CN113810723A - Video data protection method, electronic device and computer storage medium - Google Patents
Video data protection method, electronic device and computer storage medium Download PDFInfo
- Publication number
- CN113810723A CN113810723A CN202111154382.XA CN202111154382A CN113810723A CN 113810723 A CN113810723 A CN 113810723A CN 202111154382 A CN202111154382 A CN 202111154382A CN 113810723 A CN113810723 A CN 113810723A
- Authority
- CN
- China
- Prior art keywords
- video
- authentication
- embedded
- authentication information
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 97
- 238000003860 storage Methods 0.000 title claims abstract description 41
- 238000013139 quantization Methods 0.000 claims abstract description 40
- 238000012545 processing Methods 0.000 claims abstract description 34
- 238000004519 manufacturing process Methods 0.000 claims description 51
- 238000004891 communication Methods 0.000 claims description 30
- 230000008569 process Effects 0.000 claims description 23
- 238000004590 computer program Methods 0.000 claims description 5
- 230000001131 transforming effect Effects 0.000 claims description 3
- 239000003086 colorant Substances 0.000 claims description 2
- 230000001960 triggered effect Effects 0.000 claims description 2
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 claims 1
- 238000004422 calculation algorithm Methods 0.000 description 11
- 239000000463 material Substances 0.000 description 9
- 238000012795 verification Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 7
- 230000006870 function Effects 0.000 description 7
- 238000012937 correction Methods 0.000 description 5
- 238000001514 detection method Methods 0.000 description 5
- 230000008859 change Effects 0.000 description 4
- 230000000694 effects Effects 0.000 description 4
- 238000000605 extraction Methods 0.000 description 4
- 238000013473 artificial intelligence Methods 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 3
- 238000009826 distribution Methods 0.000 description 3
- 238000013475 authorization Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 230000015572 biosynthetic process Effects 0.000 description 2
- 230000006835 compression Effects 0.000 description 2
- 238000007906 compression Methods 0.000 description 2
- 239000000284 extract Substances 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000011084 recovery Methods 0.000 description 2
- 230000009466 transformation Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000005520 cutting process Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000008676 import Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000011022 operating instruction Methods 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/46—Embedding additional information in the video signal during the compression process
- H04N19/467—Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/238—Interfacing the downstream path of the transmission network, e.g. adapting the transmission rate of a video stream to network bandwidth; Processing of multiplex streams
- H04N21/2389—Multiplex stream processing, e.g. multiplex stream encrypting
- H04N21/23892—Multiplex stream processing, e.g. multiplex stream encrypting involving embedding information at multiplex stream level, e.g. embedding a watermark at packet level
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/835—Generation of protective data, e.g. certificates
- H04N21/8358—Generation of protective data, e.g. certificates involving watermark
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Editing Of Facsimile Originals (AREA)
- Image Processing (AREA)
Abstract
The embodiment of the application provides a video data protection method, electronic equipment and a computer storage medium, wherein the video data protection method comprises the following steps: acquiring a video to be embedded with authentication information and the authentication information to be embedded; performing digital watermarking processing based on the frequency domain on the video according to the authentication information to obtain the video embedded with the frequency domain digital watermark; and performing space domain digital watermark processing based on a preset quantization threshold value on the video embedded with the frequency domain digital watermark to obtain an authentication video embedded with the space domain digital watermark. According to the embodiment of the application, effective and active video work protection is achieved.
Description
Technical Field
The embodiment of the application relates to the technical field of videos, in particular to a video data protection method, electronic equipment and a computer storage medium.
Background
With the development of mobile communication technology and the wide application of terminal equipment, video consumption is increased explosively, more and more unauthorized video plagiarism or carrying behaviors appear on a network, and the rights and interests of original authors are infringed. Accordingly, protection against video works is increasingly gaining importance.
In the current video application scenario, one way to protect the rights and interests of the original author for the video is to: the video distribution platform presses the repeated video in a video repetition detection mode, so that the rights and interests of original authors are protected. However, the repeated detection process cannot guarantee that all the repeated videos are detected, and there are omissions or false detections, and in addition, the video distribution platform cannot perform repeated detection on videos of other platforms to find infringement.
Therefore, how to effectively protect the rights and interests of the video originators from the technical level becomes a problem to be solved urgently.
Disclosure of Invention
In view of the above, embodiments of the present application provide a video data protection scheme to at least partially solve the above problem.
According to a first aspect of embodiments of the present application, there is provided a video data protection method, including: acquiring a video to be embedded with authentication information and the authentication information to be embedded; performing digital watermarking processing based on the frequency domain on the video according to the authentication information to obtain the video embedded with the frequency domain digital watermark; and performing space domain digital watermark processing based on a preset quantization threshold value on the video embedded with the frequency domain digital watermark to obtain an authentication video embedded with the space domain digital watermark.
According to a second aspect of the embodiments of the present application, there is provided another video data protection method, including: receiving a video authentication request, wherein the video authentication request carries information of a video to be authenticated; obtaining a video to be authenticated according to the information of the video to be authenticated in the video authentication request, and extracting authentication information in the video to be authenticated; and acquiring an authentication deposit certificate corresponding to the video to be authenticated from the block chain, and determining the authentication result of the video to be authenticated according to the extracted authentication information and the authentication deposit certificate.
According to a third aspect of the embodiments of the present application, there is provided a video data protection method, including: receiving a copyright protection request sent by a user after completing video creation through a video creation production platform client, wherein the copyright protection request carries video information of user information of the user; performing digital watermarking processing based on a frequency domain on the video by taking the user information as authentication information to obtain the video embedded with the frequency domain digital watermark; performing spatial domain digital watermarking processing based on a preset quantization threshold value on the video embedded with the frequency domain digital watermark to obtain an authentication video embedded with the spatial domain digital watermark; and generating a data block according to the authentication video and the authentication information, adding the data block into a block chain to perform authentication and evidence storage, and obtaining an authentication and evidence storage result of the data block in the block chain as a copyright certificate of the video.
According to a fourth aspect of embodiments of the present application, there is provided an electronic apparatus, including: the system comprises a processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface complete mutual communication through the communication bus; the memory is used for storing at least one executable instruction, and the executable instruction causes the processor to execute the corresponding operation of the method according to the first aspect, the second aspect or the third aspect.
According to a fifth aspect of embodiments herein, there is provided a computer storage medium having stored thereon a computer program which, when executed by a processor, implements a method as described in the first or second or third aspect.
According to a sixth aspect of embodiments herein, there is provided a computer program product comprising computer instructions for instructing a computing device to perform operations corresponding to the method according to the first aspect, the second aspect or the third aspect.
According to the video data protection scheme provided by the embodiment of the application, the hidden digital watermark embedded in the video can be formed by carrying out watermark processing twice on the original video work of a video creator, and then the video and the digital watermark are authenticated and stored by using a block chain technology, so that whether the video is original or not can be effectively identified in the follow-up process. When the video is subjected to watermarking, the video is firstly subjected to frequency domain watermarking, so that the protection of a first-level hidden watermark can be realized, but in order to enable the video to have stronger attack resistance, a second-level spatial domain watermarking is added for the video on the basis of the frequency domain watermarking, and the spatial domain watermarking is performed on the basis of a quantization threshold value. Therefore, the video is stronger in attack resistance, and better in anti-interference performance on image change. Therefore, through the scheme of the embodiment of the application, effective and active video work protection is achieved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the embodiments of the present application, and other drawings can be obtained by those skilled in the art according to the drawings.
Fig. 1 is a schematic diagram of an exemplary system to which a video data protection method according to an embodiment of the present application is applied;
fig. 2A is a flowchart illustrating steps of a video data protection method according to a first embodiment of the present application;
FIG. 2B is a diagram illustrating an example of a scenario in the embodiment shown in FIG. 2A;
FIG. 3A is a flowchart illustrating steps of a method for protecting video data according to a second embodiment of the present application;
FIG. 3B is a diagram illustrating an exemplary process of a scenario in the embodiment shown in FIG. 3A;
fig. 4 is a flowchart illustrating steps of a video data protection method according to a third embodiment of the present application;
fig. 5 is a schematic structural diagram of a video data protection system according to a fourth embodiment of the present application;
fig. 6 is a schematic structural diagram of an electronic device according to a fifth embodiment of the present application.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in the embodiments of the present application, the technical solutions in the embodiments of the present application will be described clearly and completely below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, but not all embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application shall fall within the scope of the protection of the embodiments in the present application.
Fig. 1 illustrates an exemplary system to which a video data protection method according to an embodiment of the present application is applied. As shown in FIG. 1, the system 100 may include a video authoring production platform server device 102, a communication network 104, and/or one or more video authoring production platform client devices 106, illustrated in FIG. 1 as a plurality of client devices.
The video authoring production platform server device 102 may be any suitable server device, such as a server, for storing information, data, programs, and/or any other suitable type of content. In some embodiments, the video authoring production platform server device 102 may perform any suitable functions. For example, in some embodiments, the video authoring production platform server device 102 may be used for authentication information embedding of videos. As an optional example, in some embodiments, the video creation and production platform server apparatus 102 may be configured to, after embedding the authentication information into the video, uplink the video and the corresponding authentication information for authentication and storage, and authenticate the video. As an optional example, in some embodiments, the video authoring production platform server device 102 may be used to send the authentication deposit result or authentication result to the video authoring production platform client device.
In some embodiments, the communication network 104 may be any suitable combination of one or more wired and/or wireless networks. For example, the communication network 104 can include any one or more of the following: the network may include, but is not limited to, the internet, an intranet, a Wide Area Network (WAN), a Local Area Network (LAN), a wireless network, a Digital Subscriber Line (DSL) network, a frame relay network, an Asynchronous Transfer Mode (ATM) network, a Virtual Private Network (VPN), and/or any other suitable communication network. The video authoring production platform client device 106 can be connected to the communication network 104 via one or more communication links (e.g., communication link 112), and the communication network 104 can be linked to the video authoring production platform server device 102 via one or more communication links (e.g., communication link 114). The communication link may be any communication link suitable for communicating data between the video authoring production platform client device 106 and the video authoring production platform server device 102, such as a network link, a dial-up link, a wireless link, a hardwired link, any other suitable communication link, or any suitable combination of such links.
The video authoring production platform client devices 106 may include any client device or devices adapted to provide a video authoring production platform interface for a user to conduct video authoring or video authentication. In some embodiments, the video authoring production platform client device 106 may comprise any suitable type of device. For example, in some embodiments, the video authoring production platform client device 106 may include a mobile device, a tablet computer, a laptop computer, a desktop computer, and/or any other suitable type of client device.
Although the video authoring production platform server device 102 is illustrated as one device, in some embodiments any suitable number of devices may be used to perform the functions performed by the video authoring production platform server device 102. For example, in some embodiments, multiple devices may be used to implement the functions performed by the video authoring production platform server device 102. Alternatively, the cloud service may be used to implement the functions of the video authoring and production platform server device 102.
Based on the above system, embodiments of the present application provide a video data protection method, which is described below with reference to a plurality of embodiments.
Example one
Referring to fig. 2A, a flowchart illustrating steps of a video data protection method according to a first embodiment of the present application is shown.
The video data protection method of the present embodiment is explained from the viewpoint of video production protection, and the video data protection method of the present embodiment includes the following steps:
step S202: and acquiring the video to be embedded with the authentication information and the authentication information to be embedded.
For most video creators, it is generally desirable to protect the video after the video is created, for example, the video can be protected by the authentication information, and such video can be used as the video to be embedded with the authentication information in the embodiment of the present application.
The authentication information may be set by a person skilled in the art according to actual situations, such as user information that may be a video creator, or information related to rights or identities that needs to be added for the video creator, and the like, which is not limited in the embodiments of the present application.
Step S204: and performing digital watermarking processing based on the frequency domain on the video according to the authentication information to obtain the video embedded with the frequency domain digital watermark.
Digital watermarking in the frequency domain refers to transforming an image into the frequency domain (wavelet domain) by some transformation means (for example, fourier transform, discrete cosine transform, wavelet transform, etc.), watermarking the image in the frequency domain, and transforming the image into a spatial domain by inverse transformation. The frequency domain digital watermark has stronger hiding performance and higher attack resistance.
Step S206: and performing space domain digital watermarking processing based on a preset quantization threshold value on the video embedded with the frequency domain digital watermark to obtain an authentication video embedded with the space domain digital watermark.
As described above, in the embodiment of the present application, after the video is embedded with the frequency domain digital watermark through the video frame image, the spatial domain digital watermark processing is performed again to further improve the attack resistance of the video.
Specifically, in the embodiment of the present application, spatial domain watermarking based on a preset quantization threshold is performed on a video. The quantization threshold is used to define a range that allows the pixel values of the image to fluctuate, which subsequently allows the original watermark data to be recovered at larger pixel brightness variations. The specific value of the quantization threshold may be set according to the video frame image or empirical value or data statistics or simulation test result, and may be set to 3, for example.
In this step, for the video frame image embedded with the frequency domain digital watermark, quantization processing may be performed on the video frame image by using a quantization threshold, authentication information is added to a result based on the quantization processing, and then a reverse process of the quantization processing is performed to obtain a new video frame image. And obtaining the video embedded with the spatial domain digital watermark again based on all the processed video frame images, namely the authentication video. Therefore, the video is protected, and meanwhile the video has better anti-interference performance for image change.
Therefore, the effective and active protection of the original video of the video creator can be realized through the process. However, in order to further improve the protection effect, in an optional manner, after the authentication video is obtained, a data block may be generated according to the authentication video and the authentication information, the data block is added into the block chain for authentication and verification, and an authentication and verification result of the data block in the block chain is obtained.
From the application perspective, the blockchain is a distributed shared account book and a database, and has the characteristics of decentralization, no tampering, trace leaving in the whole process, traceability, collective maintenance, openness and transparency and the like. The characteristics ensure the honesty and the transparency of the block chain and lay a foundation for creating trust for the block chain. The blocks are one storage unit, and all communication information of each block node within a certain time is recorded. The blocks are linked through random hashing (also called hashing algorithm), the next block contains the hash value of the previous block, and as the information communication expands, one block is connected with one block in sequence to form a block chain.
When the block chain is used for protecting the video works, the authentication video and the authentication information obtained after the watermarking is performed twice can be generated into a block to be added into the block chain for storing the certificate, so that an authentication and certificate storing result is obtained. On one hand, the authentication and evidence storage result can be sent to the client device for the video creator to store; on the other hand, the authentication result can provide basis for subsequently judging whether a certain video is an original video or not or whether the video infringes.
The above process is exemplified below with a specific scenario example, as shown in fig. 2B.
In fig. 2B, it is assumed that user X has authored a short video a through a video authoring and production platform in his client device, through which copyright protection is requested. The client device triggers video protection operation through corresponding settings in the platform, such as a 'request protection' button; the client equipment obtains the user information of the user X according to the triggering operation, generates and sends a video protection request to the video creation production platform server equipment through a video creation production platform in the client equipment; after receiving the request, the server side equipment acquires the user information of the short video A and the user X from the client side equipment, and takes the user information of the user X as authentication information; further, embedding a hidden digital watermark in a frequency domain for a video frame image in the short video A through a DCT (discrete cosine transform) algorithm based on the authentication information; on the basis, the video frame image is transformed into a space domain, quantization processing based on a quantization threshold value K is firstly carried out on the video frame image in the space domain, authentication information is added after the quantization processing, and therefore the video frame image added with the space domain digital watermark again is generated, and the authentication video A' can be obtained based on the video frame images; then, the server side equipment generates a data block from the authentication video A' and the user information of the user X; then, the data block is added into a block chain, in this example, a alliance chain, to perform authentication and storage, and an authentication and storage result of the authentication and storage is returned to the client device.
Therefore, according to the embodiment, the hidden digital watermark embedded in the video can be formed by performing watermark processing twice on the original video work of the video creator, and then the video and the digital watermark are authenticated and stored by using the block chain technology, so that whether the video is original or not can be effectively identified subsequently. When the video is subjected to watermarking, the video is firstly subjected to frequency domain watermarking, so that the protection of a first-level hidden watermark can be realized, but in order to enable the video to have stronger attack resistance, a second-level spatial domain watermarking is added for the video on the basis of the frequency domain watermarking, and the spatial domain watermarking is performed on the basis of a quantization threshold value. Therefore, the video is stronger in attack resistance, and better in anti-interference performance on image change. Therefore, through the scheme of the embodiment of the application, effective and active video work protection is achieved.
In addition, if the video and the digital watermark are added into the block chain on the basis of adding the digital watermark, the generated authentication deposit certificate can effectively prove the identity of the video original author due to the originality and the safety of data in the block chain, so that the proof is provided for the copyright protection of the video, and the rights and interests of the original author are further guaranteed. Therefore, the effect of protecting the video works is further improved.
Example two
Referring to fig. 3A, a flowchart illustrating steps of a video data protection method according to a second embodiment of the present application is shown.
The video data protection method of this embodiment is still described from the viewpoint of video production protection, and the video data protection method of this embodiment includes the following steps:
step S302: and acquiring the video to be embedded with the authentication information and the authentication information to be embedded.
As described above, the video to be embedded with the authentication information in the embodiment of the present application is generally an original video. In a feasible manner, the video data protection scheme provided by the embodiment of the present application can be integrated in a video creation production platform, so as to be conveniently used by a video creator and improve the efficiency of video data protection. Based on this, in this step, a video protection request triggered after the video creation is completed by the video creation production platform client can be received; acquiring user information of a video creator and a created video from the user client according to the request; and taking the created video as the video to be embedded with the authentication information, and generating the authentication information to be embedded according to the user information. In practical applications, the user information may be directly used as the authentication information, but is not limited thereto, and other information may be added or the user information may be modified, such as encrypted, based on the user information and then used as the authentication information, so as to further protect the privacy information of the video creator.
Step S304: and performing digital watermarking processing based on the frequency domain on the video according to the authentication information to obtain the video embedded with the frequency domain digital watermark.
There are various ways of frequency domain digital watermarking, including but not limited to frequency domain digital watermarking algorithm based on fourier transform, frequency domain digital watermarking algorithm based on discrete cosine transform, frequency domain digital watermarking algorithm based on wavelet transform, etc. In an exemplary manner of the embodiment, the binary form of the authentication information may be encoded by a Reed-solomon codes method to improve the error correction capability, and then the encoding is embedded into each frame image of the video by a DCT-based frequency domain digital watermarking algorithm. Among them, the Reed-solomon codes method is an error control coding method which improves the error correction capability of the code by adding some redundancy codes after the data of the galois field. Therefore, the authentication information also has better error correction capability.
In addition, as an optional implementation manner, in this embodiment, when performing frequency domain digital watermarking on a video, a video frame image of the video may be first transformed into a frequency domain; and adding authentication information to a fixed area of the video frame image in the frequency domain, wherein the fixed area is a corner area and/or a central area of the video frame image. On one hand, the area of the image region needing to be calculated is greatly reduced, the calculation efficiency of frequency domain embedding and extraction is greatly improved, and the real-time interaction requirement of a user can be met; on the other hand, due to the relationship between the corners (e.g., four corners) and the specific positions of the central region, the frequency domain embedding has attack resistance to frequency domain attack methods such as luminance variation, noise addition, filter addition, image compression, video encoding and decoding, and the like, and also has attack resistance to spatial domain attack methods that retain one-sided clipping of one of the four corners and center clipping of the central region.
The fixed area is a square with the side length of N, and the N is determined according to the length of the authentication information and the size of the DCT window. Therefore, the integrity of the authentication information is guaranteed, and the authentication information can be effectively processed.
In one example, frequency domain digital watermark embedding is performed in a fixed partial area of a video frame image. Specifically, a plurality of fixed regions may be selected from the video frame image for frequency domain digital watermark embedding, for example, the selected region is a square with a side length of N, and the positions of the selected region include an upper left corner, a lower left corner, an upper right corner, a lower right corner, and a middle of the image. Where N ═ sqrt (M) × w, M indicates the authentication information length such as 256, sqrt indicates square root formation, and w is the DCT window size, and is typically 2.
Through the process, the embedding of the frequency domain digital watermark of the video can be realized, and the watermark is a hidden watermark.
Step S306: and performing space domain digital watermarking processing based on a preset quantization threshold value on the video embedded with the frequency domain digital watermark to obtain an authentication video embedded with the space domain digital watermark.
For example, the above-described code obtained by the Reed-solomon codes method is embedded into each frame image of the video again by the spatial domain digital watermarking algorithm based on LSB (least significant bit).
Different from the traditional spatial domain digital watermarking, the spatial domain digital watermarking on the video is realized based on a preset quantization threshold value in the embodiment of the application.
When the step is specifically realized, for the video frame image in the video embedded with the frequency domain digital watermark, acquiring component values of all colors of a color space model corresponding to the video frame image; quantizing the component values by using a quantization threshold value, and embedding authentication information on the basis of the quantized component values; and updating the video frame image according to the component value embedded with the authentication information to obtain the authentication video embedded with the spatial domain digital watermark. Optionally, when the video frame image is updated according to the component value embedded with the authentication information to obtain the authentication video embedded with the spatial domain digital watermark, a reverse vectorization process may be performed on the component value embedded with the authentication information to obtain a reverse vectorization result; and updating the video frame image by using the inverse quantization result to obtain the authentication video embedded with the spatial domain digital watermark. Wherein the quantization threshold may be determined according to an acceptable color fluctuation range of a video frame image of the video.
Color space models for images include, but are not limited to: an RGB color space model, an RGBA color space model, a YUV color space model, an HSV color space model, etc. In this embodiment, the RGB color space model is selected, which has wide versatility, easy processing, and low data processing cost. It will be apparent to those skilled in the art that, regardless of the color space model used, the quantization threshold-based processing of its color components may be such that the original watermark information is recovered even under image brightness variations.
In a specific example, a quantization threshold K is set, and for three channel values R, G, B of a pixel point in a video frame image, the quantization threshold K is used to quantize the three channel valuesThen, on the basis of the quantized values r, g and b, embedding watermark data (authentication information) of one bit at the same time to obtain new values r ', g ' and b '; then, the inverse process of quantization is performed to obtain Then, the corresponding pixel points in the video frame image are updated according to the pixel values R ', G ' and B '.
The effect of K is to set a range of allowable fluctuation of the pixel value, so as to allow recovery of the original watermark information under a larger variation of the pixel brightness, and K may be set to 3 alternatively.
Therefore, the method and the device realize the double hidden digital watermarking of the frequency domain and the space domain of the video, and obtain the authentication video.
Step S308: and generating a data block according to the authentication video and the authentication information, adding the data block into a block chain to perform authentication and evidence storage, and obtaining an authentication and evidence storage result of the data block in the block chain.
In this embodiment, the authentication video and the authentication information are uplinked through the server device. After obtaining the authentication video and the authentication information, the server device may generate a data block for the authentication video and the authentication information, and add the data block into a block chain for authentication and evidence storage to obtain a corresponding authentication and evidence storage result (e.g., a hash value corresponding to the data block). Further, the server device may return the authentication result to the client device.
For example, a member node of the federation chain may first request to log in to a federation blockchain and obtain subsequent operation authorization; then according to the authentication information embedding method of the video digital watermark, acquiring an authentication video and embedded authentication information; then, the authentication video and the embedded authentication information are applied for registering a log-in chain through member nodes of the alliance chain; and then, returning an authentication and verification result according to the Hash value of the uplink new block.
In an example of integrating the video authentication information embedding and evidence storing process into the video creation production platform, firstly, a video creator applies for logging in the video creation production platform through a client (a video creation production platform client); then the video creator edits and creates the short video works by using the client; then the video creator initiates copyright protection on the created short video through the client, and simultaneously sends personal user information of the video creator and the created short video to the server; then the server receives the request, the user information and the short video of the client; then the server side generates authentication information based on the user information, and embeds the authentication information into the short video through the authentication information embedding method to generate an authentication video; then the server side registers the authentication video and the authentication information into a link through a alliance link by the block link-based copyright certificate storing method, and obtains an authentication certificate storing result; then the server side sends the authentication video embedded with the authentication information, the authentication information and the authentication and verification result to the client side; and then the video creator obtains the authentication video embedded with the authentication information, the authentication information and the authentication and verification result as the copyright protection result of the short video through the client.
Step S310: and returning the authentication and storage result to the client.
And returning the authentication and evidence storage result to the client, wherein the authentication and evidence storage result can be stored by the client and used in the subsequent video authentication.
The above process is exemplified below with video originality protection as an example scenario. It should be apparent to those skilled in the art that the video example is applicable to a variety of video types, short video, long short video, and shorter video material.
The process comprises the following steps:
step A: and receiving a copyright protection request sent by a user after completing video creation through a video creation production platform client.
In this example, a video creation production platform is provided for a user, i.e., a video creator, and the user can locally create a video through a client of the video creation production platform and request copyright protection for an original video created by the user through the video creation production platform.
When requesting copyright protection, the client of the video creation production platform may send a copyright protection request to the server of the video creation production platform, where the copyright protection request carries user information of a user and information of a video created by the user. After receiving the request, the video creation and production platform server performs copyright protection processing on the video based on the information therein, which is described in detail below.
And B: and performing digital watermarking processing based on the frequency domain on the video by taking the user information as authentication information to obtain the video embedded with the frequency domain digital watermark.
For example, a video creation and production platform performs frequency domain digital watermark embedding in a fixed partial region of each video frame image of the video. Specifically, a plurality of fixed regions may be selected from the video frame image for frequency domain digital watermark embedding, for example, the selected region is a square with a side length of N, and the positions of the selected region include an upper left corner, a lower left corner, an upper right corner, a lower right corner, and a middle of the image. Where N ═ sqrt (M) × w, M indicates the authentication information length such as 256, sqrt indicates square root formation, and w is the DCT window size, and is typically 2.
And C: and performing space domain digital watermarking processing based on a preset quantization threshold value on the video embedded with the frequency domain digital watermark to obtain an authentication video embedded with the space domain digital watermark.
For example, a quantization threshold K is set first, and for three channel values R, G, B of a pixel point in each video frame image of the video embedded with the frequency domain digital watermark, the quantization threshold K is used to quantize the three channel values to obtain the quantized channel values B is B/k; then, on the basis of the quantized values r, g and b, embedding watermark data (authentication information) of one bit at the same time to obtain new values r ', g ' and b '; then, the inverse process of quantization is performed to obtain Then, the corresponding pixel points in the video frame image are updated according to the pixel values R ', G ' and B '.
The effect of K is to set a range of allowable fluctuation of the pixel value, so as to allow recovery of the original watermark information under a larger variation of the pixel brightness, and K may be set to 3 alternatively.
Therefore, the method and the device realize the double hidden digital watermarking of the frequency domain and the space domain of the video, and obtain the authentication video.
Step D: and generating a data block according to the authentication video and the authentication information, adding the data block into a block chain to perform authentication and evidence storage, and obtaining an authentication and evidence storage result of the data block in the block chain as a copyright certificate of the video.
The regional chain is selected from a federation chain type, but is not limited thereto, and other types such as a public chain or a private chain type are also applicable to the solution of the embodiment of the present application.
For example, a member node of the federation chain may first request to log in to a federation blockchain and obtain subsequent operation authorization; then according to the authentication information embedding method of the video digital watermark, acquiring an authentication video and embedded authentication information; then, the authentication video and the embedded authentication information are applied for registering a log-in chain through member nodes of the alliance chain; and then returning an authentication and verification storage result according to the Hash value of the uplink new block, wherein the authentication and verification storage result is the copyright certificate of the video.
In addition, optionally, in the process of video creation by the user, the video material used by the user can also be authenticated to ensure the legality of the video material used by the user, so that the legality of the video created by the user can be ensured. For example, an authentication request for used video material sent by a user in the process of authoring the video may be received; obtaining video materials according to the authentication request, and extracting authentication information of the video materials; judging whether a copyright certificate corresponding to the video material exists in the block chain; and if so, acquiring the copyright certificate, and sending use indication information aiming at the video material to the user according to the comparison result of the copyright certificate and the extracted authentication information.
The use indication information may be prompt information to prompt a user whether the video material is legal or not, whether the video material can be used or not, and the like.
In this case, if the block chain does not have the copyright certificate corresponding to the video material, the corresponding prompt information, such as the prompt information that whether the video material is legal or not cannot be determined, can be sent to the user, and the user can decide whether to use the video material. If the block chain has the copyright certificate corresponding to the video material, comparing whether the copyright certificate is consistent with the extracted authentication information, if so, prompting the user that the video material is legal material protected by copyright, asking the user to apply for use according to a specified flow, and the like; and if the video materials are inconsistent, prompting the user that the video materials are illegal materials, prohibiting the user from using the video materials to create and the like. Of course, other forms of prompting information or usage indication information are equally applicable to the scheme in this example.
But not limited to the above examples, the solution of the embodiment of the present application may also be applied to other various scenarios, including but not limited to: video copyright storage and protection under a plurality of scenes such as teaching videos recorded for teachers in online education scenes, conference videos recorded for conferences in video conference scenes, video clips of various conference videos and the like.
For example, in an online education scenario, a request for copyright protection of a teaching video recorded for a teacher may be received; according to the request and preset authentication information (such as teacher user information or account information of a teaching platform), performing frequency domain-based digital watermarking on the teaching video to obtain the teaching video embedded with the frequency domain digital watermark; then, performing spatial domain digital watermarking processing based on a preset quantization threshold value on the teaching video embedded with the frequency domain digital watermark to obtain an authentication teaching video embedded with the spatial domain digital watermark; and generating a data block according to the authentication teaching video and the authentication information, adding the data block into a block chain to perform authentication and evidence storage, and obtaining an authentication and evidence storage result of the data block in the block chain as a copyright certificate of the teaching video.
For another example, in a video conference scenario, a copyright protection request for a recorded conference video may be received; according to the request and preset authentication information (such as user information of a conference host or account information of a conference platform and the like), performing frequency domain-based digital watermarking on the conference video to obtain the conference video embedded with the frequency domain digital watermarking; then, performing airspace digital watermark processing based on a preset quantization threshold value on the conference video embedded with the frequency domain digital watermark to obtain an authentication conference video embedded with the airspace digital watermark; and generating a data block according to the authentication conference video and the authentication information, adding the data block into a block chain to perform authentication and evidence storage, and obtaining an authentication and evidence storage result of the data block in the block chain as a copyright certificate of the conference video.
For another example, also in a video conference scenario, a copyright protection request for a recorded conference video may be received; acquiring a conference video and preset authentication information (such as user information of a conference host or account information of a conference platform) according to the request; analyzing a conference video to obtain a plurality of effective video segments (such as a video segment spoken by a host, a video segment spoken by an important participant, a plurality of video segments for a topic or theme, and the like) in the conference video; then, according to the obtained authentication information, performing digital watermarking processing based on the frequency domain on each conference video segment to obtain one or more conference video segments embedded with the frequency domain digital watermarking; then, carrying out space domain digital watermark processing based on a preset quantization threshold value on the conference video segment embedded with the frequency domain digital watermark to obtain one or more authentication conference video segments embedded with the space domain digital watermark; and generating a corresponding data block according to one or more authentication conference video clips and the authentication information (the corresponding data block can be generated for each authentication conference video clip and the authentication information respectively, or a data block can be generated by all the authentication conference video clips and the authentication information together), adding the data block into a block chain for authentication and evidence storage, and obtaining an authentication and evidence storage result of the data block in the block chain as a copyright certificate of the conference video clip.
According to the embodiment, the hidden digital watermark embedded in the video can be formed by watermarking twice for the original video works of the video creators, and then the video and the digital watermark are authenticated and stored by the block chain technology, so that whether the video is original or not can be effectively identified in the follow-up process. When the video is subjected to watermarking, the video is firstly subjected to frequency domain watermarking, so that the protection of a first-level hidden watermark can be realized, but in order to enable the video to have stronger attack resistance, a second-level spatial domain watermarking is added for the video on the basis of the frequency domain watermarking, and the spatial domain watermarking is performed on the basis of a quantization threshold value. Therefore, the video is stronger in attack resistance, and better in anti-interference performance on image change. In addition, on the basis of adding the digital watermark, the video and the digital watermark are added into the block chain, and due to the originality and the safety of data in the block chain, the generated authentication deposit certificate can effectively prove the identity of the video original author, provide a proof for the copyright protection of the video, and further guarantee the rights and interests of the original author. Therefore, through the scheme of the embodiment of the application, effective and active video work protection is achieved.
EXAMPLE III
Referring to fig. 4, a flowchart illustrating steps of a video data protection method according to a third embodiment of the present application is shown.
The video data protection method of this embodiment is explained from the viewpoint of video copyright identification, and includes the following steps:
step S402: a video authentication request is received.
For example, a video authentication request initiated by a client may be received. The client can send a video authentication request to the server through the video creation production platform so as to request the identification of whether a certain video or a certain video material is infringed.
The video authentication request carries information of a video to be authenticated.
Step S404: and obtaining the video to be authenticated according to the video authentication request, and extracting authentication information in the video to be authenticated.
For example, the video to be authenticated is obtained from the client according to the information of the video to be authenticated carried in the video authentication request, or the video to be authenticated is obtained according to the address indicated by the information of the video to be authenticated.
And after the video to be authenticated is obtained, extracting authentication information in the video. For example, extracting binary codes from each video frame image through the LSB-based spatial domain digital watermarking algorithm, and recovering authentication information of each video frame image through Reed-solomon codes error correction; then, extracting binary codes from each video frame image through the DCT-based frequency domain digital watermarking algorithm and recovering the authentication information of each video frame image through Reed-solomon codes error correction; then all the extracted authentication information is counted to obtain the authentication information with the most repeated occurrence times as the finally extracted authentication information.
The authentication information in the video to be authenticated can be generated by the method described in the first or second embodiment, and of course, schemes generated by other methods can also be applied to this embodiment. For example, the video to be authenticated may be a video subjected to only frequency domain digital watermarking, or a video subjected to only spatial domain digital watermarking, or the like.
Step S406: and acquiring an authentication deposit certificate corresponding to the video to be authenticated from the block chain, and determining an authentication result of the video to be authenticated according to the extracted authentication information and the authentication deposit certificate.
For example, if the authentication result represents that the authentication information is consistent with the authentication deposit certificate, determining that the video to be authenticated is not infringed; otherwise, a video infringement to be authenticated may be determined.
In one example, the functions of the present embodiment can be integrated into a video authoring production platform, and then: firstly, a user applies for logging in the short video creation production platform through a client; then the user uploads the suspected infringement short video to the server by using the client and initiates a short video authentication information extraction request; then the server receives the suspected infringement short video and extracts the authentication information by the authentication information extraction method of the video digital watermark; then the server side inquires the authentication and evidence storage result through the copyright service union link to obtain an inquiry result; then the server side sends the extracted authentication information and the alliance chain query result to the client side; and then the user obtains the extracted authentication information and the alliance chain query result through a client as a video authentication result of the short video.
In addition, in some scenarios, the video creator may also introduce some existing video material into its own video creation, and in such a case, the video creator needs to know whether the introduced video material may infringe. In this scenario, the video authentication request may be a request for requesting authentication of a video material for creating a video, and the video to be authenticated is a video corresponding to the video material; and in this case, if the authentication result indicates that the authentication information is inconsistent with the authentication deposit certificate, the client is indicated to prohibit the video creation by using the video material. Thus, the rights and interests of both the original video and the video creator are protected.
For example, a video creator applies for logging in a video creation production platform through a client; a video creator imports video materials through a client; the platform extracts authentication information of the video material; the platform checks whether the video material has authentication information and does not accord with the user information of the current video creator; if so, triggering an active copyright protection prompt, namely, reminding the video creator that the video material is unavailable due to copyright reasons by the client side, and forbidding the video creator to create and use the video material.
Through the embodiment, copyright detection and determination can be effectively carried out on suspected videos or video materials with use requirements, so that rights and interests of original videos and video creators are effectively protected.
Example four
Referring to fig. 5, a schematic structural diagram of a specific video data protection system according to a fourth embodiment of the present application is shown.
The video data protection system of the embodiment is used for performing copyright storage protection on videos produced by a video production side, and comprises the following components: the system comprises a video digital watermark embedding and extracting module and hardware equipment, an authentication and verification system and hardware equipment comprising a alliance chain, and a software system and hardware equipment (shown as cloud storage simply) related to a copyright protection function in a client and a server of a video creation and production platform based on cloud and artificial intelligence.
The system comprises a video digital watermark embedding and extracting module and hardware equipment, wherein the video digital watermark embedding and extracting module and the hardware equipment are used for completing the embedding and extracting of authentication information based on video digital watermarks; the authentication and deposit system comprises an authentication and deposit system of a alliance chain and hardware equipment, and is used for completing an authentication and deposit process based on a block chain; and software systems and hardware equipment related to the copyright protection function in the client side and the server side of the video creation production platform based on cloud and artificial intelligence are used for completing integration of the video creation production platform and the video data protection method and completing user interaction related to video data protection.
It should be noted that, the descriptions of the functional components are all simple, and the specific implementation thereof can refer to the descriptions of the relevant parts in the foregoing method embodiments, and has corresponding beneficial effects, which are not described herein again.
EXAMPLE five
Referring to fig. 6, a schematic structural diagram of an electronic device according to a fifth embodiment of the present application is shown, and the specific embodiment of the present application does not limit a specific implementation of the electronic device.
As shown in fig. 6, the electronic device may include: a processor (processor)502, a Communications Interface 504, a memory 506, and a communication bus 508.
Wherein:
the processor 502, communication interface 504, and memory 506 communicate with one another via a communication bus 508.
A communication interface 504 for communicating with other electronic devices or servers.
The processor 502 is configured to execute the program 510, and may specifically perform the relevant steps in any of the above embodiments of the video data protection method.
In particular, program 510 may include program code that includes computer operating instructions.
The processor 502 may be a central processing unit CPU, or an application Specific Integrated circuit asic, or one or more Integrated circuits configured to implement embodiments of the present application. The intelligent device comprises one or more processors which can be the same type of processor, such as one or more CPUs; or may be different types of processors such as one or more CPUs and one or more ASICs.
And a memory 506 for storing a program 510. The memory 506 may comprise high-speed RAM memory, and may also include non-volatile memory (non-volatile memory), such as at least one disk memory.
The program 510 may be specifically adapted to cause the processor 502 to perform the operations described in any of the preceding method embodiments.
For specific implementation of each step in the program 510, reference may be made to corresponding steps and corresponding descriptions in units in the foregoing method embodiments, which are not described herein again. It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described devices and modules may refer to the corresponding process descriptions in the foregoing method embodiments, and are not described herein again.
An embodiment of the present application further provides a computer program product, which includes a computer instruction, where the computer instruction instructs a computing device to execute an operation corresponding to any video data protection method in the foregoing multiple method embodiments.
As can be seen, by the scheme of the embodiment of the present application:
(1) the scheme is characterized in that authentication information is embedded into each frame of a video by combining a frequency domain digital watermarking algorithm and a spatial domain digital watermarking algorithm. Compared with a method based on video characteristics, the method has the advantages that the calculation efficiency and the authentication robustness are remarkably improved. The method includes the steps that a video digital watermark technology is used for embedding authentication information of a video needing to be protected, for the video to be detected, only the video digital watermark technology is used for carrying out calculation operation of digital watermark extraction on the video, whether the extracted authentication information is consistent with the embedded authentication information or not is compared, and attacks such as copying, transcoding, compression, interception, cutting, filtering, noise, paper pasting, rotation, mirror image and even screen recording can be resisted.
(2) A block chain technology is used as a video copyright storage mode, and all copyright statements of a video creator are recorded at the first time by linking a video embedded with authentication information and the embedded authentication information. After the subsequent discovery of the infringement behavior, the original authentication and evidence-storing information can be inquired from the chain for investigation and evidence collection.
(3) The video authentication mode and the video evidence storage mode are integrated into a video creation production platform based on cloud and artificial intelligence, authentication information is permanently written into produced video content from the source at the video production side, and in subsequent links such as secondary creation and distribution, the authentication information cannot be erased due to the anti-attack robustness of the video digital watermark, so that the risk of copyright protection failure in the subsequent links is greatly reduced.
It should be noted that, according to the implementation requirement, each component/step described in the embodiment of the present application may be divided into more components/steps, and two or more components/steps or partial operations of the components/steps may also be combined into a new component/step to achieve the purpose of the embodiment of the present application.
The above-described methods according to embodiments of the present application may be implemented in hardware, firmware, or as software or computer code storable in a recording medium such as a CD ROM, a RAM, a floppy disk, a hard disk, or a magneto-optical disk, or as computer code originally stored in a remote recording medium or a non-transitory machine-readable medium downloaded through a network and to be stored in a local recording medium, so that the methods described herein may be stored in such software processes on a recording medium using a general-purpose computer, a dedicated processor, or programmable or dedicated hardware such as an ASIC or FPGA. It will be appreciated that the computer, processor, microprocessor controller or programmable hardware includes memory components (e.g., RAM, ROM, flash memory, etc.) that can store or receive software or computer code that, when accessed and executed by the computer, processor or hardware, implements the video data protection methods described herein. Further, when a general-purpose computer accesses code for implementing the video data protection method shown herein, execution of the code converts the general-purpose computer into a special-purpose computer for performing the video data protection method shown herein.
Those of ordinary skill in the art will appreciate that the various illustrative elements and method steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the embodiments of the present application.
The above embodiments are only used for illustrating the embodiments of the present application, and not for limiting the embodiments of the present application, and those skilled in the relevant art can make various changes and modifications without departing from the spirit and scope of the embodiments of the present application, so that all equivalent technical solutions also belong to the scope of the embodiments of the present application, and the scope of patent protection of the embodiments of the present application should be defined by the claims.
Claims (14)
1. A video data protection method, comprising:
acquiring a video to be embedded with authentication information and the authentication information to be embedded;
performing digital watermarking processing based on the frequency domain on the video according to the authentication information to obtain the video embedded with the frequency domain digital watermark;
and performing space domain digital watermark processing based on a preset quantization threshold value on the video embedded with the frequency domain digital watermark to obtain an authentication video embedded with the space domain digital watermark.
2. The method according to claim 1, wherein the performing spatial domain digital watermarking processing based on a preset quantization threshold on the video embedded with the frequency domain digital watermark to obtain the authentication video embedded with the spatial domain digital watermark includes:
for a video frame image in the video embedded with the frequency domain digital watermark, acquiring component values of all colors of a color space model corresponding to the video frame image;
quantizing the component values using the quantization threshold, and embedding the authentication information on the basis of the quantized component values;
and updating the video frame image according to the component value embedded with the authentication information to obtain the authentication video embedded with the spatial domain digital watermark.
3. The method according to claim 2, wherein the updating the video frame image according to the component value embedded with the authentication information to obtain the authentication video embedded with the spatial domain digital watermark comprises:
performing an inverse quantization process on the component values embedded with the authentication information to obtain an inverse quantization result;
and updating the video frame image by using the inverse quantization result to obtain the authentication video embedded with the spatial domain digital watermark.
4. The method of claim 1, wherein the performing frequency-domain-based digital watermarking on the video according to the authentication information to obtain the video embedded with the frequency-domain digital watermark comprises:
transforming video frame images of the video to a frequency domain;
and adding the authentication information to a fixed area of the video frame image in the frequency domain, wherein the fixed area is a corner area and/or a central area of the video frame image.
5. The method of claim 1, wherein prior to said obtaining the video in which the authentication information is to be embedded and the authentication information to be embedded, the method further comprises:
receiving a video protection request triggered after a client finishes video creation through a video creation production platform;
acquiring user information of a video creator and the created video from the client according to the request;
and taking the created video as the video to be embedded with the authentication information, and generating the authentication information to be embedded according to the user information.
6. The method of claim 1, wherein the method further comprises:
receiving a video authentication request initiated by a client;
acquiring a video to be authenticated according to the video authentication request, and extracting authentication information in the video;
and acquiring an authentication deposit certificate corresponding to the video to be authenticated from the block chain, and determining an authentication result of the video to be authenticated according to the extracted authentication information and the authentication deposit certificate.
7. The method of claim 6, wherein the video authentication request is used to request authentication of a video material for creating a video, and the video to be authenticated is a video corresponding to the video material;
the method further comprises the following steps:
and if the authentication result indicates that the authentication information is inconsistent with the authentication deposit certificate, indicating the client to forbid the video creation by using the video material.
8. The method of any of claims 1-7, wherein the method further comprises:
and generating a data block according to the authentication video and the authentication information, adding the data block into a block chain to perform authentication and evidence storage, and obtaining an authentication and evidence storage result of the data block in the block chain.
9. A video data protection method, comprising:
receiving a video authentication request, wherein the video authentication request carries information of a video to be authenticated;
obtaining a video to be authenticated according to the information of the video to be authenticated in the video authentication request, and extracting authentication information in the video to be authenticated;
and acquiring an authentication deposit certificate corresponding to the video to be authenticated from the block chain, and determining the authentication result of the video to be authenticated according to the extracted authentication information and the authentication deposit certificate.
10. A video data protection method, comprising:
receiving a copyright protection request sent by a user after completing video creation through a video creation production platform client, wherein the copyright protection request carries user information of the user and information of the video;
performing digital watermarking processing based on a frequency domain on the video by taking the user information as authentication information to obtain the video embedded with the frequency domain digital watermark;
performing spatial domain digital watermarking processing based on a preset quantization threshold value on the video embedded with the frequency domain digital watermark to obtain an authentication video embedded with the spatial domain digital watermark;
and generating a data block according to the authentication video and the authentication information, adding the data block into a block chain to perform authentication and evidence storage, and obtaining an authentication and evidence storage result of the data block in the block chain as a copyright certificate of the video.
11. The method of claim 10, wherein the method further comprises:
receiving an authentication request aiming at a used video material sent by the user in the process of creating the video;
acquiring the video material according to the authentication request, and extracting authentication information of the video material; judging whether a copyright certificate corresponding to the video material exists in the block chain or not;
and if the video material exists, acquiring the copyright certificate, and sending use indication information aiming at the video material to a user according to a comparison result of the copyright certificate and the extracted authentication information.
12. An electronic device, comprising: the system comprises a processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface complete mutual communication through the communication bus;
the memory is used for storing at least one executable instruction, and the executable instruction causes the processor to execute the operation corresponding to the video data protection method according to any one of claims 1-11.
13. A computer storage medium having stored thereon a computer program which, when executed by a processor, implements a video data protection method as claimed in any one of claims 1 to 11.
14. A computer program product comprising computer instructions to instruct a computing device to perform operations corresponding to the video data protection method according to any of claims 1 to 11.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111154382.XA CN113810723B (en) | 2021-09-29 | 2021-09-29 | Video data protection method, electronic device and computer storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111154382.XA CN113810723B (en) | 2021-09-29 | 2021-09-29 | Video data protection method, electronic device and computer storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113810723A true CN113810723A (en) | 2021-12-17 |
CN113810723B CN113810723B (en) | 2024-10-18 |
Family
ID=78897127
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111154382.XA Active CN113810723B (en) | 2021-09-29 | 2021-09-29 | Video data protection method, electronic device and computer storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113810723B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116385030A (en) * | 2023-06-06 | 2023-07-04 | 北京农夫铺子技术研究院 | Source tracing method based on block chain |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050259820A1 (en) * | 2004-05-24 | 2005-11-24 | Eastman Kodak Company | Temporally distributed watermarking for image sequences |
CN101751655A (en) * | 2008-12-17 | 2010-06-23 | 北京大学 | Methods for implanting and extracting digital watermark and device thereof |
CN103413269A (en) * | 2013-08-20 | 2013-11-27 | 宁波大学 | Image steganography method and secret information extraction method |
FR2997526A1 (en) * | 2012-10-30 | 2014-05-02 | Arnaud Pernel | Method for generating secret coding key space in frame of symmetrical cryptographic system, involves generating secret coding key space from single primitive secret coding key that is in form of ordinal key made up of unspecified objects |
CN104539965A (en) * | 2015-01-12 | 2015-04-22 | 中国电子科技集团公司第三十八研究所 | H.264/AVC compressed-domain video watermark embedding and extracting method |
US20160212441A1 (en) * | 2015-01-15 | 2016-07-21 | Gopro, Inc. | Inter frame watermark in a digital video |
CN107895340A (en) * | 2017-11-29 | 2018-04-10 | 鲁东大学 | The null tone domain color digital image blind watermark method that a kind of fusion QR is decomposed |
CN108932410A (en) * | 2018-08-17 | 2018-12-04 | 腾讯科技(深圳)有限公司 | A kind of digital resource copyright method for authenticating, device, system and storage medium |
WO2019134275A1 (en) * | 2018-01-05 | 2019-07-11 | 武汉斗鱼网络科技有限公司 | Video stream address authentication method, storage medium, device and system |
CN110134837A (en) * | 2019-04-12 | 2019-08-16 | 深圳市元征科技股份有限公司 | A kind of approaches to IM and device |
CN111145069A (en) * | 2019-12-03 | 2020-05-12 | 支付宝(杭州)信息技术有限公司 | Image watermarking processing method and device based on block chain |
CN113240569A (en) * | 2021-06-18 | 2021-08-10 | 展讯通信(上海)有限公司 | Fingerprint image encryption method, device and system |
-
2021
- 2021-09-29 CN CN202111154382.XA patent/CN113810723B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050259820A1 (en) * | 2004-05-24 | 2005-11-24 | Eastman Kodak Company | Temporally distributed watermarking for image sequences |
CN101751655A (en) * | 2008-12-17 | 2010-06-23 | 北京大学 | Methods for implanting and extracting digital watermark and device thereof |
FR2997526A1 (en) * | 2012-10-30 | 2014-05-02 | Arnaud Pernel | Method for generating secret coding key space in frame of symmetrical cryptographic system, involves generating secret coding key space from single primitive secret coding key that is in form of ordinal key made up of unspecified objects |
CN103413269A (en) * | 2013-08-20 | 2013-11-27 | 宁波大学 | Image steganography method and secret information extraction method |
CN104539965A (en) * | 2015-01-12 | 2015-04-22 | 中国电子科技集团公司第三十八研究所 | H.264/AVC compressed-domain video watermark embedding and extracting method |
US20160212441A1 (en) * | 2015-01-15 | 2016-07-21 | Gopro, Inc. | Inter frame watermark in a digital video |
CN107895340A (en) * | 2017-11-29 | 2018-04-10 | 鲁东大学 | The null tone domain color digital image blind watermark method that a kind of fusion QR is decomposed |
WO2019134275A1 (en) * | 2018-01-05 | 2019-07-11 | 武汉斗鱼网络科技有限公司 | Video stream address authentication method, storage medium, device and system |
CN108932410A (en) * | 2018-08-17 | 2018-12-04 | 腾讯科技(深圳)有限公司 | A kind of digital resource copyright method for authenticating, device, system and storage medium |
CN110134837A (en) * | 2019-04-12 | 2019-08-16 | 深圳市元征科技股份有限公司 | A kind of approaches to IM and device |
CN111145069A (en) * | 2019-12-03 | 2020-05-12 | 支付宝(杭州)信息技术有限公司 | Image watermarking processing method and device based on block chain |
CN113240569A (en) * | 2021-06-18 | 2021-08-10 | 展讯通信(上海)有限公司 | Fingerprint image encryption method, device and system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116385030A (en) * | 2023-06-06 | 2023-07-04 | 北京农夫铺子技术研究院 | Source tracing method based on block chain |
CN116385030B (en) * | 2023-06-06 | 2023-09-15 | 北京农夫铺子技术研究院 | Source tracing method based on block chain |
Also Published As
Publication number | Publication date |
---|---|
CN113810723B (en) | 2024-10-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bartolini et al. | Image authentication techniques for surveillance applications | |
US8824728B2 (en) | Method and system for tracking illegal distributor and preventing illegal content distribution | |
JP2003309559A (en) | Device and method for performing delivery and authentication of data set, using watermark | |
CN111491170A (en) | Method for embedding watermark and watermark embedding device | |
CN110717151B (en) | Digital fingerprint processing and signature processing method | |
KR20190127124A (en) | Method and apparatus for verifying integrity of source code and related data using blockchain | |
CN110288504A (en) | It is a kind of to automatically add water impression method towards block chain digital education platform | |
CN113810723B (en) | Video data protection method, electronic device and computer storage medium | |
CN105160619B (en) | A kind of image watermark detection method | |
Ding et al. | Image authentication and tamper localization based on relative difference between DCT coefficient and its estimated value | |
CN117077092A (en) | Model property right protection method, device, storage medium and program product | |
CN102946531A (en) | GOP (group of picture) frame structure combined video watermarking method and system | |
CN113095993A (en) | Image verification method and system for chaotic encryption and digital watermarking | |
Sowmya et al. | Video authentication using watermark and digital signature—a study | |
CN111222177A (en) | Digital fingerprint processing and signature processing method | |
CN116232700A (en) | Login authentication method, login authentication device, computer equipment and storage medium | |
Frolov et al. | Deepfakes and Information Security Issues | |
Hewage et al. | Multimedia privacy and security landscape in the wake of ai/ml | |
Hadmi et al. | A novel approach for robust perceptual image hashing | |
CN117633728B (en) | Video cartoon digital copyright trading platform and copyright right-determining method based on blockchain | |
CN117596407B (en) | Video stream tampering detection system and method based on feature code layered embedding | |
CN113987550A (en) | Data security processing method, electronic device and computer storage medium | |
Mahajan | Steganography: A data hiding technique | |
JP3922369B2 (en) | Embedded information recording apparatus and reproducing apparatus, recording program, and reproducing program | |
US20240242522A1 (en) | System and method of authenticating video |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant |