subsequently according to the first target verification data and the second target verification data which are added into the video frame, and the effectiveness and the safety of the video frame are improved.

Description

Video verification method and device
Technical Field
The present application relates to video technologies, and in particular, to a video verification method and apparatus.
Background
The law enforcement recorder, also known as police law enforcement recorder or field law enforcement recorder, integrates multiple functions of digital camera shooting, intercom and the like, can record videos aiming at dynamic or static field conditions in the law enforcement process, and is convenient for police officers to use in law enforcement.
Video data recorded by the law enforcement recorder often has the requirement of video notarization. Here, the video notarization means: and the notarization institution proves the authenticity and the legality of the video data according to the application of natural people, legal people or other organizations and a specified video verification mode. Currently, a commonly specified video verification method is, for example, the Message Digest algorithm (MD 5: Message Digest algorithm 5).
The existing video verification method only verifies the integrity of video data comprehensively and generally, but cannot verify whether the video data is modified manually. Taking MD5 as an example, if the video data a needs to be verified, the MD5 value of the video data a is calculated, the MD5 value is compared with the standard MD5 of the video data a, and if the MD5 value is the same as the standard MD5 of the video data a, the video data a is determined to be complete. However, if the video data a is artificially modified, and the modification does not affect the MD5 value of the video data a, it cannot be verified that the video data a is artificially modified according to the MD5 value, and the video data a is erroneously considered to be complete.
Disclosure of Invention
The application provides a video checking method and a video checking device, which are used for checking whether video data are artificially modified.
The technical scheme provided by the application comprises the following steps:
a video verification method is applied to a video recording device and comprises the following steps:
receiving a video recording instruction;
checking whether a target verification data corresponding relation meeting the video recording instruction exists in the obtained verification data corresponding relation, wherein the target verification data corresponding relation is a corresponding relation between first target verification data and second target verification data;
and if the corresponding relation of the target verification data exists, starting video recording according to the video recording instruction, and adding first target verification data and second target verification data into a recorded video frame, wherein the first target verification data and the second target verification data are used for verifying whether the video frame recorded by the video recording equipment is modified or not by the video verification equipment.
A video verification method is applied to video verification equipment and comprises the following steps:
acquiring first target verification data and second target verification data added in a video frame recorded by the video recording equipment;
searching a target verification data corresponding relation containing the first target verification data in the recorded verification data corresponding relation;
and if the corresponding relation of the target verification data is the corresponding relation between the first target verification data and the second target verification data, determining that the video frame recorded by the video recording equipment is not modified.
A video verification device, the method is applied to video recording equipment, including:
the receiving unit is used for receiving a video recording instruction;
an obtaining unit for obtaining the corresponding relation of the check data
The checking unit is used for checking whether a target verification data corresponding relation meeting the video recording instruction exists in the verification data corresponding relation acquired by the acquiring unit, wherein the target verification data corresponding relation is a corresponding relation between first target verification data and second target verification data;
and the recording unit is used for starting video recording according to the video recording instruction and adding first target verification data and second target verification data to a recorded video frame when the checking unit checks the corresponding relation of the target verification data, wherein the first target verification data and the second target verification data are used for verifying whether the video frame recorded by the video recording equipment is modified or not by video verification equipment.
A video verification method is applied to video verification equipment and comprises the following steps:
the verification data acquisition unit is used for acquiring first target verification data and second target verification data added in video frames recorded by the video recording equipment;
the verification unit is used for searching a target verification data corresponding relation containing the first target verification data in the recorded verification data corresponding relation; and if the corresponding relation of the target verification data is the corresponding relation between the first target verification data and the second target verification data, determining that the video frame recorded by the video recording equipment is not modified.
An electronic device, comprising: a processor and a machine-readable storage medium;
the machine-readable storage medium stores machine-executable instructions executable by the processor;
the processor is configured to execute machine-executable instructions to implement the above-described method.
According to the technical scheme, the first target verification data and the second target verification data which correspond to each other are added in the recorded video frame through the video recording equipment, so that whether the video frame recorded by the video recording equipment is artificially modified or not can be verified by the video verification equipment subsequently according to the first target verification data and the second target verification data which are added in the video frame, and the effectiveness and the safety of the video frame are improved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
FIG. 1 is a flow chart of a method provided by an embodiment of the present application;
fig. 2 is a flowchart of obtaining a corresponding relationship of check data according to an embodiment of the present application;
fig. 3 is a flowchart of checking a correspondence relationship between target verification data according to an embodiment of the present application;
fig. 4 is a flowchart illustrating adding first target verification data and second target verification data to a recorded video frame according to an embodiment of the present application;
fig. 5 is a flowchart illustrating first target verification data being added to a video frame according to an embodiment of the present application;
fig. 6 is a schematic diagram illustrating first target verification data added to a video frame according to an embodiment of the present application;
fig. 7 is a flowchart illustrating adding characters in second target verification data to a recorded video frame according to an embodiment of the present disclosure;
fig. 8 is a schematic diagram of adding watermark characters to a video frame according to an embodiment of the present application;
fig. 9 is another flowchart illustrating adding characters in second target verification data to a video frame according to an embodiment of the present application;
fig. 10 is a flowchart of data uploading provided in an embodiment of the present application;
fig. 11 is a flowchart of another video verification method provided in the embodiment of the present application;
FIG. 12 is a block diagram of an apparatus according to an embodiment of the present disclosure;
FIG. 13 is a block diagram of another apparatus according to an embodiment of the present disclosure;
fig. 14 is a hardware configuration diagram of a device according to an embodiment of the present application.
Detailed Description
According to the method provided by the application, the video recording equipment adds the first target verification data and the second target verification data which correspond to each other in the recorded video frame, so that whether the video frame recorded by the video recording equipment is artificially modified or not can be verified by the video verification equipment subsequently according to the first target verification data and the second target verification data which are added in the video frame, and the effectiveness and the safety of the video frame are improved.
In order to make the present application easier to understand, the method provided by the present application is described below with reference to the accompanying drawings and examples:
referring to fig. 1, fig. 1 is a flowchart of a method provided in an embodiment of the present application. The process is applied to a video recording device. As one example, the video recording device described above may be a law enforcement recorder.
As shown in fig. 1, the process may include the following steps:
step 101, a video recording device receives a video recording instruction.
As one example, a video recording device such as a law enforcement recorder is equipped with a record function key. The user triggers the recording function key when needing to record the video. Examples of the triggering recording function key include pressing the recording function key, clicking the recording function key, and the like, and the application is not particularly limited.
When the video recording device senses that the recording function key is triggered, the video recording device receives a video recording instruction.
Step 102, the video recording device checks whether a target verification data corresponding relation meeting the video recording instruction exists in the obtained verification data corresponding relation, if so, step 103 is executed.
In this embodiment, the corresponding relationship of the verification data obtained by the video recording device is used to verify whether the video frame is complete, and how to verify whether the video frame is complete is described in detail below. As for how the video recording device obtains the corresponding relationship of the check data, in this embodiment, there are many ways for the video recording device to obtain the corresponding relationship of the check data, and fig. 2 shows one of the ways by way of example, which is described in detail below and will not be described herein again for the moment.
As an example, the target verification data correspondence relationship is a correspondence relationship between the first target verification data and the second target verification data. Here, the first target verification data and the second target verification data are named for convenience of description only and are not limiting.
It should be noted that, in this embodiment, it does not concern about what data the first target verification data and the second target verification data are, and in this embodiment, by using the correspondence between the first target verification data and the second target verification data, it is possible to implement subsequent verification of whether a video frame recorded by a video recording device, such as a server, is modified, which is described in detail below and is not repeated here.
In order to facilitate the video verification device to successfully verify whether the video frame recorded by the video recording device is modified, it is necessary that the video recording device add the first target verification data and the second target verification data in the recorded video frame (that is, the first target verification data and the second target verification data may be used to verify whether the video frame recorded by the video recording device is modified). Therefore, in this embodiment, before the video recording device records the video frame according to the video recording instruction, it is necessary to check whether a target verification data corresponding relationship satisfying the video recording instruction exists in the obtained verification data corresponding relationship.
As for how the video recording device checks whether the obtained corresponding relationship of the check data has the corresponding relationship of the target check data that meets the video recording instruction, there are many implementation manners in this embodiment, and fig. 3 illustrates one implementation manner, which is not described herein again for the sake of brevity.
It should be noted that, in step 102, if it is detected that the target verification data corresponding relationship that meets the video recording instruction does not exist in the obtained verification data corresponding relationship, the video recording device may not perform any operation as an embodiment; or displaying an indication message, wherein the indication message is used for indicating that the target verification data corresponding relation does not exist.
And 103, the video recording equipment starts video recording according to the video recording instruction, and adds the first target verification data and the second target verification data to the recorded video frame.
As can be seen from step 103, the video recording device, such as a law enforcement recorder, will eventually add the first object verification data and the second object verification data to the recorded video frame. The first target verification data and the second target verification data are as described above, and are used for the video verification device to verify whether the video frame recorded by the video recording device is modified. Hereinafter, how the video verification device verifies whether the video frame recorded by the video recording device is modified according to the first target verification data and the second target verification data will be described, and details thereof are not repeated here.
As to how the video recording device adds the first target verification data and the second target verification data to the recorded video frame in step 103, there are many implementation manners in specific implementation, and fig. 4 shows one implementation manner by way of example, which is not described herein for the sake of brevity.
Thus, the flow shown in fig. 1 is completed.
Through the process shown in fig. 1, a video recording device such as a law enforcement recorder adds first target verification data and second target verification data to a recorded video frame, so that the video verification device verifies whether the video frame recorded by the video recording device is modified according to the first target verification data and the second target verification data, and the effectiveness and the safety of the video frame are improved.
How the video recording device obtains the corresponding relationship of the verification data in the above step 102 is described as follows:
referring to fig. 2, fig. 2 is a flowchart for obtaining a corresponding relationship of check data according to an embodiment of the present application. As shown in fig. 2, the process may include the following steps:
step 201, the video recording device sends a request to the video verification device to obtain the corresponding relationship of the verification data.
In one example, the video recording device may send the request to the video verification device after powering on the access network.
In another example, the video recording device may send the request to the video verification device if, among all currently acquired correspondence relationships of the verification data, it is found that the number of correspondence relationships of the idle verification data that are not occupied by the video frame is less than N. In one example, the free check data correspondence may include: and checking data corresponding relation without setting a use mark, wherein the use mark is used for indicating that the use mark is occupied. Here N is set to 2, for example, depending on the performance of the video recording device itself. By sending the request to the video verification equipment when the number of the idle verification data corresponding relations is less than N, the fact that the verification data corresponding relations are prepared before video recording can be guaranteed as far as possible, the verification data corresponding relations are not required to be obtained when the video recording starts immediately, and the video recording efficiency is improved.
When the video verification device receives the request sent by the video recording device, the video verification device selects at least one verification data corresponding relation. As for how the video verification device selects the corresponding relationship of the verification data, there are many implementation manners, such as selecting at least one new corresponding relationship of the verification data from the corresponding relationship pool of the verification data, and the like.
It should be noted that, as an embodiment, the request may be an HTTP request, but may also be other data connection requests, and the application does not specifically limit the type of the request.
After selecting at least one corresponding relationship of the verification data, the video verification device sends the selected at least one corresponding relationship of the verification data to the video recording device, and then performs the following step 202.
Step 202, the video recording device receives the corresponding relation of the verification data returned by the video verification device.
Therefore, the video recording device obtains the corresponding relation of the verification data.
Through the flow shown in fig. 2, how the video recording device obtains the corresponding relationship of the check data is realized. It should be noted that fig. 2 only describes one implementation manner of obtaining the corresponding relationship of the verification data by the video recording device by way of example, but not by way of example, other manners may also be adopted in the embodiment, for example, the corresponding relationship of the verification data is configured in the video recording device, the video recording device downloads the corresponding relationship of the verification data from a third-party platform, and the like.
The flow shown in fig. 2 is described above.
Next, how the video recording device checks whether a target check data corresponding relationship (referred to as a check target check data corresponding relationship for short) that satisfies the video recording instruction exists in the obtained check data corresponding relationships in step 102 is described:
referring to fig. 3, fig. 3 is a flowchart illustrating a step 102 of checking a corresponding relationship between target verification data according to an embodiment of the present application. As shown in fig. 3, the process may include the following steps:
step 301, the video recording device checks whether there is at least one idle check data corresponding relation not occupied by the video frame in all the obtained check data corresponding relations, if yes, step 302 is executed, if no, step 303 is executed.
As described above, in one example, the idle check data correspondence relationship may include: and the check data corresponding relation of which the use mark is not set. A flag is used to indicate that it is occupied.
Step 302, determining that a target verification data corresponding relation meeting the video recording instruction exists.
This step 302 is performed on the premise that at least one free check data correspondence is checked in step 301. On this premise, the target check data corresponding relationship is one of the idle check data corresponding relationships. For example, the corresponding relation of one of the check data which is not set with the use flag.
It should be noted that, in this embodiment, the target verification data corresponding relationship may be any verification data corresponding relationship without a use flag being set, and this embodiment is not particularly limited.
Step 303, determining that there is no target verification data corresponding relation meeting the video recording instruction.
This step 303 is executed on the premise that it is checked in step 301 that there is no free check data correspondence. On this premise, it means that all the check data corresponding relations obtained by the video recording device are occupied, and none of the check data corresponding relations can be reapplied to the video recording scene corresponding to the video recording instruction.
The flow shown in fig. 3 is completed.
Through the process shown in fig. 3, it can be realized that the video recording device checks whether the corresponding relationship of the target verification data that meets the video recording instruction exists in the obtained corresponding relationship of the verification data. It should be noted that the flow shown in fig. 3 is only an example and is not limiting.
Based on the flow shown in fig. 3, in step 103, after each character in the first target verification data and the second target verification data is added to the recorded video frame, it means that the corresponding relationship between the first target verification data and the second target verification data (i.e. the target verification data corresponding relationship) is used. Based on this, in one example, a use flag may be set for the target verification data correspondence to avoid subsequent repeated use of the target verification data correspondence. In another example, the target verification data correspondence may also be directly deleted to avoid subsequent reuse of the target verification data correspondence.
How the video recording device adds the first target verification data and the second target verification data to the recorded video frame in step 103 is described as follows:
referring to fig. 4, fig. 4 is a flowchart illustrating that the first target verification data and the second target verification data are added to the recorded video frame in step 103 according to an embodiment of the present disclosure. As shown in fig. 4, the process may include the following steps:
step 401, the video recording device adds the first target verification data to at least one recorded video frame.
As an embodiment, in this step 401, the first target verification data is added to the recorded video frame by taking the entire first target verification data as a unit (specifically, a specific location is referred to, and the specific location will be described below, which is not described herein for the time being). As for how to add the first object verification data to the recorded video frame in units of the first object verification data, there are many embodiments, and one of the embodiments is described here by way of example. In this embodiment, the video recording device adds the first target verification data to a designated location in each video frame that is recorded.
As for how the video recording device adds the first target verification data to the designated position in each recorded video frame, there are many implementation manners, such as an On Screen Display (OSD) manner, a data superposition manner, and the like, when the video recording device is implemented specifically. Taking the OSD mode as an example, the above-mentioned adding of the first target verification data to the designated position in each recorded video frame can be shown by the flow shown in fig. 5, and details are not repeated here.
At step 402, the video recording device selects at least one character from the second target verification data and adds the selected character to the recorded video frame.
As an example, this step 402 adds characters to the recorded video frame in units of characters in the second target verification data. As for how the video recording device adds the characters in the second target verification data to the recorded video frame, there may be many implementation manners, and two implementation manners are listed in the following examples, which are not repeated herein for the time being.
The flow shown in fig. 4 is completed. It should be noted that, in the flow shown in fig. 4, the steps 401 and 402 do not have a fixed time sequence, and may be executed simultaneously, or may be executed first to perform the step 402, and so on.
Through the process shown in fig. 4, the video recording device finally adds the first target verification data and the second target verification data to the recorded video frame, so that the video verification device verifies whether the video frame recorded by the video recording device is modified according to the first target verification data and the second target verification data, and the effectiveness and the safety of the video frame are improved.
The following describes how the video recording device adds the first target verification data to a specified position in each video frame recorded in step 401:
referring to fig. 5, fig. 5 is a flowchart illustrating a video recording apparatus according to an embodiment of the present application adding first target verification data to each recorded video frame. The flow shown in fig. 5 is described by taking the implementation principle of bitmap OSD as an example.
As shown in fig. 5, the process may include the following steps:
step 501, the video recording device modifies at least one attribute value of a pixel point at a specified position in each recorded video frame.
For one embodiment, the designated location may be a rectangular area of the left context in the video frame.
In this embodiment, since the first target verification data needs to be superimposed at the specified position, this step 501 needs to modify at least one attribute value of the pixel point at the specified position. The purpose of final modification is to ensure that the first target verification data is normally displayed after being successfully superposed on the modified pixel points. The at least one attribute value may be a color value, a flicker characteristic value, a transparency, a size, and the like. As to how the video recording device modifies at least one attribute value of a pixel point at a specified position in each recorded video frame, on the premise of the modification purpose, the present embodiment is not particularly limited.
Step 502, the first target verification data is superimposed on the modified pixel point.
In step 502, how to superimpose the first target verification data on the modified pixel point may refer to a superimposing manner in the current OSD manner, which is not specifically limited in this embodiment.
The final video recording device adds the first target verification data to the specified location in each video frame recorded, via step 502.
The flow shown in fig. 5 is completed.
Through the flow shown in fig. 5, it is realized that the video recording device adds the first target verification data to the designated position in each video frame that is recorded. Taking the first object verification data as the service number 03f8B046-dfc5-43bB-bBf8-f9e1cddab4da as an example, fig. 6 shows an example of adding the first object verification data to a specified position in a recorded video frame.
Two ways in which the video recording device adds the characters in the second target verification data to the recorded video frame in the above step 402 are described as follows:
mode 1:
this mode 1 requires updating one character per unit time. The unit time here may be seconds. Taking the unit time as second as an example, in this embodiment 1, one character is updated every second.
Based on this, in this manner, in step 402, the video recording apparatus adds the characters in the second target verification data to the recorded video frame in units of characters, which may include the flow shown in fig. 7.
Referring to fig. 7, fig. 7 is a flowchart illustrating that the video recording apparatus according to the embodiment of the present application adds characters in the second target verification data to a recorded video frame. As shown in fig. 7, the process may include the following steps:
in step 701, the video recording device sequentially selects one character from the second target verification data for each unit time in a manner of updating one character for each unit time.
As an embodiment, in this step 701, sequentially selecting one character from the second target verification data may include:
when the operation of selecting characters from the second target verification data is executed for the first time, selecting a first character in the second target verification data;
when the operation of selecting a character from the second target verification data is not currently executed for the first time, if the last selected character (taking X as an example) is the last character in the second target verification data, the first character in the second target verification data is selected, and if the last selected character X is not the last character in the second target verification data, the next character of the character X in the second target verification data is selected.
Generally, the longest video recording time T (i.e., T unit times) supported by the video recording device is less than or equal to the number of characters in the second target verification data. For example, taking unit time as second as an example, the longest video recording time supported by the video recording device is 3600 seconds, the second target verification data includes 3600 random characters, and the longest video recording time 3600 seconds supported by the video recording device is equal to the number of characters 3600 in the second target verification data. For another example, taking unit time as second as an example, the longest video recording time supported by the video recording device is 3600 seconds, the second target verification data includes 4800 random characters, and the longest video recording time 3600 seconds supported by the video recording device is less than the number of characters 4800 in the second target verification data. Therefore, in the present embodiment 1, when the operation of selecting a character from the second target verification data is not currently executed for the first time, the last character selected last time is generally not the last character in the second target verification data.
In step 702, the video recording device adds the selected character to each video frame recorded in the unit time by means of watermark addition.
The watermark adding mode is to add some digital information into multimedia data (such as images, sound, video signals, etc.) to achieve the functions of file authenticity identification, copyright protection, etc. The embedded watermark information does not affect the observability and integrity of the multimedia data. In this embodiment, the video recording device adds the selected character to each video frame recorded in the unit time by means of watermarking, without affecting the playing of the video frame.
In one example, a video recording device supports a watermark function. When the selected characters need to be added to the video frame, the video recording device may add the selected characters to the video frame by calling a watermark function. Here, the video recording device specifically adds the selected character to which position of the video frame, and the embodiment is not particularly limited.
The flow shown in fig. 7 is completed. The way that the video recording device updates one character per unit time is realized by the flow shown in fig. 7, and the characters in the second target verification data are added to the recorded video frame.
FIG. 7 is described below by way of example in units of time in seconds:
if the second target verification data is 65395146 … …, the video recording device records a video at a speed of recording 10 video frames per second, the first character "6" of the second target verification data is added to 10 video frames recorded in 1 second (specific time is 2019-07-515: 51:33) by the video recording device in a watermark adding manner, the second character "5" of the second target verification data is added to 10 video frames recorded in 2 second (specific time is 2019-07-515: 51:34) in a watermark adding manner, and so on. Fig. 8 shows watermark characters added to one of the video frames recorded by the video recording device at 2019-07-515: 51: 33.
This completes the description of mode 1.
Mode 2:
this approach 2 requires updating one character per video frame. Based on this, in this embodiment 2, in the step 402, the video recording apparatus adds the characters in the second target verification data to the recorded video frame in units of characters, which may include the flow shown in fig. 9.
Referring to fig. 9, fig. 9 is another flowchart illustrating that the video recording apparatus according to the embodiment of the present application adds characters in the second target verification data to the recorded video frame. As shown in fig. 9, the process may include the following steps:
in step 901, the video recording device sequentially selects a character from the second target verification data according to a manner that each video frame updates a character.
In mode 2, the manner in which the video recording device sequentially selects one character from the second target verification data is similar to the manner in which the character is selected in mode 1, and details are not repeated here.
Step 902, the video recording device adds the selected character to the recorded current video frame in a watermark adding manner.
This step 902 is similar to the step 702 described above, and is not described here again.
The flow shown in fig. 9 is completed. The addition of the characters in the second target verification data to the recorded video frames by the video recording device in a manner of updating one character per video frame is realized through the flow shown in fig. 9.
This completes the description of mode 2.
It should be noted that the above-mentioned modes 1 and 2 are only examples describing how the video recording apparatus adds the second target verification data to the recorded video frame in units of characters in the second target verification data, and are not limited.
Finally, as described above, the video recording device may add the first target verification data and the second target verification data to the recorded video frame during the video recording process. When the video recording is finished, the video recording device executes the data uploading process shown in fig. 10. As an example, the video recording end here may be: and ending video recording when a video ending instruction is received, or ending video recording when the video recording reaches the maximum video recording time allowed by the video recording equipment, and the like.
Similar to the above-mentioned received video recording command, the received video ending command here may be: sensing that the recording function key is triggered in the video recording process means that a video end instruction is received.
Referring to fig. 10, fig. 10 is a flowchart of data uploading provided by an embodiment of the present application. As shown in fig. 10, the process may include the following steps:
step 1001, when the video recording device finishes recording the video, the video recording device sets a video name for a recorded video file, and the video file is composed of recorded video frames.
The video name here is used to identify the video file.
In step 1002, the video recording device calculates an MD5 value corresponding to the video file.
MD5 is a widely used cryptographic hash function that computes MD5 values for video files from MD 5. The MD5 value here may be a 128-bit (16-byte) hash value (hashvalue).
In step 1003, the video recording device uploads the video name, the MD5 value, the video length in the video file, the device identifier of the video recording device, and the first target verification data to the video verification device, so that the video verification device manages the video file.
How the video verification device manages the video file will be described below, and details thereof will not be repeated here.
The flow shown in fig. 10 is completed.
Through the process shown in fig. 10, the video recording device uploads the video name, the MD5 value, the video length, the device identifier of the video recording device, and the first target verification data of the recorded video file to the video verification device, so that the video verification device manages the video file.
The above is described in terms of stations at the video recording device, and the following are described in terms of stations at the video verification device:
referring to fig. 11, fig. 11 is a flowchart of another video verification method provided in the embodiment of the present application. The method is applied to the video verification equipment. As an embodiment, the video verification apparatus herein may be a server supporting video verification.
As shown in fig. 11, the process may include the following steps:
step 1101, the video verification device acquires first target verification data and second target verification data added in a video frame recorded by the video recording device.
If the video recording device described in step 401 adds the first target verification data to the specified position of the video frame, in this step 1101, the video verification device may obtain the first target verification data at the specified position of the video frame. As an embodiment, the video recording device may notify the video verification device of the designated location in advance. As another embodiment, the video recording device and the video verification device may negotiate a designated position in advance, after the designated position is negotiated, the video recording device may add the first target verification data to the designated position of the negotiated video frame in the video recording process, and the video verification device may obtain the first target verification data from the designated position of the video frame when verifying the video frame.
The above describes that the video verification device acquires the first target verification data added in the video frame recorded by the video recording device. How the video verification device obtains the second target verification data added to the video frame recorded by the video recording device is described as follows:
as an embodiment, the acquiring, by the video verification device, the second target verification data added to the video frame recorded by the video recording device may include:
receiving a data instruction sent by external equipment, wherein the data instruction carries second target verification data added in a video frame recorded by video recording equipment; and acquiring second target verification data from the data instruction.
The external device here may be a device in which a watermark character derivation tool is installed. By means of the watermark character derivation tool, the external device can acquire the watermark characters added to the video frame from the video frame recorded by the video recording device and form second target verification data, and then the external device carries the second target verification data in the data instruction and sends the second target verification data to the video verification device.
As another embodiment, the video verification device itself installs a watermark character derivation tool, and the video verification device may obtain the watermark characters added to the video frames from the video frames recorded by the video recording device by using the watermark character derivation tool and compose the second target verification data.
In the above description, whether it is a video verification device or the above-mentioned external device, the obtaining, by means of the watermark character derivation tool, the watermark characters added to the video frames from the video frames recorded by the video recording device and composing the second target verification data may include:
step a1, sequentially acquiring watermark characters in each video frame recorded by the video recording device according to the sequence of video frame recording.
In an example, the recorded video frames may carry recording time, and based on this, in step a1, the watermark characters in the video frames recorded by the video recording device may be sequentially obtained according to the sequence of the recording time carried by the video frames (i.e., the sequence of the recording of the video frames).
Step a2, composing the second target verification data according to the obtained watermark characters.
As an example, if the video recording device adds characters to the video frame in the above manner 1, many identical watermark characters will appear in all the watermark characters obtained in the above step a 1. Still by way of example in mode 1 above, describing the unit time as seconds, if the second target verification data is 65395146 … …, the video recording device records video at a speed of recording 10 video frames per second, all the watermark characters obtained here would include 10 watermark characters "6" in 10 video frames recorded within time 2019-07-515: 51:33 (the first second), and so on.
In the above case, the step a2 of composing the second target verification data according to the obtained watermark characters may include the step a 21:
step a21 determines N watermark characters which are the same and are recorded in the same unit time from all the obtained watermark characters, deletes N-1 watermark characters in the N watermark characters, and sequentially combines the remaining watermark characters into a character string according to the obtaining sequence of the watermark characters to obtain second target verification data.
Still by taking the example of mode 1 above to describe that the unit time is second, if the second target verification data is 65395146 … …, the video recording device records video at the speed of recording 10 video frames per second, all the watermark characters obtained in step a1 include 10 watermark characters "6" in 10 video frames recorded within the time 2019-07-515: 51:33 (the first second), and so on. Based on this, in combination with step a21, 9 watermark characters "6" of the 10 watermark characters "6" are deleted, only one of the 10 watermark characters "6" is retained, and so on, the second target verification data 65395146 … … is finally obtained.
Of course, if the video frames recorded by the video recording device in the middle 5 th and 6 th seconds are modified manually, even if the above step a21 is adopted, the finally obtained second target verification data is not the final data 65395146 … …, but other data, such as 6539345146 … ….
The above describes how the video verification apparatus obtains the second target verification data added in the video frame recorded by the video recording apparatus.
After the video verification device obtains the first target verification data and the second target verification data added in the video frame recorded by the video recording device, the following step 1102 is executed.
Step 1102, searching a target verification data corresponding relation including the first target verification data in the recorded verification data corresponding relation, and if the target verification data corresponding relation is the corresponding relation between the first target verification data and the second target verification data, determining that the video frame recorded by the video recording device is not modified.
Of course, in this step 1102, if the target verification data corresponding relationship is not the corresponding relationship between the first target verification data and the second target verification data, it is determined that the video frame recorded by the video recording device is modified.
Thus, the description of the flow shown in fig. 11 is completed.
Through the process shown in fig. 11, the video verification device can verify whether the video frame recorded by the video recording device is modified according to the first target verification data and the second target verification data added to the video frame recorded by the video recording device, so that the effectiveness and the safety of the video frame are improved.
It should be noted that, as in the above-mentioned flowchart shown in fig. 10, the video recording device uploads the video name, the MD5 value, the video length in the video file, the device identifier of the video recording device, and the first target verification data to the video verification device. Based on this, as an embodiment, in the present application, when the video verification device cannot acquire the first target verification data and the second target verification data added in the video frame through the process shown in fig. 11, or cannot find the target verification data corresponding relationship including the first target verification data in the recorded verification data corresponding relationship; or, when it is determined that the video frame recorded by the video recording device is modified, the corresponding video file may be further obtained from the video recording device based on the video name uploaded by the video recording device, the video length in the video file, the device identifier of the video recording device, and the first target verification data, and the MD5 value of the video file may be calculated, and whether the video frame recorded by the video recording device is modified may be determined by comparing the calculated MD5 value with the MD5 value uploaded by the video recording device. In one example, the manner of determining whether the video frame recorded by the video recording device is modified by comparing the calculated MD5 value with the MD5 value uploaded by the video recording device is similar to the conventional MD5 check algorithm, and will not be described herein again.
The method provided by the present application is described above, and the device provided by the present application is described below:
referring to fig. 12, fig. 12 is a diagram illustrating a structure of an apparatus according to an embodiment of the present disclosure. The apparatus is applied to a video recording device, and as shown in fig. 12, the apparatus may include
The receiving unit is used for receiving a video recording instruction;
an obtaining unit for obtaining the corresponding relation of the check data
The checking unit is used for checking whether a target verification data corresponding relation meeting the video recording instruction exists in the verification data corresponding relation acquired by the acquiring unit, wherein the target verification data corresponding relation is a corresponding relation between first target verification data and second target verification data;
and the recording unit is used for starting video recording according to the video recording instruction and adding first target verification data and second target verification data to a recorded video frame when the checking unit checks the corresponding relation of the target verification data, wherein the first target verification data and the second target verification data are used for verifying whether the video frame recorded by the video recording equipment is modified or not by video verification equipment.
As an embodiment, the obtaining unit obtains the check data correspondence relationship by:
sending a request to video verification equipment to acquire a corresponding relation of verification data;
and receiving the corresponding relation of the check data returned by the video check equipment.
In one example, the request may be an HTTP request.
As an embodiment, the checking unit checking whether there is a target check data corresponding relationship that satisfies the video recording instruction in the check data corresponding relationships acquired by the acquiring unit includes:
checking whether at least one idle check data corresponding relation which is not occupied by the video frame exists in all the obtained check data corresponding relations,
if yes, determining that a target verification data corresponding relation meeting the video recording instruction exists, wherein the target verification data corresponding relation is one idle verification data corresponding relation;
and if not, determining that the corresponding relation of the target verification data meeting the video recording instruction does not exist.
As an embodiment, the idle check data correspondence includes: and the check data corresponding relation of which the use mark is not set.
Based on this, after the recording unit adds each character in the first target verification data and the second target verification data to the recorded video frame, the use mark is further set for the corresponding relationship of the target verification data.
As an embodiment, the adding, by the recording unit, the first target verification data and the second target verification data to the recorded video frame includes:
adding the first target verification data to the recorded video frame;
at least one character is selected from the second target verification data and the selected character is added to the recorded video frame.
As an embodiment, the adding, by the recording unit, the first target verification data to the recorded video frame according to a preset first adding manner includes:
first target verification data is added to a designated location in each video frame recorded.
As an embodiment, the adding, by the recording unit, the first target verification data to a specified position in each video frame recorded includes:
modifying at least one attribute value of each pixel point at a specified position in each recorded video frame so as to enable the first target verification data to be successfully superposed to the modified pixel points and then normally displayed;
and superposing the first target verification data on the modified pixel points.
As an embodiment, the recording unit selecting at least one character from the second target verification data and adding the selected character to the recorded video frame includes:
and aiming at each unit time, selecting one character from the second target verification data in sequence in a mode of updating one character per unit time, and adding the selected character to each video frame recorded in the unit time in a watermark adding mode.
As an embodiment, the recording unit selecting at least one character from the second target verification data and adding the selected character to the recorded video frame includes:
and selecting one character from the second target verification data in sequence according to a mode of updating one character for each video frame, and adding the selected character to the recorded current video frame in a watermark adding mode.
As an embodiment, the sequentially selecting, by the recording unit, one character from the second target verification data includes:
when the operation of selecting characters from the second target verification data is currently performed for the first time, the first character in the second target verification data is selected, otherwise,
and if the last selected character X is not the last character in the second target verification data, selecting the next character of the character X in the second target verification data.
As an embodiment, the recording unit further sets a video name for a recorded video file when the video recording is finished, wherein the video file is composed of recorded video frames; calculating an MD5 value corresponding to the video file; uploading the video name, the MD5 value, the video length in the video file, the equipment identification of the video recording equipment and the first target verification data to video verification equipment so that the video file is managed by the video verification equipment.
Thus, the apparatus configuration diagram shown in fig. 12 is completed.
Referring to fig. 13, fig. 13 is a block diagram of another apparatus provided in the present application. The device is applied to video check equipment, and comprises:
the verification data acquisition unit is used for acquiring first target verification data and second target verification data added in video frames recorded by the video recording equipment;
the verification unit is used for searching a target verification data corresponding relation containing the first target verification data in the recorded verification data corresponding relation; and if the corresponding relation of the target verification data is the corresponding relation between the first target verification data and the second target verification data, determining that the video frame recorded by the video recording equipment is not modified.
As an embodiment, the acquiring, by the verification data acquiring unit, second target verification data added to a video frame recorded by the video recording device includes:
receiving a data instruction sent by an external device, wherein the data instruction carries second target verification data added in a video frame recorded by the video recording device, and acquiring the second target verification data from the data instruction; alternatively, the first and second electrodes may be,
and sequentially acquiring watermark characters in each video frame recorded by the video recording equipment according to the sequence of video frame recording, and generating the second target verification data according to the acquired watermark characters.
As an embodiment, the generating, by the verification data obtaining unit, the second target verification data according to each obtained watermark character includes:
determining N watermark characters which are the same and are in each video frame recorded in the same unit time from all the obtained watermark characters, and deleting N-1 watermark characters in the N watermark characters;
and sequentially forming the remaining watermark characters into a character string according to the acquisition sequence of the watermark characters to obtain the second target verification data.
Thus, the description of the structure of the apparatus shown in fig. 13 is completed.
Correspondingly, the application also provides a hardware structure of the device shown in fig. 12 and 13. Referring to fig. 14, the hardware structure may include: a processor and a machine-readable storage medium having stored thereon machine-executable instructions executable by the processor; the processor is configured to execute machine-executable instructions to implement the methods disclosed in the above examples of the present application.
Based on the same application concept as the method, embodiments of the present application further provide a machine-readable storage medium, where several computer instructions are stored, and when the computer instructions are executed by a processor, the method disclosed in the above example of the present application can be implemented.
The machine-readable storage medium may be, for example, any electronic, magnetic, optical, or other physical storage device that can contain or store information such as executable instructions, data, and the like. For example, the machine-readable storage medium may be: a RAM (random Access Memory), a volatile Memory, a non-volatile Memory, a flash Memory, a storage drive (e.g., a hard drive), a solid state drive, any type of storage disk (e.g., an optical disk, a dvd, etc.), or similar storage medium, or a combination thereof.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. A typical implementation device is a computer, which may take the form of a personal computer, laptop computer, cellular telephone, camera phone, smart phone, personal digital assistant, media player, navigation device, email messaging device, game console, tablet computer, wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the units may be implemented in one or more software and/or hardware when implementing the present application.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Furthermore, these computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (14)

1. A video verification method is applied to a video recording device and comprises the following steps:
receiving a video recording instruction;
checking whether a target verification data corresponding relation meeting the video recording instruction exists in the obtained verification data corresponding relation, wherein the target verification data corresponding relation is a corresponding relation between first target verification data and second target verification data;
and if the corresponding relation of the target verification data exists, starting video recording according to the video recording instruction, and adding first target verification data and second target verification data into a recorded video frame, wherein the first target verification data and the second target verification data are used for verifying whether the video frame recorded by the video recording equipment is modified or not by the video verification equipment.
2. The method according to claim 1, wherein the video recording device obtains the check data correspondence by:
sending a request to video verification equipment to acquire a corresponding relation of verification data;
and receiving the corresponding relation of the check data returned by the video check equipment.
3. The method according to claim 1 or 2, wherein the checking whether there is a target check data corresponding relation satisfying the video recording command in the obtained check data corresponding relations comprises:
checking whether at least one idle check data corresponding relation which is not occupied by the video frame exists in all the obtained check data corresponding relations,
if yes, determining that the corresponding relation of the target verification data is satisfied, wherein the corresponding relation of the target verification data is one of the corresponding relations of the idle verification data;
if not, determining that the corresponding relation meeting the target verification data does not exist.
4. The method of claim 3, wherein the idle check data correspondence comprises: the check data corresponding relation of which the use mark is not set;
after the characters in the first target verification data and the second target verification data are added to the recorded video frame, the method further includes: and setting the use mark for the corresponding relation of the target verification data.
5. The method of claim 1, wherein adding the first target verification data and the second target verification data to the recorded video frame comprises:
adding the first target verification data to the recorded video frame;
at least one character is selected from the second target verification data and the selected character is added to the recorded video frame.
6. The method of claim 5, wherein adding the first target verification data to the recorded video frame comprises:
modifying at least one attribute value of each pixel point at a specified position in each recorded video frame so as to enable the first target verification data to be normally displayed after being superposed to the modified pixel points;
and superposing the first target verification data on the modified pixel points.
7. The method of claim 5, wherein selecting at least one character from the second target verification data and adding the selected character to the recorded video frame comprises:
and aiming at each unit time, selecting one character from the second target verification data in sequence in a mode of updating one character per unit time, and adding the selected character to each video frame recorded in the unit time in a watermark adding mode.
8. The method of claim 5, wherein selecting at least one character from the second target verification data and adding the selected character to the recorded video frame comprises:
and selecting one character from the second target verification data in sequence according to a mode of updating one character for each video frame, and adding the selected character to the recorded current video frame in a watermark adding mode.
9. The method of claim 7 or 8, wherein the selecting one character in order from the second target verification data comprises:
when the operation of selecting characters from the second target verification data is currently performed for the first time, the first character in the second target verification data is selected, otherwise,
and if the last selected character X is not the last character in the second target verification data, selecting the next character of the character X in the second target verification data.
10. The method of claim 1, further comprising:
when the video recording is finished, setting a video name for a recorded video file, wherein the video file consists of recorded video frames;
calculating an MD5 value corresponding to the video file;
uploading the video name, the MD5 value, the video length in the video file, the equipment identification of the video recording equipment and the first target verification data to video verification equipment so that the video file is managed by the video verification equipment.
11. A video verification method is applied to video verification equipment and comprises the following steps:
acquiring first target verification data and second target verification data added in a video frame recorded by the video recording equipment;
searching a target verification data corresponding relation containing the first target verification data in the recorded verification data corresponding relation;
and if the corresponding relation of the target verification data is the corresponding relation between the first target verification data and the second target verification data, determining that the video frame recorded by the video recording equipment is not modified.
12. The method of claim 11, wherein obtaining second target verification data added to the video frames recorded by the video recording device comprises:
receiving a data instruction sent by an external device, wherein the data instruction carries second target verification data added in a video frame recorded by the video recording device, and acquiring the second target verification data from the data instruction; alternatively, the first and second electrodes may be,
and sequentially acquiring watermark characters in each video frame recorded by the video recording equipment according to the sequence of video frame recording, and generating the second target verification data according to the acquired watermark characters.
13. The method of claim 12, wherein generating the second target verification data according to the obtained watermark characters comprises:
determining N watermark characters which are the same and are in each video frame recorded in the same unit time from all the obtained watermark characters, and deleting N-1 watermark characters in the N watermark characters;
and sequentially forming the remaining watermark characters into a character string according to the acquisition sequence of the watermark characters to obtain the second target verification data.
14. An electronic device, comprising: a processor and a machine-readable storage medium;
the machine-readable storage medium stores machine-executable instructions executable by the processor;
the processor is configured to execute machine executable instructions to perform the method steps of any of claims 1-10 or 11 to 13.
CN201910860057.1A 2019-09-11 2019-09-11 Video verification method and device Active CN112492248B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910860057.1A CN112492248B (en) 2019-09-11 2019-09-11 Video verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910860057.1A CN112492248B (en) 2019-09-11 2019-09-11 Video verification method and device

Publications (2)

Publication Number Publication Date
CN112492248A true CN112492248A (en) 2021-03-12
CN112492248B CN112492248B (en) 2023-02-28

Family

ID=74920552

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910860057.1A Active CN112492248B (en) 2019-09-11 2019-09-11 Video verification method and device

Country Status (1)

Country Link
CN (1) CN112492248B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114760533A (en) * 2022-05-17 2022-07-15 北京达佳互联信息技术有限公司 Check value storage method, frame data check device and electronic equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5841978A (en) * 1993-11-18 1998-11-24 Digimarc Corporation Network linking method using steganographically embedded data objects
US20020172394A1 (en) * 2001-04-24 2002-11-21 Ramarathnam Venkatesan Robust and stealthy video watermarking
US6792130B1 (en) * 2000-12-13 2004-09-14 Eastman Kodak Company System and method for embedding a watermark signal that contains message data in a digital image
WO2016179110A1 (en) * 2015-05-01 2016-11-10 Verance Corporation Watermark recovery using audio and video watermarking
CN106686333A (en) * 2016-11-02 2017-05-17 四川秘无痕信息安全技术有限责任公司 Method for producing video added watermarks for Android equipment
US20180220177A1 (en) * 2011-01-26 2018-08-02 Inside Secure S.A. Method and apparatus for hardware-enforced, always-on insertion of a watermark in a video processing path
CN109379642A (en) * 2018-12-14 2019-02-22 连尚(新昌)网络科技有限公司 It is a kind of for adding and detecting the method and apparatus of video watermark

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5841978A (en) * 1993-11-18 1998-11-24 Digimarc Corporation Network linking method using steganographically embedded data objects
US6792130B1 (en) * 2000-12-13 2004-09-14 Eastman Kodak Company System and method for embedding a watermark signal that contains message data in a digital image
US20020172394A1 (en) * 2001-04-24 2002-11-21 Ramarathnam Venkatesan Robust and stealthy video watermarking
US20180220177A1 (en) * 2011-01-26 2018-08-02 Inside Secure S.A. Method and apparatus for hardware-enforced, always-on insertion of a watermark in a video processing path
WO2016179110A1 (en) * 2015-05-01 2016-11-10 Verance Corporation Watermark recovery using audio and video watermarking
CN106686333A (en) * 2016-11-02 2017-05-17 四川秘无痕信息安全技术有限责任公司 Method for producing video added watermarks for Android equipment
CN109379642A (en) * 2018-12-14 2019-02-22 连尚(新昌)网络科技有限公司 It is a kind of for adding and detecting the method and apparatus of video watermark

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114760533A (en) * 2022-05-17 2022-07-15 北京达佳互联信息技术有限公司 Check value storage method, frame data check device and electronic equipment
CN114760533B (en) * 2022-05-17 2024-04-09 北京达佳互联信息技术有限公司 Check value storage method, frame data check method, device and electronic equipment

Also Published As

Publication number Publication date
CN112492248B (en) 2023-02-28

Similar Documents

Publication Publication Date Title
KR101605156B1 (en) Device, method, and computer for providing file deleting service
CN106998494B (en) Video recording method and related device
CN106815370B (en) Method, device and system for updating resource file
US20150254807A1 (en) Systems and Methods for Generating an Interactive Mosaic Comprising User Visual Content Data on a Portable Terminal and an Image Sharing Platform
US9667773B2 (en) Audio file management for automated synchronization of an audio track with external video playback
CN109271757B (en) Off-line activation method and system for software
CN110248115B (en) Image processing method, device and storage medium
US10992460B2 (en) Blockchain-based advertisement monitoring method and apparatus, and electronic device
CN110019278B (en) Data verification method, device and equipment
CN114301602B (en) Video protection method and device based on block chain
CN110263503A (en) A kind of copy-right protection method based on block chain, device and electronic equipment
US11330345B2 (en) Verification code generation method, data verification method and electronic device
CN111556329B (en) Method and device for inserting media content in live broadcast
CN112492248B (en) Video verification method and device
CN110046281B (en) Data adding method, device and equipment
CN111046199A (en) Method for adding bystander to image and electronic equipment
CN110865981A (en) File access method for mobile terminal and mobile terminal thereof
CN108762983B (en) Multimedia data recovery method and device
CN110730355A (en) Video image processing method and device
US20210099772A1 (en) System and method for verification of video integrity based on blockchain
CN111386711A (en) Method, device and system for managing electronic fingerprints of electronic files
KR20220034787A (en) Media source authentication through soft watermarking
CN105808677A (en) Picture deleting method and device and electronic equipment
CN111866514B (en) Method and device for compressing video and decompressing video
CN110704157B (en) Application starting method, related device and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant