CN117998096A - Video transmission method and device based on video communication, electronic equipment and medium - Google Patents
Video transmission method and device based on video communication, electronic equipment and medium Download PDFInfo
- Publication number
- CN117998096A CN117998096A CN202311826512.9A CN202311826512A CN117998096A CN 117998096 A CN117998096 A CN 117998096A CN 202311826512 A CN202311826512 A CN 202311826512A CN 117998096 A CN117998096 A CN 117998096A
- Authority
- CN
- China
- Prior art keywords
- video
- watermark
- communication
- video frame
- identification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000006854 communication Effects 0.000 title claims abstract description 222
- 238000004891 communication Methods 0.000 title claims abstract description 201
- 230000005540 biological transmission Effects 0.000 title claims abstract description 59
- 238000000034 method Methods 0.000 title claims abstract description 52
- 230000006835 compression Effects 0.000 claims abstract description 14
- 238000007906 compression Methods 0.000 claims abstract description 14
- 239000000284 extract Substances 0.000 claims abstract description 10
- 230000006399 behavior Effects 0.000 claims description 26
- 230000002159 abnormal effect Effects 0.000 claims description 25
- 238000012544 monitoring process Methods 0.000 claims description 22
- 238000001514 detection method Methods 0.000 claims description 11
- 238000012795 verification Methods 0.000 claims description 7
- 238000004590 computer program Methods 0.000 claims description 6
- 230000001960 triggered effect Effects 0.000 claims description 3
- 238000005516 engineering process Methods 0.000 abstract description 20
- 238000007726 management method Methods 0.000 description 19
- 230000008569 process Effects 0.000 description 9
- 238000012545 processing Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 6
- 238000003860 storage Methods 0.000 description 6
- 230000008859 change Effects 0.000 description 5
- 206010000117 Abnormal behaviour Diseases 0.000 description 4
- 230000009471 action Effects 0.000 description 4
- 238000004458 analytical method Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 3
- 238000000605 extraction Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 230000000903 blocking effect Effects 0.000 description 2
- 230000015556 catabolic process Effects 0.000 description 2
- 238000006731 degradation reaction Methods 0.000 description 2
- 238000010801 machine learning Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 238000005457 optimization Methods 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- 238000012300 Sequence Analysis Methods 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000000802 evaporation-induced self-assembly Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000007480 spreading Effects 0.000 description 1
- 238000003892 spreading Methods 0.000 description 1
- 238000007619 statistical method Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/46—Embedding additional information in the video signal during the compression process
- H04N19/467—Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/238—Interfacing the downstream path of the transmission network, e.g. adapting the transmission rate of a video stream to network bandwidth; Processing of multiplex streams
- H04N21/2389—Multiplex stream processing, e.g. multiplex stream encrypting
- H04N21/23892—Multiplex stream processing, e.g. multiplex stream encrypting involving embedding information at multiplex stream level, e.g. embedding a watermark at packet level
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/835—Generation of protective data, e.g. certificates
- H04N21/8358—Generation of protective data, e.g. certificates involving watermark
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Editing Of Facsimile Originals (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The invention provides a video transmission method, a device, electronic equipment and a medium based on video communication, wherein the method comprises the following steps: in the video communication process, a transmitting end generates a watermark identification of each video frame of a video, the watermark identification of each video frame is embedded into a corresponding video frame, the video with the embedded watermark identification is compressed, video data obtained by compression is transmitted to a receiving end, and the receiving end extracts information of the watermark identification from the received video data and verifies the information of the watermark identification. The invention realizes the real-time protection of communication data by adding the watermark in the video communication process. The watermark technology not only can identify the validity of communication, but also can effectively resist the risks of data tampering and information leakage, and provides a more comprehensive solution for the safety and the integrity of video communication.
Description
Technical Field
The present invention relates to the field of video communication data security technologies, and in particular, to a video transmission method based on video communication, a video transmission device based on video communication, an electronic device, and a computer readable medium.
Background
Today, the vigorous development of video communication technology brings great convenience to our lives and works, however, the safety and integrity hazards are not negligible. The existing video communication technology mainly comprises various Real-time transmission protocols (Real-time Transport Protocol, RTP), video coding and decoding technologies, encryption communication and the like, and the technologies face some security and integrity challenges while realizing video communication.
First, the integrity of the data is compromised. During transmission, the information may be subject to unauthorized tampering, resulting in distortion or corruption of the data. Secondly, with the widespread use of video communication, the risk of information leakage is increasingly prominent. Unprotected communications may be subject to malicious attacks, resulting in leakage of sensitive information, bringing serious privacy and security risks to users and enterprises.
Therefore, a more innovative and reliable solution is needed to make up for the deficiencies of current video communication technologies and ensure the integrity and security of the communication.
Disclosure of Invention
The present invention has been made in view of the above problems, and has as its object to provide a video communication-based video transmission method and a corresponding video communication-based video transmission apparatus, an electronic device, and a computer-readable medium that overcome or at least partially solve the above problems.
The invention discloses a video transmission method based on video communication, which comprises the following steps:
In the video communication process, a transmitting end generates a watermark mark of each video frame of a video;
the sending end embeds the watermark identification of each video frame into the corresponding video frame;
The sending end compresses the video embedded with the watermark identification and transmits the video data obtained by compression to the receiving end;
The receiving end extracts information of watermark identification from the received video data and verifies the information of the watermark identification.
Optionally, in the video communication process, the step of generating the watermark identifier of each video frame of the video by the transmitting end includes:
S1, generating a random seed of a current video frame by adopting a random number generation algorithm;
S2, generating a digital sequence of the current video frame by adopting a random seed of the current video frame and an encryption algorithm;
S3, generating a watermark identification of the current video frame by adopting the digital sequence of the current video frame, the time stamp of the current video frame, the equipment identification and the digital sequence of the previous video frame of the current video frame;
S4, repeatedly executing S1-S3, generating watermark identification of each video frame of the video, and recording and storing a digital sequence, a time stamp and equipment identification of the watermark identification of each video frame.
Optionally, the step of embedding the watermark identifier of each video frame into the corresponding video frame by the transmitting end includes:
Dividing each video frame into a plurality of small blocks; the plurality of tiles are contiguous areas of the image;
encoding the watermark identification of each video frame;
Determining a target tile to be embedded by the watermark identification for each video frame based on predefined rules; the predefined rule is uniform selection or selection according to image characteristics;
monitoring communication quality and network bandwidth in real time, and dynamically adjusting watermark identification embedding depth according to the real-time communication quality and the network bandwidth;
and embedding the encoded watermark identification into the target small block of the corresponding video frame according to the adjusted watermark identification embedding depth.
Optionally, the step of monitoring the communication quality and the network bandwidth in real time and dynamically adjusting the embedding depth of the watermark identifier according to the real-time communication quality and the network bandwidth includes:
judging whether the real-time communication quality and the network bandwidth meet preset conditions or not;
If the real-time communication quality and the network bandwidth meet the preset conditions, determining the watermark identification embedding depth according to the corresponding relation between the communication quality and the watermark identification embedding depth under different network bandwidth conditions and the real-time communication quality and the network bandwidth.
Optionally, the method further comprises:
Monitoring and capturing the transmitted communication flow in real time;
detecting whether the captured communication flow has abnormal communication behaviors by adopting an abnormal communication behavior detection model;
If abnormal communication behavior is detected from the captured communication traffic, an alarm is triggered and communication is automatically blocked or isolated.
Optionally, the step of extracting watermark identification information from the received video data and verifying the watermark identification information by the receiving end includes:
the receiving end extracts a digital sequence, a time stamp and a device identifier of the watermark identifier of each video frame from the received video data;
comparing the extracted digital sequence, time stamp and equipment identifier of the watermark identifier of each video frame with the stored digital sequence, time stamp and equipment identifier of the watermark identifier of the corresponding video frame respectively;
If at least one item of the extracted digital sequence, the time stamp and the equipment identifier of the watermark identifier of each video frame is inconsistent with the stored digital sequence, the time stamp and the equipment identifier of the watermark identifier of the corresponding video frame, determining that the video data is tampered or damaged;
if the extracted digital sequence, the time stamp and the equipment identifier of the watermark identifier of each video frame are respectively corresponding to and consistent with the stored digital sequence, the time stamp and the equipment identifier of the watermark identifier of the corresponding video frame, determining that the video data is not tampered or damaged.
Optionally, the step of compressing the video embedded with the watermark identifier by the sending end and transmitting the video data obtained by compression to the receiving end includes:
The sending end compresses the video with the embedded watermark identification and adopts a transmission layer encryption protocol TLS/SSL to transmit the video data obtained by compression to the receiving end.
The invention also discloses a video transmission device based on video communication, which comprises:
The watermark identification generation module is used for generating watermark identification of each video frame of the video at the transmitting end in the video communication process;
the watermark identification embedding module is used for embedding the watermark identification of each video frame into the corresponding video frame by the transmitting end;
The video transmission module is used for compressing the video embedded with the watermark identification by the sending end and transmitting the video data obtained by compression to the receiving end;
And the verification module is used for extracting the information of the watermark identifier from the received video data by the receiving end and verifying the information of the watermark identifier.
Optionally, the watermark identification generation module includes:
the random seed generation sub-module is used for generating random seeds of the current video frame by adopting a random number generation algorithm;
the digital sequence generation sub-module is used for generating a digital sequence of the current video frame by adopting a random seed of the current video frame and an encryption algorithm;
The watermark identification generation sub-module is used for generating the watermark identification of the current video frame by adopting the digital sequence of the current video frame, the timestamp of the current video frame, the equipment identification and the digital sequence of the previous video frame of the current video frame;
And the repeated execution and record storage sub-module is used for repeatedly executing S1-S3, generating the watermark identification of each video frame of the video, and recording and storing the digital sequence, the time stamp and the equipment identification of the watermark identification of each video frame.
Optionally, the watermark identification embedding module includes:
the dividing sub-module is used for dividing each video frame into a plurality of small blocks; the plurality of tiles are contiguous areas of the image;
the coding submodule is used for coding the watermark identification of each video frame;
a block selection sub-module for determining, based on predefined rules, a target tile into which the watermark identification for each video frame is to be embedded; the predefined rule is uniform selection or selection according to image characteristics;
The embedding depth determining submodule is used for monitoring communication quality and network bandwidth in real time and dynamically adjusting the embedding depth of the watermark identification according to the real-time communication quality and the network bandwidth;
And the embedding sub-module is used for embedding the encoded watermark identification into the target small block of the corresponding video frame according to the adjusted watermark identification embedding depth.
Optionally, the embedding depth determination submodule includes:
The judging unit is used for judging whether the real-time communication quality and the network bandwidth meet the preset conditions;
And the embedding depth determining unit is used for determining the embedding depth of the watermark identifier according to the corresponding relation between the communication quality and the embedding depth of the watermark identifier under different network bandwidth conditions and the real-time communication quality and the network bandwidth if the real-time communication quality and the network bandwidth meet the preset conditions.
Optionally, the apparatus further comprises:
The communication flow monitoring module is used for monitoring and capturing the transmitted communication flow in real time;
the abnormal communication behavior detection module is used for detecting whether the captured communication flow has abnormal communication behaviors or not by adopting an abnormal communication behavior detection model;
And the alarm module is used for triggering an alarm and automatically blocking or isolating communication if abnormal communication behaviors are detected from the captured communication flow.
Optionally, the verification module includes:
The extraction submodule is used for extracting the digital sequence, the time stamp and the equipment identifier of the watermark identifier of each video frame from the received video data by the receiving end;
The comparison sub-module is used for respectively comparing the extracted digital sequence, the time stamp and the equipment identifier of the watermark identifier of each video frame with the stored digital sequence, time stamp and equipment identifier of the watermark identifier of the corresponding video frame;
The abnormal communication behavior determination submodule is used for determining that the video data is tampered or damaged if at least one item of digital sequence, time stamp and equipment identifier of watermark identifier of the corresponding video frame is inconsistent with the stored digital sequence, time stamp and equipment identifier of watermark identifier of each video frame;
And the normal communication behavior determination submodule is used for determining that the video data is not tampered or damaged if the extracted digital sequence, the time stamp and the equipment identifier of the watermark identifier of each video frame are respectively corresponding and consistent with the stored digital sequence, the time stamp and the equipment identifier of the watermark identifier of the corresponding video frame.
Optionally, the video transmission module includes:
And the encryption transmission sub-module is used for compressing the video embedded with the watermark identification by the sending end and transmitting the video data obtained by compression to the receiving end by adopting a transmission layer encryption protocol TLS/SSL.
The invention also discloses an electronic device, which comprises a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory are communicated with each other through the communication bus;
The memory is used for storing a computer program;
The processor is used for realizing the video transmission method based on video communication when executing the program stored in the memory.
One or more computer-readable media having instructions stored thereon, which when executed by one or more processors, cause the processors to perform a video transmission method based on video communication according to the present invention.
The invention has the following advantages:
In the video communication-based video transmission method, in the video communication process, a transmitting end generates a watermark identifier of each video frame of a video, the watermark identifier of each video frame is embedded into a corresponding video frame, the video embedded with the watermark identifier is compressed, video data obtained by compression is transmitted to a receiving end, and the receiving end extracts information of the watermark identifier from the received video data and verifies the information of the watermark identifier. The invention realizes the real-time protection of communication data by adding the watermark in the video communication process. The watermark technology not only can identify the validity of communication, but also can effectively resist the risks of data tampering and information leakage, and provides a more comprehensive solution for the safety and the integrity of video communication.
Drawings
Fig. 1 is a flowchart of steps of a video transmission method based on video communication according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of embedding watermark identifiers in a video communication process according to the present invention;
fig. 3 is a block diagram of a video transmission device based on video communication according to an embodiment of the present invention;
FIG. 4 is a block diagram of an electronic device provided by an embodiment of the present invention;
fig. 5 is a schematic diagram of a computer readable medium according to an embodiment of the present invention.
Detailed Description
In order that the above-recited objects, features and advantages of the present invention will become more readily apparent, a more particular description of the invention will be rendered by reference to the appended drawings and appended detailed description.
Referring to fig. 1, a flowchart illustrating steps of a video transmission method based on video communication according to an embodiment of the present invention may specifically include the following steps:
Step 101, in the video communication process, a transmitting end generates a watermark identification of each video frame of a video;
Aiming at the problems of video data integrity and security possibly existing in the video communication process, the invention provides an intelligent watermark management system, a watermark technology is introduced into video data of video communication through the intelligent watermark management system, and the introduction of the watermark technology provides a brand new thought for traceability and tamper resistance of communication data. And because of the real-time property of the video communication data, the invention embeds the unique watermark identification in each frame of the communication, so that any illegal modification becomes detectable.
Specifically, in the video communication process, the sending end adds unique watermark identification to each video frame through the intelligent watermark management system. This means that in each frame of the video there is a watermark identification which may contain information about the source of the video, the time of creation, the creator etc. So that for the receiving end the source and integrity of the video can be confirmed by detecting the watermark identification in the video frames. If the watermark identification is found to be inconsistent with the expectation, it can be determined that the video may be tampered with or counterfeited with during transmission. By adding the watermark technology in video communication, not only is the safety of the video improved and unauthorized copying and spreading prevented, but also the possibility is provided for tracking and identifying the video.
In one embodiment of the present invention, during a video communication process, a step of generating a watermark identifier of each video frame of a video by a transmitting end includes:
S1, generating a random seed of a current video frame by adopting a random number generation algorithm;
S2, generating a digital sequence of the current video frame by adopting a random seed of the current video frame and an encryption algorithm;
S3, generating a watermark identification of the current video frame by adopting the digital sequence of the current video frame, the time stamp of the current video frame, the equipment identification and the digital sequence of the previous video frame of the current video frame;
S4, repeatedly executing S1-S3, generating watermark identification of each video frame of the video, and recording and storing a digital sequence, a time stamp and equipment identification of the watermark identification of each video frame.
In the video communication process, the transmitting end generates the watermark identification of each video frame of the video by using the watermark identification generation algorithm, and the watermark identification generation algorithm of the invention generates a new identification by using the principle of a hash chain and the previous watermark identification, thereby increasing the cracking difficulty of an attacker. The generation of the watermark identification not only considers randomness, but also combines the time sequence of communication so as to ensure uniqueness and prevent attack.
Specifically, the sender generates a random seed using a secure random number generation algorithm. By introducing a random seed, it is ensured that the subsequently generated watermark identification has sufficient randomness. And then generating a digital sequence with high randomness by using a random seed and an encryption algorithm, and generating the random digital sequence by using a random number generation algorithm, so that the random digital sequence has unpredictability in different scenes and time points. And then, a digital sequence generated by a random number generation algorithm is used for generating a unique watermark identifier by combining other information such as a timestamp, a device identifier and the like, so that the uniqueness of the watermark identifier in the whole system is ensured, and the tamper resistance of the watermark is increased. In addition, the random seed is updated periodically, and the random seed is updated within a certain time interval to regenerate a new watermark identification sequence, so that an attacker is prevented from attacking by analyzing the generation mode of the watermark identification, and the security of the watermark is improved. And in the course of generating the watermark identification, the digital sequence, time stamp, device identification of each video frame may be recorded and stored for subsequent verification.
Step 102, the transmitting end embeds the watermark identification of each video frame into the corresponding video frame;
After the watermark identification of each video frame is generated, the transmitting end can embed the watermark identification of each video frame into the corresponding video frame. Specifically, the transmitting end can firstly determine the embedding position and the embedding depth of the watermark identifier in the video frame, and then embed the watermark identifier in the video frame according to the determined embedding position and the determined embedding depth.
In one embodiment of the present invention, the step of embedding the watermark identifier of each video frame into the corresponding video frame by the transmitting end includes:
Dividing each video frame into a plurality of small blocks; the plurality of tiles are contiguous areas of the image;
encoding the watermark identification of each video frame;
Determining a target tile to be embedded by the watermark identification for each video frame based on predefined rules; the predefined rule is uniform selection or selection according to image characteristics;
monitoring communication quality and network bandwidth in real time, and dynamically adjusting watermark identification embedding depth according to the real-time communication quality and the network bandwidth;
and embedding the encoded watermark identification into the target small block of the corresponding video frame according to the adjusted watermark identification embedding depth.
Since the watermarking in video communication may cause transmission delay and performance problems, the dynamic watermarking of video communication may be more susceptible to unauthorized access and malicious tampering, and the video may have different resolutions and codec formats, the watermark identification needs to be adaptable to various situations, and the real-time watermarking and removal of the watermarking may affect the video quality. The invention utilizes real-time stream processing technology, reduces the impact on video transmission performance by efficient algorithms, data processing technology and data parallel processing, and protects the security of the watermark and ensures that the watermark is not tampered with by using advanced encryption and digital signature technology. In addition, intelligent algorithms capable of adaptively adjusting the addition and removal of watermarks according to the characteristics of videos in different coding formats are also developed.
Specifically, the transmitting end can divide the video frame into a plurality of small blocks, the small blocks are usually continuous areas of the image, watermark identification can be embedded in different parts of the video frame in a scattered mode through division, and robustness and safety of the watermark are improved. The sender may then encode the watermark identification to be embedded for use in block embedding, by encoding the watermark identification so that it may be embedded between different blocks and be able to decode correctly at the receiver.
Aiming at different video communication conditions, the embedding parameters such as embedding positions, embedding depths and the like can be adjusted, for example, the embedding parameters are adjusted according to the characteristics of image content and watermark information, and an embedding algorithm is optimized to adapt to different types of video and watermark information, so that the embedding effect is improved. For the embedding location, the sender may select a particular block for embedding the watermark identification. The selection of a particular block for embedding the watermark identification may be based on predefined rules, such as uniform selection, selection according to image characteristics, etc. The embedding position of the watermark mark is controlled by selecting a specific block for embedding the watermark mark, so that the robustness of the watermark is ensured and the image quality is not affected. The transmitting end can adjust the embedding depth according to the communication environment, particularly can monitor the communication quality and the network bandwidth in real time, dynamically adjust the embedding depth of the watermark identification according to the real-time communication quality and the network bandwidth, embed the encoded watermark identification into the selected block according to the determined embedding depth, and can be realized by modifying the pixel value of the block or adding a specific embedding mode into the block. Therefore, the watermark mark is embedded on the premise of not causing obvious visual change, and the watermark is not easily perceived visually.
The time stamp is introduced in the generation of the watermark identification, the exact time of the watermark generation is recorded, the time sequence of the watermark identification is increased, the watermark identification is ordered in time, and the subsequent time sequence analysis is facilitated. And the time sequence information can be encrypted, so that an attacker is prevented from damaging the time sequence of the watermark by modifying the time information.
A time sequence updating mechanism is introduced into the intelligent watermark processing system to ensure that the time sequence of watermark identification is continuous and uninterrupted, and prevent an attacker from destroying the time sequence of the watermark by means of suspending or modifying system time and the like. And dynamically adjusting the time sequence information in the watermark identification according to the running state and the requirement of the system.
In one embodiment of the present invention, the steps of monitoring communication quality and network bandwidth in real time and dynamically adjusting watermark identification embedding depth according to the real-time communication quality and network bandwidth include:
judging whether the real-time communication quality and the network bandwidth meet preset conditions or not;
If the real-time communication quality and the network bandwidth meet the preset conditions, determining the watermark identification embedding depth according to the corresponding relation between the communication quality and the watermark identification embedding depth under different network bandwidth conditions and the real-time communication quality and the network bandwidth.
The intelligent watermark management system can dynamically adjust the embedding depth of the watermark identification according to the real-time change of the communication quality and the network bandwidth so as to ensure the optimal user experience. Specifically, an embedding depth adjustment policy may be predefined, and the watermark embedding depth adjustment policy may be a correspondence between communication quality and embedding depth under the condition of formulating different network bandwidths. And trigger conditions for adjusting the embedding depth of the watermark identification can be set, such as threshold values for defining network bandwidth reduction, communication quality degradation and the like, and parameters for representing the communication quality can be signal-to-noise ratio, data transmission rate and the like.
Therefore, in the video communication process, the transmitting end monitors the communication quality and the change of the network bandwidth in real time through the intelligent watermark management system, and acquires real-time communication quality and network bandwidth data. And then judging whether the real-time communication quality and the network bandwidth meet the preset conditions, if the real-time communication quality and the network bandwidth meet the preset conditions, automatically adjusting the watermark identification embedding depth according to the strategy defined previously, namely determining the watermark identification embedding depth according to the corresponding relation between the communication quality and the watermark identification embedding depth under the different network bandwidth conditions and the real-time communication quality and the network bandwidth.
And in the dynamic adjustment process, the intelligent watermark management system can collect feedback data in real time, namely, monitor the visibility and video transmission performance of watermark identification. The data collected during this process is used for statistical analysis to provide support for the subsequent constant optimization of policy accuracy and effectiveness.
In addition, in order to better meet the personalized needs of users, the intelligent watermark management system provides options which are set by users in a self-defining way, and allows the users to manually adjust watermark embedding parameters according to specific situations.
Step 103, the sending end compresses the video embedded with the watermark identification and transmits the video data obtained by compression to the receiving end;
After the watermark identification is embedded in the video frame, the video may be compressed to ensure that the data is more efficiently transmitted during transmission. And transmitting the watermark information to a receiving end, and ensuring the authenticity and the credibility of the video by ensuring the integrity of the video embedded with the watermark in the transmission process and the stability of the watermark information.
In one embodiment of the present invention, the step of compressing the video with the watermark embedded therein by the transmitting end and transmitting the compressed video data to the receiving end includes:
The sending end compresses the video with the embedded watermark identification and adopts a transmission layer encryption protocol TLS/SSL to transmit the video data obtained by compression to the receiving end.
In the embodiment of the invention, the sending end can adopt an advanced transmission layer encryption protocol, such as TLS/SSL, so as to ensure that the communication data is additionally ensured in the transmission process. The watermarking technology and the encryption transmission communication technology complement each other to form a double-layer encryption protection system, and the resistance of the system to various network attacks is improved.
Step 104, the receiving end extracts the information of the watermark identification from the received video data and verifies the information of the watermark identification.
After receiving the video data transmitted from the transmitting end, the receiving end can carry out watermark identification extraction operation on the video data, namely, the reverse process restores watermark identification from the video frame, extracts information of the watermark identification from the video, and can verify the extracted watermark identification information after extracting the watermark identification information so as to judge whether the video frame is tampered or damaged, thereby ensuring the authenticity and integrity of the video.
In one embodiment of the present invention, the step of extracting, by the receiving end, information of watermark identification from received video data and verifying the information of watermark identification includes:
the receiving end extracts a digital sequence, a time stamp and a device identifier of the watermark identifier of each video frame from the received video data;
comparing the extracted digital sequence, time stamp and equipment identifier of the watermark identifier of each video frame with the stored digital sequence, time stamp and equipment identifier of the watermark identifier of the corresponding video frame respectively;
If at least one item of the extracted digital sequence, the time stamp and the equipment identifier of the watermark identifier of each video frame is inconsistent with the stored digital sequence, the time stamp and the equipment identifier of the watermark identifier of the corresponding video frame, determining that the video data is tampered or damaged;
if the extracted digital sequence, the time stamp and the equipment identifier of the watermark identifier of each video frame are respectively corresponding to and consistent with the stored digital sequence, the time stamp and the equipment identifier of the watermark identifier of the corresponding video frame, determining that the video data is not tampered or damaged.
The information which can be extracted from the watermark identifier may include a digital sequence, a time stamp and an equipment identifier, after the receiving end extracts the digital sequence, the time stamp and the equipment identifier of the watermark identifier of each video frame from the video data, the extracted information can be respectively and correspondingly compared with the previously stored digital sequence, time stamp and equipment identifier, if at least one item of the extracted digital sequence, time stamp and equipment identifier of the watermark identifier of each video frame is inconsistent with the stored digital sequence, time stamp and equipment identifier of the watermark identifier of the corresponding video frame, the video data can be determined to be tampered or damaged in the transmission process, and if the extracted digital sequence, time stamp and equipment identifier of the watermark identifier of each video frame are respectively and correspondingly consistent with the stored digital sequence, time stamp and equipment identifier of the watermark identifier of the corresponding video frame, the video data can be determined not to be tampered or damaged in the transmission process, and the video data is safe and complete.
In one embodiment of the invention, the method further comprises:
Monitoring and capturing the transmitted communication flow in real time;
detecting whether the captured communication flow has abnormal communication behaviors by adopting an abnormal communication behavior detection model;
If abnormal communication behavior is detected from the captured communication traffic, an alarm is triggered and communication is automatically blocked or isolated.
The intelligent watermark management system can monitor communication flow in real time, learn legal communication modes and respond and process in real time when abnormal behaviors are detected.
Specifically, the intelligent watermark management system may include a dedicated traffic monitoring module capable of capturing incoming and outgoing traffic in real time. The communication activity of the system is continuously monitored, and real-time tracking of all data transmission is ensured. Further, protocol analysis and deep analysis can be performed on the captured communication traffic to understand the structure and content of each data packet, so that the subsequent learning of legal communication modes and the detection of abnormal behaviors are facilitated. In addition, the intelligent watermark management system can also count and record related information of communication flow, including frequency, source, destination, data volume and the like. And the comprehensive communication flow data is provided for system administrators and security analysts, so that the collection and analysis of the monitoring data are facilitated.
In the embodiment of the invention, a machine learning algorithm such as a clustering algorithm, an anomaly detection algorithm and the like can be used for modeling and learning a normal communication mode and an anomaly communication event, and an anomaly communication behavior detection model is established, so that the intelligent watermark management system can dynamically adapt to the normal communication modes in different environments, and the false alarm rate is reduced. Specifically, the characteristics of the communication flow can be extracted and analyzed, so that the machine learning model can better understand the communication mode, and the abnormal behavior can be detected more accurately. And the model can be continuously optimized, namely, the abnormal communication behavior detection model is continuously optimized by adopting the communication flow and the event which are monitored in real time, so that the system can continuously adapt to the change of the communication mode.
The intelligent watermark management system can immediately trigger an alarm when detecting abnormal communication behaviors, and inform relevant personnel to take safety measures so as to realize quick response. And can automatically block or isolate related communications after abnormal communication behavior is detected to mitigate potential risks. Further, detailed information of the abnormal event may be recorded, including trigger time, trigger reason, communication traffic involved, etc., for subsequent analysis and optimization.
Referring to fig. 2, a schematic diagram of embedding watermark identifiers in a video communication process according to the present invention is shown;
① in fig. 2 is a process flow of watermark identification embedding; ② Is an intelligent watermark management system; ③ To restore watermark identification from video frames.
The following are examples of the application of the present invention in some practical scenarios:
1. Video conference scene:
1. description of the problem: in the case of a sensitive business meeting, there is a risk of information leakage and tampering of the communication contents.
2. The technical scheme is as follows: the watermarking technology in the video transmission method based on video communication can ensure that each video frame carries a unique watermark mark, and verify the integrity of communication. The intelligent watermark management system monitors abnormal behaviors in real time, dynamically adjusts watermark parameters to adapt to network fluctuation, and simultaneously encrypts communication to ensure safe transmission of data.
2. Online educational application:
1. description of the problem: in the online education process, there is a risk that teaching resources are stolen or contents are tampered with.
2. The technical scheme is as follows: watermark identification generated by a video transmission method based on video communication can be embedded into teaching video, so that the integrity of teaching contents is protected. The intelligent watermark management system can timely detect unauthorized downloading or copying behaviors, dynamically adjust watermark parameters to adapt to different network environments, and encrypt communication to ensure privacy of students and teachers.
3. Video monitoring system:
1. Description of the problem: during the transmission of the monitoring camera, there may be tampering or unauthorized access to the video data.
2. The technical scheme is as follows: watermark identification generated by a video transmission method based on video communication can be embedded into a monitoring video, so that the integrity of the video is ensured. The intelligent watermark management system monitors the video stream, responds in real time to any actions attempting tampering or unauthorized access, and dynamically adjusts watermark parameters to adapt to the change of the monitored scene.
4. Remote medical service:
1. description of the problem: in telemedicine communications, patient privacy disclosure and tampering with communication data can have serious consequences.
2. The technical scheme is as follows: the video transmission method based on video communication can ensure privacy of patients, and the intelligent watermark management system monitors abnormal conditions in the communication process and dynamically adjusts watermark parameters to adapt to special requirements of medical communication. Meanwhile, the encryption communication technology ensures the safe transmission of medical data.
Through the application examples, the video transmission method based on video communication and the intelligent watermark management system can provide comprehensive protection in various application scenes, ensure the safety and the integrity of communication, and simultaneously adapt to special requirements of different fields.
The video transmission method based on video communication can obtain the following technical effects:
first, the integrity of the video data is effectively guaranteed. The application of watermarking makes any tampering with the communication data extremely difficult, as the unique identity of the watermark is difficult to imitate or modify during the communication process. The method provides powerful guarantee for the data transmitted by the user, and avoids the possibility of data distortion or damage.
Second, the risk of information leakage is greatly reduced. The introduction of the watermark technology not only ensures the integrity of communication data, but also plays a role in authentication by the watermark mark implanted in each frame. This means that unauthorized access and information leakage will be more severely restricted and the privacy of the user will be more fully protected.
The invention adopts advanced video processing algorithm, ensures that the embedding of watermark does not affect the video quality, and can keep stable and identifiable under different resolutions and coding formats. The technology ensures that the watermark is not perceived, and a user does not need to worry about quality degradation or influence the look and feel in video communication.
In addition, the invention can dynamically adjust the watermark identification so as to adapt to different communication scenes and requirements. This means that the parameters and characteristics of the watermark can be adjusted to achieve optimal security and stability in different communication environments.
In addition, the intelligent watermark management system has the capabilities of real-time monitoring, verification and response. Any abnormal operation or tampering attempt can be timely detected through real-time monitoring of the watermark, and corresponding measures are rapidly taken, so that the safety of communication is ensured.
In summary, through the present invention, the video communication is no longer merely a tool for efficiently transmitting information, and is a safe and reliable communication platform, thereby creating better use experience for users.
It should be noted that, for simplicity of description, the method embodiments are shown as a series of acts, but it should be understood by those skilled in the art that the embodiments are not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the embodiments. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred embodiments, and that the acts are not necessarily required by the embodiments of the invention.
Referring to fig. 3, a block diagram of a video transmission device based on video communication according to an embodiment of the present invention is shown, which may specifically include the following modules:
The watermark identification generation module is used for generating watermark identification of each video frame of the video at the transmitting end in the video communication process;
the watermark identification embedding module is used for embedding the watermark identification of each video frame into the corresponding video frame by the transmitting end;
The video transmission module is used for compressing the video embedded with the watermark identification by the sending end and transmitting the video data obtained by compression to the receiving end;
And the verification module is used for extracting the information of the watermark identifier from the received video data by the receiving end and verifying the information of the watermark identifier.
Optionally, the watermark identification generation module includes:
the random seed generation sub-module is used for generating random seeds of the current video frame by adopting a random number generation algorithm;
the digital sequence generation sub-module is used for generating a digital sequence of the current video frame by adopting a random seed of the current video frame and an encryption algorithm;
The watermark identification generation sub-module is used for generating the watermark identification of the current video frame by adopting the digital sequence of the current video frame, the timestamp of the current video frame, the equipment identification and the digital sequence of the previous video frame of the current video frame;
And the repeated execution and record storage sub-module is used for repeatedly executing S1-S3, generating the watermark identification of each video frame of the video, and recording and storing the digital sequence, the time stamp and the equipment identification of the watermark identification of each video frame.
Optionally, the watermark identification embedding module includes:
the dividing sub-module is used for dividing each video frame into a plurality of small blocks; the plurality of tiles are contiguous areas of the image;
the coding submodule is used for coding the watermark identification of each video frame;
a block selection sub-module for determining, based on predefined rules, a target tile into which the watermark identification for each video frame is to be embedded; the predefined rule is uniform selection or selection according to image characteristics;
The embedding depth determining submodule is used for monitoring communication quality and network bandwidth in real time and dynamically adjusting the embedding depth of the watermark identification according to the real-time communication quality and the network bandwidth;
And the embedding sub-module is used for embedding the encoded watermark identification into the target small block of the corresponding video frame according to the adjusted watermark identification embedding depth.
Optionally, the embedding depth determination submodule includes:
The judging unit is used for judging whether the real-time communication quality and the network bandwidth meet the preset conditions;
And the embedding depth determining unit is used for determining the embedding depth of the watermark identifier according to the corresponding relation between the communication quality and the embedding depth of the watermark identifier under different network bandwidth conditions and the real-time communication quality and the network bandwidth if the real-time communication quality and the network bandwidth meet the preset conditions.
Optionally, the apparatus further comprises:
The communication flow monitoring module is used for monitoring and capturing the transmitted communication flow in real time;
the abnormal communication behavior detection module is used for detecting whether the captured communication flow has abnormal communication behaviors or not by adopting an abnormal communication behavior detection model;
And the alarm module is used for triggering an alarm and automatically blocking or isolating communication if abnormal communication behaviors are detected from the captured communication flow.
Optionally, the verification module includes:
The extraction submodule is used for extracting the digital sequence, the time stamp and the equipment identifier of the watermark identifier of each video frame from the received video data by the receiving end;
The comparison sub-module is used for respectively comparing the extracted digital sequence, the time stamp and the equipment identifier of the watermark identifier of each video frame with the stored digital sequence, time stamp and equipment identifier of the watermark identifier of the corresponding video frame;
The abnormal communication behavior determination submodule is used for determining that the video data is tampered or damaged if at least one item of digital sequence, time stamp and equipment identifier of watermark identifier of the corresponding video frame is inconsistent with the stored digital sequence, time stamp and equipment identifier of watermark identifier of each video frame;
And the normal communication behavior determination submodule is used for determining that the video data is not tampered or damaged if the extracted digital sequence, the time stamp and the equipment identifier of the watermark identifier of each video frame are respectively corresponding and consistent with the stored digital sequence, the time stamp and the equipment identifier of the watermark identifier of the corresponding video frame.
Optionally, the video transmission module includes:
And the encryption transmission sub-module is used for compressing the video embedded with the watermark identification by the sending end and transmitting the video data obtained by compression to the receiving end by adopting a transmission layer encryption protocol TLS/SSL.
For the device embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, and reference is made to the description of the method embodiments for relevant points.
In addition, the embodiment of the invention also provides an electronic device, as shown in fig. 4, which comprises a processor 401, a communication interface 402, a memory 403 and a communication bus 404, wherein the processor 401, the communication interface 402 and the memory 403 complete communication with each other through the communication bus 404,
A memory 403 for storing a computer program;
the processor 401 is configured to implement the video transmission method based on video communication as described in the above embodiment when executing the program stored in the memory 403.
The communication bus mentioned by the above terminal may be a peripheral component interconnect standard (PERIPHERAL COMPONENT INTERCONNECT, abbreviated as PCI) bus or an extended industry standard architecture (Extended Industry Standard Architecture, abbreviated as EISA) bus, etc. The communication bus may be classified as an address bus, a data bus, a control bus, or the like. For ease of illustration, the figures are shown with only one bold line, but not with only one bus or one type of bus.
The communication interface is used for communication between the terminal and other devices.
The memory may include random access memory (Random Access Memory, RAM) or may include non-volatile memory (non-volatile memory), such as at least one disk memory. Optionally, the memory may also be at least one memory device located remotely from the aforementioned processor.
The processor may be a general-purpose processor, including a central processing unit (Central Processing Unit, abbreviated as CPU), a network processor (Network Processor, abbreviated as NP), etc.; but may also be a digital signal processor (DIGITAL SIGNAL Processing, DSP), application Specific Integrated Circuit (ASIC), field-Programmable gate array (FPGA) or other Programmable logic device, discrete gate or transistor logic device, discrete hardware components.
In yet another embodiment of the present invention, as shown in fig. 5, a computer readable storage medium 501 is provided, where instructions are stored, when the computer readable storage medium runs on a computer, to cause the computer to perform the video transmission method based on video communication described in the above embodiment.
In yet another embodiment of the present invention, a computer program product containing instructions that, when executed on a computer, cause the computer to perform the video transmission method based on video communication described in the above embodiment is also provided.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present invention, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another, for example, by wired (e.g., coaxial cable, optical fiber, digital Subscriber Line (DSL)), or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid state disk Solid STATE DISK (SSD)), etc.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
In this specification, each embodiment is described in a related manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for system embodiments, since they are substantially similar to method embodiments, the description is relatively simple, as relevant to see a section of the description of method embodiments.
The foregoing description is only of the preferred embodiments of the present invention and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention are included in the protection scope of the present invention.
Claims (10)
1. A video transmission method based on video communication, the method comprising:
In the video communication process, a transmitting end generates a watermark mark of each video frame of a video;
the sending end embeds the watermark identification of each video frame into the corresponding video frame;
The sending end compresses the video embedded with the watermark identification and transmits the video data obtained by compression to the receiving end;
The receiving end extracts information of watermark identification from the received video data and verifies the information of the watermark identification.
2. The method of claim 1, wherein the step of generating the watermark identification for each video frame of the video at the transmitting end during the video communication process comprises:
S1, generating a random seed of a current video frame by adopting a random number generation algorithm;
S2, generating a digital sequence of the current video frame by adopting a random seed of the current video frame and an encryption algorithm;
S3, generating a watermark identification of the current video frame by adopting the digital sequence of the current video frame, the time stamp of the current video frame, the equipment identification and the digital sequence of the previous video frame of the current video frame;
S4, repeatedly executing S1-S3, generating watermark identification of each video frame of the video, and recording and storing a digital sequence, a time stamp and equipment identification of the watermark identification of each video frame.
3. The method of claim 1, wherein the step of embedding the watermark identification for each video frame into the corresponding video frame at the transmitting end comprises:
Dividing each video frame into a plurality of small blocks; the plurality of tiles are contiguous areas of the image;
encoding the watermark identification of each video frame;
Determining a target tile to be embedded by the watermark identification for each video frame based on predefined rules; the predefined rule is uniform selection or selection according to image characteristics;
monitoring communication quality and network bandwidth in real time, and dynamically adjusting watermark identification embedding depth according to the real-time communication quality and the network bandwidth;
and embedding the encoded watermark identification into the target small block of the corresponding video frame according to the adjusted watermark identification embedding depth.
4. A method according to claim 3, wherein the step of monitoring the communication quality and the network bandwidth in real time and dynamically adjusting the watermark identification embedding depth based on the real-time communication quality and the network bandwidth comprises:
judging whether the real-time communication quality and the network bandwidth meet preset conditions or not;
If the real-time communication quality and the network bandwidth meet the preset conditions, determining the watermark identification embedding depth according to the corresponding relation between the communication quality and the watermark identification embedding depth under different network bandwidth conditions and the real-time communication quality and the network bandwidth.
5. The method according to claim 1, wherein the method further comprises:
Monitoring and capturing the transmitted communication flow in real time;
detecting whether the captured communication flow has abnormal communication behaviors by adopting an abnormal communication behavior detection model;
If abnormal communication behavior is detected from the captured communication traffic, an alarm is triggered and communication is automatically blocked or isolated.
6. The method according to claim 2, wherein the step of the receiving end extracting watermark identification information from the received video data and verifying the watermark identification information comprises:
the receiving end extracts a digital sequence, a time stamp and a device identifier of the watermark identifier of each video frame from the received video data;
comparing the extracted digital sequence, time stamp and equipment identifier of the watermark identifier of each video frame with the stored digital sequence, time stamp and equipment identifier of the watermark identifier of the corresponding video frame respectively;
If at least one item of the extracted digital sequence, the time stamp and the equipment identifier of the watermark identifier of each video frame is inconsistent with the stored digital sequence, the time stamp and the equipment identifier of the watermark identifier of the corresponding video frame, determining that the video data is tampered or damaged;
if the extracted digital sequence, the time stamp and the equipment identifier of the watermark identifier of each video frame are respectively corresponding to and consistent with the stored digital sequence, the time stamp and the equipment identifier of the watermark identifier of the corresponding video frame, determining that the video data is not tampered or damaged.
7. The method according to claim 1, wherein the step of compressing the video in which the watermark identification has been embedded by the transmitting terminal and transmitting the compressed video data to the receiving terminal includes:
The sending end compresses the video with the embedded watermark identification and adopts a transmission layer encryption protocol TLS/SSL to transmit the video data obtained by compression to the receiving end.
8. A video transmission apparatus based on video communication, the apparatus comprising:
The watermark identification generation module is used for generating watermark identification of each video frame of the video at the transmitting end in the video communication process;
the watermark identification embedding module is used for embedding the watermark identification of each video frame into the corresponding video frame by the transmitting end;
The video transmission module is used for compressing the video embedded with the watermark identification by the sending end and transmitting the video data obtained by compression to the receiving end;
And the verification module is used for extracting the information of the watermark identifier from the received video data by the receiving end and verifying the information of the watermark identifier.
9. An electronic device comprising a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory communicate with each other via the communication bus;
The memory is used for storing a computer program;
the processor is configured to implement the video transmission method based on video communication according to any one of claims 1 to 7 when executing a program stored in the memory.
10. One or more computer-readable media having instructions stored thereon that, when executed by one or more processors, cause the processors to perform the video communication-based video transmission method of any of claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311826512.9A CN117998096B (en) | 2023-12-27 | 2023-12-27 | Video transmission method and device based on video communication, electronic equipment and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311826512.9A CN117998096B (en) | 2023-12-27 | 2023-12-27 | Video transmission method and device based on video communication, electronic equipment and medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN117998096A true CN117998096A (en) | 2024-05-07 |
CN117998096B CN117998096B (en) | 2024-09-13 |
Family
ID=90888404
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311826512.9A Active CN117998096B (en) | 2023-12-27 | 2023-12-27 | Video transmission method and device based on video communication, electronic equipment and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117998096B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB0115837D0 (en) * | 2001-06-28 | 2001-08-22 | Motorola Inc | Video/image communication with watermarking |
US20060005029A1 (en) * | 1998-05-28 | 2006-01-05 | Verance Corporation | Pre-processed information embedding system |
US20180144754A1 (en) * | 2016-11-23 | 2018-05-24 | Ati Technologies Ulc | Video assisted digital audio watermarking |
US20180288362A1 (en) * | 2017-03-28 | 2018-10-04 | International Business Machines Corporation | Integrity verification of an audio-visual data stream |
CN110636077A (en) * | 2019-10-12 | 2019-12-31 | 广元市公安局 | Network security protection system and method based on unified platform |
CN113613016A (en) * | 2020-05-04 | 2021-11-05 | 英特尔公司 | Video tamper detection |
WO2022203665A1 (en) * | 2021-03-24 | 2022-09-29 | Google Llc | Machine-learned models for imperceptible message watermarking in videos |
CN117061768A (en) * | 2023-10-12 | 2023-11-14 | 腾讯科技(深圳)有限公司 | Video watermark processing method, video watermark processing device, electronic equipment and storage medium |
CN117278762A (en) * | 2023-09-20 | 2023-12-22 | 深圳市艾宝科技有限公司 | Safe traceable video coding and decoding system |
-
2023
- 2023-12-27 CN CN202311826512.9A patent/CN117998096B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060005029A1 (en) * | 1998-05-28 | 2006-01-05 | Verance Corporation | Pre-processed information embedding system |
GB0115837D0 (en) * | 2001-06-28 | 2001-08-22 | Motorola Inc | Video/image communication with watermarking |
US20180144754A1 (en) * | 2016-11-23 | 2018-05-24 | Ati Technologies Ulc | Video assisted digital audio watermarking |
US20180288362A1 (en) * | 2017-03-28 | 2018-10-04 | International Business Machines Corporation | Integrity verification of an audio-visual data stream |
CN110636077A (en) * | 2019-10-12 | 2019-12-31 | 广元市公安局 | Network security protection system and method based on unified platform |
CN113613016A (en) * | 2020-05-04 | 2021-11-05 | 英特尔公司 | Video tamper detection |
WO2022203665A1 (en) * | 2021-03-24 | 2022-09-29 | Google Llc | Machine-learned models for imperceptible message watermarking in videos |
CN117278762A (en) * | 2023-09-20 | 2023-12-22 | 深圳市艾宝科技有限公司 | Safe traceable video coding and decoding system |
CN117061768A (en) * | 2023-10-12 | 2023-11-14 | 腾讯科技(深圳)有限公司 | Video watermark processing method, video watermark processing device, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN117998096B (en) | 2024-09-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111586361B (en) | Image processing method and related device | |
US8990587B1 (en) | Method and apparatus for secure transport and storage of surveillance video | |
US20110289116A1 (en) | Method and Apparatus for Protecting Online Content by Detecting Noncompliant Access Patterns | |
CN105721198B (en) | A kind of video monitoring system Log security auditing method | |
CN113411638A (en) | Video file playing processing method and device, electronic equipment and storage medium | |
CN108491785B (en) | Artificial intelligence image identification attack defense system | |
WO2017193949A1 (en) | Code stream tampering monitoring method and device and communication system | |
Gasior et al. | Network covert channels on the android platform | |
CN108768931A (en) | A kind of multimedia file tampering detection System and method for | |
EP3910959A1 (en) | Systems and methods for identifying a content receiving device | |
CN112804215A (en) | Video acquisition safety processing system and method based on zero trust mechanism | |
CN113254964A (en) | Log security certificate storage method and device, electronic equipment and storage medium | |
CN116527314A (en) | Image and video secure transmission method, device, medium and equipment | |
Megías | Data hiding: New opportunities for security and privacy? | |
JP2016184917A (en) | Monitoring system and reproduction device | |
CN117998096B (en) | Video transmission method and device based on video communication, electronic equipment and medium | |
US20220014501A1 (en) | Method and device for monitoring data output by a server | |
Mazurczyk et al. | Towards steganography detection through network traffic visualisation | |
CN110809138B (en) | Video one-way transmission system based on no feedback light | |
CN107979596B (en) | Method and system for preventing people from being refreshed in live broadcast | |
Bistarelli et al. | A TCP-based covert channel with integrity check and retransmission | |
CN113873341A (en) | Method for improving real-time video transmission security | |
CN117319521B (en) | Data transmission method and system based on privacy computing network | |
CN117596407B (en) | Video stream tampering detection system and method based on feature code layered embedding | |
CN118338094B (en) | Content tracing method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |