CN115550691A - Video processing method, video transmission method, video viewing method and device - Google Patents

Video processing method, video transmission method, video viewing method and device Download PDF

Info

Publication number
CN115550691A
CN115550691A CN202110732635.0A CN202110732635A CN115550691A CN 115550691 A CN115550691 A CN 115550691A CN 202110732635 A CN202110732635 A CN 202110732635A CN 115550691 A CN115550691 A CN 115550691A
Authority
CN
China
Prior art keywords
video data
video
data
encrypted
image data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110732635.0A
Other languages
Chinese (zh)
Inventor
刘永亮
邓磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Innovation Co
Original Assignee
Alibaba Singapore Holdings Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Singapore Holdings Pte Ltd filed Critical Alibaba Singapore Holdings Pte Ltd
Priority to CN202110732635.0A priority Critical patent/CN115550691A/en
Publication of CN115550691A publication Critical patent/CN115550691A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The embodiment of the application provides a video processing method, a video transmission method, a video viewing method and a video viewing device. The video processing method comprises the steps of obtaining coded video data; the video data comprises at least one frame of image data; identifying image data for a presence-sensitive region in the video data; and encrypting the sensitive area in the image data by adopting key information to obtain encrypted video data. By the video processing method, the sensitive area can be encrypted based on the encoded video data, the encoding process of the video can not be influenced, and the encoding efficiency of the video is reduced. And the sensitive area in the image data is encrypted by adopting the key information, so that the encrypted video data and the coded video data can have smaller data volume difference, and the video quality cannot be influenced.

Description

Video processing method, video transmission method, video viewing method and device
Technical Field
The present application relates to the field of video processing technologies, and in particular, to a video processing method, a video transmission method, a video viewing method, a video processing apparatus, a video transmission apparatus, and a video viewing apparatus.
Background
In the prior art, the video has higher information protection requirements. For example, in special fields such as industry, business, and medical care, it is necessary to mask confidential or sensitive contents captured in a video. As another example, some users may wish that their faces not appear in the video. For another example, a video of a factory environment requires masking of a particular facility. In this case, the video can be processed, and the content needing protection in the video is prevented from being viewed by irrelevant people. However, since a video is composed of a large number of images, if the images in the video need to be processed separately, the data amount of the video may be increased significantly, which is not favorable for the encoding and decoding process of the video and the transmission of the video.
Disclosure of Invention
In view of the above problems, embodiments of the present application are proposed to provide a video processing method, a video transmission method, a video viewing method, a video processing apparatus, a video transmission apparatus, and a video viewing apparatus that overcome or at least partially solve the above problems.
In order to solve the above problem, an embodiment of the present application discloses a video processing method, including:
acquiring encoded video data; the video data comprises at least one frame of image data;
identifying image data for a presence-sensitive region in the video data;
and encrypting the sensitive area in the image data by adopting key information to obtain encrypted video data.
Optionally, the method further comprises:
recording the key information in the encrypted video data.
Optionally, the method further comprises:
and recording identification information of the image data of the sensitive area and position information of the sensitive area in the image data in the encrypted video data.
Optionally, the step of encrypting the sensitive area in the image data by using the key information to obtain encrypted video data includes:
determining the position of the sensitive area in the image data;
and carrying out encryption operation on the data of the position of the sensitive area in the image data by adopting the key information to obtain encrypted video data.
Optionally, the step of identifying image data of a sensitive region in the video data includes:
identifying image data with at least one sensitive content in the video data, and respectively determining a sensitive area in which the sensitive content is located in the image data;
respectively distributing sensitive content identification codes for the sensitive content;
and for the sensitive content, establishing the corresponding relation between the sensitive content identification code and the key information.
Optionally, the step of encrypting the sensitive area in the image data by using the key information to obtain encrypted video data includes:
and for the sensitive area where the sensitive content in the image data is located, encrypting the sensitive area where the sensitive content in the image data is located by adopting the key information corresponding to the sensitive content identification code to obtain encrypted video data.
The embodiment of the application also discloses a video processing method, which comprises the following steps:
acquiring encoded encrypted video data and key information; the encrypted video data comprises at least one frame of encrypted image data;
and decrypting the sensitive area in the encrypted image data by adopting the key information to obtain decrypted video data.
The embodiment of the application also discloses a video transmission method, which is applied to a sending end and a receiving end, and the method comprises the following steps:
the sending end acquires encoded video data; the video data comprises at least one frame of image data;
the sending end identifies image data of a sensitive area in the video data;
the sending end encrypts the sensitive area in the image data by adopting key information to obtain encrypted video data; the encrypted video data comprises at least one frame of encrypted image data;
the receiving end receives the encrypted video data and the key information sent by the sending end;
and the receiving end decrypts the encrypted image data by adopting the key information to obtain decrypted video data.
The embodiment of the application also discloses a video viewing method, which comprises the following steps:
acquiring authentication information input by a user aiming at encrypted video data;
searching key information matched with the authentication information;
decrypting the image data with the sensitive area in the encrypted video data by adopting the key information to obtain decrypted video data;
and displaying the decrypted video data to a user.
The embodiment of the application discloses a video processing device, including:
the video acquisition module is used for acquiring the coded video data; the video data comprises at least one frame of image data;
the identification module is used for identifying image data of a sensitive area in the video data;
and the encryption module is used for encrypting the sensitive area in the image data by adopting key information to obtain encrypted video data.
Optionally, the apparatus further comprises:
and the key recording module is used for recording the key information in the encrypted video data.
Optionally, the apparatus further comprises:
and the information recording module is used for recording the identification information of the image data with the sensitive area and the position information of the sensitive area in the image data in the encrypted video data.
Optionally, the encryption module includes:
the position determining submodule is used for determining the position of the sensitive area in the image data;
and the encryption operation sub-module is used for carrying out encryption operation on the data at the position of the sensitive area in the image data by adopting the key information to obtain encrypted video data.
Optionally, the identification module comprises:
the identification submodule is used for identifying image data with at least one sensitive content in the video data and respectively determining a sensitive area where the sensitive content is located in the image data;
the distribution submodule is used for respectively distributing sensitive content identification codes for the sensitive content;
and the relation establishing submodule is used for establishing the corresponding relation between the sensitive content identification code and the key information for the sensitive content.
Optionally, the encryption module includes:
and the encryption submodule is used for encrypting the sensitive area where the sensitive content in the image data is located by adopting the key information corresponding to the sensitive content identification code in the sensitive area where the sensitive content in the image data is located to obtain encrypted video data.
The embodiment of the application also discloses a video processing device, which comprises:
the encrypted video acquisition module is used for acquiring the encoded encrypted video data and the key information; the encrypted video data comprises at least one frame of encrypted image data;
and the decryption module is used for decrypting the sensitive area in the encrypted image data by adopting the key information to obtain decrypted video data.
The embodiment of the application also discloses a video transmission device which is applied to a sending end and a receiving end, wherein the sending end comprises a coded video acquisition module, a sensitive data identification module and a data encryption module; the receiving end comprises an encrypted data receiving module and a video decryption module;
the coded video acquisition module is used for acquiring coded video data; the video data comprises at least one frame of image data;
the sensitive data identification module is used for identifying image data of a sensitive area in the video data;
the data encryption module is used for encrypting the sensitive area in the image data by adopting key information to obtain encrypted video data; the encrypted video data comprises at least one frame of encrypted image data;
the encrypted data receiving module is used for receiving the encrypted video data and the key information sent by the sending end;
the video decryption module is used for decrypting the encrypted image data by adopting the key information to obtain decrypted video data.
The embodiment of the application further discloses a video viewing device, the device includes:
the authentication acquisition module is used for acquiring authentication information input by a user aiming at the encrypted video data;
the key matching module is used for searching key information matched with the authentication information;
the video decryption module is used for decrypting the image data with the sensitive area in the encrypted video data by adopting the key information to obtain decrypted video data;
and the video display module is used for displaying the decrypted video data to a user.
The embodiment of the application also discloses an electronic device, which comprises:
one or more processors; and
one or more machine-readable media having instructions stored thereon, which when executed by the one or more processors, cause the electronic device to perform one or more methods as described herein in embodiments.
Embodiments of the present application also disclose one or more machine-readable media having instructions stored thereon, which when executed by one or more processors, cause the processors to perform one or more methods as described in embodiments of the present application.
Also disclosed are software products comprising computer programs/instructions, wherein the computer programs/instructions, when executed, implement the methods of performing any of the embodiments of the present application.
The embodiment of the application has the following advantages:
by the video processing method of the embodiment of the application, the coded video data can be obtained; identifying image data for a presence-sensitive region in the video data; and encrypting the sensitive area in the image data by adopting key information to obtain encrypted video data. Therefore, the sensitive area can be encrypted based on the encoded video data, the encoding process of the video cannot be influenced, and the encoding efficiency of the video is reduced. And the sensitive area in the image data is encrypted by adopting the key information, so that the difference of the data volume between the encrypted video data and the coded video data can be smaller, and the video quality cannot be influenced.
Drawings
FIG. 1 is a flow chart of steps of an embodiment of a video processing method of the present application;
FIG. 2 is a schematic diagram of a process of processing image data according to an embodiment of the present disclosure;
FIG. 3 is a flow chart of steps in another embodiment of a video processing method in accordance with an embodiment of the present application;
FIG. 4 is a schematic diagram of a video data structure according to an embodiment of the present application
Fig. 5 is a schematic diagram of another video data structure according to an embodiment of the present application;
FIG. 6 is a flow chart of steps in another embodiment of a method of video processing in accordance with the present application;
FIG. 7 is a flowchart illustrating steps of an embodiment of a video transmission method according to an embodiment of the present application;
FIG. 8 is a flowchart illustrating steps of an embodiment of a method for viewing video in accordance with an embodiment of the present application;
FIG. 9 is a block diagram of an embodiment of a video processing apparatus according to an embodiment of the present application;
FIG. 10 is a block diagram of another embodiment of a video processing apparatus according to the present application;
FIG. 11 is a block diagram of an embodiment of a video transmission device according to the present application;
fig. 12 is a block diagram of a video viewing device according to an embodiment of the present application.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, the present application is described in further detail with reference to the accompanying drawings and the detailed description.
In the embodiment of the present application, in general, a video may be composed of a plurality of frames of consecutive images. In the case where the video is an unprocessed original video, the video may have a large data amount. For example, for a video with a resolution of 1920 × 1280 pixels and a frame rate of 24 frames, the data amount of each frame of image may be 6.22MB, and if the video duration is 90 minutes, the data amount may approach 1000GB. Therefore, the video usually needs to be encoded, a part of frames retain all information, while a part of frames retain only data different from other frames, and when the video is decoded subsequently, inter-frame prediction is performed based on frames before and/or after the frame, and all contents contained in the frame are predicted, so that the video is compressed.
Specifically, the following types of images may be included in the encoded video:
i-frame (Intra-coded picture, intra-coded image frame): it may contain complete information, taking up the most space relative to other types of images. I-frames can be decoded independently without reference to other pictures.
P frame (forward-coded Picture, forward Predictive coded Picture frame): which states the difference between itself and the previous frame. The previous frame may be an I frame or a P frame. When decoding, the difference defined by the frame needs to be superimposed on the decoded image before the frame, and a final image is generated. It has higher compression ratio and occupies relatively less space.
B frame (bidirectional predicted picture, bidirectional predictive coded picture frame): which states the difference between itself and the preceding and following frames. The preceding and succeeding frames may be I frames or P frames. When decoding, the image decoded before and after the frame is needed to be superimposed with the difference defined by the frame, and a final image is generated. Which may have a higher compression rate than P frames and occupy less space than P frames.
In the embodiment of the present application, generally, in the case that a video needs to be processed to protect sensitive content in the video, an image of each frame in the video where the sensitive content exists may be processed. At this time, the processed image can replace the unprocessed image in the video, thereby completing the processing of the sensitive content in the video. However, the adoption of the image replacement method easily causes that the previous and the next frames cannot be mutually referred in the encoding process, thereby obviously reducing the encoding efficiency of the video and obviously increasing the data volume of the video.
Therefore, the video is processed based on the coded video data, the image data of the sensitive area in the video data is identified, the key information is adopted to encrypt the sensitive area in the image data, and therefore irrelevant people cannot see the content in the encrypted sensitive area. Meanwhile, because the embodiment of the application encrypts the coded video data, the data volume of the video cannot be obviously influenced by encryption processing, the encrypted video data is closer to the original video data, and the coding efficiency and the video quality of the video cannot be influenced.
Referring to fig. 1, a flowchart illustrating steps of an embodiment of a video processing method according to the embodiment of the present application is shown, and specifically, the method may include the following steps:
step 101, acquiring encoded video data; the video data comprises at least one frame of image data;
in the embodiment of the present application, in the case where video data needs to be processed, encoded video data may be acquired. The video data may include at least one frame of image data. The image data may be any one of an I frame, a P frame, and a B frame.
Specifically, the video data may be video data of a complete content, or video data of a content transmitted in real time. In case the video data is full content video data, such as video data of a locally stored movie, concert, etc., the video data may comprise I-frames, or the video data may comprise I-frames, as well as P-frames and/or B-frames. In the case where the video data is video data of real-time transmission content, such as video data of live broadcast, real-time video conference, etc., the video data may include I frames, or the video data may include I frames and P frames.
Step 102, identifying image data of a sensitive area in the video data;
in the embodiment of the application, whether at least one frame of image data in the video data has a sensitive area in which sensitive content is recorded can be identified, so that the image data in which the sensitive area exists can be identified in the video data.
In particular, the sensitive area may be an area in which sensitive content is present in the image data. The sensitive region may be the whole region in the image data, and may be a partial region in the image data. The sensitive content may be content that needs to be protected from being viewed by unrelated people. For example, production equipment images, product images, terrain images, office areas, or real scenes of production areas that need to be protected in the fields of industry, commerce, medical care, and the like; a face image of a person, a whole body image; trademark information of the product, an image with copyright, and the like.
In a specific implementation, a sensitive area in which sensitive content exists in the image data may be identified by using a template matching method, a model identification method, and the like. For example, in the case of template matching, an image related to the sensitive content may be prepared in advance as a template, and whether or not an area having a high similarity to the template exists may be searched for in the image data. For another example, when model recognition is used, the relevant images of the sensitive content may be prepared in advance as training samples, and the model may be trained. After the model training is completed, the model may be used to identify whether a sensitive region exists in the image data, and in the case that the sensitive region exists in the image data, the model may output the position information of the sensitive region in the image data, so that the position information of the sensitive region may be determined while knowing whether the sensitive region exists in the image data.
In particular implementations, since image data of the type P frame or B frame generally does not have complete image information, it may result in failure to normally identify a sensitive region in the image data. Therefore, when identifying whether the sensitive area exists in the image data, the image data can be decoded firstly, and then the sensitive area is identified on the decoded image data, and under the condition that the sensitive area exists, the position information of the sensitive area can be recorded, so that the sensitive area can be encrypted in the encoded image data subsequently. If there is video data that has not been encoded, before encoding the video data, first identifying image data that has a sensitive region in the video data that has not been encoded, and recording location information of the sensitive region in the image data that has not been encoded, and then after encoding the video data, using the location information of the sensitive region in the image data that has not been encoded as location information of the sensitive region in the image data that has been encoded.
And 103, encrypting the sensitive area in the image data by using the key information to obtain encrypted video data.
In this embodiment of the present application, after identifying that image data of a sensitive area exists in the video data, the key information may be used to encrypt the sensitive area in the image data, and protect sensitive content in the sensitive area.
Specifically, the key information may be generated in advance. The key information can be adopted to perform encryption operation on the data of the sensitive area in the image data to obtain encrypted video data. Therefore, when the key information is not known, the video encoding and decoding module cannot decode the sensitive region in the image data to obtain a normal image of the sensitive region, for example, when the key information is not known, the sensitive region can be decoded into a black image. Thus, sensitive content in the video data can be effectively protected.
Because the encryption processing is performed after the encoding processing, the encoding process of the video cannot be affected, and the encoding efficiency of the video is reduced. Meanwhile, as the encryption operation is directly carried out on the encoded image data by adopting the key information, the data quantity difference between the image data after the encryption operation and the encoded image data is small, and the data quantity of the video data can not be obviously changed.
As a specific example of the present application, in a video conference scene, the video encryption method of the present application may be adopted, and the video processing method of the present application may be adopted to encrypt the faces of participants and/or specific devices shown in the conference in the video data of the conference transmitted in real time, so as to avoid the privacy of the participants and/or the specific devices being revealed.
Under the scene of special child monitoring, the face of a special child can be encrypted in the video processing method for the special child monitoring video data transmitted in real time, so that the identity of the special child is prevented from being revealed.
In the video entertainment scenario, a particular star appearing in the entertainment video may be encrypted. According to actual needs, part of the audience can avoid seeing the specific star which is not expected to be seen in the entertainment video, and part of the audience can decrypt the encrypted entertainment video so as to see the specific star which is expected to be seen by the audience.
As a specific example of the present application, fig. 2 is a schematic diagram of a processing procedure of image data according to an embodiment of the present application. The original image data 201 may be image data obtained by decoding image data a of a certain frame in the encoded video data. When the sensitive content is a human Face, a human Face recognition model, such as a retinaFace model, an MTCNN (Multi-task Cascaded Convolutional network) model, an S3FD (Single Shot Scale-invariant Face Detector) model, or the like, may be used to perform human Face detection on the original image data 201, so as to determine a sensitive region 202 where the human Face is located in the original image data 201, and thus determine a sensitive region in the image data A corresponding to the original image data 201. Then, the sensitive area in the image data a may be encrypted using the key information, resulting in encrypted image data a. After the encryption of the sensitive area in the video data is completed, if the user decrypts the image data a without the key information, the decrypted image data 203 can be obtained, and the sensitive area in the decrypted image data 203 cannot be normally decoded because of the absence of the key information, and is displayed in black. If the user has the key information, the original image data 201 can be obtained after decoding.
By the video processing method of the embodiment of the application, the coded video data can be obtained; identifying image data for a presence-sensitive region in the video data; and encrypting the sensitive area in the image data by adopting key information to obtain encrypted video data. Therefore, the sensitive area can be encrypted based on the encoded video data, the encoding process of the video cannot be influenced, and the encoding efficiency of the video is reduced. And the sensitive area in the image data is encrypted by adopting the key information, so that the difference of the data volume between the encrypted video data and the coded video data can be smaller, and the video quality cannot be influenced.
Referring to fig. 3, a flowchart illustrating steps of an embodiment of a video processing method according to the embodiment of the present application is shown, which may specifically include the following steps:
step 301, acquiring encoded video data; the video data comprises at least one frame of image data;
in the embodiment of the present application, in the case where video data needs to be processed, encoded video data may be acquired. The video data may include at least one frame of image data. The image data may be any one of an I frame, a P frame, and a B frame.
Step 302, identifying image data of a sensitive area in the video data;
in the embodiment of the application, whether at least one frame of image data in the video data has a sensitive area in which sensitive content is recorded can be identified, so that the image data in which the sensitive area exists can be identified in the video data.
In particular, the sensitive area may be an area in which sensitive content is present in the image data. The sensitive region may be the whole region in the image data, and may be a partial region in the image data. The sensitive content may be content that needs to be protected from being viewed by unrelated people. In a specific implementation, a sensitive area in which sensitive content exists in the image data may be identified by using a template matching method, a model identification method, and the like. For example, when template matching is used, an image related to the sensitive content may be prepared in advance as a template, whether or not an area having a high similarity to the template exists may be searched for in the image data, and if so, the area may be regarded as a sensitive area. For another example, when model recognition is used, the relevant images of the sensitive content may be prepared in advance as training samples, and the model may be trained. After the model training is completed, the model may be used to identify whether a sensitive region exists in the image data, and in the case that the sensitive region exists in the image data, the model may output the position information of the sensitive region in the image data, so that the position information of the sensitive region may be determined while knowing whether the sensitive region exists in the image data.
In an embodiment of the present application, the step of identifying image data of a presence-sensitive area in the video data includes:
s11, identifying image data with at least one sensitive content in the video data, and respectively determining a sensitive area where the sensitive content is located in the image data;
in embodiments of the present application, one or more sensitive content may be present in the video data. For example, there may be multiple faces in the video data, and each face may be a sensitive content. Also for example, production equipment that needs to be kept secret, and human faces may exist in video data. The production device may be one type of sensitive content and the face may be another type of sensitive content. In order to avoid that all types of sensitive content in the video data are leaked due to possible leakage of the key information, different sensitive content can be distinguished and encrypted in different ways.
Therefore, when the video data is identified whether image data of a sensitive area exists or not, the type of sensitive content contained in the sensitive area can be further identified, the sensitive area in the image data is further distinguished based on the type of the sensitive content, and the sensitive areas where different sensitive contents are located are respectively determined in the image data.
Specifically, one or more sensitive areas in which the sensitive content is located in one image data may be provided. For example, in the case where the sensitive content is a production device, the image data may have a plurality of production devices, and the image data may have a plurality of areas including the production devices, and thus a plurality of sensitive areas. In the case that the sensitive content is a human face, the human face of each person may be a sensitive content, and the region corresponding to the human face of each person in the image data may correspond to a sensitive region.
S12, distributing sensitive content identification codes for the sensitive contents respectively, and establishing a corresponding relation between the sensitive content identification codes and the sensitive areas;
in the embodiment of the application, sensitive content identification codes can be respectively allocated to the sensitive content, and the corresponding relation between the sensitive content identification codes and the sensitive areas is established. Based on the sensitive content identification code, sensitive areas of different sensitive contents can be distinguished in one image data, and the sensitive areas of the same sensitive content in different image data can be quickly identified in the video data.
For example, in the case of a child in school at a family distance Cheng Jianhu kindergarten, multiple children may be present in the video data at the same time. A sensitive content identification code may be respectively assigned to each child in the video data, and a correspondence between the sensitive content identification code and the area of the child in the image data, i.e., the sensitive area, may be established. Thus, the presence of image data for a particular child can be quickly determined based on the sensitive content identification code. If different children appear in the same image data at the same time, the sensitive area corresponding to each child in the same image data can be distinguished based on the sensitive content identification code. Then, if the encrypted image data in the video data needs to be decrypted, corresponding sensitive content identification codes can be respectively distributed to parents of different children, so that the parents can conveniently check the video data related to the children, and the privacy of other children is prevented from being exposed.
For example, in the case of analyzing a person flow in a retail scene, the video data may be video data at a position such as a mall doorway, a retail store doorway, or a retail store counter. There may be a number of different customers in the video data. Customers in the video may be individually assigned a sensitive content identification code. The same identification code may be used by a group of simultaneous customers, or a sensitive content identification code may be assigned to each customer, for example, without limitation. Thereafter, a correspondence of the sensitive content identification code to the customer's face, i.e., the sensitive area, may be established. Under the condition that passenger flow analysis is needed, the sensitive content identification code and the customer have a corresponding relation, so that the passenger flow analysis can be carried out by adopting the sensitive content identification code and the time, the appearance position and the like of the sensitive area corresponding to the sensitive content identification code in the video data, and the passenger flow analysis can be finished under the condition of protecting the privacy of the customer. Meanwhile, the processing process of encrypting the video data can be completed after the video data are collected, so that the video is encrypted in the video transmission process, and the privacy of a customer is prevented from being revealed in the video transmission process. In addition, according to actual needs, the encrypted image data in the video data can be decrypted under the condition of agreement of the customer, so that the video data related to the customer can be viewed, and meanwhile, the privacy of other customers is prevented from being exposed.
In a specific implementation, in the process of identifying image data having a sensitive area, if it is found that sensitive content in the sensitive area is newly appeared sensitive content, a sensitive content identification code may be generated for the sensitive content. Meanwhile, after the position information of the sensitive area where the sensitive content is located is determined, the corresponding relation between the position information of the sensitive area and the sensitive content identification code is established.
For example, in the case of recognizing a face in image data using a face recognition model. If the image data contains the face of a certain person, the face recognition model can output a sensitive content recognition code of the task and position information of a corresponding sensitive area. The person corresponding to the sensitive area can be known according to the sensitive content identification code.
And S13, for one sensitive content, establishing a corresponding relation between the sensitive content identification code and the key information.
In the embodiment of the present application, in order to better protect the sensitive content in the video data, different key information may be configured for different sensitive content. Therefore, the corresponding relation between the sensitive content identification code and the key information can be established for the sensitive content. The key information may be used separately for such sensitive content. In this case, if the key information of other sensitive content is leaked, the sensitive content may not be adversely affected.
In addition, under the condition that the encrypted video data needs to be transmitted to other users, key information corresponding to sensitive content which can be checked by the users is stored in the encrypted video data according to the authority of different users, and the encrypted video data can be managed more flexibly. For example, in the case of children in the long and short distance Cheng Jianhu kindergarten, the parents may only check the authority of their children, and then only record the key information of the children corresponding to the parents in the encrypted video data, but not record the key information of other children, so that the parents can only check the related contents of their children after receiving the encrypted video data, thereby avoiding exposing the privacy of other children. For another example, in a product production management scenario, if a manager only has the right to manage the device a, only the key information corresponding to the device a may be recorded in the encrypted video data, and not the key information of the sensitive content of other devices, so that the manager may only manage the device a without seeing other devices in the video. For another example, in a video conference scenario, if a participant only has the right to view group a of participants, only the key information corresponding to group a of participants may be recorded in the encrypted video data, and the key information of other participants is not recorded, so that the participants can only view the conference content of group a of participants. For example, in a scene of live shopping, if a live viewer only has the right to purchase toy type commodities but not the right to purchase tobacco and wine type commodities, only the key information corresponding to the toy type commodities can be recorded in the encrypted video data, but not the key information corresponding to the tobacco and wine type commodities, so that the live viewer can only see the relevant contents of the toy type commodities but not the tobacco and wine type commodities.
Optionally, since the sensitive content identifier may generally have a higher complexity, the sensitive content identifier may be directly used as the key information, without generating additional key information for the sensitive content, and meanwhile, the protection of the sensitive content in the video data may also be better achieved.
Step 303, encrypting the sensitive area in the image data by using the key information to obtain encrypted video data.
In this embodiment of the present application, after identifying that image data of a sensitive area exists in the video data, the key information may be used to encrypt the sensitive area in the image data, and protect sensitive content in the sensitive area.
Specifically, the key information may be generated in advance. The key information can be adopted to perform encryption operation on the data of the sensitive area in the image data to obtain encrypted video data. Therefore, when the key information is not known, the video encoding and decoding module cannot decode the sensitive area in the image data to obtain a normal image of the sensitive area, for example, when the key information is not known, the sensitive area can be decoded into a black image. Thereby, sensitive content in the video data can be effectively protected.
Because the encryption processing is performed after the encoding processing, the encoding process of the video cannot be influenced, and the encoding efficiency of the video is reduced. Meanwhile, as the encryption operation is directly carried out on the encoded image data by adopting the key information, the difference of the data volume between the image data after the encryption operation and the encoded image data is small, and the data volume of the video data can not be obviously changed.
In an embodiment of the application, the step of encrypting the sensitive area in the image data by using the key information to obtain encrypted video data includes:
s21, determining the position of the sensitive area in the image data;
in this embodiment of the application, in the step of identifying the image data of the sensitive area in the video data, if the image data of the sensitive area is identified, the position information of the sensitive area in the image data may also be output. Thereby, the position of the sensitive region can be determined in the image data.
And S22, carrying out encryption operation on the data of the position of the sensitive area in the image data by adopting the key information to obtain encrypted video data.
In this embodiment of the present application, after determining the location of the sensitive area, the location of the sensitive area may be encrypted. The key information can be adopted to perform encryption operation on the data of the position of the sensitive area in the image data to obtain encrypted video data.
Specifically, the pixel value of each pixel in the image data may be a triplet [ R, G, B ] (red channel value, green channel value, blue channel value), and the size of each value is between 0 and 255. The key information can be used for carrying out encryption operation on each pixel value of the pixel point at the position of the sensitive area to obtain encrypted image data, so that encrypted video data can be obtained.
The algorithm used for the encryption operation can be determined according to actual needs. For example, DES algorithm, AES algorithm, exclusive or algorithm, etc., which is not limited in this application.
As a specific example of the present application, in the case that the encryption algorithm is an xor algorithm, a bit operation may be performed on the pixel value of the pixel point, and the encryption of the sensitive area may be completed at a relatively high speed, so as to avoid adverse effects on the efficiency of possible video transmission.
In an embodiment of the application, the step of encrypting the sensitive area in the image data by using the key information to obtain encrypted video data includes:
and S31, encrypting the sensitive area in which the sensitive content in the image data is positioned by adopting the key information corresponding to the sensitive content identification code in the sensitive area in which the sensitive content in the image data is positioned to obtain encrypted video data.
In an embodiment of the present application, different sensitive content may have different key information. Therefore, for the sensitive areas where different sensitive contents are located in the image data, the area where the sensitive contents are located in the image data can be encrypted by adopting the key information corresponding to the sensitive content identification code of the sensitive contents, and the encrypted video data is obtained. Therefore, the sensitive areas of different sensitive contents can be encrypted by adopting different key information, and the key information of one sensitive content is leaked, so that adverse effects on other sensitive contents can be avoided. The security of the encrypted video data is further improved.
Alternatively, since the sensitive content identifier may generally have a higher complexity, the sensitive content identifier may be directly used as the key information. In this case, the sensitive area in which the sensitive content in the image data is located may be directly encrypted by using the sensitive content identification code to obtain the encrypted video data. The encryption process of the image data can be simplified to a certain extent, and meanwhile, higher security can be kept.
Step 304, recording the key information in the encrypted video data.
In this embodiment of the present application, after obtaining the encrypted video data, the encrypted video data may be transmitted to other users. The key information may not be recorded in the encrypted video data, but may be transmitted to the user by another transmission method. In order to facilitate a trusted user to acquire key information required for decrypting the encrypted video data without changing the original video data transmission flow, the key information may be recorded in the encrypted video data. The trusted user can know the encryption mode of the encrypted video data and the position recorded by the key information of the encrypted video data, so that the trusted user can quickly know the key information in the encrypted video data without changing the acquisition mode of the original video data, and decode the encrypted video data based on the key information. Therefore, the transmission safety of the video data can be ensured under the condition that the trusted user is not influenced to view the normally viewed video.
Specifically, the encrypted video data may have an area to which custom information may be added, and the key information may be recorded in the area to which custom information may be added, so that a subsequent trusted user may decode the encrypted video data.
In one embodiment of the present application, the method further comprises:
s41, recording the identification information of the image data with the sensitive area and the position information of the sensitive area in the image data in the encrypted video data.
In this embodiment, identification information of image data in which the sensitive area exists and position information of the sensitive area in the image data may also be recorded in the encrypted video data. Therefore, a trusted user can quickly know image data needing to be decrypted and the specific position of a sensitive area in the image data, the trusted user can quickly decrypt the encrypted video data after acquiring the encrypted video data under the condition that the original video data acquisition mode is not changed, the trusted user can normally view videos, and meanwhile, the transmission safety of the video data is ensured.
As a specific example of the present application, fig. 4 is a schematic diagram of a video data structure according to an embodiment of the present application, where the video data may be stored in the following structure: the top layer is a sequence layer, and the sequence layer can contain a sequence start code, a sequence header, sequence data and a sequence end code; the sequence data comprises an image group layer, and the image group layer can comprise at least one group of image group header and image group data; the image group data comprises an image layer, and the image layer can comprise at least one group of image heads and image data; the image data comprises a macro block layer, and the macro block layer comprises macro block information and macro block data; the macroblock data includes a block layer, and the block layer includes at least one block data.
Specifically, each of the image group data may include at least one I-frame image data and P-frame image data and/or B-frame image data following the I-frame image data. The image data may be further divided into at least one slice data, the slice data may be further divided into at least one macroblock data (16 × 16 pixel block), and the macroblock data may be further stylized into at least one block data (entropy-coded data of transform quantization coefficients of 8 × 8 or 4 × 4 block).
In an embodiment of the present application, fig. 5 is another schematic view of a video data structure of the embodiment of the present application, and in order to record, in the video data, that the key information, the identification information of the image data of the sensitive area, and the position information of the sensitive area in the image data, information may be embedded in the following manner:
recording, in the image group layer, image group data in which the sensitive area exists, that is, identification information of encrypted image group data;
recording the image data of the sensitive area in the image layer, namely the identification information of the encrypted image data;
recording the stripe data of the sensitive area, namely the identification information of the encrypted stripe data and the position information of the sensitive area in the stripe layer;
recording macro block data with the sensitive area in the macro block layer, namely, identification information of encrypted macro block data, position information of the sensitive area and key information;
and recording block data with the sensitive area, namely identification information of the encrypted block data, position information of the sensitive area and key information in the block layer.
Therefore, identification information of data subjected to encryption processing can be recorded in each data layer of video data, so that a trusted user can quickly know data needing decryption, and meanwhile, position information of sensitive areas is also recorded in a stripe layer, a macro block layer and a block layer, so that the trusted user can quickly know the positions of the sensitive areas in the stripe layer, the macro block layer and the block layer. Meanwhile, the macro block layer and the block layer are also recorded with key information, so that a trusty user can quickly decrypt encrypted data without changing a video acquisition mode and acquiring the key information.
In an embodiment of the present application, the key Information, the position Information of the sensitive area in the image data, and the identification Information of the image data having the sensitive area may be further encapsulated as SEI (Supplemental Enhancement Information) Information, and then the SEI Information is embedded in the encrypted video data.
Specifically, the data structure of the encrypted video data may be referred to as a NALU (Network Abstract Layer Unit) structure. The encrypted video data may be considered to be made up of a plurality of NALU units. The types of NALU units may include SPS (Sequence Parameter Set), PPS (Picture Parameter Set), VCL (Video Coding Layer), and SEI. The data stored in the VCL unit is image group, image, slice, macroblock, etc.
At least one NALU unit of type SEI information may be added to the encrypted video data and SEI information describing the key information, location information of a sensitive area in the image data, and identification information of the image data where the sensitive area exists may be stored in the NALU unit so that a trusted user may decrypt the encrypted video data based on the SEI information.
Optionally, encryption identification information may be recorded in the SEI information, and the trusted user may determine whether encrypted image data exists in the video data according to the encryption identification information recorded in the SEI information.
Alternatively, the SEI information may not describe key information, but a key information acquisition method. The user can obtain the key information from the video data or other contents than the video data based on the manner of obtaining the key information described in the SEI information.
As a specific example of the present application, table 1 is an example of SEI information in an embodiment of the present application.
Figure BDA0003139625900000141
Table 1 SEI information example
Wherein the payloadType field is used to determine the type of SEI information, in payIn the case where the loadType field is set to 5, it may indicate that this SEI information is user-defined data. The payloadSize field is used to indicate uuid and the total size of user data. The uuid field may be used to determine the encryption type of the video. For example, in the case where uuid is ac32e5b6e6d948b7362cd828d9c3bbef, it may indicate that the encryption type is a face encryption type. The payload field may record image data identification information, sensitive region location information, and key information. For example, in the case of the content 010140503c0fdec5e9ade4d24db8632c, the first two bytes 01 may be used to indicate that the image data identification information of the presence-sensitive area is 1, i.e., the 1 st frame image data. The next 10 bytes can be used to represent the position information (x) of the sensitive area in the image left ,y up ,x right ,y down ). Where each parameter may also be used to indicate its position in the few macroblocks in that dimension. For example, 0140503c0f may be used to represent the location information of the sensitive area as coordinates (5,5, 15, 15), x left =5 equals the sensitive area located on the 5 th macroblock from the left in the x direction. The remaining bytes of the location information may be used to record key information. For example, dec5e9ade4d24db8632c is the key information corresponding to the sensitive area.
By the video processing method of the embodiment of the application, the coded video data can be obtained; identifying image data for a presence-sensitive region in the video data; and encrypting the sensitive area in the image data by adopting key information to obtain encrypted video data. Therefore, the sensitive area can be encrypted based on the encoded video data, the encoding process of the video cannot be influenced, and the encoding efficiency of the video is reduced. And the sensitive area in the image data is encrypted by adopting the key information, so that the difference of the data volume between the encrypted video data and the coded video data can be smaller, and the video quality cannot be influenced. Further, the key information is recorded in the encrypted video data. The method can provide a decryption mode of the encrypted video data for the trusted user without changing the original video transmission mode, and can continuously avoid other users from viewing the content needing protection in the video.
Referring to fig. 6, a flowchart illustrating steps of an embodiment of a video processing method according to the embodiment of the present application is shown, which may specifically include the following steps:
step 601, acquiring encoded encrypted video data and key information; the encrypted video data comprises at least one frame of encrypted image data;
in the embodiment of the present application, in the case where video data needs to be acquired, encoded encrypted video data and key information may be acquired. The encrypted video data may include at least one frame of encrypted image data.
Specifically, the encrypting the video data may be by obtaining encoded video data; identifying image data for a presence-sensitive region in the video data; and encrypting the sensitive area in the image data by adopting key information to obtain encrypted video data. Since the encrypted data is processed on the basis of the encoded video data, a small data amount difference can be obtained between the encrypted video data and the encoded video data without affecting the video quality.
Specifically, the key information may be information for decrypting the encrypted video data. The key information may or may not be described in the encrypted video data.
If the key information is recorded in the encrypted video data, the mode of acquiring the video data by the user can be the same as the original mode, and the user can acquire the encrypted video data and the key information recorded in the encrypted video data only by directly receiving the video data.
If the key information is not recorded in the encrypted video data, the mode of acquiring the video data by the user is different from the original mode, and the user needs to receive the key information by other modes, so that the security of the encrypted video data can be further improved to a certain extent.
Specifically, the encrypted video data may include at least one frame of encrypted image data. A sensitive area in which sensitive content is recorded may exist in the encrypted image data. The data in the sensitive area can be encrypted by the key information and cannot be directly decoded and viewed.
Step 602, decrypting the sensitive area in the encrypted image data by using the key information to obtain decrypted video data.
In this embodiment of the present application, since the sensitive area in the image data is encrypted by using the key information, the sensitive area in the encrypted image data may be decrypted by using the key information, so as to obtain decrypted video data. The decrypted video data may be encoded video data. After the decryption of the encrypted video data is completed, the decrypted video data can be decoded for viewing by adopting an original video decoding mode. Therefore, the user can acquire the video data in the same encoding mode as the original video data only by adopting the key information for decryption, and the data security is ensured while less influence is caused on the view of the video data by a trustable user.
Specifically, the user may know the encryption mode of the encrypted video data, and may also know the identification information of the image data in which the sensitive area exists, and the storage location of the location information of the sensitive area in the image data in the encrypted video data. Therefore, after the key information is acquired, the image data which needs to be decrypted in the encrypted video data can be determined according to the image data identification information, the data which needs to be decrypted in the image data can be determined according to the position information of the sensitive area, and the sensitive area in the encrypted image data can be decrypted.
By the video processing method of the embodiment of the application, the encoded and encrypted video data and the key information are obtained; the encrypted video data comprises at least one frame of encrypted image data; and decrypting the sensitive area in the encrypted image data by adopting the key information to obtain decrypted video data. The encoded encrypted video data may have a video quality similar to the original encoded video data, and the user may decode the decrypted video data to view it after the user has completed decrypting the encrypted video data in the original video decoding manner. The video transmission security is ensured, and meanwhile, video data which keeps the original video quality is provided for the user, so that the trusted user is slightly influenced to view the video data.
Referring to fig. 7, a flowchart illustrating steps of an embodiment of a video transmission method according to the present application is shown, where the method is applied to a sending end and a receiving end.
The method may specifically comprise the steps of:
step 701, the sending end obtains encoded video data; the video data comprises at least one frame of image data;
in this embodiment, the sending end may send video data to the receiving end. However, to ensure that sensitive content in the video data is not captured by unrelated people. The sending end needs to encrypt the sensitive content in the video data before sending the video data to the receiving end.
Therefore, the sending end can firstly acquire the coded video data; the video data includes at least one frame of image data.
Specifically, the encoded video data may be stored in the sending end, or the sending end may obtain the encoded video data sent by other devices, which is not limited in this application.
Step 702, the sending end identifies image data of a sensitive area in the video data;
in this embodiment, the sending end may identify whether at least one frame of image data in the video data has a sensitive area in which sensitive content is recorded, so that image data in which the sensitive area exists may be identified in the video data.
In a specific implementation, a sensitive area in which sensitive content exists in the image data may be identified by using a template matching method, a model identification method, and the like. Since image data of the type P frame or B frame does not generally have complete image information, it may result in failure to normally identify a sensitive area in the image data. Therefore, when identifying whether the sensitive area exists in the image data, the image data can be decoded firstly, and then the sensitive area is identified on the decoded image data, and under the condition that the sensitive area exists, the position information of the sensitive area can be recorded, so that the sensitive area can be encrypted in the encoded image data subsequently.
Step 703, the sending end encrypts the sensitive area in the image data by using the key information to obtain encrypted video data; the encrypted video data comprises at least one frame of encrypted image data;
in this embodiment of the application, after identifying that image data of a sensitive area exists in the video data, the sending end may encrypt the sensitive area in the image data by using key information, and protect sensitive content in the sensitive area.
Because the encryption processing is performed after the encoding processing, the encoding process of the video cannot be influenced, and the encoding efficiency of the video is reduced. Meanwhile, as the encryption operation is directly carried out on the encoded image data by adopting the key information, the data quantity difference between the image data after the encryption operation and the encoded image data is small, and the data quantity of the video data can not be obviously changed.
Step 704, the receiving end receives the encrypted video data and the key information sent by the sending end;
in this embodiment of the application, after the sending end completes the encryption of the video, the receiving end may receive the encrypted video data and the key information sent by the sending end in different manners. For example, the encrypted video data may be sent to the receiving end in a Push (Push) manner, the encrypted video data may also be sent to the receiving end in a broadcast manner, or the receiving end may actively send a request to the sending end to obtain the encrypted video data. Sensitive contents in the encrypted video data can be encrypted, so that the security of the encrypted video data in the transmission process can be ensured to a certain extent.
Specifically, the key information may be information for decrypting the encrypted video data. The key information may be described in the encrypted video data or may not be described in the encrypted video data.
If the key information is recorded in the encrypted video data, the manner of acquiring the video data by the receiving end at this time may be the same as the original manner, and the receiving end only needs to directly receive the video data to acquire the encrypted video data and the key information recorded in the encrypted video data.
If the key information is not recorded in the encrypted video data, the manner of acquiring the video data by the receiving end is different from the original manner, and the receiving end needs to adopt other manners to receive the key information, so that the security of the encrypted video data can be further improved to a certain extent.
Step 705, the receiving end decrypts the encrypted image data by using the key information to obtain decrypted video data.
In this embodiment, the receiving end may decrypt the sensitive area in the encrypted image data by using the key information, so as to obtain decrypted video data. The decrypted video data may be encoded video data. After the decryption of the encrypted video data is completed, the decrypted video data can be decoded for viewing by adopting the original video decoding mode. Therefore, the user can acquire the video data in the same encoding mode as the original video data only by adopting the key information for decryption, and the data security is ensured while less influence is caused on the view of the video data by a trustable user.
Therefore, the video encryption and decryption processes can be tightly coupled with the video encoding and decoding processes, the video can be encrypted by the sending end after the video data are encoded, and the encrypted video data can be further decoded by the receiving end after the receiving end receives the encrypted video data and decrypts the encrypted video data, so that the video data can be checked by the receiving end. Meanwhile, the encryption and decryption of the video data can not affect the original encoding process and decoding process of the video data, the video encoding and decoding efficiency and the video quality are ensured, and the encrypted video data is still close to the original standard video data.
According to the video transmission method, the sending end obtains the coded video data; the video data comprises at least one frame of image data; the sending end identifies image data of a sensitive area in the video data; the sending end encrypts the sensitive area in the image data by adopting key information to obtain encrypted video data; the encrypted video data comprises at least one frame of encrypted image data; the sending end sends the encrypted video data and the key information to the receiving end; and the receiving end decrypts the encrypted image data by adopting the key information to obtain decrypted video data. The encryption and decryption of the video data can not affect the original encoding process and decoding process of the video data, so that no matter a sending end or a receiving end can transmit the video in a mode similar to the original video transmission, the video transmission quality and the video transmission efficiency are ensured, and the video transmission safety is improved.
Referring to fig. 8, a video viewing method according to an embodiment of the present application is shown, where the method includes:
step 801, acquiring authentication information input by a user aiming at encrypted video data;
in the embodiment of the application, when a user participates in a real-time video conference, watches entertainment videos and teaching videos provided by a video platform, watches live videos of a shopping platform, monitors children, manages the safety of a company, and performs passenger flow analysis and other different scenes on a shopping mall, the user can obtain encrypted video data through electronic equipment held by the user. The encrypted video data may include at least one frame of encrypted image data.
The electronic device may be a mobile phone, a notebook computer, a tablet computer, a desktop computer, an intelligent watch, a projector, and the like, which is not limited in this application.
Specifically, the encrypted video data may be obtained by obtaining encoded video data; identifying image data for which a sensitive region exists in the video data; and encrypting the sensitive area in the image data by adopting key information to obtain encrypted video data. Since the encrypted data is processed on the basis of the encoded video data, there can be a small difference in data amount between the encrypted video data and the encoded video data without affecting the video quality.
In order for a user to view image data of a presence-sensitive area in encrypted video data, authentication information may be input to authenticate whether the user has permission to view image data of the presence-sensitive area in the encrypted video data.
The authentication information may be human characteristic information such as a fingerprint, a human face, an iris, etc., a text password, a graphic password, an authentication certificate stored in the mobile storage device, etc., which is not limited in the present application.
Specifically, the user may input the authentication information by touching the electronic device, operating an input device such as a camera, a keyboard, or a mouse connected to the electronic device, connecting the mobile storage device to the electronic device so that the electronic device may obtain the authentication certificate in the mobile storage device, or the like, so that the electronic device held by the user may obtain the authentication information input by the user for the encrypted video data.
In a specific implementation, after the encrypted video data is obtained, the user may be prompted to input authentication information to decrypt the encrypted video data. The user may also input the authentication information in advance for the encrypted video data before acquiring the encrypted video data, so that the electronic device may decrypt the encrypted video data based on the authentication information after acquiring the encrypted video data. The electronic device may also obtain authentication information input by the user before obtaining the encrypted video data, and send the authentication information of the user to the sending end device for sending the encrypted video data, so that the sending end device may send the encrypted video data carrying the key information matched with the authentication information based on the authentication information of the user, so as to complete decryption of the encrypted video data without additionally obtaining the key information.
Step 802, searching key information matched with the authentication information;
in the embodiment of the application, the encrypted video data can be decrypted by using the key information, so that after the authentication information is obtained, the key information matched with the authentication information can be searched for, and the subsequent decryption of the image data in the sensitive area in the encrypted video data is facilitated. If the user allows to view the encrypted video data, the key information matched with the authentication information of the user can be found. If the user does not allow viewing of the encrypted video data, the key information matched with the authentication information of the user cannot be found, so that sensitive content in the encrypted video data cannot be viewed.
In a specific implementation, the electronic device may send authentication information of the user to a device for managing key information to obtain key information matching the authentication information.
The electronic device may also look up key information in the encrypted video data that matches the authentication information. For example, an acquisition address of the key information may be recorded in the encrypted video data, and the electronic device may transmit a request of recording the authentication information to the address to acquire the key information matching the authentication information. Alternatively, the electronic device may record the encrypted key information, and the electronic device may attempt to decrypt the key information based on the authentication information. If the key information obtained by correctly decrypting the authentication information is adopted, the authentication information can have matched key information. Or, before obtaining the encrypted video data, the electronic device may send the authentication information of the user to the sending-end device for sending the encrypted video data, and then the sending-end device may send the encrypted video data carrying the key information matched with the authentication information based on the authentication information of the user. The electronic device can know the recording position and the recording mode of the key information in the encrypted video data in advance, so that the key information required by the electronic device can be extracted from the encrypted video data.
In a specific implementation, the image data in the sensitive area in the encrypted video data may all be encrypted by using the same key information. In this case, the authentication information of multiple users may be set to match the key information, so that multiple users can obtain the key information required to decrypt the encrypted video data by using their own authentication information.
In the encrypted video data, different types of image data of sensitive areas can be encrypted by using different key information respectively. In this case, the authentication information of different users may respectively match at least one key information. Therefore, according to the authority possessed by different users, the users can view different types of sensitive contents in the encrypted video data. For example, in a scene where a parent monitors children, image data of areas where different children are located in video data may be encrypted by using different key information, and after a parent inputs authentication information, key information corresponding to the child may be obtained. For another example, in a scenario of product production management, image data of areas where different types of production devices are located may be encrypted by using different key information, and a manager inputs authentication information and may obtain at least one key information matching with the authority of the manager, for example, the authentication information of a manager with low authority may only obtain the key information corresponding to the production device a, and the authentication information of a manager with high authority may simultaneously obtain multiple key information corresponding to the production devices a to D.
Step 803, decrypting the image data with the sensitive area in the encrypted video data by using the key information to obtain decrypted video data;
in this embodiment of the application, after obtaining the key information, the electronic device may decrypt the sensitive area in the encrypted image data by using the key information, so as to obtain decrypted video data. The decrypted video data can be the same as the encrypted video data and are all coded video data, so that after the video is decrypted, the data volume of the obtained decrypted video data cannot be obviously changed, and the video data is checked by a user with less influence while the data security is ensured.
Specifically, the electronic device may know an encryption manner of the encrypted video data, and may also know, according to information described in the encrypted video data, identification information of image data in which a sensitive area exists, and a storage location of location information of the sensitive area in the image data in the encrypted video data. Therefore, after the key information is acquired, the image data which needs to be decrypted in the encrypted video data can be determined according to the image data identification information, the data which needs to be decrypted in the image data can be determined according to the position information of the sensitive area, and the sensitive area in the encrypted image data can be decrypted.
Step 804, presenting the decrypted video data to a user.
In this embodiment of the application, after the electronic device obtains the decrypted video data, the electronic device may decrypt the decrypted video data and play the decrypted video data to show the decrypted video data to the user. Meanwhile, the decoding mode for decrypting the video data is the same as the decryption mode for the video data which is not encrypted. Therefore, the user can acquire the video data in the same encoding mode as the original video data only by adopting the key information for decryption, and the playing and displaying of the video data are less influenced while the data security is ensured.
According to the video viewing method provided by the embodiment of the invention, the authentication information input by the user aiming at the encrypted video data is obtained; searching key information matched with the authentication information; decrypting the image data with the sensitive area in the encrypted video data by adopting the key information to obtain decrypted video data; and displaying the decrypted video data to a user. The user can simply and conveniently finish the decryption of the video data through the authentication information and check the decrypted video data. The security of video transmission can be significantly improved with less impact on the application.
It should be noted that, for simplicity of description, the method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the embodiments are not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the embodiments. Further, those skilled in the art will also appreciate that the embodiments described in the specification are presently preferred and that no particular act is required of the embodiments of the application.
Referring to fig. 9, a block diagram of a video processing apparatus according to an embodiment of the present application is shown, which may specifically include the following modules:
a video obtaining module 901, configured to obtain encoded video data; the video data comprises at least one frame of image data;
an identifying module 902, configured to identify image data of a sensitive area in the video data;
an encryption module 903, configured to encrypt the sensitive area in the image data by using the key information, so as to obtain encrypted video data.
In one embodiment of the present application, the apparatus further comprises:
and the key recording module is used for recording the key information in the encrypted video data.
In one embodiment of the present application, the apparatus further comprises:
and the information recording module is used for recording the identification information of the image data with the sensitive area and the position information of the sensitive area in the image data in the encrypted video data.
In one embodiment of the present application, the encryption module includes:
the position determining sub-module is used for determining the position of the sensitive area in the image data;
and the encryption operation sub-module is used for carrying out encryption operation on the data of the position of the sensitive area in the image data by adopting the key information to obtain encrypted video data.
In one embodiment of the present application, the identification module includes:
the identification submodule is used for identifying image data with at least one sensitive content in the video data and respectively determining a sensitive area where the sensitive content is located in the image data;
the distribution submodule is used for respectively distributing the sensitive content identification codes for the sensitive content;
and the relation establishing submodule is used for establishing the corresponding relation between the sensitive content identification code and the key information for the sensitive content.
In one embodiment of the present application, the encryption module includes:
and the encryption submodule is used for encrypting the sensitive area where the sensitive content in the image data is located by adopting the key information corresponding to the sensitive content identification code in the sensitive area where the sensitive content in the image data is located to obtain encrypted video data.
Referring to fig. 10, a block diagram of another embodiment of a video processing apparatus according to the embodiment of the present application is shown, and specifically, the block diagram may include the following modules:
an encrypted video acquisition module 1001 configured to acquire encoded encrypted video data and key information; the encrypted video data comprises at least one frame of encrypted image data;
the decryption module 1002 is configured to decrypt the sensitive area in the encrypted image data by using the key information, so as to obtain decrypted video data.
Referring to fig. 11, a block diagram of an embodiment of a video transmission apparatus according to an embodiment of the present application is shown, and is applied to a sending end and a receiving end, where the sending end includes a coded video obtaining module 1101, a sensitive data identifying module 1102, and a data encrypting module 1103; the receiving end comprises a video receiving module 1104 and a video decrypting module 1105;
the encoded video acquiring module 1101 is configured to acquire encoded video data; the video data comprises at least one frame of image data;
the sensitive data identification module 1102 is configured to identify image data of a sensitive area in the video data;
the data encryption module 1103 is configured to encrypt the sensitive area in the image data by using key information to obtain encrypted video data; the encrypted video data comprises at least one frame of encrypted image data;
the encrypted data receiving module 1104 is configured to receive the encrypted video data and the key information sent by the sending end;
the video decryption module 1105 is configured to decrypt the encrypted image data using the key information to obtain decrypted video data.
Referring to fig. 12, a block diagram of an embodiment of a video viewing apparatus according to an embodiment of the present application is shown, where the apparatus includes:
an authentication obtaining module 1201, configured to obtain authentication information input by a user for encrypted video data;
a key matching module 1202, configured to search for key information matching the authentication information;
a video decryption module 1203, configured to decrypt, using the key information, image data in a sensitive area in the encrypted video data to obtain decrypted video data;
a video display module 1204, configured to display the decrypted video data to a user.
For the apparatus embodiment, since it is substantially similar to the method embodiment, the description is relatively simple, and reference may be made to the partial description of the method embodiment for relevant points.
An embodiment of the present application further provides an electronic device, including:
one or more processors; and
one or more machine-readable media having instructions stored thereon, which when executed by the one or more processors, cause the electronic device to perform the methods of embodiments of the present application.
Embodiments of the present application also provide one or more machine-readable media having instructions stored thereon, which when executed by one or more processors, cause the processors to perform the methods of embodiments of the present application.
Also disclosed are software products comprising computer programs/instructions, wherein the computer programs/instructions, when executed, implement the methods of performing any of the embodiments of the present application.
The embodiments in the present specification are all described in a progressive manner, and each embodiment focuses on differences from other embodiments, and portions that are the same and similar between the embodiments may be referred to each other.
As will be appreciated by one of skill in the art, embodiments of the present application may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.
Embodiments of the present application are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present application have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including the preferred embodiment and all such alterations and modifications as fall within the true scope of the embodiments of the application.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising a … …" does not exclude the presence of another identical element in a process, method, article, or terminal apparatus that comprises the element.
The detailed description is given above on a video processing method, a video transmission method, a video viewing method, a video processing device, a video transmission device, and a video viewing device provided by the present application, and a specific example is applied in the present application to explain the principle and the implementation manner of the present application, and the description of the above embodiment is only used to help understand the method and the core idea of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (14)

1. A video processing method, comprising:
acquiring encoded video data; the video data comprises at least one frame of image data;
identifying image data for a presence-sensitive region in the video data;
and encrypting the sensitive area in the image data by adopting key information to obtain encrypted video data.
2. The method of claim 1, further comprising:
recording the key information in the encrypted video data.
3. The method according to claim 1 or 2, characterized in that the method further comprises:
and recording identification information of the image data of the sensitive area and position information of the sensitive area in the image data in the encrypted video data.
4. The method of claim 1, wherein the step of identifying image data for the presence-sensitive region in the video data comprises:
identifying image data with at least one sensitive content in the video data, and respectively determining a sensitive area in which the sensitive content is located in the image data;
respectively distributing sensitive content identification codes for the sensitive content;
and for the sensitive content, establishing the corresponding relation between the sensitive content identification code and the key information.
5. A method of video processing, the method comprising:
acquiring encoded encrypted video data and key information; the encrypted video data comprises at least one frame of encrypted image data;
and decrypting the sensitive area in the encrypted image data by adopting the key information to obtain decrypted video data.
6. A video transmission method is applied to a sending end and a receiving end, and the method comprises the following steps:
the sending end acquires encoded video data; the video data comprises at least one frame of image data;
the sending end identifies image data of a sensitive area in the video data;
the sending end encrypts the sensitive area in the image data by adopting key information to obtain encrypted video data; the encrypted video data comprises at least one frame of encrypted image data;
the receiving end receives the encrypted video data and the key information sent by the sending end;
and the receiving end decrypts the encrypted image data by adopting the key information to obtain decrypted video data.
7. A method of video viewing, the method comprising:
acquiring authentication information input by a user aiming at encrypted video data;
searching key information matched with the authentication information;
decrypting the image data with the sensitive area in the encrypted video data by adopting the key information to obtain decrypted video data;
and displaying the decrypted video data to a user.
8. A video processing apparatus, characterized in that the apparatus comprises:
the video acquisition module is used for acquiring the coded video data; the video data comprises at least one frame of image data;
the identification module is used for identifying image data of a sensitive area in the video data;
and the encryption module is used for encrypting the sensitive area in the image data by adopting key information to obtain encrypted video data.
9. A video processing apparatus, characterized in that the apparatus comprises:
the encrypted video acquisition module is used for acquiring the encoded encrypted video data and the key information; the encrypted video data comprises at least one frame of encrypted image data;
and the decryption module is used for decrypting the sensitive area in the encrypted image data by adopting the key information to obtain decrypted video data.
10. A video transmission device is characterized in that the video transmission device is applied to a sending end and a receiving end, wherein the sending end comprises a coded video acquisition module, a sensitive data identification module and a data encryption module; the receiving end comprises an encrypted data receiving module and a video decryption module;
the coded video acquisition module is used for acquiring coded video data; the video data comprises at least one frame of image data;
the sensitive data identification module is used for identifying image data of a sensitive area in the video data;
the data encryption module is used for encrypting the sensitive area in the image data by adopting key information to obtain encrypted video data; the encrypted video data comprises at least one frame of encrypted image data;
the encrypted data receiving module is used for receiving the encrypted video data and the key information sent by the sending end;
the video decryption module is used for decrypting the encrypted image data by adopting the key information to obtain decrypted video data.
11. A video viewing apparatus, the apparatus comprising:
the authentication acquisition module is used for acquiring authentication information input by a user aiming at the encrypted video data;
the key matching module is used for searching key information matched with the authentication information;
the video decryption module is used for decrypting the image data with the sensitive area in the encrypted video data by adopting the key information to obtain decrypted video data;
and the video display module is used for displaying the decrypted video data to a user.
12. An electronic device, comprising:
one or more processors; and
one or more machine-readable media having instructions stored thereon that, when executed by the one or more processors, cause the electronic device to perform any of the methods of claims 1-4 or 5 or 6 or 7.
13. One or more machine readable media having instructions stored thereon that, when executed by one or more processors, cause the processors to perform any of the methods of claims 1-4 or 5 or 6 or 7.
14. A software product comprising computer programs/instructions, wherein the computer programs/instructions, when executed, implement the method of any of claims 1-4 or 5 or 6 or 7.
CN202110732635.0A 2021-06-29 2021-06-29 Video processing method, video transmission method, video viewing method and device Pending CN115550691A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110732635.0A CN115550691A (en) 2021-06-29 2021-06-29 Video processing method, video transmission method, video viewing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110732635.0A CN115550691A (en) 2021-06-29 2021-06-29 Video processing method, video transmission method, video viewing method and device

Publications (1)

Publication Number Publication Date
CN115550691A true CN115550691A (en) 2022-12-30

Family

ID=84717270

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110732635.0A Pending CN115550691A (en) 2021-06-29 2021-06-29 Video processing method, video transmission method, video viewing method and device

Country Status (1)

Country Link
CN (1) CN115550691A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117714712A (en) * 2024-02-01 2024-03-15 浙江华创视讯科技有限公司 Data steganography method, equipment and storage medium for video conference
CN117749974A (en) * 2023-12-15 2024-03-22 苏州智华汽车电子有限公司 Video processing method, video restoration method and video restoration device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090245513A1 (en) * 2008-03-31 2009-10-01 Fujitsu Limited Image encryption apparatus and image decryption apparatus
CN103546750A (en) * 2013-10-22 2014-01-29 中国人民解放军重庆通信学院 H.264 video encryption method based on region of interest
US20150055775A1 (en) * 2013-08-20 2015-02-26 Electronics And Telecommunications Research Institute Image processing apparatus and operation method thereof
CN106791923A (en) * 2016-12-30 2017-05-31 中广热点云科技有限公司 A kind of stream of video frames processing method, video server and terminal device
CN111935486A (en) * 2020-07-29 2020-11-13 Oppo广东移动通信有限公司 Image processing method and device, computer readable storage medium and electronic device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090245513A1 (en) * 2008-03-31 2009-10-01 Fujitsu Limited Image encryption apparatus and image decryption apparatus
US20150055775A1 (en) * 2013-08-20 2015-02-26 Electronics And Telecommunications Research Institute Image processing apparatus and operation method thereof
CN103546750A (en) * 2013-10-22 2014-01-29 中国人民解放军重庆通信学院 H.264 video encryption method based on region of interest
CN106791923A (en) * 2016-12-30 2017-05-31 中广热点云科技有限公司 A kind of stream of video frames processing method, video server and terminal device
CN111935486A (en) * 2020-07-29 2020-11-13 Oppo广东移动通信有限公司 Image processing method and device, computer readable storage medium and electronic device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117749974A (en) * 2023-12-15 2024-03-22 苏州智华汽车电子有限公司 Video processing method, video restoration method and video restoration device
CN117714712A (en) * 2024-02-01 2024-03-15 浙江华创视讯科技有限公司 Data steganography method, equipment and storage medium for video conference
CN117714712B (en) * 2024-02-01 2024-05-07 浙江华创视讯科技有限公司 Data steganography method, equipment and storage medium for video conference

Similar Documents

Publication Publication Date Title
US11023618B2 (en) Systems and methods for detecting modifications in a video clip
US9094733B2 (en) Methods and systems for cryptographic access control of video
US8387150B2 (en) Segmented media content rights management
CN108206930A (en) The method and device for showing image is covered based on privacy
US20070003102A1 (en) Electronic watermark-containing moving picture transmission system, electronic watermark-containing moving picture transmission method, information processing device, communication control device, electronic watermark-containing moving picture processing program, and storage medium containing electronic watermark-containing
Guo et al. An efficient motion detection and tracking scheme for encrypted surveillance videos
US9928352B2 (en) System and method for creating, processing, and distributing images that serve as portals enabling communication with persons who have interacted with the images
Cheung et al. Protecting and managing privacy information in video surveillance systems
US10575068B2 (en) Streaming piracy detection method and system
CN115550691A (en) Video processing method, video transmission method, video viewing method and device
WO2023125291A1 (en) Image display methods, apparatuses and system and device
KR20130114037A (en) Masking and recovering method of privacy region
Kanwal et al. Preserving chain-of-evidence in surveillance videos for authentication and trust-enabled sharing
Lakshmi et al. Digital video watermarking tools: an overview
US20160337673A1 (en) Protection of privacy in a video stream by means of a redundant slice
CN113038089B (en) Intelligent identification dynamic self-decoding processing method and device, electronic equipment and storage medium
US12041318B2 (en) System and method for automatic detection and reporting of group watermarking data
US20080192746A1 (en) Systems and methods for communicating secure media
Wei et al. Trustworthy authentication on scalable surveillance video with background model support
CN114339282A (en) Method and device for transmitting anchor image picture in live broadcast interaction
Carpentieri et al. Privacy-preserving Secure Media Streaming for Multi-user Smart Environments
KR20180102455A (en) How to mask privacy data in the HEVC video
CN109905762B (en) Image processing apparatus and control method thereof
US20220215071A1 (en) Privacy protection method for transmitting end and receiving end, electronic device and computer readable storage medium
Gerhardt et al. Selective face encryption in H. 264 encoded videos

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20240304

Address after: 51 Belarusian Pasha Road, Singapore, Lai Zan Da Building 1 # 03-06, Postal Code 189554

Applicant after: Alibaba Innovation Co.

Country or region after: Singapore

Address before: Room 01, 45th Floor, AXA Building, 8 Shanton Road, Singapore

Applicant before: Alibaba Singapore Holdings Ltd.

Country or region before: Singapore

TA01 Transfer of patent application right