WO2010020101A1 - 用于通信系统的图片或多媒体视频图片的监控方法 - Google Patents
用于通信系统的图片或多媒体视频图片的监控方法 Download PDFInfo
- Publication number
- WO2010020101A1 WO2010020101A1 PCT/CN2008/073528 CN2008073528W WO2010020101A1 WO 2010020101 A1 WO2010020101 A1 WO 2010020101A1 CN 2008073528 W CN2008073528 W CN 2008073528W WO 2010020101 A1 WO2010020101 A1 WO 2010020101A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- picture
- multimedia video
- identifier
- monitoring
- video picture
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/564—Enhancement of application control based on intercepted application data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/60—Network streaming of media packets
- H04L65/75—Media network packet handling
- H04L65/765—Media network packet handling intermediate
Definitions
- the present invention relates to the field of communications, and in particular to a method for monitoring a picture or a multimedia video picture of a communication system.
- BACKGROUND OF THE INVENTION In network communication, there is a phenomenon in which bad information is transmitted by using pictures and multimedia video pictures. Therefore, it is desirable to recognize such pictures and multimedia video pictures.
- the multimedia video picture here refers to: All the picture collections during video playback, which is a set of consecutive pictures. In order to be able to identify whether the picture and the multimedia video picture have the above-mentioned bad information, firstly, the content of the picture and the multimedia video picture needs to be characterized, and then the matching method is used to identify the picture and the multimedia video picture.
- the hash algorithm here is also called a hash function (which can also be called a hash function, which does not affect the essence of the invention).
- the Hash function is A function that maps an arbitrarily long input message string into a fixed-length output message string. This output message string is called the hash value of the message, also known as the hash value. A single bit change in any input string will cause approximately half of the bits in the output message string to change.
- the Hash function needs to meet at least the following conditions: 1 The length of the input message string is any length; 2 The length of the output message string is a fixed length; 3 For each given input message string, it is easier to calculate the hash value; 4 Given the Hash function The description, find two different input message strings mapped to the same hash value, can not be calculated. Therefore, the Hash value can be used to uniquely represent a picture.
- the current image representation methods are mainly divided into two categories: one is: first use the Hash algorithm to represent the entire image, and then the image recognition; the other is: First, the image is segmented in some way, then for each The segmentation part calculates the hash value, uses the obtained set of hash values to represent the picture, and finally uses each hash value to perform image recognition.
- This method can identify the picture modified by the content.
- the first type of method can only be used to identify the same picture, and cannot be used to identify the modified picture.
- the second method can identify the picture that has been modified by the content, but recognizes a picture.
- these two types Defects in image characterization methods can result in inefficient recognition of images and thus cannot be easily applied to surveillance systems.
- you combine the two methods together that is, first use the first method, and then use the second method, because you need to perform a Hash calculation on the image, the binary bytes of the initial image are represented. There are more defects in efficiency (ie, lower efficiency). Similar drawbacks exist for multimedia video pictures.
- the present invention aims to provide a method for monitoring pictures or multimedia video pictures of a communication system to solve the above problems.
- a method for monitoring pictures or multimedia video pictures of a communication system is provided.
- a monitoring method for a picture or a multimedia video picture of a communication system includes the following steps: a monitoring point extracts a picture or a multimedia video picture from the communication data; the preprocessing system divides the picture or the multimedia video picture into a plurality of parts and respectively Performing a hash calculation to obtain a hash value for each part; the preprocessing system processes the plurality of hash values to construct an identifier; the primary monitoring system retrieves the identifier in the template library, and the template library includes a plurality of entries, each of which includes an identifier And constituting the hash value identified in the entry; if the identifier is not retrieved, the primary monitoring system retrieves each hash value separately in the template library; the primary monitoring system notifies the pre-processing system and the monitoring point of the retrieval result.
- the primary monitoring system notifying the pre-processing system and the monitoring point of the retrieval result specifically includes: the primary monitoring system notifying the pre-processing system of the retrieval result, and then notifying the monitoring point by the pre-processing system; Or the primary monitoring system notifies the monitoring point and the pre-processing system of the search results.
- the identifier of the picture or multimedia video picture that is forbidden to be forwarded in the entry of the template library and the hash value constituting the identifier in the entry and the method further includes: if the search result is a search To the identification, the primary monitoring system or the pre-processing system forwards the relevant information of the picture or the multimedia video picture to the depth monitoring system; the monitoring point cancels the forwarding of the picture or the multimedia video picture; the pre-processing system forwards the picture or the multimedia video picture to the depth monitoring system .
- the following features are also obtained: If the search result is that the identifier is not retrieved, but the hash value is retrieved, the primary monitoring system or the pre-processing system will take a picture or multimedia video. The related information of the picture is forwarded to the deep monitoring system; the primary monitoring system adds the identifier to the template library; the preprocessing system forwards the picture or the multimedia video picture to the depth monitoring system; and the monitoring point cancels the forwarding picture or the multimedia video picture. Further, in the present invention, the following features are also obtained: If the search result is that the identifier is not retrieved, and the hash value is not retrieved, the monitoring point forwards the picture or the multimedia video picture.
- Each entry further includes an attribute of the identifier
- the primary monitoring system searches the identifier in the template library to specifically include: if the identifier is retrieved, the attribute of the identifier is read. Further, in the present invention, the following features are also obtained: if the search result is that the identifier is retrieved, and the attribute is prohibitive forwarding, the primary monitoring system or the pre-processing system forwards the related information of the picture or the multimedia video picture to the deep monitoring system; The monitoring point cancels forwarding the picture or multimedia video picture; the preprocessing system forwards the picture or multimedia video picture to the depth monitoring system.
- the following feature is also obtained: if the search result is that the identifier is retrieved, and the attribute is allowed to be forwarded, the monitoring point forwards the picture or the multimedia video picture. Further, in the present invention, the following features are also obtained: If the identifier is not retrieved, the primary monitoring system separately searches each of the hash values in the template library to include: the primary monitoring system targets the identifiers in the template library that are prohibited from being forwarded. The hash value retrieves each hash value.
- the primary monitoring system or the pre-processing system forwards the related information of the picture or the multimedia video picture to the depth monitoring system.
- the primary monitoring system adds the identification to the template library; the preprocessing system forwards the picture or multimedia video picture to the deep monitoring system; and the monitoring point cancels the forwarding of the picture or multimedia video picture.
- the following features are also obtained: If the search result is that the identifier is not retrieved, and the hash value is not retrieved, the primary monitoring system or the pre-processing system forwards the related information of the picture or the multimedia video picture to the depth monitoring.
- the preprocessing system forwards the picture or multimedia video picture to the deep monitoring system; the primary monitoring system receives the notification from the deep monitoring system and notifies the monitoring point accordingly.
- the notification indicates that the forwarding of the picture or the multimedia video picture is prohibited
- the method further includes: the primary monitoring system adds the identifier to the template library, and sets the attribute of the identifier. To prohibit forwarding, multiple hash values are added to the identified entry, and the monitoring point is notified of the prohibition of forwarding; the monitoring point cancels forwarding the picture or multimedia video picture.
- the notification indicates that the picture or the multimedia video picture is allowed to be forwarded
- the method further includes: the primary monitoring system adds the identifier and the multiple hash values to the template library, and sets the attribute of the identifier to allow forwarding; The system notifies the monitoring point about the indication of allowing forwarding; the monitoring point forwards the picture or multimedia video picture.
- the following features are also obtained: when the monitoring point does not receive the notification within a predetermined time, the picture or the multimedia video picture is forwarded or cancelled.
- the following features are also obtained: If the search result is that the identifier is not retrieved, and the hash value is not retrieved, the monitoring point forwards the picture or the multimedia video picture. Further, in the present invention, the following information is further characterized in that the related information includes at least one of the following: a sender identifier, a receiver identifier, a service identifier, a block size, a message sending time, a picture format, and a picture, or a multimedia video picture. Image size.
- dividing the picture into multiple parts and performing Hash calculation separately to obtain the hash value of each part specifically includes: Preprocessing system picture is divided into NM parts, N and M All are positive integers; the preprocessing system performs Hash value calculation on the above N x M parts respectively, and obtains NM hash values.
- the processing of the plurality of hash values to construct an identifier specifically includes: the pre-processing system performs a hash calculation on the plurality of hash values to obtain a feature hash value as the target.
- performing Hash calculation on multiple hash values to obtain a feature hash value specifically includes: the preprocessing system concatenates multiple hash values into one character string; preprocessing system pairs string A hash calculation is performed to obtain a character string with a reduced number of bits as a feature hash value.
- processing multiple hash values to construct an identifier specifically includes: The preprocessing system concatenates multiple hash values into a string as an identifier.
- the following features are also included: performing format processing and or size processing on the picture to obtain the processed picture; Then, for the processed picture, a step of dividing the picture into a plurality of parts and performing Hash calculation respectively and a step of processing a plurality of hash values to construct an identifier are performed. Further, in the present invention, the following features are also obtained: color processing the picture to obtain a color-processed picture; and then performing a step of dividing the picture into a plurality of parts and performing Hash calculation separately for the color-processed picture and The step of processing multiple hash values to construct an identity.
- the following features are also obtained: extracting the feature values one time for the picture to obtain the extracted I sub-pictures and one sub-picture of the remaining part of the original picture after the extraction; and then performing for 1+1 sub-pictures The step of dividing the picture into a plurality of parts and performing Hash calculation separately and processing a plurality of hash values to construct an identification.
- the following features are also obtained: dividing the multimedia video picture into multiple parts and performing Hash calculation separately, to obtain the hash value of each part specifically: the preprocessing system multimedia video picture is divided into N parts , N is a positive integer; the data of all the pictures of each part of the N parts are respectively connected in series according to a predetermined manner to form N data parts; the preprocessing system performs Hash value calculation on the N parts respectively, and obtains N Hash value.
- processing a plurality of hash values to construct an identifier specifically includes: the preprocessing system performs a hash calculation on the plurality of hash values to obtain a feature hash value as the identifier.
- performing Hash calculation on multiple hash values to obtain a feature hash value specifically includes: the preprocessing system concatenates multiple hash values into one character string; preprocessing system pairs string A hash calculation is performed to obtain a character string with a reduced number of bits as a feature hash value.
- processing multiple hash values to construct an identifier specifically includes: The preprocessing system concatenates multiple hash values into a string as an identifier.
- the following features are also: color processing the multimedia video picture to obtain the color processed multimedia video picture; and then dividing the multimedia video picture into multiple parts for the color processed multimedia video picture and The steps of performing a hash calculation separately and processing a plurality of hash values to construct an identifier.
- the following features are also obtained: extracting feature values of the first time of the multimedia video picture to obtain one sub-multimedia video picture and one sub-picture of the remaining part of the original picture after the extraction; and then for 1+1 sub-multimedia videos
- the picture performs the steps of dividing the multimedia video picture into a plurality of parts and performing Hash calculation separately, and processing a plurality of hash values to construct a target.
- the following features are also obtained: pre-determining a picture or a multimedia video picture that is allowed to be forwarded or prohibited from being forwarded into multiple parts and performing Hash calculation separately to obtain a hash value of each part; Multiple hash values are processed for identification; the identity and multiple hash values are added to the entry in the template library, and the identified attributes are set to allow forwarding or prohibit forwarding.
- the present invention overcomes the prior art picture or the method of monitoring the picture or the multimedia video picture by using the method for monitoring multiple hash values into one identifier and monitoring only the identifier first.
- the problem of low efficiency of multimedia video picture monitoring improves the efficiency of picture or multimedia video picture monitoring in communication.
- FIG. 1 is a flowchart of a method for monitoring a picture or a multimedia video picture of a communication system according to an embodiment of the present invention
- FIG. 2 is a monitoring system according to a preferred embodiment 1 of the present invention in a communication network.
- FIG. 3 is a schematic diagram of an implementation of a monitoring system in a communication network according to a preferred embodiment 2 of the present invention
- Figure 4 is a schematic diagram of a method for monitoring a picture or a multimedia video picture according to a preferred embodiment 3 of the present invention
- FIG. 6 is a schematic diagram of a picture segmentation according to a preferred embodiment of the present invention
- FIG. 7 is a schematic diagram of a picture characterization method according to a preferred embodiment of the present invention
- FIG. 8 is a schematic diagram of multimedia video picture segmentation according to a preferred embodiment of the present invention
- FIG. 9 is a schematic diagram of a multimedia video picture representation method according to a preferred embodiment of the present invention.
- the embodiment of the present invention provides a monitoring scheme for a picture or a multimedia video picture of a communication system, in which the function of the present invention is not considered.
- the monitoring point extracts a picture or a multimedia video picture from the communication data, and the preprocessing system divides the picture or the multimedia video picture into multiple parts and performs Hash calculation separately to obtain the hash value of each part, and then, the preprocessing system has multiple
- the hash value is processed to construct an identifier
- the primary monitoring system retrieves the identifier in the template library, where the template library includes a plurality of entries, wherein each entry includes an identifier and a hash value constituting the identifier in the entry, if the identifier is not retrieved
- the primary monitoring system separately retrieves each hash value in the template library, and the primary monitoring system notifies the pre-processing system and the monitoring point of the retrieval result.
- Step S10 The monitoring point extracts a picture or a multimedia video picture from the communication data.
- Step S20 The preprocessing system divides the picture or the multimedia video picture into multiple parts and performs Hash calculation separately to obtain a hash value of each part; S30.
- the preprocessing system processes the plurality of hash values to construct an identifier.
- step S40 the primary monitoring system searches the template library for the identifier.
- the template library includes multiple entries, and each entry includes an identifier and an identifier formed in the entry. Hash value; Step S50, if the identifier is not retrieved, the primary monitoring system separately retrieves each hash value in the template library; and in step S60, the primary monitoring system notifies the pre-processing system and the monitoring point of the retrieval result.
- the monitoring center in FIG. 2 corresponds to the primary monitoring system in the embodiment, as shown in FIG. 2, on its communication network, Monitoring points and monitoring centers are set up.
- the monitoring point is responsible for extracting the information that needs to be monitored, and the monitoring center is responsible for completing the monitoring of the information content.
- the monitoring point can be a network device such as an access gateway, a border gateway, a content filtering device, or a deep mining device.
- the monitoring point can be a Multi Media Service Center (MMSC). SMS gateway and other devices.
- MMSC Multi Media Service Center
- FIG. 3 is a schematic diagram of implementation of a monitoring system in a communication network according to a preferred embodiment 2 of the present invention.
- the primary monitoring system of FIG. 3 is only a monitoring center of the primary monitoring system.
- the two-level monitoring system of the b-picture includes a primary monitoring system and a deep monitoring system.
- the depth monitoring system is more ⁇ 2 labor only for other work.
- the pre-processing system sends the calculated identifier and hash value string used to represent the picture and the multimedia video picture and related information to the monitoring center according to the requirements of the security policy rule.
- Relevant information may include sender identification (eg, name, mobile number, IP address), recipient identification (eg, name, mobile number, IP address), business identification (eg, MMS identity, port number, stream category), Information block size (for example, number of bytes), information transmission time, picture format, picture size, and so on.
- the monitoring center analyzes the "user behavior" according to the received identity, hash value string and pre-template library according to the security policy rules.
- the foregoing step S60 specifically includes: the primary monitoring system notifying the pre-processing system of the retrieval result, and then notifying the monitoring point by the pre-processing system; or the primary monitoring system notifying the monitoring point and the pre-processing system at the same time.
- the template library herein pre-stores the image of the forbidden forwarding picture or the multimedia video picture. If the retrieval result is the retrieved identifier, the primary monitoring system or the pre-processing system forwards the information of the picture or the multimedia video picture to the depth monitoring system; The point cancels the forwarding of the picture or the multimedia video picture; the preprocessing system forwards the picture or the multimedia video picture to the depth monitoring system.
- the processing operations for the search results include the following:
- the primary monitoring system or the pre-processing system forwards the related information of the picture or the multimedia video picture to the deep monitoring system; the primary monitoring system adds the identifier to the template library; The pre-processing system forwards the picture or multimedia video picture to the depth monitoring system; and the monitoring point cancels the forwarding of the picture or the multimedia video picture.
- the Hash value is retrieved, it indicates that the picture or multimedia video picture may be a modified forbidden forwarding picture, and the preferred embodiment processes the situation accordingly.
- the search result is that the identifier is not retrieved, and the hash value is not retrieved, the monitoring point forwarding picture or the multimedia video picture identifier and the hash value are all retrieved, and the picture or the multimedia video picture can be confirmed as good information. Can be forwarded.
- the primary monitoring system retrieving the identifier in the template library specifically includes: if the identifier is retrieved, the attribute of the identifier is read.
- An attribute field is added to the template library of the preferred embodiment to specifically define whether the picture or the multimedia video picture is good information and whether it should be forwarded.
- the primary monitoring system or the pre-processing system forwards the related information of the picture or the multimedia video picture to the deep monitoring system; the monitoring point cancels the forwarding of the picture or the multimedia video picture; Preprocessing system will take pictures or multimedia video pictures The slice is forwarded to the deep monitoring system.
- the preferred embodiment attribute is set to prohibit forwarding, and the forwarding of the picture or multimedia video picture is directly cancelled.
- the monitoring point forwards the picture or multimedia video picture.
- the preferred embodiment attribute is set to allow forwarding, and the forwarding of the picture or multimedia video picture is directly allowed.
- the primary monitoring system separately retrieves each hash value in the template library, specifically: the primary monitoring system retrieves each hash value for the hash value of the identifier in the template library whose attribute is forbidden to forward. This is for the case where the picture or multimedia video picture may be a modified picture or multimedia video picture that is prohibited from being forwarded.
- the primary monitoring system or the pre-processing system forwards the related information of the picture or the multimedia video picture to the deep monitoring system; the primary monitoring system adds the identifier to the template library; The pre-processing system forwards the picture or multimedia video picture to the depth monitoring system; and the monitoring point cancels the forwarding of the picture or the multimedia video picture.
- the Hash value is retrieved, it can be confirmed that it has been modified to be processed accordingly.
- the primary monitoring system or the pre-processing system forwards the related information of the picture or the multimedia video picture to the deep monitoring system; the pre-processing system will take the picture or multimedia video The picture is forwarded to the in-depth monitoring system; the primary monitoring system receives notifications from the in-depth monitoring system and notifies the monitoring points accordingly. If the identifier and the hash value are not retrieved, it indicates that the picture or the multimedia video picture is a new picture or a multimedia video picture that has never entered the monitoring system, and the preferred embodiment performs corresponding processing for the situation, for example, forwarding to the depth.
- the monitoring system (which can be manually monitored by a specific regulatory agency) is processed.
- the process of the notification indicating that the picture or the multimedia video picture is forbidden or allowed to be forwarded specifically includes: First, the process of notifying the forwarding of the picture or the multimedia video picture by the notification includes: the primary monitoring system adds the identifier to the template library, and the attribute of the identifier is prohibited. Forwarding, adding multiple hash values to the identified entry, and notifying the monitoring point about the prohibition of forwarding; the monitoring point cancels forwarding the picture or multimedia video picture. In this embodiment, when the indication of prohibiting forwarding is received, the forwarding of the picture or the multimedia video picture is cancelled accordingly.
- an instruction to allow forwarding is received, and the picture or multimedia video picture is forwarded accordingly, and the attribute information is added to the template library.
- the monitoring point does not receive the notification within the predetermined time, the picture or multimedia video picture is forwarded or cancelled.
- This preferred embodiment gives a processing scheme for the timeout condition.
- the monitoring point forwards the picture or the multimedia video picture. If neither the identifier nor the hash value is retrieved, it indicates that the picture or multimedia video picture is a new picture or multimedia video picture that has never entered the monitoring system.
- the preferred embodiment performs corresponding processing for this case, for example, direct forwarding.
- the above related information may include sender identification (eg, name, mobile number, IP address), recipient identification (eg, name, mobile number, IP address), service identification (eg, MMS identity, port number, stream category) , information block size (for example, number of bytes), information transmission time, picture format, picture size, and so on.
- Step S401 the monitoring center according to the security policy rule It is required to receive the identifier of the characterization picture or the multimedia video picture sent from the pre-processing system, the hash value string and related information, and analyze the "user behavior" according to the pre-template library.
- Relevant information may include sender identification (eg, name, mobile number, IP address), recipient identification (eg, name, mobile number, IP address), service identification (eg, IP packet identification, MMS identity), block size (for example, number of bytes), information transmission time, picture format, picture size, and so on.
- Step S402 The monitoring center searches for the entire picture or the multimedia video picture according to the security policy rule requirement, and searches in the template library.
- the monitoring center finds that the matching identifier can be retrieved.
- the monitoring center feeds back the information to the pre-processing system, and the pre-processing system notifies the monitoring point, allowing Forward the message; or the monitoring center directly notifies the monitoring point, forwards the message, and feeds back information to the pre-processing system.
- Step S404 The monitoring center finds that the matching identifier cannot be retrieved, and then uses the hash value of each part of the picture or the multimedia video picture to be searched in the template library.
- the next step is processed according to the security policy rules.
- the monitoring center feeds back information to the pre-processing system.
- the pre-processing system reports information such as pictures or multimedia video pictures to the monitoring center, and pre-processes the system feedback information to the monitoring points.
- the monitoring points are prohibited, delayed, or allowed according to the requirements of the security policy rules. Forward the picture or multimedia video picture.
- the security policy rule requirement when a certain hash value or a hash value is matched, the attribute of the hash value of the picture or the multimedia video picture is set to be prohibited from being forwarded, indicating that the picture or the multimedia video picture violates the security policy rule.
- the monitoring center feeds back information to the preprocessing system, and the preprocessing system notifies the monitoring point to prohibit forwarding of the message; or the monitoring center notifies the monitoring point, prohibits forwarding the message, and feeds this information back to the preprocessing system; meanwhile, the monitoring center It may be necessary to notify the supervisor that the transmission of controlled information occurs on the communication network.
- Step S405 The monitoring center finds, by searching the template library, that no match of any one of the hash values in the hash value string is found, indicating that this is a new picture or multimedia video picture that has not appeared on the communication network, and then according to the security policy rule Request, proceed to the next step.
- the monitoring center feeds back information to the pre-processing system.
- the pre-processing system can report information such as pictures or multimedia video pictures to the monitoring center, and pre-process the system feedback information to the monitoring point.
- the monitoring points can be prohibited or delayed according to the requirements of the security policy rules. Or allow forwarding of this picture or multimedia video picture.
- 5 is a schematic diagram of a method for monitoring a picture or a multimedia video picture according to a preferred embodiment 4 of the present invention.
- Step S501 the monitoring point is required according to the security policy rule.
- Relevant information may include sender identification (such as name, mobile number, IP address;), recipient identification (such as name, mobile number, IP address;), service identification (such as IP packet identification, MMS identification), information block size (such as the number of bytes), information transmission time, picture format, picture size, and so on.
- Step S502 The pre-processing system sends the calculated identifier, the hash value string, and related information used to represent the picture or the multimedia video picture to the monitoring center according to the security policy rule requirement.
- Step S503 The monitoring center (primary monitoring system) analyzes the "user behavior" according to the received identifier, the hash value string, and the pre-template library according to the security policy rule requirements. If the image or multimedia video picture is found to be existing, and the specific attribute is allowed to be forwarded, indicating that the picture or the multimedia video picture meets the requirements of the security policy rule, the monitoring center (primary monitoring system) feeds back information to the pre-processing system.
- the pre-processing system then notifies the monitoring point to allow the message to be forwarded; or the monitoring center (primary monitoring system) directly notifies the monitoring point, forwards the message, and feeds back information to the pre-processing system.
- Step S504 The monitoring center (primary monitoring system) analyzes the "user behavior" according to the received identifier, the hash value string, and the pre-template library according to the security policy rule requirements. If the image or multimedia video picture is found to be existing, and the specific attribute is forbidden to forward, indicating that the picture or the multimedia video picture violates the security policy rule requirement, the monitoring center (primary monitoring system) feedback information is sent to the preprocessing system, and the preprocessing is performed.
- Step S505 The monitoring center (primary monitoring system) analyzes the "user behavior" according to the received identifier, the hash value string, and the pre-template library according to the security policy rule requirements.
- the monitoring center feeds back information to the preprocessing system according to the security policy rules.
- the preprocessing system may need to take pictures or multimedia video pictures, related information, and identifiers.
- the Hash value string and other information is reported to the monitoring center (deep monitoring system).
- the monitoring center deep monitoring system
- the monitoring center may need to notify the monitoring personnel to transmit the modified picture or multimedia video picture on the communication network.
- the pre-processing system feeds back information to the monitoring point, and the monitoring point prohibits, delays or allows the forwarding of the picture or multimedia video picture according to the requirements of the security policy rule.
- Step S506 The monitoring center (primary monitoring system) analyzes the "user behavior" according to the received identifier, the hash value string, and the pre-template library according to the security policy rule requirements. If it is found to be a new picture or multimedia video picture, the monitoring center (primary monitoring system) feedback information is sent to the preprocessing system according to the security policy rule requirements, and the preprocessing system needs to take pictures or multimedia video pictures, related information, identification, Hash The value string and other information is reported to the monitoring center (deep monitoring system). The monitoring center (deep monitoring system) may need to notify the monitoring personnel, and new information appears on the communication network. Transfer of pictures or multimedia video pictures.
- the pre-processing system feeds back information to the monitoring point, and the monitoring point prohibits, delays or allows the forwarding of the picture or multimedia video picture according to the requirements of the security policy rule.
- the monitoring center deep monitoring system
- the monitoring center may find that the modified picture or the transmission of the multimedia video picture appears on the communication network, or the transmission of a new picture or multimedia video picture occurs, it may be necessary to notify the monitoring personnel to identify the picture.
- the conclusion that the picture is allowed to be forwarded or prohibited is forwarded, and the conclusion is stored in the template library, and the corresponding monitoring point is notified, and the forwarding process is allowed to be forwarded or prohibited according to the foregoing.
- the monitoring point takes delay forwarding measures according to the security policy rules, if no further information is obtained from the monitoring center (primary monitoring system, deep monitoring system) at a given time, it can be processed according to the security policy rules, such as prohibition. Forward or allow forwarding.
- the template library saved in the deep monitoring system can be updated to the primary monitoring system according to the requirements of the security policy rules.
- the picture characterization method of the preferred embodiment of the present invention will be specifically described below. 6 is a schematic diagram of picture segmentation in accordance with a preferred embodiment of the present invention. As shown in FIG. 6, at the monitoring point, according to the requirements of the security policy rule, the received picture is extracted and submitted as an initial picture to the pre-processing system.
- the pre-processing system divides the initial picture into NM parts according to the requirements of the security policy rules. Then, the preprocessing system performs a hash value calculation on the NM parts respectively, and obtains a hash value of each part to form a set of hash values. Then, the hash value string is processed to form an identifier, for example, using a hash algorithm to obtain a hash value; for example, the set of hash values are concatenated. Finally, this flag is used to uniquely characterize the initial picture.
- dividing the picture into multiple parts and performing Hash calculation separately to obtain the hash value of each part specifically includes: preprocessing system picture is divided into NM parts, N and M are positive integers; preprocessing system is to the above NM The hash values are calculated separately to obtain N hash values.
- the processing of the multiple hash values to obtain an identifier may include one of the following processes: (1) The preprocessing system performs a hash calculation on the plurality of hash values to obtain a feature hash value as the identifier.
- the hash calculation of the plurality of hash values to obtain a feature hash value specifically includes: the preprocessing system concatenates the plurality of hash values into a string; the preprocessing system performs a hash calculation on the string to obtain a reduced number of bits.
- the string is used as the feature hash value.
- the preprocessing system concatenates multiple hash values into a single string as an identifier.
- the monitoring method may further include the following processing:
- the pre-processing system can perform regular pre-processing on the initial picture according to the requirements of the security policy rules before performing the picture segmentation.
- the initial picture is converted to a standard picture format and or picture size according to a given method.
- the pre-processing system may perform color characterization on the initial picture according to the requirements of the security policy rules before performing the picture segmentation. For example, converting a picture represented by color to a picture represented by gray.
- the pre-processing system may use the conventional feature extraction method for the initial picture according to the requirements of the security policy rule, and extract the feature values of the initial picture one time to form 1+1 pictures that need to be matched.
- FIG. 7 is a schematic diagram of a picture characterization method according to a preferred embodiment of the present invention. As shown in FIG. 7, the method includes the following steps S701 to S708: Step S701, the monitoring point will receive the initial picture according to the security policy rule requirement. And related information is submitted to the pre-processing system.
- Relevant information may include sender identification (such as name, mobile number, IP address), recipient identification (such as name, mobile number, IP address), service identification (such as IP packet identification, MMS identification), information block size (such as words) Number of sections), information transmission time, picture format, picture size, etc.
- sender identification such as name, mobile number, IP address
- recipient identification such as name, mobile number, IP address
- service identification such as IP packet identification, MMS identification
- information block size such as words) Number of sections
- information transmission time picture format, picture size, etc.
- Step S702 the pre-processing system performs normal pre-processing on the initial picture according to the requirements of the security policy rule. For example, the initial picture is converted to a standard picture format or/and picture size according to a given method.
- Step S703 The pre-processing system performs color processing on the picture according to the requirements of the security policy rule. For example, converting a color picture to a picture in grayscale.
- Step S704 the pre-processing system uses the conventional feature value extraction method according to the security policy rule requirement, and extracts the feature value of the image for one time, and the extracted feature value can be regarded as one sub-picture to form 1+1 sub-pictures.
- Step S705 The pre-processing system divides the picture data into NM parts or divides the 1+1 sub-picture data formed by the feature value extraction into NXM parts according to the requirements of the security policy rule.
- Step S706 the pre-processing system performs, according to the security policy rule, the NXM segmentation part or the (1+1) x N x M segmentation parts of the picture according to the given hash algorithm or the Hash algorithm of the ten-operator.
- the Hash value is calculated, and the hash value of each part is obtained to form a hash value string, which is used to represent the entire picture.
- Step S707 The pre-processing system calculates N x M or (1+1) XN x M hash values calculated for each segment of the image according to the requirements of the security policy rule, according to a given algorithm or ten businesses. The algorithm performs one-time identification calculation to obtain one identifier, which is used to represent the entire picture.
- Step S708 outputting a picture representation result.
- the initial picture may be characterized by the identifier obtained in step S707, or may be represented by the hash value string obtained in step S706.
- FIG. 8 is a schematic diagram of multimedia video picture segmentation according to a preferred embodiment of the present invention.
- the received multimedia video picture is extracted as an initial multimedia video picture.
- the pre-processing system divides the initial multimedia video picture into N parts according to security policy rules.
- the preprocessing system performs a hash value calculation on the N parts, and obtains a hash value of each part to form a Group hash value. Then, the hash value string is processed to obtain an identifier. For example, a Hash algorithm is used for this set of hash values to obtain a hash value as an identifier; the set of hash values are concatenated as an identifier. Finally, this identification is used to uniquely characterize the initial multimedia video picture. The preferred embodiment only uses the identification, and does not need to perform Hash calculation on the entire multimedia video picture, so that the entire multimedia video picture can be represented by one identifier, because the number of recognitions can be reduced, and the number of character strings can be significantly shortened to reduce the recognition work.
- dividing the multimedia video picture into multiple parts and performing Hash calculation separately to obtain the hash value of each part specifically includes: preprocessing system, the multimedia video picture is divided into N parts, and N is a positive integer; The data of all the pictures in each part are respectively connected in series according to a predetermined manner to form N data parts.
- the preprocessing system performs Hash value calculation on the N parts respectively to obtain N hash values.
- the processing of the multiple hash values to obtain an identifier may include one of the following operations: (1)
- the preprocessing system performs a hash calculation on the plurality of hash values to obtain a feature hash value as the identifier.
- the hash calculation of the plurality of hash values to obtain a feature hash value specifically includes: the preprocessing system concatenates the plurality of hash values into a string; the preprocessing system performs a hash calculation on the string to obtain a reduced number of bits.
- the string is used as the feature hash value.
- the preprocessing system concatenates multiple hash values into a single string as an identifier.
- the monitoring method can also include one of the following:
- the pre-processing system may perform conventional pre-processing on the initial multimedia video picture according to the requirements of the security policy rule before performing the multimedia video picture segmentation.
- the initial multimedia video picture is converted to a standard multimedia video picture format and or a multimedia video picture size according to a given method.
- the pre-processing system may perform color characterization on the initial multimedia video picture according to the requirements of the security policy rule. For example, a multimedia video picture represented by color is converted into a multimedia video picture expressed in grayscale.
- FIG. 9 is a schematic diagram showing a multimedia video picture characterization method according to a preferred embodiment of the present invention. As shown in FIG. 9, the method includes the following steps S901 to S906: Step S901, the monitoring point receives the received according to the security policy rule requirements. The initial multimedia video picture and its associated information are submitted to the pre-processing system.
- Relevant information may include sender identification (eg, name, mobile number, IP address), recipient identification (eg, name, mobile number, IP address), service identification (eg, IP packet identification, MMS identity), block size (for example, number of bytes), information transmission time, multimedia video picture format, multimedia video picture size, and so on.
- sender identification eg, name, mobile number, IP address
- recipient identification eg, name, mobile number, IP address
- service identification eg, IP packet identification, MMS identity
- block size for example, number of bytes
- Step S904 The pre-processing system performs Hash value calculation on each of the N divided parts of the multimedia video picture according to the given Hash algorithm or the negotiated Hash algorithm according to the requirements of the security policy rule, and obtains the hash value of each divided part. , forming a hash value string, used to represent each segment of the multimedia video picture.
- Step S905 The pre-processing system performs the identification calculation on the N hash values calculated by the divided parts of the multimedia video picture according to the requirements of the security policy rule, and obtains one identifier by using a given algorithm or a negotiated algorithm. To characterize the entire multimedia video picture.
- Step S906 outputting a multimedia video picture representation result.
- the initial multimedia video picture may be characterized by the hash value obtained in step S904, and the initial multimedia video picture may be characterized by the identifier obtained in step S905.
- the monitoring method of the present invention can quickly recognize the initial picture and the initial multimedia video picture, and can recognize the enlarged and reduced, the color expression change, the modified picture, and can recognize the color passing. Multimedia video pictures with different expressions and content modifications can be easily applied to the monitoring system.
- the monitoring method overcomes the problem of low efficiency of monitoring pictures or multimedia video pictures in the prior art by first processing multiple hash values into one identifier and first monitoring only one identifier, and improves picture or multimedia video picture monitoring in communication. s efficiency.
- modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device, or they may be separately fabricated into individual integrated circuit modules, or they may be Multiple modules or steps are made into a single integrated circuit module.
- the invention is not limited to any specific combination of hardware and software.
- the above is only the preferred embodiment of the present invention, and is not intended to limit the present invention.
- the present invention can be variously modified and modified. Any modifications, equivalent substitutions, improvements, etc. made therein are intended to be included within the scope of the present invention.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Technology Law (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Storage Device Security (AREA)
Description
Claims
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2011519004A JP5254443B2 (ja) | 2008-08-22 | 2008-12-16 | 通信システムの画像またはマルチメディアビデオ画像に使用される監視方法 |
US13/055,140 US8532331B2 (en) | 2008-08-22 | 2008-12-16 | Method for monitoring a picture or multimedia video pictures in a communication system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200810214016A CN101350826B (zh) | 2008-08-22 | 2008-08-22 | 用于通信系统的图片或多媒体视频图片的监控方法 |
CN200810214016.7 | 2008-08-22 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2010020101A1 true WO2010020101A1 (zh) | 2010-02-25 |
Family
ID=40269401
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2008/073528 WO2010020101A1 (zh) | 2008-08-22 | 2008-12-16 | 用于通信系统的图片或多媒体视频图片的监控方法 |
Country Status (4)
Country | Link |
---|---|
US (1) | US8532331B2 (zh) |
JP (1) | JP5254443B2 (zh) |
CN (1) | CN101350826B (zh) |
WO (1) | WO2010020101A1 (zh) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120084608A1 (en) * | 2010-10-05 | 2012-04-05 | Michael Pasternak | Mechanism for Performing Verification of Template Integrity of Monitoring Templates Used for Customized Monitoring of System Activities |
US20130077873A1 (en) * | 2011-09-23 | 2013-03-28 | GM Global Technology Operations LLC | System and method of fast object detection using parts to whole fragment detection |
US9355004B2 (en) | 2010-10-05 | 2016-05-31 | Red Hat Israel, Ltd. | Installing monitoring utilities using universal performance monitor |
US9363107B2 (en) | 2010-10-05 | 2016-06-07 | Red Hat Israel, Ltd. | Accessing and processing monitoring data resulting from customized monitoring of system activities |
US9524224B2 (en) | 2010-10-05 | 2016-12-20 | Red Hat Israel, Ltd. | Customized monitoring of system activities |
CN112562146A (zh) * | 2020-10-29 | 2021-03-26 | 重庆恢恢信息技术有限公司 | 一种基于智慧云平台实现建筑工地人员流动方法 |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104217205B (zh) | 2013-05-29 | 2018-05-18 | 华为技术有限公司 | 一种识别用户活动类型的方法及系统 |
CN103984776B (zh) * | 2014-06-05 | 2017-05-03 | 北京奇虎科技有限公司 | 一种识别重复图片的方法、图片搜索去重方法及其装置 |
CN112530068B (zh) * | 2020-10-29 | 2023-09-22 | 重庆恢恢信息技术有限公司 | 一种通过物联网实现智慧建筑工地的人员识别方法 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1599372A (zh) * | 2004-06-25 | 2005-03-23 | 港湾网络有限公司 | 基于媒体访问控制的802.1x认证的实体查找方法 |
CN1713569A (zh) * | 2004-06-25 | 2005-12-28 | 佳能株式会社 | 信息处理装置及其控制方法和图像处理装置及其控制方法 |
CN101018129A (zh) * | 2006-12-31 | 2007-08-15 | 华东师范大学 | 公共安全播控媒体管理与识别其完整未被篡改的认证方法 |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080141033A1 (en) * | 1995-02-13 | 2008-06-12 | Intertrust Technologies Corporation | Trusted and secure techniques, systems and methods for item delivery and execution |
US6728398B1 (en) * | 2000-05-18 | 2004-04-27 | Adobe Systems Incorporated | Color table inversion using associative data structures |
US7102669B2 (en) * | 2002-04-02 | 2006-09-05 | Freescale Semiconductor, Inc. | Digital color image pre-processing |
CN1279493C (zh) * | 2004-01-19 | 2006-10-11 | 上海交通大学 | 基于四叉树的图像可靠性认证方法 |
JP4740706B2 (ja) * | 2005-09-28 | 2011-08-03 | ヤフー株式会社 | 不正画像検出装置、方法、プログラム |
JP5309354B2 (ja) * | 2006-02-28 | 2013-10-09 | 独立行政法人産業技術総合研究所 | 高速パターンマッチング装置の探索方法 |
US7661121B2 (en) * | 2006-06-22 | 2010-02-09 | Tivo, Inc. | In-band data recognition and synchronization system |
-
2008
- 2008-08-22 CN CN200810214016A patent/CN101350826B/zh active Active
- 2008-12-16 JP JP2011519004A patent/JP5254443B2/ja active Active
- 2008-12-16 WO PCT/CN2008/073528 patent/WO2010020101A1/zh active Application Filing
- 2008-12-16 US US13/055,140 patent/US8532331B2/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1599372A (zh) * | 2004-06-25 | 2005-03-23 | 港湾网络有限公司 | 基于媒体访问控制的802.1x认证的实体查找方法 |
CN1713569A (zh) * | 2004-06-25 | 2005-12-28 | 佳能株式会社 | 信息处理装置及其控制方法和图像处理装置及其控制方法 |
CN101018129A (zh) * | 2006-12-31 | 2007-08-15 | 华东师范大学 | 公共安全播控媒体管理与识别其完整未被篡改的认证方法 |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120084608A1 (en) * | 2010-10-05 | 2012-04-05 | Michael Pasternak | Mechanism for Performing Verification of Template Integrity of Monitoring Templates Used for Customized Monitoring of System Activities |
US9256488B2 (en) * | 2010-10-05 | 2016-02-09 | Red Hat Israel, Ltd. | Verification of template integrity of monitoring templates used for customized monitoring of system activities |
US9355004B2 (en) | 2010-10-05 | 2016-05-31 | Red Hat Israel, Ltd. | Installing monitoring utilities using universal performance monitor |
US9363107B2 (en) | 2010-10-05 | 2016-06-07 | Red Hat Israel, Ltd. | Accessing and processing monitoring data resulting from customized monitoring of system activities |
US9524224B2 (en) | 2010-10-05 | 2016-12-20 | Red Hat Israel, Ltd. | Customized monitoring of system activities |
US20130077873A1 (en) * | 2011-09-23 | 2013-03-28 | GM Global Technology Operations LLC | System and method of fast object detection using parts to whole fragment detection |
US9400945B2 (en) * | 2011-09-23 | 2016-07-26 | GM Global Technology Operations LLC | System and method of fast object detection using parts to whole fragment detection |
CN112562146A (zh) * | 2020-10-29 | 2021-03-26 | 重庆恢恢信息技术有限公司 | 一种基于智慧云平台实现建筑工地人员流动方法 |
CN112562146B (zh) * | 2020-10-29 | 2023-09-22 | 重庆恢恢信息技术有限公司 | 一种基于智慧云平台实现建筑工地人员流动方法 |
Also Published As
Publication number | Publication date |
---|---|
CN101350826B (zh) | 2012-09-05 |
US8532331B2 (en) | 2013-09-10 |
JP2011529213A (ja) | 2011-12-01 |
CN101350826A (zh) | 2009-01-21 |
JP5254443B2 (ja) | 2013-08-07 |
US20110123064A1 (en) | 2011-05-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2010020101A1 (zh) | 用于通信系统的图片或多媒体视频图片的监控方法 | |
US10257092B2 (en) | CCN routing using hardware-assisted hash tables | |
EP3413507B1 (en) | Electronic documents certification | |
WO2022083417A1 (zh) | 一种数据包处理方法、装置、电子设备、计算机可读存储介质以及计算机程序产品 | |
US8554774B2 (en) | System and method for word indexing in a capture system and querying thereof | |
US9742667B2 (en) | Packet processing method, device and system | |
US6549957B1 (en) | Apparatus for preventing automatic generation of a chain reaction of messages if a prior extracted message is similar to current processed message | |
CN110119292B (zh) | 系统运行参数查询方法、匹配方法、装置及节点设备 | |
CN109766707B (zh) | 基于区块链的数据处理方法、装置、设备和介质 | |
EP2186275B1 (en) | Generating a fingerprint of a bit sequence | |
AU2014226654A1 (en) | Document classification using multiscale text fingerprints | |
JP2012164031A (ja) | データ処理装置及びデータ保管装置及びデータ処理方法及びデータ保管方法及びプログラム | |
CN101789905A (zh) | 防止未知组播攻击cpu的方法和设备 | |
CN111367874B (zh) | 一种日志处理方法、装置、介质和设备 | |
CN108764902B (zh) | 用于存储数据的方法、节点和区块链系统 | |
JPWO2015151184A1 (ja) | 通信システム、通信方法、中継装置、および、通信プログラム | |
CN111666575B (zh) | 基于词元编码的文本无载体信息隐藏方法 | |
CN108566382B (zh) | 基于规则生命周期检测的防火墙自适应能力提升方法 | |
CN112087389B (zh) | 一种报文匹配查表方法、系统、存储介质和终端 | |
CN107124410A (zh) | 基于机器深度学习的网络安全态势特征聚类方法 | |
CN109391583B (zh) | 一种基于恶意应用的攻击者溯源方法和系统 | |
CN116015796A (zh) | 一种流表更新方法、装置、防火墙设备及存储介质 | |
CN115865843A (zh) | 规则存储方法、报文处理方法、装置、电子设备及介质 | |
CN111835727B (zh) | 一种基于cpu+fpga+搜索引擎平台实现网络访问控制的方法 | |
Wang et al. | Teng |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08876778 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13055140 Country of ref document: US |
|
ENP | Entry into the national phase |
Ref document number: 2011519004 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 08876778 Country of ref document: EP Kind code of ref document: A1 |