CN116489426B - Trusted video generation and verification system and method - Google Patents

Trusted video generation and verification system and method Download PDF

Info

Publication number
CN116489426B
CN116489426B CN202310505810.1A CN202310505810A CN116489426B CN 116489426 B CN116489426 B CN 116489426B CN 202310505810 A CN202310505810 A CN 202310505810A CN 116489426 B CN116489426 B CN 116489426B
Authority
CN
China
Prior art keywords
video
plaintext
certificate
subsystem
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310505810.1A
Other languages
Chinese (zh)
Other versions
CN116489426A (en
Inventor
杨颖�
熊行创
刘子龙
金尚忠
姜海洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National Institute of Metrology
Original Assignee
National Institute of Metrology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National Institute of Metrology filed Critical National Institute of Metrology
Priority to CN202310505810.1A priority Critical patent/CN116489426B/en
Publication of CN116489426A publication Critical patent/CN116489426A/en
Application granted granted Critical
Publication of CN116489426B publication Critical patent/CN116489426B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
    • H04N21/2343Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements
    • H04N21/234309Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements by transcoding between formats or standards, e.g. from MPEG-2 to MPEG-4 or from Quicktime to Realvideo
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
    • H04N21/4402Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving reformatting operations of video signals for household redistribution, storage or real-time display
    • H04N21/440218Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving reformatting operations of video signals for household redistribution, storage or real-time display by transcoding between formats or standards, e.g. from MPEG-2 to MPEG-4
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
    • H04N21/4408Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/77Graphical identity

Abstract

The invention discloses a trusted video generation and verification system and a trusted video generation and verification method, wherein the system comprises a video generation subsystem, a video verification subsystem, a certificate subsystem and a certificate server; the video generation subsystem is used for generating and encrypting videos; the video verification subsystem is used for verifying the credibility of the video generated by the video generation subsystem; the certificate subsystem is used for generating a private key and a public key for encryption and decryption of video; the certificate server is used for storing space-time certificate information; the video generation subsystem and the video inspection subsystem are independent of each other; the video generation subsystem and the video inspection subsystem can be connected with the certificate server through the Internet, and the invention can simultaneously superimpose plaintext and ciphertext on the premise of following SVAC standards and use certificate inspection, so that the finally obtained trusted video has higher credibility and video quality on the basis of preventing tampering.

Description

Trusted video generation and verification system and method
Technical Field
The invention relates to the technical field of monitoring, in particular to a trusted video generation and verification system and method.
Background
GB/T25724-2017 public safety video monitoring networking information safety technical requirement is published in 2017 in China, the development of domestic video data protection is promoted, and the corresponding technology is called SVAC. The SVAC technology designs an encryption and signature interface and a data format in the aspect of data protection, supports various encryption and authentication algorithms in a unified grammar format, and realizes interconnection and interworking. Meanwhile, the technical support of asymmetric and symmetric passwords is supported, a safety parameter set is perfected, the marks of abstracts and signature algorithms are added, and the carrying of key information and digital certificate information is standardized. With the development of the internet, a video acquisition system is continuously optimized, a video propagation channel is wider, new video editing and modifying tools are added, video tampering becomes more frequent, the requirements on the reliability of the video acquired by the video acquisition system are higher, and the current mainstream method for detecting the reliability of the video is mainly divided into a plaintext inspection method and a ciphertext inspection method. Meanwhile, some time and space information related to the video exists on the video, and the time and space information has the problem of serious deviation from the actual situation before generation.
The plaintext watermark information is directly superimposed on the carrier by a technical means, so that the method has the characteristics of convenience in implementation, flexibility in embedding and the like, but the plaintext watermark information is easily damaged by simple operations such as cutting and shielding due to poor concealment of the plaintext at the same time; the dark text verification is to embed some verification information into the video. The dark text inspection technique does not affect the viewing effect of the video nor does the human vision perceive the presence of dark text. By detecting the integrity of the information hidden in the video, the purposes of verifying whether the related information (such as content, holder, version information and the like) of the video is tampered or not can be achieved, but the problem that the adjustment of the video coding content can be caused in the writing process during the verification of the ciphertext, thereby influencing the video quality is also solved.
Disclosure of Invention
Aiming at the defects in the prior art, the trusted video generation and verification system and the method provided by the invention solve the problem that the credibility of the time plaintext and the space plaintext is not high when the video generated by the video acquisition module is subjected to trusted encryption and verification in the prior art.
In order to achieve the aim of the invention, the invention adopts the following technical scheme: providing a trusted video generation and verification system, wherein the trusted video generation and verification system conforms to SVAC standards and comprises a video generation subsystem, a video verification subsystem, a certificate subsystem and a certificate server;
the video generation subsystem is used for generating and encrypting videos;
the video verification subsystem is used for verifying the credibility of the video generated by the video generation subsystem;
the certificate subsystem is used for generating a private key and a public key for encryption and decryption of video;
the certificate server is used for storing space-time certificate information;
the video generation subsystem and the video inspection subsystem are independent of each other; the video generation subsystem and the video inspection subsystem can be connected with the certificate server through the Internet; the video generation subsystem is connected with the certificate subsystem through the Internet.
Further: the video generation subsystem comprises a video acquisition module, a hash encryption module, an operation module and a first transcoding module;
the video acquisition module is used for acquiring video to obtain an initial video;
the hash encryption module is used for encrypting the video image in the initial video to generate a hash value;
the operation module is used for recording time information and space information;
the first transcoding module is used for transcoding the video file and the code stream file.
Further: the video inspection subsystem comprises a second transcoding module and a signature inspection module;
the second transcoding module is used for transcoding the video file into a code stream file;
the signature verification module is used for verifying the signature file decrypted by the public key to obtain a dark text verification result.
The invention also provides a trusted video generation and verification method based on the trusted video generation and verification system, which comprises the following steps:
s1, recording an initial video, and converting the initial video into a video of a two-dimensional code of a superimposed plaintext and ciphertext;
s2, checking the video of the two-dimensional code with the superimposed plaintext and ciphertext, determining the credibility of the video, and completing the generation and the checking of the credible video.
Further: the step S1 comprises the following sub-steps:
s11, recording by using a video acquisition module to obtain an initial video;
s12, generating a hash value from a video image in the initial video through a hash encryption module;
s13, applying for a space-time certificate to a certificate server to obtain space-time certificate information, and generating a plaintext according to the time information and the space position information of the operation module to obtain a time-space plaintext when the operation module is generated;
s14, applying for a certificate unique to the video acquisition system to obtain a certificate subsystem, wherein the certificate subsystem comprises a public key and a private key, and a plaintext two-dimensional code is generated through the private key and a time space plaintext during generation;
s15, carrying out SM2 encryption on the hash values one by using a private key to obtain signature dark text;
s16, superposing the time space plaintext and the plaintext two-dimensional code on the initial video to obtain a video file of the superposition time space plaintext and the plaintext two-dimensional code;
s17, transcoding the video file of the superimposed time space plaintext and the plaintext two-dimensional code into a code stream file through a first transcoding module, reading a custom information unit in the code stream file, clearing original custom information, writing the signature ciphertext into the code stream, and transcoding the code stream file into the video file to obtain the video of the superimposed plaintext ciphertext two-dimensional code.
The beneficial effects of the above-mentioned further scheme are: on the basis of overlapping the plaintext, the method uses the certificate to verify, and uses the certificate to authenticate the time space plaintext information, thereby ensuring the credibility of the time plaintext and the space plaintext. Meanwhile, a plaintext two-dimensional code is generated, certificate information can be checked more conveniently by scanning the two-dimensional code, and compared with a scheme with only a time plaintext and a space plaintext, the scheme is more credible, and the time space certificate information is checked more conveniently through the two-dimensional code.
Further: the specific method for generating the hash value in the step S12 is as follows: when the 60 th frame of image is acquired by the video acquisition module and stored as a video, the video image is read from the 1 st frame, and when 10 frames of images are read, a data matrix of the video image is encrypted through a hash algorithm to generate a hash value.
The beneficial effects of the above-mentioned further scheme are: the invention encrypts the video image of every 10 frames by using the hidden text on the basis of overlapping the plaintext and generating a signature hidden text by using the hash algorithm and the SM2 non-opposite encryption algorithm, and compared with other methods, the invention sets the video frame number processed each time as 10, degrades the complexity of calculating the hash value, and carries out the degradation bit depth processing on the video image before carrying out the hash algorithm, thereby improving the speed of calculating the hash value while ensuring the image quality, and having higher efficiency while ensuring the credibility by reducing the calculation complexity and improving the calculation speed.
Further: the step S2 comprises the following sub-steps:
s21, scanning a plaintext two-dimensional code in the video overlapped with the plaintext dark two-dimensional code to obtain checked space-time certificate information;
s22, comparing the checked space-time certificate information with the generated space-time certificate information, and performing certificate check to obtain a certificate check result;
if the comparison results are the same, the certificate checking result is true; otherwise, the result is false;
s23, checking information recorded in a time space plaintext in the video of the two-dimensional code with the superimposed plaintext and dark text, and comparing the information with the information recorded in the time space plaintext when the information is generated to obtain a plaintext test result;
if the comparison results are the same, the plaintext test result is true; otherwise, the result is false;
s24, transcoding the video with the superimposed plaintext and ciphertext two-dimensional codes into a code stream file through a second transcoding module, and reading user-defined information in the code stream file to obtain a signature file;
s25, decrypting the obtained signature file by using the public key, and putting the decrypted signature file into a signature verification module for verification to obtain a ciphertext verification result;
the inspection method comprises the following steps: comparing the decrypted hash value calculated from the decrypted signature file with the hash value generated in step S12;
if the two types of the information are the same, the dark text inspection result is true, and if the two types of the information are different, the dark text inspection result is false.
S26, determining the credibility of the video according to the certificate checking result, the plaintext checking result and the ciphertext checking result, and completing the generation and the checking of the credible video.
Further: the method for determining the credibility of the video comprises the following steps: when the certificate test result, the plaintext test result and the ciphertext test result are all true, the video is credible; otherwise the video is not trusted.
The beneficial effects of the invention are as follows:
1) On the basis of overlapping the plaintext, the method uses the certificate to verify, and uses the certificate to authenticate the time space plaintext information, thereby ensuring the credibility of the time plaintext and the space plaintext. Meanwhile, a plaintext two-dimensional code is generated, certificate information can be checked more conveniently by scanning the two-dimensional code, and compared with a scheme with only a time plaintext and a space plaintext, the scheme is more reliable, and the time space certificate information can be checked more conveniently by the two-dimensional code;
2) The invention also uses the ciphertext to encrypt, and generates a signature ciphertext by the hash algorithm and SM2 non-opposite encryption algorithm for every 10 frames of video images, compared with other methods, the invention sets the number of video frames processed each time as 10, degrades the complexity of calculating the hash value, and carries out the degradation bit depth processing on the video images before carrying out the hash algorithm, thereby improving the speed of calculating the hash value while ensuring the image quality, and ensuring higher efficiency while ensuring the reliability by reducing the calculation complexity and improving the calculation speed.
Drawings
Fig. 1 is a schematic diagram of a trusted video generation and verification system according to the present invention.
Fig. 2 is a flow chart of a trusted video generation and verification method according to the present invention.
Detailed Description
The following description of the embodiments of the present invention is provided to facilitate understanding of the present invention by those skilled in the art, but it should be understood that the present invention is not limited to the scope of the embodiments, and all the inventions which make use of the inventive concept are protected by the spirit and scope of the present invention as defined and defined in the appended claims to those skilled in the art.
As shown in figure 1 of the drawings,
in one embodiment of the present invention, a trusted video generation and verification system is provided that complies with the SVAC standard, including a video generation subsystem, a video verification subsystem, a credential subsystem, and a credential server;
the video generation subsystem is used for generating and encrypting videos;
the video verification subsystem is used for verifying the credibility of the video generated by the video generation subsystem;
the certificate subsystem is used for generating a private key and a public key for encryption and decryption of video;
the certificate server is used for storing space-time certificate information;
the video generation subsystem and the video inspection subsystem are independent of each other; the video generation subsystem and the video inspection subsystem can be connected with the certificate server through the Internet; the video generation subsystem is connected with the certificate subsystem through the Internet.
In this embodiment, the video generation subsystem includes a video acquisition module, a hash encryption module, an operation module, and a first transcoding module;
the video acquisition module is used for acquiring video to obtain an initial video;
the hash encryption module is used for encrypting the video image in the initial video to generate a hash value;
the operation module is used for recording time information and space information;
the first transcoding module is used for transcoding the video file and the code stream file.
The video inspection subsystem comprises a second transcoding module and a signature inspection module;
the second transcoding module is used for transcoding the video file into a code stream file;
the signature verification module is used for verifying the signature file decrypted by the public key to obtain a dark text verification result.
The invention also provides a trusted video generation and verification method based on the trusted video generation and verification system, which comprises the following steps:
s1, recording an initial video, and converting the initial video into a video of a two-dimensional code of a superimposed plaintext and ciphertext;
s2, checking the video of the two-dimensional code with the superimposed plaintext and ciphertext, determining the credibility of the video, and completing the generation and the checking of the credible video.
In this embodiment, the step S1 includes the following sub-steps:
s11, recording by using a video acquisition module to obtain an initial video;
s12, generating a hash value from a video image in the initial video through a hash encryption module;
the specific method for generating the hash value comprises the following steps: when the 60 th frame of image is acquired by the video acquisition module and stored as a video, the video image is read from the 1 st frame, and when 10 frames of images are read, a data matrix of the video image is encrypted through a hash algorithm to generate a hash value;
s13, applying for a space-time certificate to a certificate server to obtain space-time certificate information, and generating a plaintext according to the time information and the space position information of the operation module to obtain a time-space plaintext when the operation module is generated;
s14, applying for a certificate unique to the video acquisition system to obtain a certificate subsystem, wherein the certificate subsystem comprises a public key and a private key, and a plaintext two-dimensional code is generated through the private key and a time space plaintext during generation;
s15, carrying out SM2 encryption on the hash values one by using a private key to obtain signature dark text;
s16, superposing the time space plaintext and the plaintext two-dimensional code on the initial video to obtain a video file of the superposition time space plaintext and the plaintext two-dimensional code;
s17, transcoding the video file of the superimposed time space plaintext and the plaintext two-dimensional code into a code stream file through a first transcoding module, reading a custom information unit in the code stream file, clearing original custom information, writing the signature ciphertext into the code stream, and transcoding the code stream file into the video file to obtain the video of the superimposed plaintext ciphertext two-dimensional code.
In this embodiment, the step S2 includes the following sub-steps:
s21, scanning a plaintext two-dimensional code in the video overlapped with the plaintext dark two-dimensional code to obtain checked space-time certificate information;
s22, comparing the checked space-time certificate information with the generated space-time certificate information, and performing certificate check to obtain a certificate check result;
if the comparison results are the same, the certificate checking result is true; otherwise, the result is false;
s23, checking information recorded in a time space plaintext in the video of the two-dimensional code with the superimposed plaintext and dark text, and comparing the information with the information recorded in the time space plaintext when the information is generated to obtain a plaintext test result;
if the comparison results are the same, the plaintext test result is true; otherwise, the result is false;
s24, transcoding the video with the superimposed plaintext and ciphertext two-dimensional codes into a code stream file through a second transcoding module, and reading user-defined information in the code stream file to obtain a signature file;
s25, decrypting the obtained signature file by using the public key, and putting the decrypted signature file into a signature verification module for verification to obtain a ciphertext verification result;
the inspection method comprises the following steps: comparing the decrypted hash value calculated from the decrypted signature file with the hash value generated in step S12;
if the two types of the information are the same, the dark text inspection result is true, and if the two types of the information are different, the dark text inspection result is false.
S26, determining the credibility of the video according to the certificate test result, the plaintext test result and the ciphertext test result, and completing the generation and test of the credible video;
the method for determining the credibility of the video comprises the following steps: when the certificate test result, the plaintext test result and the ciphertext test result are all true, the video is credible; otherwise the video is not trusted.
In the description of the present invention, it should be understood that the terms "center," "thickness," "upper," "lower," "horizontal," "top," "bottom," "inner," "outer," "radial," and the like indicate or are based on the orientation or positional relationship shown in the drawings, merely to facilitate description of the present invention and to simplify the description, and do not indicate or imply that the devices or elements referred to must have a particular orientation, be configured and operated in a particular orientation, and thus should not be construed as limiting the present invention. Furthermore, the terms "first," "second," and "third" are used for descriptive purposes only and are not to be interpreted as indicating or implying a relative importance or number of technical features indicated. Thus, a feature defined as "first," "second," "third," or the like, may explicitly or implicitly include one or more such feature.

Claims (8)

1. A trusted video generation and verification system, wherein the trusted video generation and verification system complies with the SVAC standard, comprising a video generation subsystem, a video verification subsystem, a credential subsystem, and a credential server;
the video generation subsystem is used for generating and encrypting videos;
the video verification subsystem is used for verifying the credibility of the video generated by the video generation subsystem;
the certificate subsystem is used for generating a private key and a public key for encryption and decryption of video;
the certificate server is used for storing space-time certificate information;
the video generation subsystem and the video inspection subsystem are independent of each other; the video generation subsystem and the video inspection subsystem can be connected with the certificate server through the Internet; the video generation subsystem is connected with the certificate subsystem through the Internet;
the method for generating the trusted video by the trusted video generation and verification system comprises the following steps:
s11, recording by using a video acquisition module to obtain an initial video;
s12, generating a hash value from a video image in the initial video through a hash encryption module;
s13, applying for a space-time certificate to a certificate server to obtain space-time certificate information, and generating a plaintext according to the time information and the space position information of the operation module to obtain a time-space plaintext when the operation module is generated;
s14, applying for a certificate unique to the video acquisition system to obtain a certificate subsystem, wherein the certificate subsystem comprises a public key and a private key, and a plaintext two-dimensional code is generated through the private key and a time space plaintext during generation;
s15, carrying out SM2 encryption on the hash values one by using a private key to obtain signature dark text;
s16, superposing the time space plaintext and the plaintext two-dimensional code on the initial video to obtain a video file of the superposition time space plaintext and the plaintext two-dimensional code;
s17, transcoding the video file of the superimposed time space plaintext and plaintext two-dimensional code into a code stream file through a first transcoding module, reading a custom information unit in the code stream file, clearing original custom information, writing a signature dark text into the code stream, and transcoding the code stream file into the video file to obtain a video of the superimposed plaintext dark text two-dimensional code;
and the video of the two-dimensional code of the superimposed plaintext and ciphertext is a trusted video.
2. The trusted video generation and verification system of claim 1, wherein: the video generation subsystem comprises a video acquisition module, a hash encryption module, an operation module and a first transcoding module;
the video acquisition module is used for acquiring video to obtain an initial video;
the hash encryption module is used for encrypting the video image in the initial video to generate a hash value;
the operation module is used for recording time information and space information;
the first transcoding module is used for transcoding the video file and the code stream file.
3. The trusted video generation and verification system of claim 2, wherein: the video inspection subsystem comprises a second transcoding module and a signature inspection module;
the second transcoding module is used for transcoding the video file into a code stream file;
the signature verification module is used for verifying the signature file decrypted by the public key to obtain a dark text verification result.
4. A method of generating and verifying a trusted video based on the system of generating and verifying a trusted video as claimed in any one of claims 1 to 3, comprising the steps of:
s1, recording an initial video, and converting the initial video into a video of a two-dimensional code of a superimposed plaintext and ciphertext;
s2, checking the video of the two-dimensional code with the superimposed plaintext and ciphertext, determining the credibility of the video, and completing the generation and the checking of the credible video.
5. The method for generating and verifying a trusted video as defined in claim 4, wherein the step S1 comprises the sub-steps of:
s11, recording by using a video acquisition module to obtain an initial video;
s12, generating a hash value from a video image in the initial video through a hash encryption module;
s13, applying for a space-time certificate to a certificate server to obtain space-time certificate information, and generating a plaintext according to the time information and the space position information of the operation module to obtain a time-space plaintext when the operation module is generated;
s14, applying for a certificate unique to the video acquisition system to obtain a certificate subsystem, wherein the certificate subsystem comprises a public key and a private key, and a plaintext two-dimensional code is generated through the private key and a time space plaintext during generation;
s15, carrying out SM2 encryption on the hash values one by using a private key to obtain signature dark text;
s16, superposing the time space plaintext and the plaintext two-dimensional code on the initial video to obtain a video file of the superposition time space plaintext and the plaintext two-dimensional code;
s17, transcoding the video file of the superimposed time space plaintext and the plaintext two-dimensional code into a code stream file through a first transcoding module, reading a custom information unit in the code stream file, clearing original custom information, writing the signature ciphertext into the code stream, and transcoding the code stream file into the video file to obtain the video of the superimposed plaintext ciphertext two-dimensional code.
6. The method for generating and verifying a trusted video as claimed in claim 5, wherein the specific method for generating the hash value in step S12 is as follows: when the 60 th frame of image is acquired by the video acquisition module and stored as a video, the video image is read from the 1 st frame, and when 10 frames of images are read, a data matrix of the video image is encrypted through a hash algorithm to generate a hash value.
7. The method for generating and verifying a trusted video as defined in claim 5, wherein the step S2 comprises the sub-steps of:
s21, scanning a plaintext two-dimensional code in the video overlapped with the plaintext dark two-dimensional code to obtain checked space-time certificate information;
s22, comparing the checked space-time certificate information with the generated space-time certificate information, and performing certificate check to obtain a certificate check result;
if the comparison results are the same, the certificate checking result is true; otherwise, the result is false;
s23, checking information recorded in a time space plaintext in the video of the two-dimensional code with the superimposed plaintext and dark text, and comparing the information with the information recorded in the time space plaintext when the information is generated to obtain a plaintext test result;
if the comparison results are the same, the plaintext test result is true; otherwise, the result is false;
s24, transcoding the video with the superimposed plaintext and ciphertext two-dimensional codes into a code stream file through a second transcoding module, and reading user-defined information in the code stream file to obtain a signature file;
s25, decrypting the obtained signature file by using the public key, and putting the decrypted signature file into a signature verification module for verification to obtain a ciphertext verification result;
the inspection method comprises the following steps: comparing the decrypted hash value calculated from the decrypted signature file with the hash value generated in step S12;
if the two types of the information are the same, the dark text inspection result is true, and if the two types of the information are different, the dark text inspection result is false;
s26, determining the credibility of the video according to the certificate checking result, the plaintext checking result and the ciphertext checking result, and completing the generation and the checking of the credible video.
8. The method for generating and verifying the trusted video as claimed in claim 7, wherein in the step S26, the method for determining the credibility of the video is as follows: when the certificate checking result, the plaintext checking result and the ciphertext checking result are all true, the video is credible; otherwise the video is not trusted.
CN202310505810.1A 2023-05-06 2023-05-06 Trusted video generation and verification system and method Active CN116489426B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310505810.1A CN116489426B (en) 2023-05-06 2023-05-06 Trusted video generation and verification system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310505810.1A CN116489426B (en) 2023-05-06 2023-05-06 Trusted video generation and verification system and method

Publications (2)

Publication Number Publication Date
CN116489426A CN116489426A (en) 2023-07-25
CN116489426B true CN116489426B (en) 2024-02-06

Family

ID=87226798

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310505810.1A Active CN116489426B (en) 2023-05-06 2023-05-06 Trusted video generation and verification system and method

Country Status (1)

Country Link
CN (1) CN116489426B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101516025A (en) * 2009-03-25 2009-08-26 公安部第一研究所 Reliable video system using digital signature technology
CN102779263A (en) * 2012-06-19 2012-11-14 袁开国 Credible two-dimensional code scheme based on public key infrastructure (PKI) and digital signature
CN107547918A (en) * 2016-06-28 2018-01-05 中兴通讯股份有限公司 The methods, devices and systems that a kind of IPTV channel plays safely
WO2022193620A1 (en) * 2021-03-15 2022-09-22 尤尼泰克嘉兴信息技术有限公司 Encoding method and apparatus for network file protection, and decoding method and apparatus for network file protection

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101516025A (en) * 2009-03-25 2009-08-26 公安部第一研究所 Reliable video system using digital signature technology
CN102779263A (en) * 2012-06-19 2012-11-14 袁开国 Credible two-dimensional code scheme based on public key infrastructure (PKI) and digital signature
CN107547918A (en) * 2016-06-28 2018-01-05 中兴通讯股份有限公司 The methods, devices and systems that a kind of IPTV channel plays safely
WO2022193620A1 (en) * 2021-03-15 2022-09-22 尤尼泰克嘉兴信息技术有限公司 Encoding method and apparatus for network file protection, and decoding method and apparatus for network file protection

Also Published As

Publication number Publication date
CN116489426A (en) 2023-07-25

Similar Documents

Publication Publication Date Title
US10803900B2 (en) Method and apparatus for information carrier authentication
EP2544119B1 (en) Semiconductor device
CN106571951B (en) Audit log obtaining method, system and device
US20080175377A1 (en) Methods and Systems for Digital Authentication Using Digitally Signed Images
CN109274644B (en) Data processing method, terminal and watermark server
KR20120140217A (en) Semiconductor device and method of writing data to semiconductor device
US20070276756A1 (en) Recording/Reproducing Device, Recording Medium Processing Device, Reproducing Device, Recording Medium, Contents Recording/Reproducing System, And Contents Recording/Reproducing Method
US7111167B1 (en) Digital watermarks with values derived from remote platforms
CN114244522B (en) Information protection method, device, electronic equipment and computer readable storage medium
US20220109661A1 (en) System and method to improve user authentication for enhanced security of cryptographically protected communication sessions
CN116489426B (en) Trusted video generation and verification system and method
CN113761488A (en) Content network copyright tracing encryption system and encryption method
CN112383577A (en) Authorization method, device, system, equipment and storage medium
CN112528309A (en) Data storage encryption and decryption method and device
CN110830413A (en) Communication method, client, server, communication device and system
CN111343421B (en) Video sharing method and system based on white-box encryption
CN113595741A (en) Credible data chain generation system and method based on 5G law enforcement recorder
CN114448687A (en) Image file encryption method and system based on RSA
CN1607511A (en) Data protection method and system
CN113221132A (en) QR code encryption and decryption method based on NTRU
JP2000287065A (en) Image processing system
CN115021918A (en) QR two-dimensional code data security encryption method and decryption method
CN109635577A (en) A kind of method of the data file of offline decryption oracle tde encryption
GB2608590A (en) Digital asset ownership authentication method and system
CN116647361A (en) Cross-browser application based on intelligent password key and identity authentication method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant