CN116456154B - Video piracy tracing method and system - Google Patents
Video piracy tracing method and system Download PDFInfo
- Publication number
- CN116456154B CN116456154B CN202310716210.XA CN202310716210A CN116456154B CN 116456154 B CN116456154 B CN 116456154B CN 202310716210 A CN202310716210 A CN 202310716210A CN 116456154 B CN116456154 B CN 116456154B
- Authority
- CN
- China
- Prior art keywords
- video
- binary
- string
- address
- session
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 230000009466 transformation Effects 0.000 claims abstract description 4
- 238000012545 processing Methods 0.000 claims description 22
- 238000004806 packaging method and process Methods 0.000 claims description 18
- 238000007781 pre-processing Methods 0.000 claims description 13
- 230000006835 compression Effects 0.000 claims description 7
- 238000007906 compression Methods 0.000 claims description 7
- 238000001514 detection method Methods 0.000 claims description 6
- 230000003993 interaction Effects 0.000 claims description 6
- 230000008569 process Effects 0.000 claims description 5
- 238000002347 injection Methods 0.000 claims description 3
- 239000007924 injection Substances 0.000 claims description 3
- 238000007726 management method Methods 0.000 description 16
- 238000003780 insertion Methods 0.000 description 3
- 230000037431 insertion Effects 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000000243 solution Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
- H04N21/4402—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving reformatting operations of video signals for household redistribution, storage or real-time display
- H04N21/440218—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving reformatting operations of video signals for household redistribution, storage or real-time display by transcoding between formats or standards, e.g. from MPEG-2 to MPEG-4
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
- H04N21/44008—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving operations for analysing video streams, e.g. detecting features or characteristics in the video stream
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/845—Structuring of content, e.g. decomposing content into time segments
- H04N21/8456—Structuring of content, e.g. decomposing content into time segments by decomposing the content in the time domain, e.g. in time segments
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/103—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for protecting copy right
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/146—Tracing the source of attacks
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Abstract
The application relates to a video piracy tracing method and a system, wherein the method comprises the following steps: acquiring an address of a pirated video, and downloading the pirated video according to the address of the pirated video; the pirated video is inserted with 0/1 value based on the set time interval; extracting 0/1 value inserted in pirated video through inverse transformation to obtain binary sequence string; cutting off the binary sequence string based on the set binary string and the set slicing time length to obtain a cut binary string; compressing the cut binary string based on the set slicing time length to obtain a compressed binary string; and determining the session number of the video played by the user based on the compressed binary string, and determining the user information corresponding to the pirated video based on the session number. The tracing method can realize tracing of pirated content, further effectively hit piracy and maintain legal rights and interests of a content copyright party to a greater extent.
Description
Technical Field
The application relates to the technical field of video piracy tracing, in particular to a video piracy tracing method and system.
Background
In recent years, with the development of the internet, people have become more and more convenient and faster to watch videos through the internet, but with the flooding of pirated contents, the cost of pirated resource propagation has become lower and lower due to the development of the internet and the diversity of file transmission. Although many copyrighted content operators currently incur significant costs for content protection, such as through digital rights management @, for exampleDigital Rights Management, DRM) Techniques to protect content copyrights in which caseOnly legitimate users are authorized to view the video. Even so, the content still has a risk of leakage: the legal user records the video through the recording screen in the process of watching the video, so that a copy of the original content can be obtained, and the user can issue the copy to other networks with the recorded copy, thereby achieving the purpose of piracy. In this case, even if the content copyright party can find the corresponding pirated content in time, the content copyright party cannot trace back the users who leak and pirate the content, so that legal responsibility of the pirated users cannot be pursued.
Disclosure of Invention
Based on this, there is a need to provide a video piracy tracing method, which includes:
s1: acquiring an address of a pirated video, and downloading the pirated video according to the address of the pirated video; the pirated video is inserted with a 0/1 value based on a set time interval;
s2: extracting 0/1 value inserted in the pirated video through inverse transformation to obtain a binary sequence string;
s3: cutting the binary sequence string based on the set binary string and the set slicing time length to obtain a cut binary string;
s4: compressing the truncated binary string based on the set slicing time length to obtain a compressed binary string;
s5: and determining the session number of the video played by the user based on the compressed binary string, and determining the user information corresponding to the pirated video based on the session number.
Preferably, in S3, obtaining the truncated binary string includes:
s3.1: performing tail sub-string truncation processing on the binary sequence string based on the set binary string;
s3.2: performing head substring truncation processing on the binary sequence string subjected to tail substring truncation processing based on the set slicing time length;
s3.3: and reserving the rest sub-strings, wherein the rest sub-strings are the truncated binary strings.
Preferably, the performing tail sub-string truncation processing on the binary sequence string based on the set binary string includes:
s3.1.1: traversing the binary sequence strings from right to left until the set binary strings are searched for the first time, and stopping traversing;
s3.1.2: and cutting off the searched sub-strings after the set binary string in the binary sequence string, and reserving the rest sub-strings.
Preferably, the performing head sub-string truncation processing on the binary sequence string subjected to the tail sub-string truncation processing based on the set slice duration includes:
s3.2.1: calculating a head truncated bit number based on the length of the binary sequence string and the set slicing time length;
s3.2.2: and in the binary sequence string subjected to tail substring truncation processing, the head truncation bit number binary characters before truncation are reserved, and the rest substrings are reserved.
Preferably, the calculation formula of the head truncated number of bits is:
M 0 =len(S')%(L*D);
wherein ,M 0 representing the number of head truncations, len () representing a sequence length acquisition function, S' representing the binary sequence string subjected to tail substring truncations,Lrepresenting the length of the string of binary sequences,Dindicating the set slice duration.
Preferably, in S4, obtaining the compressed binary string includes:
and in the truncated binary string, the set slicing time length is used as a compression number, and the compression number of adjacent binary characters is compressed into one-bit binary characters until the truncated binary string is traversed, so that the compressed binary string is obtained.
Preferably, in S5, the method includes:
step 1: converting the compressed binary string into a decimal number, and taking the decimal number as a session number of a user for playing video;
step 2: and searching the corresponding user information in the database according to the session number, namely the user information corresponding to the pirated video.
Preferably, the method further comprises: a user requests to play a video interaction stage; the interaction phase comprises:
step 1: injecting video content;
step 2: performing transcoding preprocessing and packaging on the video content, and distributing the processed video content;
step 3: receiving an authentication request with user information and generating a session token; splicing the session token to the play address of the processed video content, and returning the session token to the user;
step 4: receiving a play request of a user, and determining a returned slice file according to the type of the play request and a play address spliced with a session token; and inserting 0/1 value into the slice file based on the set time interval to form a binary string corresponding to the slice file.
Preferably, the determining the returned slice file according to the type of the play request and the play address spliced with the session token includes:
the types of the play requests comprise an index file request, a metadata file request, an audio slice file request and a video slice file request;
the address of the video slice file request is a play address with a session token spliced with the serial number of the requested video slice file;
when the type of the playing request is an index file request or a metadata file request or an audio slice file request, replacing a session token in the playing address spliced with the session token with a path where video content is stored to obtain a first playing address; searching a first clip file according to the first play address, and returning the first clip file to a user;
when the type of the play request is a video slice file request, extracting a session token in a play address spliced with the session token, and decrypting the session token to obtain a session token binary string; extracting the sequence number of the requested video slice file, calculating a modulus result based on the session token binary string and the sequence number, taking the modulus result as an index value of the session token binary string, and reading a corresponding binary character; when the binary character is 0, replacing a session token in the address of the video slice file request with a path where video content is stored to obtain a second play address, and when the binary character is 1, replacing the session token in the address of the video slice file request with the path where video content is stored to obtain a third play address, and adding a prefix to the file name of the video slice file in the video slice file request; and searching a second slice file according to the second playing address or the third playing address, and returning the second slice file to the user.
The application also provides a video piracy tracing system which is applied to the video piracy tracing method;
the traceability system comprises:
the system comprises a transcoding preprocessing and packaging module, a session management module, a content distribution module, a content and user management module and a traceability detection module;
the transcoding preprocessing and packaging module is used for performing transcoding preprocessing and packaging on the video content and reporting the processed video content to the content distribution module;
the session management module is used for creating and managing session information in the video content distribution process;
the content distribution module is used for scheduling a distribution strategy of video content in real time according to the session information;
the content and user management module is used for video content injection and management of subscribing users;
the tracing detection module is used for tracing user information corresponding to the pirated video.
The beneficial effects are that: the tracing method can realize tracing of pirated content, further effectively hit piracy and maintain legal rights and interests of a content copyright party to a greater extent.
Drawings
In order to more clearly illustrate the embodiments of the application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flowchart of a video piracy tracing method according to an embodiment of the application.
Fig. 2 is a schematic diagram of a video piracy tracing system according to an embodiment of the application.
Detailed Description
In order that the above objects, features and advantages of the application will be readily understood, a more particular description of the application will be rendered by reference to the appended drawings. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present application. The present application may be embodied in many other forms than described herein and similarly modified by those skilled in the art without departing from the spirit of the application, whereby the application is not limited to the specific embodiments disclosed below.
Furthermore, the terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In the description of the present application, the meaning of "plurality" means at least two, for example, two, three, etc., unless specifically defined otherwise.
As shown in fig. 1, this embodiment provides a video piracy tracing method, which includes:
s1: acquiring an address of a pirated video, and downloading the pirated video according to the address of the pirated video; the pirated video is inserted with a 0/1 value based on a set time interval;
in the present embodiment, the set time interval is 1 second.
S2: extracting 0/1 value inserted in the pirated video through inverse transformation to obtain a binary sequence string;
let binary sequence string be:
“111111000000000000000000000000111111000000111111000000000000111111000000000000000000000000111111000000”;
s3: cutting the binary sequence string based on the set binary string and the set slicing time length to obtain a cut binary string;
specifically, obtaining the truncated binary string includes:
s3.1: performing tail sub-string truncation processing on the binary sequence string based on the set binary string;
further, the performing tail sub-string truncation processing on the binary sequence string based on the set binary string includes:
s3.1.1: traversing the binary sequence strings from right to left until the set binary strings are searched for the first time, and stopping traversing;
the binary string is set as follows: "111111000000000000";
s3.1.2: and cutting off the searched sub-strings after the set binary string in the binary sequence string, and reserving the rest sub-strings.
The remaining substrings are:
“111111000000000000000000000000111111000000111111000000000000111111000000000000”;
s3.2: performing head substring truncation processing on the binary sequence string subjected to tail substring truncation processing based on the set slicing time length;
further, the performing head sub-string truncation processing on the binary sequence string subjected to the tail sub-string truncation processing based on the set slice duration includes:
s3.2.1: calculating a head truncated bit number based on the length of the binary sequence string and the set slicing time length;
further, the calculation formula of the head truncated bit number is:
M 0 =len(S')%(L*D);
wherein ,M 0 representing the number of head truncations, len () representing a sequence length acquisition function, S' representing the binary sequence string subjected to tail substring truncations,Lrepresenting the length of the string of binary sequences,Dindicating the set slice duration. In the present embodiment of the present application, in the present embodiment,L=10,D=6, len (S')=78, givingM 0 =18;
S3.2.2: and in the binary sequence string subjected to tail substring truncation processing, the head truncation bit number binary characters before truncation are reserved, and the rest substrings are reserved.
The remaining substrings are:
“000000000000111111000000111111000000000000111111000000000000”;
s3.3: and reserving the rest sub-strings, wherein the rest sub-strings are the truncated binary strings.
S4: compressing the truncated binary string based on the set slicing time length to obtain a compressed binary string;
specifically, obtaining the compressed binary string includes:
and in the truncated binary string, the set slicing time length is used as a compression number, and the compression number of adjacent binary characters is compressed into one-bit binary characters until the truncated binary string is traversed, so that the compressed binary string is obtained.
In the present embodiment, the set slice period is 6 seconds, so the compression amount is 6; the compressed binary string is: "0010100100";
s5: and determining the session number of the video played by the user based on the compressed binary string, and determining the user information corresponding to the pirated video based on the session number.
In particular, the method comprises the steps of,
step 1: converting the compressed binary string into a decimal number, and taking the decimal number as a session number of a user for playing video;
step 2: and searching the corresponding user information in the database according to the session number, namely the user information corresponding to the pirated video.
In this embodiment, the method further includes: a user requests to play a video interaction stage;
the interaction phase comprises:
step 1: injecting video content;
step 2: performing transcoding preprocessing and packaging on the video content, and distributing the processed video content;
step 3: receiving an authentication request with user information and generating a session token; splicing the session token to the play address of the processed video content, and returning the session token to the user;
in this embodiment, the session ticket must be inserted into the URI portion of the play address, i.e., after the first slash and before the second slash, to avoid losing parameters during the request. For example, the original play address is:https:// edge.cdn.com.net/index.m3u8, the play address returned after splicing is as follows:https:// edge.cdn.com.net/SESSIONTOKEN/index.m3u8。
step 4: receiving a play request of a user, and determining a returned slice file according to the type of the play request and a play address spliced with a session token; and inserting 0/1 value into the slice file based on the set time interval to form a binary string corresponding to the slice file.
In this embodiment, since the duration of each slice file is 6 seconds, and each slice file is inserted with one 0/1 every 1 second, when the user plays 60 seconds of video, the corresponding binary string in the returned slice file is as follows:
“000000000000111111000000111111000000000000111111000000000000”。
further, the determining the returned slice file according to the type of the play request and the play address spliced with the session token includes:
the types of the play requests comprise an index file request, a metadata file request, an audio slice file request and a video slice file request;
the address of the video slice file request is a play address with a session token spliced with the serial number of the requested video slice file;
when the type of the playing request is an index file request or a metadata file request or an audio slice file request, replacing a session token in the playing address spliced with the session token with a path where video content is stored to obtain a first playing address; searching a first clip file according to the first play address, and returning the first clip file to a user;
when the type of the play request is a video slice file request, extracting a session token in a play address spliced with the session token, and decrypting the session token to obtain a session token binary string; extracting the sequence number of the requested video slice file, calculating a modulus result based on the session token binary string and the sequence number, taking the modulus result as an index value of the session token binary string, and reading a corresponding binary character; when the binary character is 0, replacing a session token in the address of the video slice file request with a path where video content is stored to obtain a second play address, and when the binary character is 1, replacing the session token in the address of the video slice file request with the path where video content is stored to obtain a third play address, and adding a prefix to the file name of the video slice file in the video slice file request; and searching a second slice file according to the second playing address or the third playing address, and returning the second slice file to the user.
As shown in fig. 2, the present embodiment further provides a video piracy tracing system, where the system is applied to the video piracy tracing method described above;
the traceability system comprises:
the system comprises a transcoding preprocessing and packaging module, a session management module, a content distribution module, a content and user management module and a traceability detection module;
the transcoding pretreatment and packaging moduleTranscoding and Packaging, TP) The video content processing module is used for carrying out transcoding preprocessing and packaging on the video content and reporting the processed video content to the content distribution module;
specifically, in the transcoding preprocessing and packaging module, first performingGOP (Group Of Pictures) Alignment is completedGOPAfter alignment, the alignment is performed by spatial transformationGOPAnd performing 0 and 1 insertion operations on the aligned video files respectively, wherein the insertion operations are performed once every 1 second, and finally, two video files of 0/1 variant are obtained. Assume that the original file injected issource.mp4For 30 seconds, and setGOPFor 3 seconds, finishGOPAfter alignment, obtainsource_align.mp4For a pair ofsource_align.mp4Respectively performing 0/1 insertion operation to obtain 0/1 variant output filessource_align_ 0.mp4Andsource_align_1.mp4. Next, respectively tosource_align_0.mp4Andsource_align_1.mp4packaging and outputting, setting the slicing time length to be 6 seconds,source_align_0.mp4the naming rules of the video slice files which are packaged and output are as follows: [PREFIX-]$Number$.m4s,source_align_1.mp4The naming rules of the video slice files which are packaged and output are as follows: [PREFIX-]b-$Number$.m4s, wherein ,PREFIX-is an optional prefix string.
In addition, the transcoding preprocessing and packaging module can carry out unique identification of the content after completing content packaging and uploadingCIDPackaging slice output slice durationDURATIONAnd resolution size of contentSIZEReporting to a session management module.
The session management moduleSession Manager, SM) The method is used for creating and managing session information in the video content distribution process;
specifically, before a user is authorized to play content, the user needs to request play authentication from the background of the content and user management module, at this time, the background of the content and user management module requests a session token from the session management module, and at the same time, the session token carries related information of a unique identifier user, and after receiving the request, the session management module generates and creates the session token according to the following steps:
step 1: performing hash calculation on the user information, and performing HEX coding on the hash result to obtainHIDAccording toHIDAnd (3) inquiring the database, confirming whether the session number exists or not, if not, turning to the step (2), otherwise turning to the step (3).
Step 2: creating globally unique session numbers, withHIDForming a one-to-one correspondence, the created session numbers need to satisfy the following conditions: (1) the low three bits of the session number binary string must be 100; (2) consecutive 1's cannot occur in the session number binary string. For example, 10100100 is a legal session number binary string and 10110100 is not a legal session number binary string. And after the binary string of the session number is obtained, carrying out left zero padding according to the set alignment length of the binary string to obtain the final binary character string of the session number. For example, the session number binary string is 10100100, and if the length of the aligned binary string is 10, the session number binary string obtained by zero padding on the left side is 0010100100.
Step 3: and (3) encrypting the session number binary string obtained in the step (2), then performing BASE64 coding on the encryption result, and taking the output character string as a session token.
The content distribution moduleContent Delivery Network, CDN) A distribution strategy for scheduling video content in real time according to session information;
specifically, after receiving the returned play address, the user starts to initiate a play request, and the process of playing the request data is performed according to the following sequence: request index file → request metadata file → { request audio slice file → request video slice file }, where the request in brackets { } above indicates that it is likely to be repeated multiple times. If the request received by the content distribution module is an index file request or a metadata file request or an audio slice file request, the content distribution module directly replaces the session token with a path on which the content is stored, for example, the content storage path is: /mnt/media, original request index fileIs addressed tohttps://edge.cdn.com.net/SESSIONTOKEN/index.m3u8, replacing the session token to obtain a new address:https://edge.cdn.com.net/mnt/media/index.m3uand 8, the WEB service of the content distribution module can find the file to be read according to the first playing address and returns the file.
The content and user management moduleBack Office System, BO) The method is used for video content injection and subscription user management;
the tracing detection moduleDetecting Module, DM) The method is used for tracing the user information corresponding to the pirated video.
The technical features of the above-described embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above-described embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples illustrate only a few embodiments of the application, which are described in detail and are not to be construed as limiting the scope of the claims. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of protection of the present application is to be determined by the appended claims.
Claims (9)
1. The video piracy tracing method is characterized by comprising the following steps of:
s1: acquiring an address of a pirated video, and downloading the pirated video according to the address of the pirated video; the pirated video is inserted with a 0/1 value based on a set time interval;
s2: extracting 0/1 value inserted in the pirated video through inverse transformation to obtain a binary sequence string;
s3: cutting the binary sequence string based on the set binary string and the set slicing time length to obtain a cut binary string;
s4: compressing the truncated binary string based on the set slicing time length to obtain a compressed binary string;
s5: determining a session number of a user playing the video based on the compressed binary string, and determining user information corresponding to the pirated video based on the session number;
converting the compressed binary string into a decimal number, and taking the decimal number as a session number of a user for playing video;
and searching the corresponding user information in the database according to the session number, namely the user information corresponding to the pirated video.
2. The video piracy tracing method according to claim 1, wherein in S3, obtaining the truncated binary string comprises:
s3.1: performing tail sub-string truncation processing on the binary sequence string based on the set binary string;
s3.2: performing head substring truncation processing on the binary sequence string subjected to tail substring truncation processing based on the set slicing time length;
s3.3: and reserving the rest sub-strings, wherein the rest sub-strings are the truncated binary strings.
3. The video piracy tracing method according to claim 2, wherein said performing tail sub-string truncation processing on said binary sequence string based on said set binary string comprises:
s3.1.1: traversing the binary sequence strings from right to left until the set binary strings are searched for the first time, and stopping traversing;
s3.1.2: and cutting off the searched sub-strings after the set binary string in the binary sequence string, and reserving the rest sub-strings.
4. A video piracy tracing method according to claim 3, wherein said performing head sub-string truncation processing on said binary sequence string subjected to tail sub-string truncation processing based on said set slice duration comprises:
s3.2.1: calculating a head truncated bit number based on the length of the binary sequence string and the set slicing time length;
s3.2.2: and in the binary sequence string subjected to tail substring truncation processing, the head truncation bit number binary characters before truncation are reserved, and the rest substrings are reserved.
5. The video piracy tracing method of claim 4, wherein the head truncated bit number has a calculation formula:
M 0 =len(S')%(L*D);
wherein ,M 0 representing the number of head truncations, len () representing a sequence length acquisition function, S' representing the binary sequence string subjected to tail substring truncations,Lrepresenting the length of the string of binary sequences,Dindicating the set slice duration.
6. The video piracy tracing method according to claim 2, wherein in S4, obtaining the compressed binary string comprises:
and in the truncated binary string, the set slicing time length is used as a compression number, and the compression number of adjacent binary characters is compressed into one-bit binary characters until the truncated binary string is traversed, so that the compressed binary string is obtained.
7. The video piracy tracing method of claim 1, further comprising: a user requests to play a video interaction stage; the interaction phase comprises:
step 1: injecting video content;
step 2: performing transcoding preprocessing and packaging on the video content, and distributing the processed video content;
step 3: receiving an authentication request with user information and generating a session token; splicing the session token to the play address of the processed video content, and returning the session token to the user;
step 4: receiving a play request of a user, and determining a returned slice file according to the type of the play request and a play address spliced with a session token; and inserting 0/1 value into the slice file based on the set time interval to form a binary string corresponding to the slice file.
8. The method for video piracy tracing according to claim 7, wherein said determining the returned slice file according to the type of the play request and the play address spliced with the session token comprises:
the types of the play requests comprise an index file request, a metadata file request, an audio slice file request and a video slice file request;
the address of the video slice file request is a play address with a session token spliced with the serial number of the requested video slice file;
when the type of the playing request is an index file request or a metadata file request or an audio slice file request, replacing a session token in the playing address spliced with the session token with a path where video content is stored to obtain a first playing address; searching a first clip file according to the first play address, and returning the first clip file to a user;
when the type of the play request is a video slice file request, extracting a session token in a play address spliced with the session token, and decrypting the session token to obtain a session token binary string; extracting the sequence number of the requested video slice file, calculating a modulus result based on the session token binary string and the sequence number, taking the modulus result as an index value of the session token binary string, and reading a corresponding binary character; when the binary character is 0, replacing a session token in the address of the video slice file request with a path where video content is stored to obtain a second play address, and when the binary character is 1, replacing the session token in the address of the video slice file request with the path where video content is stored to obtain a third play address, and adding a prefix to the file name of the video slice file in the video slice file request; and searching a second slice file according to the second playing address or the third playing address, and returning the second slice file to the user.
9. A video piracy tracing system, characterized by being applied to the video piracy tracing method of any one of claims 7-8;
the traceability system comprises:
the system comprises a transcoding preprocessing and packaging module, a session management module, a content distribution module, a content and user management module and a traceability detection module;
the transcoding preprocessing and packaging module is used for performing transcoding preprocessing and packaging on the video content and reporting the processed video content to the content distribution module;
the session management module is used for creating and managing session information in the video content distribution process;
the content distribution module is used for scheduling a distribution strategy of video content in real time according to the session information;
the content and user management module is used for video content injection and management of subscribing users;
the tracing detection module is used for tracing user information corresponding to the pirated video.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310716210.XA CN116456154B (en) | 2023-06-16 | 2023-06-16 | Video piracy tracing method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310716210.XA CN116456154B (en) | 2023-06-16 | 2023-06-16 | Video piracy tracing method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116456154A CN116456154A (en) | 2023-07-18 |
CN116456154B true CN116456154B (en) | 2023-09-01 |
Family
ID=87127732
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310716210.XA Active CN116456154B (en) | 2023-06-16 | 2023-06-16 | Video piracy tracing method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116456154B (en) |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101364871A (en) * | 2007-08-10 | 2009-02-11 | 华为技术有限公司 | Method, system and apparatus for domain manager to carry out domain management to user equipment |
KR20100062111A (en) * | 2008-12-01 | 2010-06-10 | 주식회사 케이티 | Apparatus for watermarking by dividing off tracking information and method therefor |
CN106027959A (en) * | 2016-05-13 | 2016-10-12 | 深圳先进技术研究院 | Video recognizing-tracking-positioning system based on position linear fitting |
WO2016184229A1 (en) * | 2015-05-15 | 2016-11-24 | 乐视云计算有限公司 | Method and system for recording live video |
CN106936770A (en) * | 2015-12-30 | 2017-07-07 | 玲珑视界科技(北京)有限公司 | A kind of HLS index lists encrypted antitheft catenary system and method |
CN110856047A (en) * | 2019-12-05 | 2020-02-28 | 湖南省农业信息与工程研究所 | Decomposition method of traceability video file, streaming media server and client |
CN111510775A (en) * | 2020-05-11 | 2020-08-07 | 知安视娱(南京)科技有限公司 | Digital copyright management and watermark tracking method and system for set top box video in IPTV |
US11051064B1 (en) * | 2018-12-27 | 2021-06-29 | Michael Kureth | System and process of adaptive video streaming service with anti-piracy tracking providing a unique version of a movie customized by artificial intelligence and tailored specifically for each person or group of people watching |
US11212595B1 (en) * | 2020-08-17 | 2021-12-28 | Cognizant Technology Solutions India Pvt. Ltd. | System and method for watermarking over the top (OTT) content delivered through OTT platform |
CN114242111A (en) * | 2021-11-03 | 2022-03-25 | 阿里巴巴(中国)有限公司 | Audio processing method and device, storage medium and electronic equipment |
CN114417268A (en) * | 2021-11-12 | 2022-04-29 | 上海观安信息技术股份有限公司 | Method and device for watermark encryption and tracing user disclosure and computer storage medium |
CN114756835A (en) * | 2022-04-21 | 2022-07-15 | 中央宣传部电影技术质量检测所 | Cinema film piracy tracing method and system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2961157A1 (en) * | 2014-06-23 | 2015-12-30 | Thomson Licensing | Message inserting method in a rendering of a video content by a display device, reading method, devices and programs associated |
-
2023
- 2023-06-16 CN CN202310716210.XA patent/CN116456154B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101364871A (en) * | 2007-08-10 | 2009-02-11 | 华为技术有限公司 | Method, system and apparatus for domain manager to carry out domain management to user equipment |
KR20100062111A (en) * | 2008-12-01 | 2010-06-10 | 주식회사 케이티 | Apparatus for watermarking by dividing off tracking information and method therefor |
WO2016184229A1 (en) * | 2015-05-15 | 2016-11-24 | 乐视云计算有限公司 | Method and system for recording live video |
CN106936770A (en) * | 2015-12-30 | 2017-07-07 | 玲珑视界科技(北京)有限公司 | A kind of HLS index lists encrypted antitheft catenary system and method |
CN106027959A (en) * | 2016-05-13 | 2016-10-12 | 深圳先进技术研究院 | Video recognizing-tracking-positioning system based on position linear fitting |
US11051064B1 (en) * | 2018-12-27 | 2021-06-29 | Michael Kureth | System and process of adaptive video streaming service with anti-piracy tracking providing a unique version of a movie customized by artificial intelligence and tailored specifically for each person or group of people watching |
CN110856047A (en) * | 2019-12-05 | 2020-02-28 | 湖南省农业信息与工程研究所 | Decomposition method of traceability video file, streaming media server and client |
CN111510775A (en) * | 2020-05-11 | 2020-08-07 | 知安视娱(南京)科技有限公司 | Digital copyright management and watermark tracking method and system for set top box video in IPTV |
US11212595B1 (en) * | 2020-08-17 | 2021-12-28 | Cognizant Technology Solutions India Pvt. Ltd. | System and method for watermarking over the top (OTT) content delivered through OTT platform |
CN114242111A (en) * | 2021-11-03 | 2022-03-25 | 阿里巴巴(中国)有限公司 | Audio processing method and device, storage medium and electronic equipment |
CN114417268A (en) * | 2021-11-12 | 2022-04-29 | 上海观安信息技术股份有限公司 | Method and device for watermark encryption and tracing user disclosure and computer storage medium |
CN114756835A (en) * | 2022-04-21 | 2022-07-15 | 中央宣传部电影技术质量检测所 | Cinema film piracy tracing method and system |
Non-Patent Citations (1)
Title |
---|
大融合时代下有线电视产业数字化传播之路新思考;杜洋;;广播电视信息(03);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN116456154A (en) | 2023-07-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8055899B2 (en) | Systems and methods using digital watermarking and identifier extraction to provide promotional opportunities | |
US20190243948A1 (en) | Method and apparatus for delivering encoded content | |
US7379549B2 (en) | Access control for digital content | |
JP4679093B2 (en) | Access control for digital content | |
US7478238B2 (en) | Access control for digital video stream data | |
EP2109248B1 (en) | Method and device for testing consistency of numeric contents | |
Kalker et al. | Music2Share-copyright-compliant music sharing in P2P systems | |
US20110231436A1 (en) | Associating rights to multimedia content | |
US20050025316A1 (en) | Access control for digital content | |
JP5557897B2 (en) | Digital media content protection system and method | |
CN1771487A (en) | Method and apparatus for limiting number of times contents can be accessed using hashing chain | |
US20060195837A1 (en) | Synchronized-download version manager (S-DVM) | |
JP4666302B2 (en) | Access control for digital content | |
US9275401B2 (en) | Tamper resistant video rendering | |
US20220284130A1 (en) | Content Playlist Integrity | |
Augot et al. | Secure delivery of images over open networks | |
US20120210447A1 (en) | Secure video download method | |
CN116456154B (en) | Video piracy tracing method and system | |
US20050038999A1 (en) | Access control for digital content | |
Koukopoulos et al. | Security in collaborative multimedia web-based art projects | |
WO2010113040A2 (en) | Watermarking method and system | |
Guo | Research on the Video Copyright Protection | |
US8656499B1 (en) | Client-side bit-stripping system and method | |
KR100587530B1 (en) | Apparatus for and Method of Protecting Streamed ASF Files | |
CN117579905A (en) | Object management method based on multimedia data and related equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |