CN115278310A - Method for expanding source authorization information in AVS3 video - Google Patents
Method for expanding source authorization information in AVS3 video Download PDFInfo
- Publication number
- CN115278310A CN115278310A CN202210718356.3A CN202210718356A CN115278310A CN 115278310 A CN115278310 A CN 115278310A CN 202210718356 A CN202210718356 A CN 202210718356A CN 115278310 A CN115278310 A CN 115278310A
- Authority
- CN
- China
- Prior art keywords
- data
- video
- digital
- authorization
- avs3
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000013475 authorization Methods 0.000 title claims abstract description 54
- 238000000034 method Methods 0.000 title claims abstract description 29
- 230000009191 jumping Effects 0.000 claims abstract description 4
- 238000012795 verification Methods 0.000 description 3
- 230000007547 defect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000004630 mental health Effects 0.000 description 1
- 230000011514 reflex Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/258—Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
- H04N21/25808—Management of client data
- H04N21/25816—Management of client data involving client authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Multimedia (AREA)
- Computer Graphics (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
Abstract
A method of extending source-authorization information in AVS3 video, comprising: s1: generating a key pair of a public key and a private key of RSA2048, and determining a digital digest algorithm; s2: reading a GOP of the AVS3 video, acquiring video I frame data, performing digital abstraction and generating digital abstract data; s3: encrypting the digital summary data by using a private key of RSA2048 to obtain encrypted data; s4: splicing the digital abstract algorithm and the encrypted data into authorization data; s5: writing the authorization data into the user data of the GOP read in S2; and S6: and reading the next GOP data, and jumping to S2 to continue the execution until the whole AVS3 video finishes the writing of the authorization information. The method can meet the requirement of verifying the video source under the compatible condition, can use the authorization data to verify the player needing to verify the video source, and can normally play the player without verifying the video source by directly ignoring the data.
Description
Technical Field
The invention relates to the field of video coding, in particular to a method for expanding source authorization information in an audio video standard (AVS 3) video, which relates to the field of verifying a video source in the third generation AVS3 video playing and preventing unauthorized video or tampered video playing.
Background
In the video field, there are many techniques for protecting video content, such as scrambling, which is to control an unauthorized player not to play a protected video, but there is another scenario in reality that a video source needs to be verified, and the unauthorized video is not allowed to be played. The scene can be applied to the playing control of a large screen in a public place. Public large screens are generally set in squares, business circles and traffic hubs with dense people flow, and once some bad information which influences national safety, physical and mental health of people, such as reflexes, pornography, violence and the like is broadcast, very bad social influence is generated. The currently adopted means is that the played video is manually audited, and the audited video is sent to a large-screen playing system administrator for playing, and the method has the defects that the administrator may have misoperation and a hacker can tamper with the content of the played video. In order to overcome the defect, a technology of verifying the played video source by using a player with a public large screen can be adopted, only the video passing the verification is played, the dependence on manual control is reduced to the maximum extent, the manual error is avoided, and the problem that the content is tampered by a verification mechanism is solved. Illegal video content is prevented from being played on a public large screen.
The digital signature is a digital string which can be generated only by a sender of the information and cannot be forged by others, and the digital string is also a valid proof of the authenticity of the information sent by the sender of the information. The method is realized by using a digital abstract and an asymmetric encryption technology, firstly, the digital abstract is adopted to generate an abstract for the content to be sent, the data volume to be encrypted is reduced, then, an asymmetric encryption algorithm is adopted to encrypt the generated abstract information, the principle of the asymmetric encryption algorithm is to generate a pair of public and private keys, a private key is adopted to encrypt, a public key is adopted to decrypt, the private key is held by a signature party, and the public key is sent to a signature verifier. When the verifier verifies the digital signature, the public key is firstly adopted to decrypt the signature, and the digest data is obtained after decryption.
The main problems of the background art are: the source authorization information of the video needs to determine the source on one hand and bind with the video content on the other hand, otherwise, the video content can be deceived directly by copying the authorization information, so the video content needs to be asymmetrically encrypted, and the difficulty in solving the problem is that the content of the video data is too large, and if the video data is completely encrypted, the efficiency is definitely unacceptable. The significance for solving the problems is as follows: the encryption and decryption efficiency can be ensured.
Disclosure of Invention
The invention provides a method for expanding source authorization information in an AVS3 video, which is used for verifying video source authorization by a player, and verifying whether video content is tampered and verifying the source authorization by adopting a digital digest algorithm and an asymmetric encryption algorithm. The invention adopts two modes to reduce the encrypted data volume, on one hand, only takes the I frame of the video; on the other hand, the data volume can be greatly reduced by carrying out asymmetric encryption on the data summary, and the encrypted data size is fixed, so that the encryption and decryption efficiency can be ensured.
The technical scheme of the invention is as follows:
the invention discloses a method for expanding source authorization information in an AVS3 video, which comprises the following steps: s1: generating a key pair of a public key and a private key of RSA2048, and determining a digital digest algorithm; s2: reading a group of pictures (GOP) of the AVS3 video, acquiring video I frame data, performing digital abstraction and generating digital abstract data; s3: encrypting the digital summary data generated by the S2 by using a private key of RSA2048 to obtain encrypted data; s4: splicing the digital abstract algorithm and the encrypted data generated in the S3 into authorization data; s5: writing the authorization data generated in S4 into the user data of the group of pictures (GOP) read in S2; and S6: and reading the next group of pictures (GOP) data, and jumping to S2 to continue the execution until the whole AVS3 video finishes the writing of the authorization information.
Preferably, in the method for extending the source authorization information in the AVS3 video, in step S1, a key pair of a public key and a private key of RSA2048 is first generated, the private key itself holds and ensures that it is not leaked, and the public key is sent to the player side for decryption; and simultaneously determining a digital abstract algorithm to be adopted.
Preferably, in the method for extending the source authorization information in the AVS3 video, the digital digest algorithm is the mainstream algorithm of MD5 and SHA 256.
Preferably, in the method for extending the source-authorization information in the AVS3 video, in step S2, the video I frame data is digitally summarized through the digital summarization algorithm determined in S1, so as to generate fixed-length digital summary data.
Preferably, in the method for extending the source authorization information in the AVS3 video, in step S3, the private key generated in step S1 is used, and the RSA2048 algorithm is used to perform asymmetric encryption on the digital digest data generated in step S2 to generate a ciphertext, where RSA encryption is used to check the source validity, and the digital digest is used to check whether the video I frame data are consistent.
Preferably, in the method for extending the source authorization information in the AVS3 video, in step S4, the authorization data is composed of a total length field, a digital digest algorithm field and a ciphertext field, wherein the total length field is 16 bits and is used for storing the length of the entire authorization data, the unit is bits, the digital digest algorithm field is 2 bits, 00 represents MD5, and 01 represents SHA256, which may represent four algorithms in total, and the ciphertext data generated in S3 is concatenated at the end, and the three fields are filled according to actual data to generate the authorization data.
Preferably, in the method for extending the source entitlement information in the AVS3 video, in step S5, the AVS3 video sequence where the group of pictures (GOP) is located is read, and the bit string "0x000001B1" in the AVS3 video sequence is found to be the video sequence end code, and the extended entitlement data is inserted into the video sequence end code, first the user data start code "0x000001B2" is inserted into the video sequence end code, and then the entitlement data generated in S4 is inserted into the video sequence after the user data start code, and the other data are not modified, and then the video sequence with the entitlement data is written into the target video file.
According to the technical scheme of the invention, the beneficial effects are as follows:
the invention adopts a mode of expanding the authorization data in the user data, can realize the requirement of verifying the video source under the compatible condition, can use the authorization data to verify the player needing to verify the video source, and can normally play the player without directly ignoring the data for the player needing to verify the video source.
For a better understanding and appreciation of the concepts, principles of operation, and effects of the invention, reference will now be made to the following detailed description of the invention, taken in conjunction with the accompanying drawings, in which:
drawings
In order to more clearly illustrate the detailed description of the invention or the technical solutions in the prior art, the drawings that are needed in the detailed description of the invention or the prior art will be briefly described below.
Fig. 1 is a flow chart of the method of the present invention for extending source-authorization information in AVS3 video.
Detailed Description
In order to make the objects, technical means and advantages of the present invention more apparent, the present invention will be described in detail with reference to the accompanying drawings and specific examples. These examples are merely illustrative and not restrictive of the invention.
The method for expanding the source authorization information in the AVS3 video not only defines the video data in the AVS3 video coding, but also defines the user data which can be used for some expansion, and the method writes the source authorization in the user data in a digital signature verification information mode. The method for expanding the source authorization information comprises the following steps of reading an I frame of an AVS3 video, carrying out digital digest on I frame data through an MD5 (information digest algorithm) or SHA (secure hash algorithm) algorithm, encrypting the digital digest of the I frame by using a private key of an RSA (asymmetric encryption algorithm) algorithm, and writing an encrypted ciphertext into a user data part of the AVS3 video. When the player plays, firstly, a cipher text in user data is read, then, the cipher text is decrypted by using a public key of an RSA algorithm, digital abstract data A is obtained after decryption, then, I frame data is read for digital abstract, digital abstract data B is obtained, if A and B are completely consistent, the video source is legal and is not tampered, playing can be carried out, otherwise, the video source is illegal, and playing is not carried out.
The invention authorizes the video source by using a signature mode, and is convenient for a player to control the legality of the video source, as shown in figure 1, the method for expanding the source authorization information in the AVS3 video comprises the following steps:
s1: a key pair of the public key and the private key of RSA2048 (i.e., a public-private key pair) is generated, and a digital digest algorithm is determined.
In the step, firstly, a public-private key pair of RSA2048 is generated through an open-source security software library opennssl or other encryption and decryption tools, the private key is held and ensured not to be leaked, and the public key is sent to a player side for decryption; and meanwhile, determining a digital abstract algorithm to be adopted, wherein the digital abstract algorithm can be a mainstream algorithm such as MD5 and SHA256, and the selection of the algorithm is in accordance with the safety level and the requirement on efficiency.
S2: a group of pictures (GOP) of the AVS3 video is read, I frame data is obtained, digital summarization is carried out, and digital summarization data is generated.
In this step, I frame data of one GOP data of the AVS3 video is read, and in order to reduce the data amount of RSA encryption, the I frame is first subjected to digital digest, which can check whether the I frame data are consistent. Specifically, the I frame data is digitally summarized by the digital summarization algorithm determined in S1, and fixed-length digital summary data is generated.
S3: and encrypting the digital digest data generated by the S2 by using a private key of RSA2048 to obtain encrypted data.
In this step, the private key generated in step S1 is used to asymmetrically encrypt the digital digest data generated in S2 by using RSA2048 algorithm to generate a ciphertext. The RSA encryption can be used for checking source validity, and the digital abstract can check whether the video I frame data are consistent, so that the player can check whether the source of the video is legal and whether the content is tampered.
S4: and splicing the digital digest algorithm and the encrypted data generated in the S3 into authorization data.
In this step, the authorization data is composed of a total length field, a digital digest algorithm field and a ciphertext field, the total length field is 16 bits, and is used for storing the length of the whole authorization data, and the unit is a bit. The digital digest algorithm field is 2 bits, 00 represents MD5, 01 represents SHA256, and four algorithms can be represented in total. And (4) splicing the ciphertext data generated in the S3 at the end, and filling the three fields according to actual data to generate the authorization data.
S5: the authorization data generated in S4 is written into the user data of the GOP read in S2.
In this step, the AVS3 video sequence where the GOP is located is read, the bit string "0x000001B1" in the sequence is found to be the video sequence end code, the user data start code "0x000001B2" is first inserted before the sequence end code before the extended grant data is inserted into the sequence end code, then the grant data generated in S4 is inserted after the user data start code, and the video sequence with the grant data is written into the target video file without modifying any other data.
S6: and reading the next GOP data, and jumping to S2 to continue the execution until the whole AVS3 video finishes the writing of the authorization information.
In the step, the next GOP data is continuously read, and the step jumps to S2 to carry out circulation until the whole video finishes the addition of the authorization data, so that a new AVS3 video file with the authorization data is generated.
The invention adopts the mode of expanding the authorization data in the AVS3 user data, the player only needs to read the expanded authorization data when playing, firstly adopts RSA to decrypt and obtain the digital abstract of the video I frame, then calculates the digital abstract of the actual video I frame, if the two are consistent, the video is authorized and the content is not tampered, and the player can play. The method has the advantages that the requirement of verifying the video source can be realized under the compatible condition, the authorized data can be used for verifying the player needing to verify the video source, and the data can be directly ignored for normally playing the player without verifying the video source.
The above is only one implementation of the present invention, and the digital summarization algorithm used therein is not limited to MD5, SHA256, but may also be SHA128, SHA512 or other digital summarization algorithms. The asymmetric encryption algorithm is not limited to RSA2048, and may be other asymmetric algorithms such as DSA and ECC. The digital summary object may be the entire I-frame, or a portion of an I-frame, or plus a B-frame or P-frame. All falling within the scope of the present invention.
The foregoing description is of the preferred embodiment of the concepts and principles of operation in accordance with the invention. The above-described embodiments should not be understood as limiting the scope of the claims, and other embodiments and combinations of implementations according to the inventive concept are within the scope of the invention.
Claims (7)
1. A method of extending source-authorization information in AVS3 video, comprising the steps of:
s1: generating a key pair of a public key and a private key of RSA2048, and determining a digital digest algorithm;
s2: reading a group of pictures (GOP) of the AVS3 video, acquiring video I frame data, performing digital abstraction and generating digital abstract data;
s3: encrypting the digital summary data generated by the S2 by using a private key of RSA2048 to obtain encrypted data;
s4: splicing the digital digest algorithm and the encrypted data generated in the S3 into authorization data;
s5: writing the authorization data generated in S4 into the user data of the group of pictures (GOP) read in S2; and
s6: and reading the next group of picture (GOP) data, and jumping to S2 to continue executing until the whole AVS3 video finishes writing the authorization information.
2. The method of claim 1, wherein in step S1, a key pair of a public key and a private key of the RSA2048 is first generated, the private key itself holds and ensures against disclosure, and the public key is sent to a player side for decryption; and simultaneously determining a digital abstract algorithm to be adopted.
3. The method of claim 2, wherein the digital summarization algorithm is a MD5, SHA256 mainstream algorithm.
4. The method of claim 1, wherein in step S2, the video I frame data is digitally summarized by the digital summarization algorithm determined in S1 to generate fixed-length digital summary data.
5. The method of claim 1 for extending source authorization information in an AVS3 video, wherein in step S3, the private key generated in step S1 is used to asymmetrically encrypt the digital digest data generated in S2 by using RSA2048 algorithm to generate ciphertext, wherein RSA encryption is used to check the validity of the source, and the digital digest is used to check whether the video I frame data are consistent.
6. The method of claim 1, wherein in step S4, the authorization data is composed of a total length field, a digital digest algorithm field and a ciphertext field, wherein the total length field is 16 bits for storing the length of the whole authorization data, and has a unit of bit, the digital digest algorithm field is 2 bits, 00 represents MD5, 01 represents SHA256, which can represent four algorithms in total, and the ciphertext data generated in S3 is spliced at the end and the three fields are filled with actual data to generate the authorization data.
7. The method of claim 1, wherein in step S5, the AVS3 video sequence where the group of pictures (GOP) is located is read, and the bit string "0x000001B1" in the AVS3 video sequence is found to be the video sequence end code, and the extended authorization data is inserted into the video sequence end code, first the user data start code "0x000001B2" is inserted into the video sequence end code, and then the authorization data generated in step S4 is inserted into the video sequence with authorization data after the user data start code, and the other data are not modified, and then the video sequence with authorization data is written into the target video file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210718356.3A CN115278310A (en) | 2022-06-23 | 2022-06-23 | Method for expanding source authorization information in AVS3 video |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210718356.3A CN115278310A (en) | 2022-06-23 | 2022-06-23 | Method for expanding source authorization information in AVS3 video |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115278310A true CN115278310A (en) | 2022-11-01 |
Family
ID=83760893
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210718356.3A Pending CN115278310A (en) | 2022-06-23 | 2022-06-23 | Method for expanding source authorization information in AVS3 video |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115278310A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116894012A (en) * | 2023-07-19 | 2023-10-17 | 天翼爱音乐文化科技有限公司 | Method, system, equipment and storage medium for warehousing audio color ring back tone |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109413444A (en) * | 2018-10-30 | 2019-03-01 | 苏州科达科技股份有限公司 | Completeness check data creation method, integrity checking method and the device of video |
US10404467B1 (en) * | 2018-09-09 | 2019-09-03 | Tyson York Winarski | Blockchain digest augmention of media files including group-of-pictures video streams for MXF files |
CN110868413A (en) * | 2019-11-12 | 2020-03-06 | 成都索贝数码科技股份有限公司 | Video and audio credible playing method for generating associated abstract based on intra-frame extraction |
CN110955918A (en) * | 2019-10-29 | 2020-04-03 | 浙江工业大学 | Contract text protection method based on RSA encrypted sha-256 digital signature |
CN113225534A (en) * | 2021-05-06 | 2021-08-06 | 上海远哲视讯科技有限公司 | Method for conforming encryption and transmission based on H.264 or H.265 media stream data NAL layer |
-
2022
- 2022-06-23 CN CN202210718356.3A patent/CN115278310A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10404467B1 (en) * | 2018-09-09 | 2019-09-03 | Tyson York Winarski | Blockchain digest augmention of media files including group-of-pictures video streams for MXF files |
CN109413444A (en) * | 2018-10-30 | 2019-03-01 | 苏州科达科技股份有限公司 | Completeness check data creation method, integrity checking method and the device of video |
CN110955918A (en) * | 2019-10-29 | 2020-04-03 | 浙江工业大学 | Contract text protection method based on RSA encrypted sha-256 digital signature |
CN110868413A (en) * | 2019-11-12 | 2020-03-06 | 成都索贝数码科技股份有限公司 | Video and audio credible playing method for generating associated abstract based on intra-frame extraction |
CN113225534A (en) * | 2021-05-06 | 2021-08-06 | 上海远哲视讯科技有限公司 | Method for conforming encryption and transmission based on H.264 or H.265 media stream data NAL layer |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116894012A (en) * | 2023-07-19 | 2023-10-17 | 天翼爱音乐文化科技有限公司 | Method, system, equipment and storage medium for warehousing audio color ring back tone |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10025953B2 (en) | Systems and methods for authenticating and protecting the integrity of data streams and other data | |
US7107452B2 (en) | Methods and systems for encoding and protecting data using digital signature and watermarking techniques | |
US7356143B2 (en) | System, method, and apparatus for securely providing content viewable on a secure device | |
US20080189546A1 (en) | Method and apparatus for providing and using content allowing integrity verification | |
US6996717B2 (en) | Semi-fragile watermarking system for MPEG video authentication | |
US7373506B2 (en) | Data authentication system | |
US7555779B2 (en) | Copyright protection system, recording device, and reproduction device | |
TWI257798B (en) | System for identification and revocation of audiovisual titles and replicators | |
US20080101604A1 (en) | Self-protecting digital content | |
US20060153017A1 (en) | Method and apparatus for protecting shared data and method and apparatus for reproducing data from recording medium using local storage | |
US8132264B2 (en) | Access authorization across processing devices | |
KR20080050934A (en) | Method for conditional inserting authentication code and apparatus therefor, method for conditional using data through authenticating and apparatus therefor | |
US7715558B2 (en) | Encrypted-content recording medium, playback apparatus, and playback method | |
RU2010105036A (en) | MAS CODE CHECK WITHOUT ITS DISCLOSURE | |
JPH1131105A (en) | Device and method for producing data capsule | |
CN115278310A (en) | Method for expanding source authorization information in AVS3 video | |
JP2000286839A (en) | Information recorder, method for verifying authenticity and computer-readable recording medium storing program to allow computer to execute the method | |
KR101775971B1 (en) | A storage device, method and apparatus for authenticating the storage device | |
BRPI0807572A2 (en) | COPYRIGHT DATA PROCESSING SYSTEM AND REPRODUCTION DEVICE | |
KR20060090562A (en) | Data processing apparatus, data recording apparatus, data playback apparatus, and data storage method | |
JP2004014112A (en) | Copyright protection system, recording equipment and decoding equipment | |
KR20030085513A (en) | Verifying the integrity of a media key block by storing validation data in the cutting area of media |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |