CN116456154B - Video piracy tracing method and system - Google Patents

Video piracy tracing method and system Download PDF

Info

Publication number
CN116456154B
CN116456154B CN202310716210.XA CN202310716210A CN116456154B CN 116456154 B CN116456154 B CN 116456154B CN 202310716210 A CN202310716210 A CN 202310716210A CN 116456154 B CN116456154 B CN 116456154B
Authority
CN
China
Prior art keywords
video
binary
string
address
session
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310716210.XA
Other languages
Chinese (zh)
Other versions
CN116456154A (en
Inventor
韦月飞
杨宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen SDMC Technology Co Ltd
Original Assignee
Shenzhen SDMC Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen SDMC Technology Co Ltd filed Critical Shenzhen SDMC Technology Co Ltd
Priority to CN202310716210.XA priority Critical patent/CN116456154B/en
Publication of CN116456154A publication Critical patent/CN116456154A/en
Application granted granted Critical
Publication of CN116456154B publication Critical patent/CN116456154B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
    • H04N21/4402Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving reformatting operations of video signals for household redistribution, storage or real-time display
    • H04N21/440218Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving reformatting operations of video signals for household redistribution, storage or real-time display by transcoding between formats or standards, e.g. from MPEG-2 to MPEG-4
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
    • H04N21/44008Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving operations for analysing video streams, e.g. detecting features or characteristics in the video stream
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/845Structuring of content, e.g. decomposing content into time segments
    • H04N21/8456Structuring of content, e.g. decomposing content into time segments by decomposing the content in the time domain, e.g. in time segments
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/103Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measure for protecting copy right
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2463/00Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
    • H04L2463/146Tracing the source of attacks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The application relates to a video piracy tracing method and a system, wherein the method comprises the following steps: acquiring an address of a pirated video, and downloading the pirated video according to the address of the pirated video; the pirated video is inserted with 0/1 value based on the set time interval; extracting 0/1 value inserted in pirated video through inverse transformation to obtain binary sequence string; cutting off the binary sequence string based on the set binary string and the set slicing time length to obtain a cut binary string; compressing the cut binary string based on the set slicing time length to obtain a compressed binary string; and determining the session number of the video played by the user based on the compressed binary string, and determining the user information corresponding to the pirated video based on the session number. The tracing method can realize tracing of pirated content, further effectively hit piracy and maintain legal rights and interests of a content copyright party to a greater extent.

Description

Video piracy tracing method and system
Technical Field
The application relates to the technical field of video piracy tracing, in particular to a video piracy tracing method and system.
Background
In recent years, with the development of the internet, people have become more and more convenient and faster to watch videos through the internet, but with the flooding of pirated contents, the cost of pirated resource propagation has become lower and lower due to the development of the internet and the diversity of file transmission. Although many copyrighted content operators currently incur significant costs for content protection, such as through digital rights management @, for exampleDigital Rights Management, DRM) Techniques to protect content copyrights in which caseOnly legitimate users are authorized to view the video. Even so, the content still has a risk of leakage: the legal user records the video through the recording screen in the process of watching the video, so that a copy of the original content can be obtained, and the user can issue the copy to other networks with the recorded copy, thereby achieving the purpose of piracy. In this case, even if the content copyright party can find the corresponding pirated content in time, the content copyright party cannot trace back the users who leak and pirate the content, so that legal responsibility of the pirated users cannot be pursued.
Disclosure of Invention
Based on this, there is a need to provide a video piracy tracing method, which includes:
s1: acquiring an address of a pirated video, and downloading the pirated video according to the address of the pirated video; the pirated video is inserted with a 0/1 value based on a set time interval;
s2: extracting 0/1 value inserted in the pirated video through inverse transformation to obtain a binary sequence string;
s3: cutting the binary sequence string based on the set binary string and the set slicing time length to obtain a cut binary string;
s4: compressing the truncated binary string based on the set slicing time length to obtain a compressed binary string;
s5: and determining the session number of the video played by the user based on the compressed binary string, and determining the user information corresponding to the pirated video based on the session number.
Preferably, in S3, obtaining the truncated binary string includes:
s3.1: performing tail sub-string truncation processing on the binary sequence string based on the set binary string;
s3.2: performing head substring truncation processing on the binary sequence string subjected to tail substring truncation processing based on the set slicing time length;
s3.3: and reserving the rest sub-strings, wherein the rest sub-strings are the truncated binary strings.
Preferably, the performing tail sub-string truncation processing on the binary sequence string based on the set binary string includes:
s3.1.1: traversing the binary sequence strings from right to left until the set binary strings are searched for the first time, and stopping traversing;
s3.1.2: and cutting off the searched sub-strings after the set binary string in the binary sequence string, and reserving the rest sub-strings.
Preferably, the performing head sub-string truncation processing on the binary sequence string subjected to the tail sub-string truncation processing based on the set slice duration includes:
s3.2.1: calculating a head truncated bit number based on the length of the binary sequence string and the set slicing time length;
s3.2.2: and in the binary sequence string subjected to tail substring truncation processing, the head truncation bit number binary characters before truncation are reserved, and the rest substrings are reserved.
Preferably, the calculation formula of the head truncated number of bits is:
M 0 =len(S')%(L*D);
wherein ,M 0 representing the number of head truncations, len () representing a sequence length acquisition function, S' representing the binary sequence string subjected to tail substring truncations,Lrepresenting the length of the string of binary sequences,Dindicating the set slice duration.
Preferably, in S4, obtaining the compressed binary string includes:
and in the truncated binary string, the set slicing time length is used as a compression number, and the compression number of adjacent binary characters is compressed into one-bit binary characters until the truncated binary string is traversed, so that the compressed binary string is obtained.
Preferably, in S5, the method includes:
step 1: converting the compressed binary string into a decimal number, and taking the decimal number as a session number of a user for playing video;
step 2: and searching the corresponding user information in the database according to the session number, namely the user information corresponding to the pirated video.
Preferably, the method further comprises: a user requests to play a video interaction stage; the interaction phase comprises:
step 1: injecting video content;
step 2: performing transcoding preprocessing and packaging on the video content, and distributing the processed video content;
step 3: receiving an authentication request with user information and generating a session token; splicing the session token to the play address of the processed video content, and returning the session token to the user;
step 4: receiving a play request of a user, and determining a returned slice file according to the type of the play request and a play address spliced with a session token; and inserting 0/1 value into the slice file based on the set time interval to form a binary string corresponding to the slice file.
Preferably, the determining the returned slice file according to the type of the play request and the play address spliced with the session token includes:
the types of the play requests comprise an index file request, a metadata file request, an audio slice file request and a video slice file request;
the address of the video slice file request is a play address with a session token spliced with the serial number of the requested video slice file;
when the type of the playing request is an index file request or a metadata file request or an audio slice file request, replacing a session token in the playing address spliced with the session token with a path where video content is stored to obtain a first playing address; searching a first clip file according to the first play address, and returning the first clip file to a user;
when the type of the play request is a video slice file request, extracting a session token in a play address spliced with the session token, and decrypting the session token to obtain a session token binary string; extracting the sequence number of the requested video slice file, calculating a modulus result based on the session token binary string and the sequence number, taking the modulus result as an index value of the session token binary string, and reading a corresponding binary character; when the binary character is 0, replacing a session token in the address of the video slice file request with a path where video content is stored to obtain a second play address, and when the binary character is 1, replacing the session token in the address of the video slice file request with the path where video content is stored to obtain a third play address, and adding a prefix to the file name of the video slice file in the video slice file request; and searching a second slice file according to the second playing address or the third playing address, and returning the second slice file to the user.
The application also provides a video piracy tracing system which is applied to the video piracy tracing method;
the traceability system comprises:
the system comprises a transcoding preprocessing and packaging module, a session management module, a content distribution module, a content and user management module and a traceability detection module;
the transcoding preprocessing and packaging module is used for performing transcoding preprocessing and packaging on the video content and reporting the processed video content to the content distribution module;
the session management module is used for creating and managing session information in the video content distribution process;
the content distribution module is used for scheduling a distribution strategy of video content in real time according to the session information;
the content and user management module is used for video content injection and management of subscribing users;
the tracing detection module is used for tracing user information corresponding to the pirated video.
The beneficial effects are that: the tracing method can realize tracing of pirated content, further effectively hit piracy and maintain legal rights and interests of a content copyright party to a greater extent.
Drawings
In order to more clearly illustrate the embodiments of the application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flowchart of a video piracy tracing method according to an embodiment of the application.
Fig. 2 is a schematic diagram of a video piracy tracing system according to an embodiment of the application.
Detailed Description
In order that the above objects, features and advantages of the application will be readily understood, a more particular description of the application will be rendered by reference to the appended drawings. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present application. The present application may be embodied in many other forms than described herein and similarly modified by those skilled in the art without departing from the spirit of the application, whereby the application is not limited to the specific embodiments disclosed below.
Furthermore, the terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In the description of the present application, the meaning of "plurality" means at least two, for example, two, three, etc., unless specifically defined otherwise.
As shown in fig. 1, this embodiment provides a video piracy tracing method, which includes:
s1: acquiring an address of a pirated video, and downloading the pirated video according to the address of the pirated video; the pirated video is inserted with a 0/1 value based on a set time interval;
in the present embodiment, the set time interval is 1 second.
S2: extracting 0/1 value inserted in the pirated video through inverse transformation to obtain a binary sequence string;
let binary sequence string be:
“111111000000000000000000000000111111000000111111000000000000111111000000000000000000000000111111000000”;
s3: cutting the binary sequence string based on the set binary string and the set slicing time length to obtain a cut binary string;
specifically, obtaining the truncated binary string includes:
s3.1: performing tail sub-string truncation processing on the binary sequence string based on the set binary string;
further, the performing tail sub-string truncation processing on the binary sequence string based on the set binary string includes:
s3.1.1: traversing the binary sequence strings from right to left until the set binary strings are searched for the first time, and stopping traversing;
the binary string is set as follows: "111111000000000000";
s3.1.2: and cutting off the searched sub-strings after the set binary string in the binary sequence string, and reserving the rest sub-strings.
The remaining substrings are:
“111111000000000000000000000000111111000000111111000000000000111111000000000000”;
s3.2: performing head substring truncation processing on the binary sequence string subjected to tail substring truncation processing based on the set slicing time length;
further, the performing head sub-string truncation processing on the binary sequence string subjected to the tail sub-string truncation processing based on the set slice duration includes:
s3.2.1: calculating a head truncated bit number based on the length of the binary sequence string and the set slicing time length;
further, the calculation formula of the head truncated bit number is:
M 0 =len(S')%(L*D);
wherein ,M 0 representing the number of head truncations, len () representing a sequence length acquisition function, S' representing the binary sequence string subjected to tail substring truncations,Lrepresenting the length of the string of binary sequences,Dindicating the set slice duration. In the present embodiment of the present application, in the present embodiment,L=10,D=6, len (S')=78, givingM 0 =18;
S3.2.2: and in the binary sequence string subjected to tail substring truncation processing, the head truncation bit number binary characters before truncation are reserved, and the rest substrings are reserved.
The remaining substrings are:
“000000000000111111000000111111000000000000111111000000000000”;
s3.3: and reserving the rest sub-strings, wherein the rest sub-strings are the truncated binary strings.
S4: compressing the truncated binary string based on the set slicing time length to obtain a compressed binary string;
specifically, obtaining the compressed binary string includes:
and in the truncated binary string, the set slicing time length is used as a compression number, and the compression number of adjacent binary characters is compressed into one-bit binary characters until the truncated binary string is traversed, so that the compressed binary string is obtained.
In the present embodiment, the set slice period is 6 seconds, so the compression amount is 6; the compressed binary string is: "0010100100";
s5: and determining the session number of the video played by the user based on the compressed binary string, and determining the user information corresponding to the pirated video based on the session number.
In particular, the method comprises the steps of,
step 1: converting the compressed binary string into a decimal number, and taking the decimal number as a session number of a user for playing video;
step 2: and searching the corresponding user information in the database according to the session number, namely the user information corresponding to the pirated video.
In this embodiment, the method further includes: a user requests to play a video interaction stage;
the interaction phase comprises:
step 1: injecting video content;
step 2: performing transcoding preprocessing and packaging on the video content, and distributing the processed video content;
step 3: receiving an authentication request with user information and generating a session token; splicing the session token to the play address of the processed video content, and returning the session token to the user;
in this embodiment, the session ticket must be inserted into the URI portion of the play address, i.e., after the first slash and before the second slash, to avoid losing parameters during the request. For example, the original play address is:https:// edge.cdn.com.net/index.m3u8, the play address returned after splicing is as follows:https:// edge.cdn.com.net/SESSIONTOKEN/index.m3u8。
step 4: receiving a play request of a user, and determining a returned slice file according to the type of the play request and a play address spliced with a session token; and inserting 0/1 value into the slice file based on the set time interval to form a binary string corresponding to the slice file.
In this embodiment, since the duration of each slice file is 6 seconds, and each slice file is inserted with one 0/1 every 1 second, when the user plays 60 seconds of video, the corresponding binary string in the returned slice file is as follows:
“000000000000111111000000111111000000000000111111000000000000”。
further, the determining the returned slice file according to the type of the play request and the play address spliced with the session token includes:
the types of the play requests comprise an index file request, a metadata file request, an audio slice file request and a video slice file request;
the address of the video slice file request is a play address with a session token spliced with the serial number of the requested video slice file;
when the type of the playing request is an index file request or a metadata file request or an audio slice file request, replacing a session token in the playing address spliced with the session token with a path where video content is stored to obtain a first playing address; searching a first clip file according to the first play address, and returning the first clip file to a user;
when the type of the play request is a video slice file request, extracting a session token in a play address spliced with the session token, and decrypting the session token to obtain a session token binary string; extracting the sequence number of the requested video slice file, calculating a modulus result based on the session token binary string and the sequence number, taking the modulus result as an index value of the session token binary string, and reading a corresponding binary character; when the binary character is 0, replacing a session token in the address of the video slice file request with a path where video content is stored to obtain a second play address, and when the binary character is 1, replacing the session token in the address of the video slice file request with the path where video content is stored to obtain a third play address, and adding a prefix to the file name of the video slice file in the video slice file request; and searching a second slice file according to the second playing address or the third playing address, and returning the second slice file to the user.
As shown in fig. 2, the present embodiment further provides a video piracy tracing system, where the system is applied to the video piracy tracing method described above;
the traceability system comprises:
the system comprises a transcoding preprocessing and packaging module, a session management module, a content distribution module, a content and user management module and a traceability detection module;
the transcoding pretreatment and packaging moduleTranscoding and Packaging, TP) The video content processing module is used for carrying out transcoding preprocessing and packaging on the video content and reporting the processed video content to the content distribution module;
specifically, in the transcoding preprocessing and packaging module, first performingGOP (Group Of Pictures) Alignment is completedGOPAfter alignment, the alignment is performed by spatial transformationGOPAnd performing 0 and 1 insertion operations on the aligned video files respectively, wherein the insertion operations are performed once every 1 second, and finally, two video files of 0/1 variant are obtained. Assume that the original file injected issource.mp4For 30 seconds, and setGOPFor 3 seconds, finishGOPAfter alignment, obtainsource_align.mp4For a pair ofsource_align.mp4Respectively performing 0/1 insertion operation to obtain 0/1 variant output filessource_align_ 0.mp4Andsource_align_1.mp4. Next, respectively tosource_align_0.mp4Andsource_align_1.mp4packaging and outputting, setting the slicing time length to be 6 seconds,source_align_0.mp4the naming rules of the video slice files which are packaged and output are as follows: [PREFIX-]$Number$.m4ssource_align_1.mp4The naming rules of the video slice files which are packaged and output are as follows: [PREFIX-]b-$Number$.m4s, wherein ,PREFIX-is an optional prefix string.
In addition, the transcoding preprocessing and packaging module can carry out unique identification of the content after completing content packaging and uploadingCIDPackaging slice output slice durationDURATIONAnd resolution size of contentSIZEReporting to a session management module.
The session management moduleSession Manager, SM) The method is used for creating and managing session information in the video content distribution process;
specifically, before a user is authorized to play content, the user needs to request play authentication from the background of the content and user management module, at this time, the background of the content and user management module requests a session token from the session management module, and at the same time, the session token carries related information of a unique identifier user, and after receiving the request, the session management module generates and creates the session token according to the following steps:
step 1: performing hash calculation on the user information, and performing HEX coding on the hash result to obtainHIDAccording toHIDAnd (3) inquiring the database, confirming whether the session number exists or not, if not, turning to the step (2), otherwise turning to the step (3).
Step 2: creating globally unique session numbers, withHIDForming a one-to-one correspondence, the created session numbers need to satisfy the following conditions: (1) the low three bits of the session number binary string must be 100; (2) consecutive 1's cannot occur in the session number binary string. For example, 10100100 is a legal session number binary string and 10110100 is not a legal session number binary string. And after the binary string of the session number is obtained, carrying out left zero padding according to the set alignment length of the binary string to obtain the final binary character string of the session number. For example, the session number binary string is 10100100, and if the length of the aligned binary string is 10, the session number binary string obtained by zero padding on the left side is 0010100100.
Step 3: and (3) encrypting the session number binary string obtained in the step (2), then performing BASE64 coding on the encryption result, and taking the output character string as a session token.
The content distribution moduleContent Delivery Network, CDN) A distribution strategy for scheduling video content in real time according to session information;
specifically, after receiving the returned play address, the user starts to initiate a play request, and the process of playing the request data is performed according to the following sequence: request index file → request metadata file → { request audio slice file → request video slice file }, where the request in brackets { } above indicates that it is likely to be repeated multiple times. If the request received by the content distribution module is an index file request or a metadata file request or an audio slice file request, the content distribution module directly replaces the session token with a path on which the content is stored, for example, the content storage path is: /mnt/media, original request index fileIs addressed tohttps://edge.cdn.com.net/SESSIONTOKEN/index.m3u8, replacing the session token to obtain a new address:https://edge.cdn.com.net/mnt/media/index.m3uand 8, the WEB service of the content distribution module can find the file to be read according to the first playing address and returns the file.
The content and user management moduleBack Office System, BO) The method is used for video content injection and subscription user management;
the tracing detection moduleDetecting Module, DM) The method is used for tracing the user information corresponding to the pirated video.
The technical features of the above-described embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above-described embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples illustrate only a few embodiments of the application, which are described in detail and are not to be construed as limiting the scope of the claims. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of protection of the present application is to be determined by the appended claims.

Claims (9)

1. The video piracy tracing method is characterized by comprising the following steps of:
s1: acquiring an address of a pirated video, and downloading the pirated video according to the address of the pirated video; the pirated video is inserted with a 0/1 value based on a set time interval;
s2: extracting 0/1 value inserted in the pirated video through inverse transformation to obtain a binary sequence string;
s3: cutting the binary sequence string based on the set binary string and the set slicing time length to obtain a cut binary string;
s4: compressing the truncated binary string based on the set slicing time length to obtain a compressed binary string;
s5: determining a session number of a user playing the video based on the compressed binary string, and determining user information corresponding to the pirated video based on the session number;
converting the compressed binary string into a decimal number, and taking the decimal number as a session number of a user for playing video;
and searching the corresponding user information in the database according to the session number, namely the user information corresponding to the pirated video.
2. The video piracy tracing method according to claim 1, wherein in S3, obtaining the truncated binary string comprises:
s3.1: performing tail sub-string truncation processing on the binary sequence string based on the set binary string;
s3.2: performing head substring truncation processing on the binary sequence string subjected to tail substring truncation processing based on the set slicing time length;
s3.3: and reserving the rest sub-strings, wherein the rest sub-strings are the truncated binary strings.
3. The video piracy tracing method according to claim 2, wherein said performing tail sub-string truncation processing on said binary sequence string based on said set binary string comprises:
s3.1.1: traversing the binary sequence strings from right to left until the set binary strings are searched for the first time, and stopping traversing;
s3.1.2: and cutting off the searched sub-strings after the set binary string in the binary sequence string, and reserving the rest sub-strings.
4. A video piracy tracing method according to claim 3, wherein said performing head sub-string truncation processing on said binary sequence string subjected to tail sub-string truncation processing based on said set slice duration comprises:
s3.2.1: calculating a head truncated bit number based on the length of the binary sequence string and the set slicing time length;
s3.2.2: and in the binary sequence string subjected to tail substring truncation processing, the head truncation bit number binary characters before truncation are reserved, and the rest substrings are reserved.
5. The video piracy tracing method of claim 4, wherein the head truncated bit number has a calculation formula:
M 0 =len(S')%(L*D);
wherein ,M 0 representing the number of head truncations, len () representing a sequence length acquisition function, S' representing the binary sequence string subjected to tail substring truncations,Lrepresenting the length of the string of binary sequences,Dindicating the set slice duration.
6. The video piracy tracing method according to claim 2, wherein in S4, obtaining the compressed binary string comprises:
and in the truncated binary string, the set slicing time length is used as a compression number, and the compression number of adjacent binary characters is compressed into one-bit binary characters until the truncated binary string is traversed, so that the compressed binary string is obtained.
7. The video piracy tracing method of claim 1, further comprising: a user requests to play a video interaction stage; the interaction phase comprises:
step 1: injecting video content;
step 2: performing transcoding preprocessing and packaging on the video content, and distributing the processed video content;
step 3: receiving an authentication request with user information and generating a session token; splicing the session token to the play address of the processed video content, and returning the session token to the user;
step 4: receiving a play request of a user, and determining a returned slice file according to the type of the play request and a play address spliced with a session token; and inserting 0/1 value into the slice file based on the set time interval to form a binary string corresponding to the slice file.
8. The method for video piracy tracing according to claim 7, wherein said determining the returned slice file according to the type of the play request and the play address spliced with the session token comprises:
the types of the play requests comprise an index file request, a metadata file request, an audio slice file request and a video slice file request;
the address of the video slice file request is a play address with a session token spliced with the serial number of the requested video slice file;
when the type of the playing request is an index file request or a metadata file request or an audio slice file request, replacing a session token in the playing address spliced with the session token with a path where video content is stored to obtain a first playing address; searching a first clip file according to the first play address, and returning the first clip file to a user;
when the type of the play request is a video slice file request, extracting a session token in a play address spliced with the session token, and decrypting the session token to obtain a session token binary string; extracting the sequence number of the requested video slice file, calculating a modulus result based on the session token binary string and the sequence number, taking the modulus result as an index value of the session token binary string, and reading a corresponding binary character; when the binary character is 0, replacing a session token in the address of the video slice file request with a path where video content is stored to obtain a second play address, and when the binary character is 1, replacing the session token in the address of the video slice file request with the path where video content is stored to obtain a third play address, and adding a prefix to the file name of the video slice file in the video slice file request; and searching a second slice file according to the second playing address or the third playing address, and returning the second slice file to the user.
9. A video piracy tracing system, characterized by being applied to the video piracy tracing method of any one of claims 7-8;
the traceability system comprises:
the system comprises a transcoding preprocessing and packaging module, a session management module, a content distribution module, a content and user management module and a traceability detection module;
the transcoding preprocessing and packaging module is used for performing transcoding preprocessing and packaging on the video content and reporting the processed video content to the content distribution module;
the session management module is used for creating and managing session information in the video content distribution process;
the content distribution module is used for scheduling a distribution strategy of video content in real time according to the session information;
the content and user management module is used for video content injection and management of subscribing users;
the tracing detection module is used for tracing user information corresponding to the pirated video.
CN202310716210.XA 2023-06-16 2023-06-16 Video piracy tracing method and system Active CN116456154B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310716210.XA CN116456154B (en) 2023-06-16 2023-06-16 Video piracy tracing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310716210.XA CN116456154B (en) 2023-06-16 2023-06-16 Video piracy tracing method and system

Publications (2)

Publication Number Publication Date
CN116456154A CN116456154A (en) 2023-07-18
CN116456154B true CN116456154B (en) 2023-09-01

Family

ID=87127732

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310716210.XA Active CN116456154B (en) 2023-06-16 2023-06-16 Video piracy tracing method and system

Country Status (1)

Country Link
CN (1) CN116456154B (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101364871A (en) * 2007-08-10 2009-02-11 华为技术有限公司 Method, system and apparatus for domain manager to carry out domain management to user equipment
KR20100062111A (en) * 2008-12-01 2010-06-10 주식회사 케이티 Apparatus for watermarking by dividing off tracking information and method therefor
CN106027959A (en) * 2016-05-13 2016-10-12 深圳先进技术研究院 Video recognizing-tracking-positioning system based on position linear fitting
WO2016184229A1 (en) * 2015-05-15 2016-11-24 乐视云计算有限公司 Method and system for recording live video
CN106936770A (en) * 2015-12-30 2017-07-07 玲珑视界科技(北京)有限公司 A kind of HLS index lists encrypted antitheft catenary system and method
CN110856047A (en) * 2019-12-05 2020-02-28 湖南省农业信息与工程研究所 Decomposition method of traceability video file, streaming media server and client
CN111510775A (en) * 2020-05-11 2020-08-07 知安视娱(南京)科技有限公司 Digital copyright management and watermark tracking method and system for set top box video in IPTV
US11051064B1 (en) * 2018-12-27 2021-06-29 Michael Kureth System and process of adaptive video streaming service with anti-piracy tracking providing a unique version of a movie customized by artificial intelligence and tailored specifically for each person or group of people watching
US11212595B1 (en) * 2020-08-17 2021-12-28 Cognizant Technology Solutions India Pvt. Ltd. System and method for watermarking over the top (OTT) content delivered through OTT platform
CN114242111A (en) * 2021-11-03 2022-03-25 阿里巴巴(中国)有限公司 Audio processing method and device, storage medium and electronic equipment
CN114417268A (en) * 2021-11-12 2022-04-29 上海观安信息技术股份有限公司 Method and device for watermark encryption and tracing user disclosure and computer storage medium
CN114756835A (en) * 2022-04-21 2022-07-15 中央宣传部电影技术质量检测所 Cinema film piracy tracing method and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2961157A1 (en) * 2014-06-23 2015-12-30 Thomson Licensing Message inserting method in a rendering of a video content by a display device, reading method, devices and programs associated

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101364871A (en) * 2007-08-10 2009-02-11 华为技术有限公司 Method, system and apparatus for domain manager to carry out domain management to user equipment
KR20100062111A (en) * 2008-12-01 2010-06-10 주식회사 케이티 Apparatus for watermarking by dividing off tracking information and method therefor
WO2016184229A1 (en) * 2015-05-15 2016-11-24 乐视云计算有限公司 Method and system for recording live video
CN106936770A (en) * 2015-12-30 2017-07-07 玲珑视界科技(北京)有限公司 A kind of HLS index lists encrypted antitheft catenary system and method
CN106027959A (en) * 2016-05-13 2016-10-12 深圳先进技术研究院 Video recognizing-tracking-positioning system based on position linear fitting
US11051064B1 (en) * 2018-12-27 2021-06-29 Michael Kureth System and process of adaptive video streaming service with anti-piracy tracking providing a unique version of a movie customized by artificial intelligence and tailored specifically for each person or group of people watching
CN110856047A (en) * 2019-12-05 2020-02-28 湖南省农业信息与工程研究所 Decomposition method of traceability video file, streaming media server and client
CN111510775A (en) * 2020-05-11 2020-08-07 知安视娱(南京)科技有限公司 Digital copyright management and watermark tracking method and system for set top box video in IPTV
US11212595B1 (en) * 2020-08-17 2021-12-28 Cognizant Technology Solutions India Pvt. Ltd. System and method for watermarking over the top (OTT) content delivered through OTT platform
CN114242111A (en) * 2021-11-03 2022-03-25 阿里巴巴(中国)有限公司 Audio processing method and device, storage medium and electronic equipment
CN114417268A (en) * 2021-11-12 2022-04-29 上海观安信息技术股份有限公司 Method and device for watermark encryption and tracing user disclosure and computer storage medium
CN114756835A (en) * 2022-04-21 2022-07-15 中央宣传部电影技术质量检测所 Cinema film piracy tracing method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
大融合时代下有线电视产业数字化传播之路新思考;杜洋;;广播电视信息(03);全文 *

Also Published As

Publication number Publication date
CN116456154A (en) 2023-07-18

Similar Documents

Publication Publication Date Title
US8055899B2 (en) Systems and methods using digital watermarking and identifier extraction to provide promotional opportunities
US20190243948A1 (en) Method and apparatus for delivering encoded content
US7379549B2 (en) Access control for digital content
JP4679093B2 (en) Access control for digital content
US7478238B2 (en) Access control for digital video stream data
EP2109248B1 (en) Method and device for testing consistency of numeric contents
Kalker et al. Music2Share-copyright-compliant music sharing in P2P systems
US20110231436A1 (en) Associating rights to multimedia content
US20050025316A1 (en) Access control for digital content
JP5557897B2 (en) Digital media content protection system and method
CN1771487A (en) Method and apparatus for limiting number of times contents can be accessed using hashing chain
US20060195837A1 (en) Synchronized-download version manager (S-DVM)
JP4666302B2 (en) Access control for digital content
US9275401B2 (en) Tamper resistant video rendering
US20220284130A1 (en) Content Playlist Integrity
Augot et al. Secure delivery of images over open networks
US20120210447A1 (en) Secure video download method
CN116456154B (en) Video piracy tracing method and system
US20050038999A1 (en) Access control for digital content
Koukopoulos et al. Security in collaborative multimedia web-based art projects
WO2010113040A2 (en) Watermarking method and system
Guo Research on the Video Copyright Protection
US8656499B1 (en) Client-side bit-stripping system and method
KR100587530B1 (en) Apparatus for and Method of Protecting Streamed ASF Files
CN117579905A (en) Object management method based on multimedia data and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant