WO2016103581A1 - Moving image generating method, tamper detecting method, moving image generating device, tamper detecting device, and tamper detecting system - Google Patents

Moving image generating method, tamper detecting method, moving image generating device, tamper detecting device, and tamper detecting system Download PDF

Info

Publication number
WO2016103581A1
WO2016103581A1 PCT/JP2015/005900 JP2015005900W WO2016103581A1 WO 2016103581 A1 WO2016103581 A1 WO 2016103581A1 JP 2015005900 W JP2015005900 W JP 2015005900W WO 2016103581 A1 WO2016103581 A1 WO 2016103581A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
image
moving image
encoded
region
Prior art date
Application number
PCT/JP2015/005900
Other languages
French (fr)
Japanese (ja)
Inventor
雅明 遠藤
裕樹 小林
佐藤 正樹
Original Assignee
パナソニックIpマネジメント株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by パナソニックIpマネジメント株式会社 filed Critical パナソニックIpマネジメント株式会社
Publication of WO2016103581A1 publication Critical patent/WO2016103581A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/20Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using video object coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/46Embedding additional information in the video signal during the compression process
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates

Definitions

  • the present disclosure relates to a moving image generation method, a falsification detection method, a moving image generation device, a falsification detection device, and a falsification detection system.
  • Patent Document 1 discloses a network monitoring system. According to the network disclosure system of Patent Document 1, it is possible to distribute an ID to a monitoring terminal and transmit image data of a masking portion only in response to an image transmission request from a monitoring terminal with a specific ID.
  • the present disclosure provides a moving image generation method, a falsification detection method, a moving image generation device, a falsification detection device, and a falsification detection system that facilitate detection of whether or not a part of a moving image is falsified.
  • the moving image generation method and the moving image generation apparatus add the falsification detection information to the information constituting the encoded moving image encoded according to a predetermined encoding method, so that the processor generates the moving image.
  • An image constituting the encoded moving image has a first image region and a second image region.
  • the processor determines whether or not the first image area has been tampered with from the information that includes the image information in the first image area and does not include the image information in the second image area among the information constituting the encoded moving image.
  • First falsification detection information which is information for detecting, is calculated. Furthermore, the processor adds the calculated first alteration detection information to information constituting the encoded moving image.
  • the processor decodes the moving image in which the falsification detection information is added to the information constituting the encoded moving image encoded according to a predetermined encoding method.
  • An image constituting the moving image has a first image region and a second image region.
  • the processor detects whether or not the first image area is falsified from information including the image information in the first image area and not including the image information in the second image area among the information of the moving image.
  • the first verification falsification detection information which is the above information, is calculated.
  • the processor extracts first falsification detection information from the moving image information. Further, the processor compares the first verification falsification detection information with the first falsification detection information to detect whether or not the first image area has been falsified.
  • the falsification detection system includes the moving image device and the falsification detection device according to the present disclosure.
  • the moving image generation method, decoding method, generation device, decoding device, and falsification detection system according to the present disclosure are effective for facilitating detection of the presence or absence of falsification of a part of a moving image.
  • FIG. 1 is a conceptual diagram of a tamper detection system according to the first embodiment.
  • FIG. 2 is a block diagram of the moving image generating apparatus according to the first embodiment.
  • FIG. 3 is a block diagram of the tampering detection apparatus according to the first embodiment.
  • FIG. 4 is a flowchart showing the moving image generation processing in the first embodiment.
  • FIG. 5 is a diagram for explaining the mask processing in the first embodiment.
  • FIG. 6 is a diagram for explaining the calculation process of specific information in the first embodiment.
  • FIG. 7 is a diagram for explaining information embedding processing in the first embodiment.
  • FIG. 8 is a flowchart showing falsification detection processing in the first embodiment.
  • FIG. 9 is a flowchart showing falsification detection processing in the first embodiment.
  • FIG. 1 is a conceptual diagram of a tamper detection system according to the first embodiment.
  • the falsification detection system 100 includes a moving image generation device 110 and a falsification detection device 120.
  • the moving image generated by the moving image generating device 110 is sent to the tampering detection device via the communication path 130.
  • the moving image generated by the moving image generating device 110 may be falsified by a third party.
  • a third party acquires a moving image flowing through the communication path 130 and falsifies the content of the moving image.
  • a third party falsifies a part of the moving image generated by the moving image generating device and discloses it as his own moving image.
  • the moving image generating apparatus 110 generates a moving image to which alteration detection information is added.
  • the falsification detection device 120 detects falsification of the moving image using the falsification detection information.
  • the falsification detection system 100 can detect falsification of the moving image in this way.
  • FIG. 2 is a block diagram of the moving image generating apparatus according to the first embodiment.
  • the moving image generating apparatus 110 includes a processor 201, a storage unit 202, an input unit 203, an output unit 204, a communication unit 205, and a bus 206.
  • the processor 201 controls other elements of the moving image generating apparatus 110 via the bus 206.
  • the processor 201 can be configured by using a general-purpose CPU (Central Processing Unit). Further, the processor 201 can execute a predetermined program. When the processor 201 executes a predetermined program, it is possible to generate an encoded moving image and falsification detection information.
  • a general-purpose CPU Central Processing Unit
  • the storage unit 202 acquires various information from other elements and holds the information temporarily or permanently.
  • the storage unit 202 is a general term for so-called primary storage devices and secondary storage devices, and a plurality of storage units 202 may be physically arranged.
  • a DRAM Direct Random Access Memory
  • HDD Hard Disk Drive
  • SSD Solid State Drive
  • the input unit 203 receives information from the outside.
  • the external information received by the input unit 203 includes information related to input from the operator of the video generation device 110, information that configures a video before encoding, information that configures a video after encoding, and the like.
  • the input unit 203 can be configured by using an existing input / output interface.
  • the output unit 204 presents information to the outside.
  • Information presented by the output unit includes information that configures a moving image before encoding, information that configures a moving image after encoding, and the like.
  • the output unit 204 can be configured by using an existing input / output interface.
  • the communication unit 205 communicates with an external device via the communication path 130.
  • the device with which the communication unit 205 communicates includes the falsification detection device 120.
  • the communication unit 205 can be configured by using an existing communication interface.
  • the configuration of the moving image generating apparatus 110 listed above is an example. A part of each component of the moving image generating apparatus 110 may be integrated to configure the moving image generating apparatus. It is also possible to divide a part of each component of the moving image generating device 110 into a plurality of elements to configure the moving image generating device.
  • the moving image generating apparatus can be configured by omitting some of the components of the moving image generating apparatus 110.
  • the moving image generating apparatus can be configured by adding other elements to the moving image generating apparatus 110.
  • FIG. 3 is a block diagram of the tampering detection apparatus according to the first embodiment.
  • the falsification detection device 120 includes a processor 301, a storage unit 302, an input unit 303, an output unit 304, a communication unit 305, and a bus 306.
  • the processor 301 controls other elements of the tampering detection apparatus 120 via the bus 306.
  • the processor 301 can be configured by using a general-purpose CPU. Further, the processor 301 can execute a predetermined program. When the processor 301 executes a predetermined program, it is possible to generate a coded moving image and falsification detection information.
  • the storage unit 302 acquires various information from other elements and holds the information temporarily or permanently.
  • the storage unit 302 is a generic name for so-called primary storage devices and secondary storage devices, and a plurality of storage units 302 may be physically arranged.
  • a DRAM, HDD, or SSD is used for the configuration of the storage unit 302 for example.
  • the input unit 303 receives information from the outside.
  • Information from the outside that is accepted by the input unit 303 includes information related to input from the operator of the falsification detection device 120.
  • the input unit 303 can be configured by using an existing input / output interface.
  • the output unit 304 presents information to the outside.
  • the information presented by the output unit includes information constituting the encoded moving image, information notifying the result of tampering detection, and the like.
  • the output unit 304 can be configured by using an existing input / output interface.
  • the communication unit 305 communicates with an external device via the communication path 130.
  • the apparatus with which the communication unit 305 communicates includes the moving image generation apparatus 110.
  • the communication unit 305 can be configured by using an existing communication interface.
  • the configuration of the falsification detection device 120 mentioned above is an example. It is also possible to configure a tamper detection device by integrating some of the components of the tamper detection device 120. It is also possible to configure a tamper detection device by dividing a part of each component of the tamper detection device 120 into a plurality of elements. It is also possible to configure the tamper detection device by omitting some of the components of the tamper detection device 120. Another element can be added to the alteration detection device 120 to configure the alteration detection device.
  • the communication path 130 may be either wired or wireless.
  • FIG. 4 is a flowchart showing the moving image generation processing in the first embodiment.
  • the moving image generation processing in the present embodiment is mainly performed by the processor 201 of the moving image generation apparatus 110.
  • step S400 the processor 201 starts moving image generation processing.
  • the processor 201 reads a predetermined number of images constituting the moving image from the storage unit 202.
  • the number of the predetermined number can be determined based on a unit for performing the moving image generation process.
  • the moving image generation process is performed in GOP (Group Of Pictures) units.
  • GOP is a set of images including I pictures.
  • An I picture is one of the types of images that make up a moving image.
  • An I picture is an image having no dependency on other images.
  • the number of images constituting the GOP is 30.
  • the processor 201 reads 30 images from the storage unit 202.
  • the read image is stored in a high-speed storage area in the processor 201.
  • the moving image to be subjected to the moving image generation process need not be encoded at the time of step S400.
  • the timing at which the processor starts the moving image generation process may be performed according to the moving image generation processing instruction for the input unit 203 performed by the user of the moving image generation device 110 or every time a moving image before encoding is acquired from the input unit 203. May be.
  • step S401 the processor 201 performs a mask process on a ROI (Region Of Interest) area.
  • ROI refers to an area on the image.
  • the mask process refers to replacing a predetermined area in an image constituting a moving image with predetermined data.
  • FIG. 5 is a diagram for explaining the mask processing in the first embodiment.
  • the mask process is performed by the processor 201, whereby the pre-mask image 501 becomes the post-mask image 502.
  • the pre-mask image 501 becomes the post-mask image 502.
  • ROI is an area corresponding to a human face.
  • the processor 201 can recognize the ROI region. Coordinates as an example of techniques that specifically performs a specific (region), it may be performed according to coordinates (area) specified processing to the input unit 203 the user has performed the moving image generating apparatus 110 in advance what the coordinates (region) May be defined in the storage unit 202.
  • an existing reversible transformable mask processing technique can be used.
  • the reversible transformable mask processing technique is a technique for replacing a predetermined area of an image with a mask that can be removed using an encryption key or the like.
  • a method of encrypting image data in the mask area in the pre-mask image 501 using an encryption key is used.
  • the moving image generation apparatus 110 transmits the encryption key to the tampering detection apparatus 120 via the communication path 130 or the like. Note that it is not essential for the moving image generating apparatus 110 itself to perform the masking process.
  • the moving image generation apparatus 110 may acquire a moving image that has been subjected to mask processing via the input unit 203.
  • step S402 the processor 201 performs an encoding process.
  • the processor 201 applies H.264 to a moving image. Encoding processing according to the H.265 standard is performed.
  • the image constituting the encoded moving image encoded in step S402 has an image area other than the ROI and the ROI. Note that it is not essential for the moving image generating apparatus 110 itself to encode the moving image.
  • the moving image generation apparatus 110 may acquire an encoded moving image via the input unit 203.
  • the H.265 standard is a scheme in which each image (original image) constituting a moving image before encoding is encoded with reference to a region of a reference image that is an image forming an encoded moving image. is there.
  • the processor 201 encodes the ROI in the image without referring to the region other than the ROI in the reference image, and encodes the ROI in the region other than the ROI in the image. It is good to encode without referring. In this way, when encoding one image, the ROI and the area other than the ROI can be encoded independently. Therefore, it is useful for the detection process of presence / absence of falsification of a part of a region in a moving image described later.
  • step S403 the processor 201 determines whether or not the read data is auxiliary information.
  • the processor 201 reads data from the encoded moving image that is the moving image encoded in step S402.
  • the processor 201 reads data for a predetermined data unit from the encoded moving image.
  • the H.264 format Since encoding is performed according to the H.265 standard. Data is read in units of NAL (Network Abstraction Layer) in the H.265 standard. NAL is an element used to delimit encoded data for processing.
  • NAL Network Abstraction Layer
  • the content of the information included in the NAL is largely (1) Information representing the image information constituting the encoded video image called VCL (Video Coding Layer) (2) Corresponding to the information related to video encoding called Non-VCL It is divided into two types of auxiliary information. Whether a certain NAL is VCL or Non-VCL can be identified by the processor 201 reading the header of the NAL. In this disclosure, auxiliary information is H.264. Reference numeral 265 denotes information relating to encoding of a moving image, which corresponds to Non-VCL.
  • step S404 the processor 201 records the NAL determined to be auxiliary information in step S403 in the storage unit 202 as ROI specific information.
  • the ROI specific information is information related to the ROI.
  • the ROI specific information includes the ROI encoding method and ROI image information.
  • Non-ROI specific information is information related to an image area other than the ROI.
  • the non-ROI specific information includes a coding method of an image area other than the ROI and image information of the image area other than the ROI.
  • the information included in the Non-VCL NAL relates to both the encoding of the ROI area and the encoding of the image area other than the ROI. This is because the Non-VCL NAL may include information related to the entire image. Therefore, the NAL that is Non-VCL is recorded in the storage unit 202 as both ROI specific information and Non-ROI specific information. Note that, depending on the encoding method of moving images, there is a case where it is not necessary to record auxiliary information in both ROI specific information and Non-ROI specific information because a concept such as auxiliary information is not defined.
  • step S406 the processor 201 determines whether the image information included in the NAL constitutes the ROI for the NAL determined in step S403 as VCL. H. in this embodiment.
  • one image is divided into units called a plurality of tiles and is considered.
  • SPS Sequence Parameter Set
  • PPS Picture Parameter Set
  • the processor 201 can acquire information on how an image is divided. When it is determined how the image is divided, it is determined at which position in the image the area to which the predetermined tile number is assigned.
  • the processor 201 can obtain the position of the data constituting the GOP where the start point of the data corresponding to the specific tile number exists.
  • the processor 201 can know where the information included in the NAL exists in the data constituting the GOP. Therefore, whether the image information included in a certain NAL is image information in the ROI or image information in an image area other than the ROI, or both the image information in the ROI and the image information in the image area other than the ROI are included in the NAL (not necessarily NAL). And tile units do not match).
  • step S407 the processor 201 records image information in the ROI in the storage unit 202 as ROI specific information.
  • step S408 the processor 201 records the image information in the image area other than the ROI in the storage unit 202 as non-ROI specific information.
  • FIG. 6 illustrates the processing performed by the processing from step S403 to step S408.
  • FIG. 6 is a diagram for explaining the calculation process of specific information in the first embodiment.
  • the auxiliary information 601 such as AU (Access Unit), VPS (Video Parameter Set), SPS, PPS, Slice Header, etc. among the data constituting the GOP is non-ROI specific information 602 and ROI specific information.
  • Information 603 is recorded as both.
  • the image information in the image area of the tile number (1-9, 11, 16, 64, etc.) constituting the portion other than the ROI in the data included in the GOP is non-ROI specific information 602. To be recorded.
  • the image information in the image area of the tile number (10, 12-15, etc.) constituting the ROI portion of the data included in the GOP is recorded as ROI specific information 603.
  • step S409 the processor 201 determines whether there is data that has not been subjected to the processing in steps S403 to S408 in the encoded data. Specifically, the processor 201 determines whether or not the processing from step S403 to step S408 has been performed on all data constituting the GOP. If there is residual data that has not been subjected to the processing of steps S403 to S408, the processing returns to step S403 (No in step S409).
  • the processor 201 calculates and embeds falsification detection information in step S410.
  • the processor 201 calculates non-ROI falsification detection information by calculating a hash value for the non-ROI specific information.
  • the processor 201 calculates ROI falsification detection information by calculating a hash value for the ROI specific information.
  • the processor 201 embeds the first tampering detection information and the second tampering detection information in SEI (Supplemental Enhancement Information) that is information constituting the encoded moving image.
  • SEI is one of NALs that are Non-VCL, and constitutes a GOP.
  • the SEI defines an area where the user of the moving image generating apparatus 110 can freely write information.
  • the processor 201 writes the falsification detection information in the area. It is not essential to embed both Non-ROI alteration detection information and ROI alteration detection information in SEI. For example, if the user is interested only in whether or not the ROI has been altered, the ROI alteration detection information may be embedded in the SEI.
  • FIG. 7 is a diagram for explaining the information embedding process in the first embodiment.
  • the data shown in FIG. 7 is data constituting one GOP, and includes data from which the falsification detection information is calculated as shown in FIG.
  • the GOP can optionally include SEI.
  • the processor 201 embeds the falsification detection information by including the SEI in the GOP from which the falsification detection information is calculated and writing the non-ROI falsification detection information 701 and the ROI falsification detection information 702 in the SEI. .
  • the moving image generation process ends (step S411).
  • the processor 201 may transmit the moving image to the tampering detection device 120 via the communication unit 205 and the communication path 130 after the moving image generation process is completed.
  • FIG. 8 is a flowchart showing falsification detection processing in the first embodiment.
  • the falsification detection processing is mainly performed by the processor 301 of the falsification detection device 120.
  • step S800 the processor 301 starts falsification detection processing.
  • the processor 301 reads out data constituting the encoded moving image from the storage unit 302 by a predetermined data unit.
  • the moving image is H.264. Since the encoding is performed in accordance with the H.265 standard, the processor 301 uses the H.264 standard. Data is read in GOP units in the H.265 standard. The read data is stored in a high-speed storage area in the processor 301.
  • the encoded moving image that is the target of the falsification detection process is a moving image generated by the moving image generating device 110.
  • the tampering detection device may acquire the encoded moving image from the moving image generation device 110 via the communication path 130 and the communication unit 305, or may acquire the moving image recorded on the storage medium from the input unit 303.
  • the timing at which the processor starts the falsification detection processing may be performed in accordance with a falsification detection processing instruction for the input unit 303 performed by the user of the falsification detection device 120, or every time a moving image is acquired from the input unit 303 or the communication unit 305. May be.
  • step S801 the processor 301 extracts falsification detection information from the moving image.
  • the falsification detection information is falsification detection information embedded by the moving image generating apparatus 110 in step S410.
  • the processor 301 searches for the SEI from the GOP read in step S800. When detecting the SEI, the processor 301 extracts the falsification detection information from the SEI.
  • step S802 the processor 301 determines whether or not the NAL configuring the GOP read in step S800 is auxiliary information.
  • step S803 the processor 301 records the NAL determined to be auxiliary information in step S802 in the storage unit 302 as ROI specific information.
  • step S804 the processor 301 records the NAL determined as auxiliary information in step S802 in the storage unit 302 as non-ROI specific information.
  • step S805 the processor 301 determines whether the image information included in the NAL constitutes the ROI for the NAL determined to be the VCL in step S802.
  • a method similar to the method described in step S406 can be used as a method for the processor 301 to determine whether the image information included in the NAL constitutes the ROI.
  • step S806 the processor 301 records the image information in the ROI among the data included in the NAL determined in step S805 in the storage unit 302 as the ROI specific information.
  • step S807 the processor 301 records the image information in the image area other than the ROI in the data included in the NAL determined in step S806 in the storage unit 302 as non-ROI specific information.
  • step S808 the processor 301 determines whether there is data that has not been subjected to the processing in steps S802 to S807 in the encoded data. Specifically, the processor 301 determines whether or not the processing in steps S802 to S807 has been performed on all data constituting the GOP. If there is residual data that has not been subjected to the processing of steps S802 to S807, the processing returns to step S802 (No in step S808).
  • FIG. 9 is a flowchart showing falsification detection processing in the first embodiment.
  • the flowchart shown in FIG. 9 is connected to the flowchart shown in FIG.
  • the processor 301 calculates verification falsification detection information in step S901.
  • the processor 301 calculates non-ROI verification falsification detection information by calculating a hash value for the non-ROI specific information.
  • the processor 301 calculates ROI verification falsification detection information by calculating a hash value for the ROI specific information.
  • the algorithm used for calculating the hash value is the same as the algorithm used by the moving image generating apparatus 110 in step S410.
  • step S902 the processor 301 detects whether or not the image area other than the ROI has been tampered with.
  • the processor 301 compares the falsification detection information for Non-ROI and the falsification detection information for verification for Non-ROI and determines that there is no falsification in the area other than the ROI if they are the same. Detect that there was.
  • step S903 the processor 301 notifies that an image area other than the ROI has been tampered with.
  • a warning message can be output via the output unit 304 to notify that alterations have occurred.
  • step S904 the processor 301 detects whether the ROI has been tampered with.
  • the processor 301 compares the ROI tampering detection information with the ROI verification tampering detection information and determines that the ROI has not been tampered with if it is the same, and if it is not the same, detects that the ROI has been tampered with.
  • step S905 the processor 301 notifies that the ROI has been tampered with.
  • a notification similar to that in step S903 can be used to notify that tampering has occurred.
  • step S906 the processor 301 decodes the GOP read in step 800. Note that when alteration is detected in an area other than the ROI or in the ROI, the area that has been altered may not be decoded. In this way, the risk of presenting an image with low reliability to the user of the falsification detection device 120 is reduced.
  • step S907 the processor 301 determines whether or not the encryption key used for the moving image generating apparatus 110 to perform the mask process in step S401 is recorded in the storage unit 302.
  • Step S908 the processor 301 notifies that the image information in the ROI is a mask.
  • Step S909 the processor 301 cancels the ROI mask.
  • the processor 301 ends the falsification detection processing (step S910).
  • the moving image generating apparatus 110 and the moving image generating method executed by the moving image generating apparatus 110 include the falsification detection information in the information constituting the encoded moving image encoded according to a predetermined encoding method.
  • the processor 201 By adding, the processor 201 generates a moving image.
  • An image constituting the encoded moving image has a first image region (region other than ROI or ROI) and a second image region (region other than ROI or ROI).
  • the processor 201 determines whether or not the first image area has been tampered with from the information that includes the image information in the first image area and does not include the image information in the second image area among the information that configures the encoded moving image.
  • First falsification detection information (ROI falsification detection information or Non-ROI falsification detection information), which is information for detecting the above, is calculated. Further, the processor 201 adds the calculated first alteration detection information to information constituting the encoded moving image.
  • the processor 201 uses the second information from the information that includes the image information in the second image area and does not include the image information in the first image area among the information that configures the encoded moving image.
  • Second alteration detection information (ROI alteration detection information or Non-ROI alteration detection information), which is information for detecting whether or not the image area of the image has been altered, is calculated.
  • the processor 201 adds the calculated first alteration detection information and the second alteration detection information to information constituting the encoded moving image.
  • the information constituting the encoded moving image has auxiliary information including information related to the encoding method of the encoded moving image, and the auxiliary information includes the first alteration detection information and the second alteration detection. Used to calculate both information.
  • the presence of information relating to the entire image constituting the moving image which is called a moving image encoding method, can be reflected in the calculation of the first alteration detection information and the second alteration detection information.
  • the encoding method refers to an area of a reference image that is an image constituting an encoded moving image when each original image constituting the moving image before encoding is encoded.
  • This is a coding method.
  • the first area and the second area are defined in the original image.
  • the processor 201 does not refer to the second region in the reference image when encoding the first region in the original image, and the first region in the reference image when encoding the second region in the original image. Encode without referring to.
  • the first image area and the second image area can be independently encoded when encoding one image.
  • the falsification detection device 120 and the falsification detection method executed by the falsification detection device 120 include the falsification detection information attached to the information constituting the encoded moving image encoded according to a predetermined encoding method.
  • the processor 301 decrypts the moving image.
  • An image constituting a moving image has a first image region (region other than ROI or ROI) and a second image region (region other than ROI or ROI).
  • the processor 301 detects whether or not the first image area has been tampered with from information that includes image information in the first image area and does not include image information in the second image area, among the information of the moving image.
  • First falsification detection information for verification (ROI verification falsification detection information or Non-ROI verification falsification detection information), which is information for this purpose, is calculated. Further, the processor extracts first alteration detection information (ROI alteration detection information or Non-ROI alteration detection information) from the moving image information. Further, the processor compares the first verification falsification detection information with the first falsification detection information to detect whether or not the first image area has been falsified.
  • the processor 301 also detects whether the second image area has been tampered with from information that includes the image information in the second image area and does not include the image information in the first image area, among the information of the moving image. 2nd verification falsification detection information which is information for performing the calculation, the second falsification detection information is extracted from the video information, and the second verification falsification detection information is compared with the second falsification detection information. Thus, it is detected whether or not the second image area has been tampered with.
  • the information constituting the encoded moving image has auxiliary information including information on the encoding method of the encoded moving image, and the auxiliary information includes the first verification falsification detection information and the second verification falsification detection. Used to calculate both information.
  • the presence of information relating to the entire image constituting the moving image which is a moving image encoding method, can be reflected in the calculation of the first verification falsification detection information and the second verification falsification detection information.
  • the first embodiment has been described as an example of the technique disclosed in the present application.
  • the technology in the present disclosure is not limited to this, and can also be applied to an embodiment in which changes, replacements, additions, omissions, and the like are appropriately performed.
  • This disclosure can be applied to a security system that detects the presence or absence of falsification of a part of a moving image.

Abstract

This disclosure makes it possible for the presence or absence of tampering in a region in part of a moving image to be detected easily. In the moving image generating method and the moving image generating device according to this disclosure, a processor generates a moving image by appending tamper detection information to information forming an encoded moving image which has been encoded in accordance with a prescribed coding scheme. The images forming the encoded moving image have a first image region and a second image region. The processor calculates first tamper detection information, which is information for detecting whether or not the first image region has been tampered with, from information that contains image information relating to the first image region but does not contain image information relating to the second image region, from among the information forming the encoded moving image. Further, the processor appends the calculated first tamper detection information to the information forming the encoded moving image. The tamper detecting method, tamper detecting device and tamper detecting system according to this disclosure detect tampering on the basis of the first tamper detection information.

Description

動画生成方法、改ざん検出方法、動画生成装置、改ざん検出装置および改ざん検出システムMovie generation method, alteration detection method, movie generation device, alteration detection device, and alteration detection system
 本開示は、動画生成方法、改ざん検出方法、動画生成装置、改ざん検出装置および改ざん検出システムに関する。 The present disclosure relates to a moving image generation method, a falsification detection method, a moving image generation device, a falsification detection device, and a falsification detection system.
 特許文献1は、ネットワーク監視システムを開示する。特許文献1のネットワーク開示システムによれば、監視端末側にIDを振り分け、特定のIDの監視端末からの画像送信要求に対してだけ、マスキング部分の画像データも伝送することができる。 Patent Document 1 discloses a network monitoring system. According to the network disclosure system of Patent Document 1, it is possible to distribute an ID to a monitoring terminal and transmit image data of a masking portion only in response to an image transmission request from a monitoring terminal with a specific ID.
特開2004-104314号公報JP 2004-104314 A
 本開示は、動画における一部の領域に対する改ざんの有無の検出を容易にする動画生成方法、改ざん検出方法、動画生成装置、改ざん検出装置および改ざん検出システムを提供する。 The present disclosure provides a moving image generation method, a falsification detection method, a moving image generation device, a falsification detection device, and a falsification detection system that facilitate detection of whether or not a part of a moving image is falsified.
 本開示における動画生成方法、動画生成装置は、所定の符号化方式に従って符号化された符号化済み動画を構成する情報に改ざん検出情報を付加することで、プロセッサが動画を生成する。符号化済み動画を構成する画像は第1の画像領域と第2の画像領域を有する。プロセッサは、符号化済み動画を構成する情報のうち、第1の画像領域における画像情報を含み、第2の画像領域における画像情報を含まない情報から、第1の画像領域が改ざんされたか否かを検出する為の情報である第1の改ざん検出情報を算出する。更にプロセッサは、算出された第1の改ざん検出情報を、前記符号化済み動画を構成する情報に付加する。 The moving image generation method and the moving image generation apparatus according to the present disclosure add the falsification detection information to the information constituting the encoded moving image encoded according to a predetermined encoding method, so that the processor generates the moving image. An image constituting the encoded moving image has a first image region and a second image region. The processor determines whether or not the first image area has been tampered with from the information that includes the image information in the first image area and does not include the image information in the second image area among the information constituting the encoded moving image. First falsification detection information, which is information for detecting, is calculated. Furthermore, the processor adds the calculated first alteration detection information to information constituting the encoded moving image.
 本開示における改ざん検出方法、改ざん検出装置は、所定の符号化方式に従って符号化された符号化済み動画を構成する情報に改ざん検出情報を付された動画をプロセッサが復号する。動画を構成する画像は第1の画像領域と第2の画像領域を有する。プロセッサは、動画の有する情報のうち、第1の画像領域における画像情報を含み、第2の画像領域における画像情報を含まない情報から、第1の画像領域が改ざんされたか否かを検出する為の情報である第1の検証用改ざん検出情報を算出する。更にプロセッサは、第1の改ざん検出情報を前記動画の情報から抽出する。更にプロセッサは第1の検証用改ざん検出情報と第1の改ざん検出情報を比較することで第1の画像領域に改ざんがあったか否かを検出する。 In the falsification detection method and the falsification detection apparatus according to the present disclosure, the processor decodes the moving image in which the falsification detection information is added to the information constituting the encoded moving image encoded according to a predetermined encoding method. An image constituting the moving image has a first image region and a second image region. The processor detects whether or not the first image area is falsified from information including the image information in the first image area and not including the image information in the second image area among the information of the moving image. The first verification falsification detection information, which is the above information, is calculated. Further, the processor extracts first falsification detection information from the moving image information. Further, the processor compares the first verification falsification detection information with the first falsification detection information to detect whether or not the first image area has been falsified.
 本開示における改ざん検出システムは本開示における動画装置と、改ざん検出装置を有する。 The falsification detection system according to the present disclosure includes the moving image device and the falsification detection device according to the present disclosure.
 本開示における動画の生成方法、復号方法、生成装置、復号装置および改ざん検出システムは、動画における一部の領域に対する改ざんの有無の検出を容易にするのに有効である。 The moving image generation method, decoding method, generation device, decoding device, and falsification detection system according to the present disclosure are effective for facilitating detection of the presence or absence of falsification of a part of a moving image.
図1は、実施の形態1における改ざん検出システムの概念図である。FIG. 1 is a conceptual diagram of a tamper detection system according to the first embodiment. 図2は、実施の形態1における動画生成装置のブロック図である。FIG. 2 is a block diagram of the moving image generating apparatus according to the first embodiment. 図3は、実施の形態1における改ざん検出装置のブロック図である。FIG. 3 is a block diagram of the tampering detection apparatus according to the first embodiment. 図4は、実施の形態1における動画生成処理を示すフローチャートである。FIG. 4 is a flowchart showing the moving image generation processing in the first embodiment. 図5は、実施の形態1におけるマスク処理を説明する図である。FIG. 5 is a diagram for explaining the mask processing in the first embodiment. 図6は、実施の形態1における固有情報の算出処理を説明する図である。FIG. 6 is a diagram for explaining the calculation process of specific information in the first embodiment. 図7は、実施の形態1における情報埋め込み処理を説明する図である。FIG. 7 is a diagram for explaining information embedding processing in the first embodiment. 図8は、実施の形態1における改ざん検出処理を示すフローチャートである。FIG. 8 is a flowchart showing falsification detection processing in the first embodiment. 図9は、実施の形態1における改ざん検出処理を示すフローチャートである。FIG. 9 is a flowchart showing falsification detection processing in the first embodiment.
 以下、適宜図面を参照しながら、実施の形態を詳細に説明する。但し、必要以上に詳細な説明は省略する場合がある。例えば、既によく知られた事項の詳細説明や実質的に同一の構成に対する重複説明を省略する場合がある。これは、以下の説明が不必要に冗長になるのを避け、当業者の理解を容易にするためである。 Hereinafter, embodiments will be described in detail with reference to the drawings as appropriate. However, more detailed description than necessary may be omitted. For example, detailed descriptions of already well-known matters and repeated descriptions for substantially the same configuration may be omitted. This is to avoid the following description from becoming unnecessarily redundant and to facilitate understanding by those skilled in the art.
 なお、添付図面および以下の説明は、当業者が本開示を十分に理解するために、提供されるのであって、これらにより請求の範囲に記載の主題を限定することは意図されていない。 The accompanying drawings and the following description are provided for those skilled in the art to fully understand the present disclosure, and are not intended to limit the claimed subject matter.
 (実施の形態1)
 以下、図1~9を用いて、実施の形態1を説明する。
(Embodiment 1)
The first embodiment will be described below with reference to FIGS.
 [1-1.構成]
 図1は、実施の形態1における改ざん検出システムの概念図である。
[1-1. Constitution]
FIG. 1 is a conceptual diagram of a tamper detection system according to the first embodiment.
 改ざん検出システム100は動画生成装置110と改ざん検出装置120を有する。 The falsification detection system 100 includes a moving image generation device 110 and a falsification detection device 120.
 動画生成装置110で生成された動画は通信路130を経由して改ざん検出装置へ送られる。 The moving image generated by the moving image generating device 110 is sent to the tampering detection device via the communication path 130.
 動画生成装置110で生成された動画が第三者によって改ざんされることがある。例えば第三者が通信路130を流れる動画を取得して動画の内容を改ざんする場合がある。あるいは第三者が動画生成装置の生成した動画の一部を改ざんしてとして自分の動画として公開する場合がある。 The moving image generated by the moving image generating device 110 may be falsified by a third party. For example, there is a case where a third party acquires a moving image flowing through the communication path 130 and falsifies the content of the moving image. Alternatively, there is a case where a third party falsifies a part of the moving image generated by the moving image generating device and discloses it as his own moving image.
 本実施の形態において動画生成装置110は改ざん検出情報を付加した動画を生成する。改ざん検出装置120は当該改ざん検出情報を用いて動画に対する改ざんを検出する。改ざん検出システム100はこのようにして動画に対する改ざんを検出することができる。 In the present embodiment, the moving image generating apparatus 110 generates a moving image to which alteration detection information is added. The falsification detection device 120 detects falsification of the moving image using the falsification detection information. The falsification detection system 100 can detect falsification of the moving image in this way.
 図2は、実施の形態1における動画生成装置のブロック図である。 FIG. 2 is a block diagram of the moving image generating apparatus according to the first embodiment.
 動画生成装置110はプロセッサ201と記憶部202と入力部203と出力部204と通信部205とバス206を有する。 The moving image generating apparatus 110 includes a processor 201, a storage unit 202, an input unit 203, an output unit 204, a communication unit 205, and a bus 206.
 プロセッサ201はバス206を介して動画生成装置110の他の要素を制御する。一例として汎用CPU(Central Processing Unit)を用いることで、プロセッサ201を構成することができる。また、プロセッサ201は所定のプログラムを実行することができる。プロセッサ201が所定のプログラムを実行することで符号化済み動画の生成や、改ざん検出情報の生成を行うことができる。 The processor 201 controls other elements of the moving image generating apparatus 110 via the bus 206. As an example, the processor 201 can be configured by using a general-purpose CPU (Central Processing Unit). Further, the processor 201 can execute a predetermined program. When the processor 201 executes a predetermined program, it is possible to generate an encoded moving image and falsification detection information.
 記憶部202は他の要素から様々な情報を取得し一時的、あるいは恒久的にその情報を保持する。記憶部202はいわゆる一次記憶装置と二次記憶装置の総称であり、記憶部202は物理的に複数配置されても良い。記憶部202の構成には例えばDRAM(Direct Random Access Memory)やHDD(Hard Disk Drive)やSSD(Solid State Drive)が用いられる。 The storage unit 202 acquires various information from other elements and holds the information temporarily or permanently. The storage unit 202 is a general term for so-called primary storage devices and secondary storage devices, and a plurality of storage units 202 may be physically arranged. For example, a DRAM (Direct Random Access Memory), a HDD (Hard Disk Drive), or an SSD (Solid State Drive) is used for the configuration of the storage unit 202.
 入力部203は外部からの情報を受け付ける。入力部203が受け付ける外部からの情報には動画生成装置110の操作者からの入力に関する情報や、符号化前の動画を構成する情報、符号化後の動画を構成する情報などが含まれる。一例として既存の入出力インターフェースを用いることで入力部203を構成することができる。 The input unit 203 receives information from the outside. The external information received by the input unit 203 includes information related to input from the operator of the video generation device 110, information that configures a video before encoding, information that configures a video after encoding, and the like. As an example, the input unit 203 can be configured by using an existing input / output interface.
 出力部204は外部へ情報を提示する。出力部が提示する情報には符号化前の動画を構成する情報、符号化後の動画を構成する情報などが含まれる。一例として既存の入出力インターフェースを用いることで出力部204を構成することができる。 The output unit 204 presents information to the outside. Information presented by the output unit includes information that configures a moving image before encoding, information that configures a moving image after encoding, and the like. As an example, the output unit 204 can be configured by using an existing input / output interface.
 通信部205は通信路130を介して外部の機器と通信を行う。通信部205が通信する機器には改ざん検出装置120が含まれる。一例として既存の通信インターフェースを用いることで通信部205を構成することができる。 The communication unit 205 communicates with an external device via the communication path 130. The device with which the communication unit 205 communicates includes the falsification detection device 120. As an example, the communication unit 205 can be configured by using an existing communication interface.
 以上に挙げられた動画生成装置110の構成は一例である。動画生成装置110の各構成要素の一部を統合して動画生成装置を構成することもできる。動画生成装置110の各構成要素の一部を複数の要素に分割して動画生成装置を構成することもできる。動画生成装置110の各構成要素の一部を省略して動画生成装置を構成することもできる。動画生成装置110に他の要素を付加して動画生成装置を構成することもできる。 The configuration of the moving image generating apparatus 110 listed above is an example. A part of each component of the moving image generating apparatus 110 may be integrated to configure the moving image generating apparatus. It is also possible to divide a part of each component of the moving image generating device 110 into a plurality of elements to configure the moving image generating device. The moving image generating apparatus can be configured by omitting some of the components of the moving image generating apparatus 110. The moving image generating apparatus can be configured by adding other elements to the moving image generating apparatus 110.
 図3は、実施の形態1における改ざん検出装置のブロック図である。 FIG. 3 is a block diagram of the tampering detection apparatus according to the first embodiment.
 改ざん検出装置120はプロセッサ301と記憶部302と入力部303と出力部304と通信部305とバス306を有する。 The falsification detection device 120 includes a processor 301, a storage unit 302, an input unit 303, an output unit 304, a communication unit 305, and a bus 306.
 プロセッサ301はバス306を介して改ざん検出装置120の他の要素を制御する。一例として汎用CPUを用いることで、プロセッサ301を構成することができる。また、プロセッサ301は所定のプログラムを実行することができる。プロセッサ301が所定のプログラムを実行することで符号化済み動画の生成や、改ざん検出情報の生成を行うことができる。 The processor 301 controls other elements of the tampering detection apparatus 120 via the bus 306. As an example, the processor 301 can be configured by using a general-purpose CPU. Further, the processor 301 can execute a predetermined program. When the processor 301 executes a predetermined program, it is possible to generate a coded moving image and falsification detection information.
 記憶部302は他の要素から様々な情報を取得し一時的、あるいは恒久的にその情報を保持する。記憶部302はいわゆる一次記憶装置と二次記憶装置の総称であり、記憶部302は物理的に複数配置されても良い。記憶部302の構成には例えばDRAMやHDDやSSDが用いられる。 The storage unit 302 acquires various information from other elements and holds the information temporarily or permanently. The storage unit 302 is a generic name for so-called primary storage devices and secondary storage devices, and a plurality of storage units 302 may be physically arranged. For the configuration of the storage unit 302, for example, a DRAM, HDD, or SSD is used.
 入力部303は外部からの情報を受け付ける。入力部303が受け付ける外部からの情報には改ざん検出装置120の操作者からの入力に関する情報が含まれる。一例として既存の入出力インターフェースを用いることで入力部303を構成することができる。 The input unit 303 receives information from the outside. Information from the outside that is accepted by the input unit 303 includes information related to input from the operator of the falsification detection device 120. As an example, the input unit 303 can be configured by using an existing input / output interface.
 出力部304は外部へ情報を提示する。出力部が提示する情報には符号化後の動画を構成する情報、改ざん検出の結果を報知する情報などが含まれる。一例として既存の入出力インターフェースを用いることで出力部304を構成することができる。 The output unit 304 presents information to the outside. The information presented by the output unit includes information constituting the encoded moving image, information notifying the result of tampering detection, and the like. As an example, the output unit 304 can be configured by using an existing input / output interface.
 通信部305は通信路130を介して外部の機器と通信を行う。通信部305が通信する機器には動画生成装置110が含まれる。一例として既存の通信インターフェースを用いることで通信部305を構成することができる。 The communication unit 305 communicates with an external device via the communication path 130. The apparatus with which the communication unit 305 communicates includes the moving image generation apparatus 110. As an example, the communication unit 305 can be configured by using an existing communication interface.
 以上に挙げられた改ざん検出装置120の構成は一例である。改ざん検出装置120の各構成要素の一部を統合して改ざん検出装置を構成することもできる。改ざん検出装置120の各構成要素の一部を複数の要素に分割して改ざん検出装置を構成することもできる。改ざん検出装置120の各構成要素の一部を省略して改ざん検出装置を構成することもできる。改ざん検出装置120に他の要素を付加して改ざん検出装置を構成することもできる。 The configuration of the falsification detection device 120 mentioned above is an example. It is also possible to configure a tamper detection device by integrating some of the components of the tamper detection device 120. It is also possible to configure a tamper detection device by dividing a part of each component of the tamper detection device 120 into a plurality of elements. It is also possible to configure the tamper detection device by omitting some of the components of the tamper detection device 120. Another element can be added to the alteration detection device 120 to configure the alteration detection device.
 なお、通信路130は有線と無線のどちらで構成しても良い。 Note that the communication path 130 may be either wired or wireless.
 [1-2.動作]
 図4は、実施の形態1における動画生成処理を示すフローチャートである。
[1-2. Operation]
FIG. 4 is a flowchart showing the moving image generation processing in the first embodiment.
 本実施の形態における動画生成処理は主として動画生成装置110のプロセッサ201によって行われる。 The moving image generation processing in the present embodiment is mainly performed by the processor 201 of the moving image generation apparatus 110.
 ステップS400において、プロセッサ201は動画生成処理を開始する。プロセッサ201は動画生成処理を開始すると記憶部202から動画を構成する画像を所定の枚数読み出す。所定の枚数が何枚であるかは動画生成処理を行う単位に基づいて定めることができる。本実施の形態では動画生成処理をGOP(Group Of Pictures)単位で行う。GOPとはIピクチャを含む画像の集合である。Iピクチャとは動画を構成する画像の種類の一つである。Iピクチャは他の画像に対する依存関係がない画像である。本実施の形態ではGOPを構成する画像の枚数を30枚とする。動画生成処理の開始においてプロセッサ201は30枚の画像を記憶部202から読み出す。読み出された画像はプロセッサ201内の高速な記憶領域に保存される。動画生成処理の対象となる動画がステップS400の時点で符号化されている必要はない。プロセッサが動画生成処理を開始するタイミングは動画生成装置110の使用者が行った入力部203に対する動画生成処理命令に従って行っても良いし、入力部203から符号化前の動画を取得する度に行っても良い。 In step S400, the processor 201 starts moving image generation processing. When starting the moving image generation process, the processor 201 reads a predetermined number of images constituting the moving image from the storage unit 202. The number of the predetermined number can be determined based on a unit for performing the moving image generation process. In the present embodiment, the moving image generation process is performed in GOP (Group Of Pictures) units. GOP is a set of images including I pictures. An I picture is one of the types of images that make up a moving image. An I picture is an image having no dependency on other images. In the present embodiment, the number of images constituting the GOP is 30. At the start of the moving image generation process, the processor 201 reads 30 images from the storage unit 202. The read image is stored in a high-speed storage area in the processor 201. The moving image to be subjected to the moving image generation process need not be encoded at the time of step S400. The timing at which the processor starts the moving image generation process may be performed according to the moving image generation processing instruction for the input unit 203 performed by the user of the moving image generation device 110 or every time a moving image before encoding is acquired from the input unit 203. May be.
 ステップS401において、プロセッサ201はROI(Region Of Interest)領域にマスク処理を行う。ROIとは画像上の一領域をいう。マスク処理とは動画を構成する画像における所定の領域を所定のデータに置換することをいう。 In step S401, the processor 201 performs a mask process on a ROI (Region Of Interest) area. ROI refers to an area on the image. The mask process refers to replacing a predetermined area in an image constituting a moving image with predetermined data.
 図5は、実施の形態1におけるマスク処理を説明する図である。 FIG. 5 is a diagram for explaining the mask processing in the first embodiment.
 図5に示すように、プロセッサ201によってマスク処理が行われることで、マスク前画像501がマスク後画像502になる。図5に示すように、マスク前画像501における人物の顔に相当する箇所が、マスク後画像502においてマスク503に置換されていることがわかる。図5においてROIは人の顔に相当する領域である。複数の座標を用いてROIを特定することで、プロセッサ201はROIの領域を認識することができる。座標(領域)の特定を具体的に行う手法の一例としては、動画生成装置110の使用者が行った入力部203に対する座標(領域)指定処理に従って行っても良いし、予めどの座標(領域)をマスクするかが記憶部202に定義されていても良い。ROIをどのようにマスクするかについては既存の可逆変換可能なマスク処理手法を用いることができる。可逆変換可能なマスク処理手法とは、暗号鍵等を用いて解除可能なマスクで画像の所定の領域を置き換える手法である。本実施の形態では暗号鍵を用いてマスク前画像501におけるマスク領域の画像データを暗号化する手法を用いる。動画生成装置110は通信路130などを介して暗号鍵を改ざん検出装置120へ送信する。なお、動画生成装置110自身がマスク処理を行うことは必須ではない。動画生成装置110は入力部203を介してマスク処理済みの動画を取得しても良い。 As shown in FIG. 5, the mask process is performed by the processor 201, whereby the pre-mask image 501 becomes the post-mask image 502. As shown in FIG. 5, it can be seen that a portion corresponding to a human face in the pre-mask image 501 is replaced with a mask 503 in the post-mask image 502. In FIG. 5, ROI is an area corresponding to a human face. By specifying the ROI using a plurality of coordinates, the processor 201 can recognize the ROI region. Coordinates as an example of techniques that specifically performs a specific (region), it may be performed according to coordinates (area) specified processing to the input unit 203 the user has performed the moving image generating apparatus 110 in advance what the coordinates (region) May be defined in the storage unit 202. As for how to mask the ROI, an existing reversible transformable mask processing technique can be used. The reversible transformable mask processing technique is a technique for replacing a predetermined area of an image with a mask that can be removed using an encryption key or the like. In this embodiment, a method of encrypting image data in the mask area in the pre-mask image 501 using an encryption key is used. The moving image generation apparatus 110 transmits the encryption key to the tampering detection apparatus 120 via the communication path 130 or the like. Note that it is not essential for the moving image generating apparatus 110 itself to perform the masking process. The moving image generation apparatus 110 may acquire a moving image that has been subjected to mask processing via the input unit 203.
 ステップS402において、プロセッサ201は符号化処理を行う。本実施の形態においてプロセッサ201は動画に対してH.265規格に従った符号化処理を行う。本開示においてステップS402で符号化された符号化済み動画を構成する画像はROI以外の画像領域とROIを有する。なお、動画生成装置110自身が動画の符号化を行うことは必須ではない。動画生成装置110は入力部203を介して符号化済みの動画を取得しても良い。 In step S402, the processor 201 performs an encoding process. In this embodiment, the processor 201 applies H.264 to a moving image. Encoding processing according to the H.265 standard is performed. In the present disclosure, the image constituting the encoded moving image encoded in step S402 has an image area other than the ROI and the ROI. Note that it is not essential for the moving image generating apparatus 110 itself to encode the moving image. The moving image generation apparatus 110 may acquire an encoded moving image via the input unit 203.
 なお、H.265規格は、符号化前の動画を構成する各々の画像(原画像)を符号化する際に、符号化済み動画を構成する画像である参照画像の有する領域を参照して符号化する方式である。このような場合は、プロセッサ201は、画像におけるROIを符号化する際は参照画像におけるROI以外の領域を参照せずに符号化し、かつ、画像におけるROI以外の領域を符号化する際はROIを参照せずに符号化すると良い。このようにすると、1枚の画像を符号化する際にROIとROI以外の領域とを独立に符号化できる。よって、後述する動画における一部の領域に対する改ざんの有無の検出処理にとって有益である。 H. The H.265 standard is a scheme in which each image (original image) constituting a moving image before encoding is encoded with reference to a region of a reference image that is an image forming an encoded moving image. is there. In such a case, the processor 201 encodes the ROI in the image without referring to the region other than the ROI in the reference image, and encodes the ROI in the region other than the ROI in the image. It is good to encode without referring. In this way, when encoding one image, the ROI and the area other than the ROI can be encoded independently. Therefore, it is useful for the detection process of presence / absence of falsification of a part of a region in a moving image described later.
 ステップS403において、プロセッサ201は読み出したデータが補助情報であるか否かを判定する。プロセッサ201はS403においてステップS402において符号化した動画である符号化済み動画からデータを読み出す。プロセッサ201は符号化済み動画から所定のデータ単位分だけデータを読み出す。本実施の形態においてはステップS402においてH.265規格に従った符号化を行っているので、H.265規格におけるNAL(Network Abstraction Layer)単位でデータを読み出す。NALは符号化したデータを処理のために区切るのに用いられる要素である。NALが含む情報の内容は大きく(1)VCL(Video Coding Layer)と呼ばれる符号化された動画の画像を構成する画像情報を表す情報(2)Non-VCLと呼ばれる動画の符号化に関する情報に該当する補助情報、の二種類に分けられる。あるNALがVCLかNon-VCLであるかはプロセッサ201がNALのヘッダを読むことで識別できる。本開示において補助情報とはH.265においてはNon-VCLに該当するような、動画の符号化に関する情報のことを指す。 In step S403, the processor 201 determines whether or not the read data is auxiliary information. In step S403, the processor 201 reads data from the encoded moving image that is the moving image encoded in step S402. The processor 201 reads data for a predetermined data unit from the encoded moving image. In the present embodiment, in step S402, the H.264 format. Since encoding is performed according to the H.265 standard. Data is read in units of NAL (Network Abstraction Layer) in the H.265 standard. NAL is an element used to delimit encoded data for processing. The content of the information included in the NAL is largely (1) Information representing the image information constituting the encoded video image called VCL (Video Coding Layer) (2) Corresponding to the information related to video encoding called Non-VCL It is divided into two types of auxiliary information. Whether a certain NAL is VCL or Non-VCL can be identified by the processor 201 reading the header of the NAL. In this disclosure, auxiliary information is H.264. Reference numeral 265 denotes information relating to encoding of a moving image, which corresponds to Non-VCL.
 ステップS404(ステップS403でYes)において、プロセッサ201はステップS403において補助情報であると判断されたNALをROI用固有情報として記憶部202に記録する。ROI用固有情報とはROIに関連する情報である。ROI用固有情報はROIの符号化方式やROIの画像情報を含む。 In step S404 (Yes in step S403), the processor 201 records the NAL determined to be auxiliary information in step S403 in the storage unit 202 as ROI specific information. The ROI specific information is information related to the ROI. The ROI specific information includes the ROI encoding method and ROI image information.
 ステップS405において、プロセッサ201はステップS403において補助情報であると判断されたNALをNon-ROI用固有情報として記憶部202に記録する。Non-ROI用固有情報とはROI以外の画像領域に関連する情報である。Non-ROI用固有情報はROI以外の画像領域の符号化方式やROI以外の画像領域の画像情報を含む。 In step S405, the processor 201 records the NAL determined as auxiliary information in step S403 in the storage unit 202 as non-ROI specific information. Non-ROI specific information is information related to an image area other than the ROI. The non-ROI specific information includes a coding method of an image area other than the ROI and image information of the image area other than the ROI.
 Non-VCLのNALが含む情報は、ROI領域の符号化とROI以外の画像領域の符号化の双方に関係する。Non-VCLのNALは画像の全体に共通して関連する情報を含む場合があるからである。よって、Non-VCLであるNALは、ROI用固有情報およびNon-ROI用固有情報の双方として記憶部202に記録される。なお、動画の符号化方式によっては、補助情報のような概念が定義されないために補助情報をROI用固有情報およびNon-ROI用固有情報の双方に記録することの必要がない場合がある。 The information included in the Non-VCL NAL relates to both the encoding of the ROI area and the encoding of the image area other than the ROI. This is because the Non-VCL NAL may include information related to the entire image. Therefore, the NAL that is Non-VCL is recorded in the storage unit 202 as both ROI specific information and Non-ROI specific information. Note that, depending on the encoding method of moving images, there is a case where it is not necessary to record auxiliary information in both ROI specific information and Non-ROI specific information because a concept such as auxiliary information is not defined.
 ステップS406(ステップS403でNo)において、プロセッサ201はステップS403においてVCLであると判断されたNALに対して、当該NALに含まれる画像情報がROIを構成するかを判断する。本実施の形態におけるH.265符号化においては、1枚の画像が複数のタイルと呼ばれる単位分割されて観念される。Non-VCLであるSPS(Sequence Parameter Set)またはPPS(Picture Parameter Set)を参照することで、プロセッサ201は画像をどのように分割したのかに関する情報を取得することができる。画像をどのように分割したのかが定まると、所定のタイル番号を付された領域が画像中のどの位置に存在するのかが定まる。Non-VCLであるSlice Headerを参照することで、プロセッサ201は特定のタイル番号に対応するデータの始点がGOPを構成するデータのどの位置に存在するかを取得することができる。プロセッサ201はNALに含まれる情報がGOPを構成するデータのどの位置に存在するのかを知ることができる。したがって、あるNALに含まれる画像情報がROIにおける画像情報かROI以外の画像領域における画像情報か、またはROIにおける画像情報とROI以外の画像領域における画像情報の双方がNALに含まれるか(必ずしもNALとタイルの単位は一致しない)を知ることができる。 In step S406 (No in step S403), the processor 201 determines whether the image information included in the NAL constitutes the ROI for the NAL determined in step S403 as VCL. H. in this embodiment. In the H.265 coding, one image is divided into units called a plurality of tiles and is considered. By referring to SPS (Sequence Parameter Set) or PPS (Picture Parameter Set) which is Non-VCL, the processor 201 can acquire information on how an image is divided. When it is determined how the image is divided, it is determined at which position in the image the area to which the predetermined tile number is assigned. By referring to the slice header that is a non-VCL, the processor 201 can obtain the position of the data constituting the GOP where the start point of the data corresponding to the specific tile number exists. The processor 201 can know where the information included in the NAL exists in the data constituting the GOP. Therefore, whether the image information included in a certain NAL is image information in the ROI or image information in an image area other than the ROI, or both the image information in the ROI and the image information in the image area other than the ROI are included in the NAL (not necessarily NAL). And tile units do not match).
 ステップS407において、プロセッサ201は、ROIにおける画像情報をROI用固有情報として記憶部202に記録する。 In step S407, the processor 201 records image information in the ROI in the storage unit 202 as ROI specific information.
 ステップS408において、プロセッサ201は、ROI以外の画像領域における画像情報をNon-ROI用固有情報として記憶部202に記録する。 In step S408, the processor 201 records the image information in the image area other than the ROI in the storage unit 202 as non-ROI specific information.
 ステップS403乃至ステップS408の処理が行う処理を図で説明すると図6に示すようになる。図6は、実施の形態1における固有情報の算出処理を説明する図である。図6に示すように、GOPを構成するデータのうちAU(Access Unit)、VPS(Video Parameter Set)、SPS、PPS、Slice Headerなどの補助情報601はNon-ROI用固有情報602およびROI用固有情報603の双方として記録される。図6に示すように、GOPに含まれるデータのうちROI以外の箇所を構成するタイル番号(1-9、11、16、64など)の画像領域における画像情報はNon-ROI用固有情報602として記録される。GOPに含まれるデータのうちROIの箇所を構成するタイル番号(10、12-15など)の画像領域における画像情報はROI用固有情報603として記録される。 FIG. 6 illustrates the processing performed by the processing from step S403 to step S408. FIG. 6 is a diagram for explaining the calculation process of specific information in the first embodiment. As shown in FIG. 6, the auxiliary information 601 such as AU (Access Unit), VPS (Video Parameter Set), SPS, PPS, Slice Header, etc. among the data constituting the GOP is non-ROI specific information 602 and ROI specific information. Information 603 is recorded as both. As shown in FIG. 6, the image information in the image area of the tile number (1-9, 11, 16, 64, etc.) constituting the portion other than the ROI in the data included in the GOP is non-ROI specific information 602. To be recorded. The image information in the image area of the tile number (10, 12-15, etc.) constituting the ROI portion of the data included in the GOP is recorded as ROI specific information 603.
 ステップS409において、プロセッサ201は符号化したデータにステップS403乃至ステップS408の処理を行っていないデータが無いか判定する。具体的にはプロセッサ201はGOPを構成する全てのデータに対してステップS403乃至ステップS408の処理を行ったか否かを判定する。ステップS403乃至ステップS408の処理を行っていない残余のデータが存在する場合は処理がステップS403に戻る(ステップS409でNo)。 In step S409, the processor 201 determines whether there is data that has not been subjected to the processing in steps S403 to S408 in the encoded data. Specifically, the processor 201 determines whether or not the processing from step S403 to step S408 has been performed on all data constituting the GOP. If there is residual data that has not been subjected to the processing of steps S403 to S408, the processing returns to step S403 (No in step S409).
 GOPを構成する全てのデータに対してステップS403乃至ステップS408の処理が完了する(ステップS409でYes)と、プロセッサ201はステップS410において、改ざん検出情報の算出および埋め込みを行う。プロセッサ201はNon-ROI用固有情報に対してハッシュ値を算出することでNon-ROI用改ざん検出情報を算出する。プロセッサ201はROI用固有情報に対してハッシュ値を算出することでROI用改ざん検出情報を算出する。プロセッサ201が第1の改ざん検出情報および第2の改ざん検出情報を埋め込む先は、符号化済み動画を構成する情報であるSEI(Supplemental Enhancement Information)である。SEIはNon-VCLであるNALのひとつであり、GOPを構成する。SEIには動画生成装置110の使用者が自由に情報を書き込める領域が定義されている。プロセッサ201は当該領域に改ざん検出情報を書き込む。なお、Non-ROI用改ざん検出情報およびROI用改ざん検出情報の双方をSEIに埋め込むことは必須ではない。例えばROIの改ざんの有無のみに関心がある場合はROI用改ざん検出情報をSEIに埋め込めばよい。 When the processing from step S403 to step S408 is completed for all data constituting the GOP (Yes in step S409), the processor 201 calculates and embeds falsification detection information in step S410. The processor 201 calculates non-ROI falsification detection information by calculating a hash value for the non-ROI specific information. The processor 201 calculates ROI falsification detection information by calculating a hash value for the ROI specific information. The processor 201 embeds the first tampering detection information and the second tampering detection information in SEI (Supplemental Enhancement Information) that is information constituting the encoded moving image. SEI is one of NALs that are Non-VCL, and constitutes a GOP. The SEI defines an area where the user of the moving image generating apparatus 110 can freely write information. The processor 201 writes the falsification detection information in the area. It is not essential to embed both Non-ROI alteration detection information and ROI alteration detection information in SEI. For example, if the user is interested only in whether or not the ROI has been altered, the ROI alteration detection information may be embedded in the SEI.
 図7は、実施の形態1における情報埋め込み処理を説明する図である。 FIG. 7 is a diagram for explaining the information embedding process in the first embodiment.
 図7に示すデータは1つのGOPを構成するデータであり、図6に示したように改ざん検出情報の算出の元となったデータを含む。GOPには任意でSEIを含ませることが可能である。プロセッサ201は改ざん検出情報の算出の元となったGOPにSEIを含ませ、更にSEIにNon-ROI用改ざん検出情報701およびROI用改ざん検出情報702を書き込むことで、改ざん検出情報の埋め込みを行う。 The data shown in FIG. 7 is data constituting one GOP, and includes data from which the falsification detection information is calculated as shown in FIG. The GOP can optionally include SEI. The processor 201 embeds the falsification detection information by including the SEI in the GOP from which the falsification detection information is calculated and writing the non-ROI falsification detection information 701 and the ROI falsification detection information 702 in the SEI. .
 プロセッサ201は改ざん検出情報の埋め込みが完了すると、動画生成処理を終了する(ステップS411)。プロセッサ201は動画生成処理を終了した後に通信部205および通信路130を介して改ざん検出装置120に動画を送信しても良い。 When the processor 201 completes the embedding of the falsification detection information, the moving image generation process ends (step S411). The processor 201 may transmit the moving image to the tampering detection device 120 via the communication unit 205 and the communication path 130 after the moving image generation process is completed.
 図8は、実施の形態1における改ざん検出処理を示すフローチャートである。 FIG. 8 is a flowchart showing falsification detection processing in the first embodiment.
 本実施の形態において改ざん検出処理は主として改ざん検出装置120のプロセッサ301によって行われる。 In the present embodiment, the falsification detection processing is mainly performed by the processor 301 of the falsification detection device 120.
 ステップS800において、プロセッサ301は改ざん検出処理を開始する。プロセッサ301は改ざん検出処理を開始すると記憶部302から符号化済み動画を構成する情報を所定のデータ単位分だけデータを読み出す。本実施の形態において動画がH.265規格に従って符号化をされているので、プロセッサ301はH.265規格におけるGOP単位でデータを読み出す。読み出されたデータはプロセッサ301内の高速な記憶領域に保存される。改ざん検出処理の対象となる符号化済み動画は動画生成装置110で生成された動画である。改ざん検出装置は符号化済み動画を動画生成装置110から通信路130および通信部305を介して取得しても良いし、記憶媒体に記録された動画として入力部303から取得しても良い。プロセッサが改ざん検出処理を開始するタイミングは改ざん検出装置120の使用者が行った入力部303に対する改ざん検出処理命令に従って行っても良いし、入力部303または通信部305から動画を取得する度に行っても良い。 In step S800, the processor 301 starts falsification detection processing. When the falsification detection process is started, the processor 301 reads out data constituting the encoded moving image from the storage unit 302 by a predetermined data unit. In this embodiment, the moving image is H.264. Since the encoding is performed in accordance with the H.265 standard, the processor 301 uses the H.264 standard. Data is read in GOP units in the H.265 standard. The read data is stored in a high-speed storage area in the processor 301. The encoded moving image that is the target of the falsification detection process is a moving image generated by the moving image generating device 110. The tampering detection device may acquire the encoded moving image from the moving image generation device 110 via the communication path 130 and the communication unit 305, or may acquire the moving image recorded on the storage medium from the input unit 303. The timing at which the processor starts the falsification detection processing may be performed in accordance with a falsification detection processing instruction for the input unit 303 performed by the user of the falsification detection device 120, or every time a moving image is acquired from the input unit 303 or the communication unit 305. May be.
 ステップS801において、プロセッサ301は動画から改ざん検出情報を抽出する。改ざん検出情報とはステップS410において動画生成装置110が埋め込んだ改ざん検出情報である。プロセッサ301はステップS800で読み出したGOPのうちからSEIを探索する。プロセッサ301はSEIを検知するとSEIから改ざん検出情報を抽出する。 In step S801, the processor 301 extracts falsification detection information from the moving image. The falsification detection information is falsification detection information embedded by the moving image generating apparatus 110 in step S410. The processor 301 searches for the SEI from the GOP read in step S800. When detecting the SEI, the processor 301 extracts the falsification detection information from the SEI.
 ステップS802において、プロセッサ301はステップS800で読み出したGOPを構成するNALが補助情報であるか否かを判断する。 In step S802, the processor 301 determines whether or not the NAL configuring the GOP read in step S800 is auxiliary information.
 ステップS803(ステップS802でYes)において、プロセッサ301はステップS802において補助情報であると判断されたNALをROI用固有情報として記憶部302に記録する。 In step S803 (Yes in step S802), the processor 301 records the NAL determined to be auxiliary information in step S802 in the storage unit 302 as ROI specific information.
 ステップS804において、プロセッサ301はステップS802において補助情報であると判断されたNALをNon-ROI用固有情報として記憶部302に記録する。 In step S804, the processor 301 records the NAL determined as auxiliary information in step S802 in the storage unit 302 as non-ROI specific information.
 ステップS805(ステップS802でNo)において、プロセッサ301はステップS802において、VCLであると判断されたNALに対して、当該NALに含まれる画像情報がROIを構成するかを判断する。プロセッサ301がNALに含まれる画像情報がROIを構成するかを判断する手法はステップS406で述べた手法と同様のものを用いることができる。 In step S805 (No in step S802), the processor 301 determines whether the image information included in the NAL constitutes the ROI for the NAL determined to be the VCL in step S802. A method similar to the method described in step S406 can be used as a method for the processor 301 to determine whether the image information included in the NAL constitutes the ROI.
 ステップS806において、プロセッサ301はステップS805で判定したNALに含まれるデータのうちROIにおける画像情報をROI用固有情報として記憶部302に記録する。 In step S806, the processor 301 records the image information in the ROI among the data included in the NAL determined in step S805 in the storage unit 302 as the ROI specific information.
 ステップS807において、プロセッサ301はステップS806で判定したNALに含まれるデータのうちROI以外の画像領域における画像情報をNon-ROI用固有情報として記憶部302に記録する。 In step S807, the processor 301 records the image information in the image area other than the ROI in the data included in the NAL determined in step S806 in the storage unit 302 as non-ROI specific information.
 ステップS808において、プロセッサ301は符号化したデータにステップS802乃至ステップS807の処理を行っていないデータが無いか判定する。具体的にはプロセッサ301はGOPを構成する全てのデータに対してステップS802乃至ステップS807の処理を行ったか否かを判定する。ステップS802乃至ステップS807の処理を行っていない残余のデータが存在する場合は処理がステップS802に戻る(ステップS808でNo)。 In step S808, the processor 301 determines whether there is data that has not been subjected to the processing in steps S802 to S807 in the encoded data. Specifically, the processor 301 determines whether or not the processing in steps S802 to S807 has been performed on all data constituting the GOP. If there is residual data that has not been subjected to the processing of steps S802 to S807, the processing returns to step S802 (No in step S808).
 図9は、実施の形態1における改ざん検出処理を示すフローチャートである。なお、図9に示すフローチャートは図8に示すフローチャートと結節点Aで結合している。 FIG. 9 is a flowchart showing falsification detection processing in the first embodiment. The flowchart shown in FIG. 9 is connected to the flowchart shown in FIG.
 GOPを構成する全てのデータに対してステップS802乃至ステップS807の処理が完了する(ステップS808でYes)と、プロセッサ301はステップS901において、検証用改ざん検出情報の算出を行う。プロセッサ301はNon-ROI用固有情報に対してハッシュ値を算出することでNon-ROI用検証用改ざん検出情報を算出する。プロセッサ301はROI用固有情報に対してハッシュ値を算出することでROI用検証用改ざん検出情報を算出する。なお、ここでハッシュ値の算出に用いるアルゴリズムは動画生成装置110がステップS410で用いたアルゴリズムと同様とする。 When the processing from step S802 to step S807 is completed for all data constituting the GOP (Yes in step S808), the processor 301 calculates verification falsification detection information in step S901. The processor 301 calculates non-ROI verification falsification detection information by calculating a hash value for the non-ROI specific information. The processor 301 calculates ROI verification falsification detection information by calculating a hash value for the ROI specific information. Here, the algorithm used for calculating the hash value is the same as the algorithm used by the moving image generating apparatus 110 in step S410.
 ステップS902において、プロセッサ301はROI以外の画像領域に改ざんがあったか否かを検出する。プロセッサ301はNon-ROI用改ざん検出情報とNon-ROI用検証用改ざん検出情報とを比較し同一ならばROI以外の領域に改ざんが無かったと判定し、同一でなければROI以外の領域に改ざんがあったことを検出する。 In step S902, the processor 301 detects whether or not the image area other than the ROI has been tampered with. The processor 301 compares the falsification detection information for Non-ROI and the falsification detection information for verification for Non-ROI and determines that there is no falsification in the area other than the ROI if they are the same. Detect that there was.
 ステップS903(ステップS902でYes)において、プロセッサ301はROI以外の画像領域に改ざんがあったことを報知する。改ざんがあったことの報知は様々なものが考えられるが一例としては、出力部304を介して警告メッセージを出力することで改ざんがあったことの報知を行うことができる。 In step S903 (Yes in step S902), the processor 301 notifies that an image area other than the ROI has been tampered with. There are various notifications of alterations, but as an example, a warning message can be output via the output unit 304 to notify that alterations have occurred.
 ステップS904において、プロセッサ301はROIに改ざんがあったか否かを検出する。プロセッサ301はROI用改ざん検出情報とROI用検証用改ざん検出情報とを比較し同一ならばROIに改ざんが無かったと判定し、同一でなければROIに改ざんがあったことを検出する。 In step S904, the processor 301 detects whether the ROI has been tampered with. The processor 301 compares the ROI tampering detection information with the ROI verification tampering detection information and determines that the ROI has not been tampered with if it is the same, and if it is not the same, detects that the ROI has been tampered with.
 ステップS905(ステップS904でYes)において、プロセッサ301はROIに改ざんがあったことを報知する。改ざんがあったことの報知はステップS903と同様の手法を用いることができる。 In step S905 (Yes in step S904), the processor 301 notifies that the ROI has been tampered with. A notification similar to that in step S903 can be used to notify that tampering has occurred.
 ステップS906において、プロセッサ301はステップ800で読み出したGOPを復号する。なお、ROI以外の領域またはROIで改ざんが検出された場合は、改ざんのあった領域について復号を行わないようにしても良い。このようにすると、信用性の低い画像を改ざん検出装置120の使用者に提示してしまうおそれが減る。 In step S906, the processor 301 decodes the GOP read in step 800. Note that when alteration is detected in an area other than the ROI or in the ROI, the area that has been altered may not be decoded. In this way, the risk of presenting an image with low reliability to the user of the falsification detection device 120 is reduced.
 ステップS907において、プロセッサ301は動画生成装置110がステップS401でマスク処理を行うために用いた暗号鍵が記憶部302に記録されているか否かを判定する。 In step S907, the processor 301 determines whether or not the encryption key used for the moving image generating apparatus 110 to perform the mask process in step S401 is recorded in the storage unit 302.
 記憶部302に暗号鍵が記録されていない場合(ステップ907でNo)、ステップS908において、プロセッサ301はROIにおける画像情報はマスクであることを報知する。 When the encryption key is not recorded in the storage unit 302 (No in Step 907), in Step S908, the processor 301 notifies that the image information in the ROI is a mask.
 記憶部302に暗号鍵が記録されている場合(ステップ907でYes)、ステップS909において、プロセッサ301はROIのマスクを解除する。 If the encryption key is recorded in the storage unit 302 (Yes in Step 907), in Step S909, the processor 301 cancels the ROI mask.
 以上の処理を終えるとプロセッサ301は改ざん検出処理を終了する(ステップS910)。 When the above processing is completed, the processor 301 ends the falsification detection processing (step S910).
 [1-3.効果等]
 以上のように本実施の形態において、動画生成装置110および動画生成装置110が実行する動画生成方法は、所定の符号化方式に従って符号化された符号化済み動画を構成する情報に改ざん検出情報を付加することで、プロセッサ201が動画を生成する。符号化済み動画を構成する画像は第1の画像領域(ROIまたはROI以外の領域)と第2の画像領域(ROIまたはROI以外の領域)を有する。プロセッサ201は、符号化済み動画を構成する情報のうち、第1の画像領域における画像情報を含み、第2の画像領域における画像情報を含まない情報から、第1の画像領域が改ざんされたか否かを検出する為の情報である第1の改ざん検出情報(ROI用改ざん検出情報またはNon-ROI用改ざん検出情報)を算出する。更にプロセッサ201は、算出された第1の改ざん検出情報を、前記符号化済み動画を構成する情報に付加する。
[1-3. Effect]
As described above, in the present embodiment, the moving image generating apparatus 110 and the moving image generating method executed by the moving image generating apparatus 110 include the falsification detection information in the information constituting the encoded moving image encoded according to a predetermined encoding method. By adding, the processor 201 generates a moving image. An image constituting the encoded moving image has a first image region (region other than ROI or ROI) and a second image region (region other than ROI or ROI). The processor 201 determines whether or not the first image area has been tampered with from the information that includes the image information in the first image area and does not include the image information in the second image area among the information that configures the encoded moving image. First falsification detection information (ROI falsification detection information or Non-ROI falsification detection information), which is information for detecting the above, is calculated. Further, the processor 201 adds the calculated first alteration detection information to information constituting the encoded moving image.
 これにより、動画を構成する画像の一部のみに改ざんがあったか否かを検出するのに用いることができる第1の改ざん検出情報を付加した動画を生成することができる。 Thereby, it is possible to generate a moving image to which the first falsification detection information that can be used to detect whether or not only a part of the image constituting the moving image has been falsified.
 そのため、動画における一部の領域に対する改ざんの有無の検出を容易にすることができる。 Therefore, it is possible to easily detect the presence / absence of alteration of a part of the moving image.
 また、本実施の形態において、プロセッサ201は、符号化済み動画を構成する情報のうち、第2の画像領域における画像情報を含み、第1の画像領域における画像情報を含まない情報から、第2の画像領域が改ざんされたか否かを検出する為の情報である第2の改ざん検出情報(ROI用改ざん検出情報またはNon-ROI用改ざん検出情報)を算出する。プロセッサ201は、算出された第1の改ざん検出情報および第2の改ざん検出情報を、符号化済み動画を構成する情報に付加する。 Further, in the present embodiment, the processor 201 uses the second information from the information that includes the image information in the second image area and does not include the image information in the first image area among the information that configures the encoded moving image. Second alteration detection information (ROI alteration detection information or Non-ROI alteration detection information), which is information for detecting whether or not the image area of the image has been altered, is calculated. The processor 201 adds the calculated first alteration detection information and the second alteration detection information to information constituting the encoded moving image.
 これにより、動画を構成する画像が複数の領域に分割されている際に、当該領域毎に独立して改ざんの有無を検出することができる動画を生成することができる。 Thereby, when the image constituting the moving image is divided into a plurality of regions, it is possible to generate a moving image that can detect the presence or absence of falsification independently for each region.
 そのため、動画における一部の領域に対する改ざんの有無の検出をより容易にすることができる。 Therefore, it is possible to more easily detect the presence / absence of alteration of a part of the moving image.
 また、本実施の形態において符号化済み動画を構成する情報は符号化済み動画の符号化方式に関する情報を含む補助情報を有し、補助情報は、第1の改ざん検出情報および第2の改ざん検出情報の双方の算出に用いられる。 Further, in the present embodiment, the information constituting the encoded moving image has auxiliary information including information related to the encoding method of the encoded moving image, and the auxiliary information includes the first alteration detection information and the second alteration detection. Used to calculate both information.
 これにより、動画の符号化方式という動画を構成する画像全体にかかわる情報についての存在を第1の改ざん検出情報および第2の改ざん検出情報の算出に反映させることができる。 Thus, the presence of information relating to the entire image constituting the moving image, which is called a moving image encoding method, can be reflected in the calculation of the first alteration detection information and the second alteration detection information.
 そのため、動画における一部の領域に対する改ざんの有無の検出をより容易にすることができる。 Therefore, it is possible to more easily detect the presence / absence of alteration of a part of the moving image.
 また、本実施の形態において符号化方式は、符号化前の動画を構成する各々の原画像を符号化する際に、符号化済み動画を構成する画像である参照画像の有する領域を参照して符号化する方式である。そして、第1の領域および第2の領域は原画像において定義されている。プロセッサ201は、原画像における第1の領域を符号化する際は参照画像における第2の領域を参照せず、原画像における第2の領域を符号化する際は参照画像における前記第1の領域を参照せずに符号化する。 Also, in the present embodiment, the encoding method refers to an area of a reference image that is an image constituting an encoded moving image when each original image constituting the moving image before encoding is encoded. This is a coding method. The first area and the second area are defined in the original image. The processor 201 does not refer to the second region in the reference image when encoding the first region in the original image, and the first region in the reference image when encoding the second region in the original image. Encode without referring to.
 これにより、1枚の画像を符号化する際に第1の画像領域と第2の画像領域とを独立に符号化できる。 Thus, the first image area and the second image area can be independently encoded when encoding one image.
 そのため、動画における一部の領域に対する改ざんの有無の検出をより容易にすることができる。 Therefore, it is possible to more easily detect the presence / absence of alteration of a part of the moving image.
 また、本実施の形態において改ざん検出装置120および改ざん検出装置120が実行する改ざん検出方法は、所定の符号化方式に従って符号化された符号化済み動画を構成する情報に改ざん検出情報を付された動画をプロセッサ301が復号する。動画を構成する画像は第1の画像領域(ROIまたはROI以外の領域)と第2の画像領域(ROIまたはROI以外の領域)を有する。プロセッサ301は、動画の有する情報のうち、第1の画像領域における画像情報を含み、第2の画像領域における画像情報を含まない情報から、第1の画像領域が改ざんされたか否かを検出する為の情報である第1の検証用改ざん検出情報(ROI用検証用改ざん検出情報またはNon-ROI用検証用改ざん検出情報)を算出する。更にプロセッサは、第1の改ざん検出情報(ROI用改ざん検出情報またはNon-ROI用改ざん検出情報)を前記動画の情報から抽出する。更にプロセッサは第1の検証用改ざん検出情報と第1の改ざん検出情報を比較することで第1の画像領域に改ざんがあったか否かを検出する。 Further, in the present embodiment, the falsification detection device 120 and the falsification detection method executed by the falsification detection device 120 include the falsification detection information attached to the information constituting the encoded moving image encoded according to a predetermined encoding method. The processor 301 decrypts the moving image. An image constituting a moving image has a first image region (region other than ROI or ROI) and a second image region (region other than ROI or ROI). The processor 301 detects whether or not the first image area has been tampered with from information that includes image information in the first image area and does not include image information in the second image area, among the information of the moving image. First falsification detection information for verification (ROI verification falsification detection information or Non-ROI verification falsification detection information), which is information for this purpose, is calculated. Further, the processor extracts first alteration detection information (ROI alteration detection information or Non-ROI alteration detection information) from the moving image information. Further, the processor compares the first verification falsification detection information with the first falsification detection information to detect whether or not the first image area has been falsified.
 これにより、第1の改ざん検出情報を用いて、動画における一部の領域に対する改ざんの検出を行うことができる。 Thereby, it is possible to detect falsification of a part of the moving image using the first falsification detection information.
 そのため、動画における一部の領域に対する改ざんの有無の検出を容易にすることができる。 Therefore, it is possible to easily detect the presence / absence of alteration of a part of the moving image.
 またプロセッサ301は、動画の有する情報のうち、第2の画像領域における画像情報を含み、第1の画像領域における画像情報を含まない情報から、第2の画像領域が改ざんされたか否かを検出する為の情報である第2の検証用改ざん検出情報を算出し、第2の改ざん検出情報を前記動画の情報から抽出し、第2の検証用改ざん検出情報と第2の改ざん検出情報を比較することで第2の画像領域に改ざんがあったか否かを検出する。 The processor 301 also detects whether the second image area has been tampered with from information that includes the image information in the second image area and does not include the image information in the first image area, among the information of the moving image. 2nd verification falsification detection information which is information for performing the calculation, the second falsification detection information is extracted from the video information, and the second verification falsification detection information is compared with the second falsification detection information. Thus, it is detected whether or not the second image area has been tampered with.
 これにより、動画を構成する画像が複数の領域に分割されている際に、当該領域毎に独立して改ざんの有無を検出することができる。 Thereby, when the image constituting the moving image is divided into a plurality of areas, it is possible to detect the presence or absence of falsification independently for each area.
 そのため、動画における一部の領域に対する改ざんの有無の検出をより容易にすることができる。 Therefore, it is possible to more easily detect the presence / absence of alteration of a part of the moving image.
 また、符号化済み動画を構成する情報は前記符号化済み動画の符号化方式に関する情報を含む補助情報を有し、補助情報は、第1の検証用改ざん検出情報および第2の検証用改ざん検出情報の双方の算出に用いられる。 Further, the information constituting the encoded moving image has auxiliary information including information on the encoding method of the encoded moving image, and the auxiliary information includes the first verification falsification detection information and the second verification falsification detection. Used to calculate both information.
 これにより、動画の符号化方式という動画を構成する画像全体にかかわる情報についての存在を第1の検証用改ざん検出情報および第2の検証用改ざん検出情報の算出に反映させることができる。 Thus, the presence of information relating to the entire image constituting the moving image, which is a moving image encoding method, can be reflected in the calculation of the first verification falsification detection information and the second verification falsification detection information.
 そのため、動画における一部の領域に対する改ざんの有無の検出をより容易にすることができる。 Therefore, it is possible to more easily detect the presence / absence of alteration of a part of the moving image.
 (他の実施の形態)
 以上のように、本出願において開示する技術の例示として、実施の形態1を説明した。しかしながら、本開示における技術は、これに限定されず、適宜、変更、置き換え、付加、省略などを行った実施の形態にも適用可能である。また、上記実施の形態1で説明した各構成要素を組み合わせて、新たな実施の形態とすることも可能である。
(Other embodiments)
As described above, the first embodiment has been described as an example of the technique disclosed in the present application. However, the technology in the present disclosure is not limited to this, and can also be applied to an embodiment in which changes, replacements, additions, omissions, and the like are appropriately performed. Moreover, it is also possible to combine each component demonstrated in the said Embodiment 1, and it can also be set as a new embodiment.
 なお、上述の実施の形態は、本開示における技術を例示するためのものであるから、請求の範囲またはその均等の範囲において種々の変更、置き換え、付加、省略などを行うことができる。 Note that the above-described embodiment is for illustrating the technique in the present disclosure, and therefore various modifications, replacements, additions, omissions, and the like can be made within the scope of the claims or an equivalent scope thereof.
 本開示は、動画における一部の領域に対する改ざんの有無を検出するセキュリティシステムなどに適用可能である。 This disclosure can be applied to a security system that detects the presence or absence of falsification of a part of a moving image.
 100 検出システム
 110 動画生成装置
 120 改ざん検出装置
 130 通信路
 201 プロセッサ
 202 記憶部
 203 入力部
 204 出力部
 205 通信部
 206 バス
 301 プロセッサ
 302 記憶部
 303 入力部
 304 出力部
 305 通信部
 306 バス
 501 マスク前画像
 502 マスク後画像
 503 マスク
 601 補助情報
 602 Non-ROI用固有情報
 603 ROI用固有情報
 701 Non-ROI用改ざん検出情報
 702 ROI用改ざん検出情報
DESCRIPTION OF SYMBOLS 100 Detection system 110 Animation production | generation apparatus 120 Tampering detection apparatus 130 Communication path 201 Processor 202 Storage part 203 Input part 204 Output part 205 Communication part 206 Bus 301 Processor 302 Storage part 303 Input part 304 Output part 305 Communication part 306 Bus 501 Image before mask 502 Post-mask image 503 Mask 601 Auxiliary information 602 Non-ROI specific information 603 ROI specific information 701 Non-ROI falsification detection information 702 ROI falsification detection information

Claims (18)

  1.  所定の符号化方式に従って符号化された符号化済み動画を構成する情報に改ざん検出情報を付加することで、プロセッサが動画を生成する、動画生成方法であって、
     前記符号化済み動画を構成する画像は第1の画像領域と第2の画像領域を有し、
     前記プロセッサは、
     前記符号化済み動画を構成する情報のうち、前記第1の画像領域における画像情報を含み、前記第2の画像領域における画像情報を含まない情報から、前記第1の画像領域が改ざんされたか否かを検出する為の情報である第1の改ざん検出情報を算出し、
     前記算出された第1の改ざん検出情報を、前記符号化済み動画を構成する情報に付加する、
     動画生成方法。
    A moving image generating method in which a processor generates a moving image by adding falsification detection information to information constituting an encoded moving image encoded according to a predetermined encoding method,
    The image constituting the encoded moving image has a first image region and a second image region,
    The processor is
    Whether or not the first image area has been tampered with from information that includes the image information in the first image area and does not include the image information in the second image area among the information constituting the encoded moving image Calculating first alteration detection information that is information for detecting
    Adding the calculated first alteration detection information to information constituting the encoded moving image;
    Movie generation method.
  2.  前記プロセッサは、
     前記符号化済み動画を構成する情報のうち、前記第2の画像領域における画像情報を含み、前記第1の画像領域における画像情報を含まない情報から、前記第2の画像領域が改ざんされたか否かを検出する為の情報である第2の改ざん検出情報を算出し、
     前記算出された第1の改ざん検出情報および第2の改ざん検出情報を、前記符号化済み動画を構成する情報に付加する、
     請求項1に記載の動画生成方法。
    The processor is
    Whether the second image area has been tampered with from the information that includes the image information in the second image area and does not include the image information in the first image area among the information constituting the encoded moving image Calculating second alteration detection information that is information for detecting
    Adding the calculated first alteration detection information and second alteration detection information to information constituting the encoded moving image;
    The moving image generation method according to claim 1.
  3.  前記符号化済み動画を構成する情報は前記符号化済み動画の符号化方式に関する情報を含む補助情報を有し、
     前記補助情報は、前記第1の改ざん検出情報および前記第2の改ざん検出情報の双方の算出に用いられる、
     請求項2に記載の動画生成方法。
    The information constituting the encoded video has auxiliary information including information on the encoding method of the encoded video,
    The auxiliary information is used to calculate both the first alteration detection information and the second alteration detection information.
    The moving image generating method according to claim 2.
  4.  前記所定の符号化方式は、符号化前の動画を構成する各々の原画像を符号化する際に、前記符号化済み動画を構成する画像である参照画像の有する領域を参照して符号化する方式であって、
     前記第1の領域および前記第2の領域は前記原画像において定義され、
     前記プロセッサは、
     前記原画像における前記第1の領域を符号化する際は前記参照画像における前記第2の領域を参照せず、前記原画像における前記第2の領域を符号化する際は前記参照画像における前記第1の領域を参照せずに符号化する、
     請求項1に記載の動画生成方法。
    In the predetermined encoding method, when each original image constituting the moving image before encoding is encoded, encoding is performed with reference to a region included in a reference image which is an image forming the encoded moving image. A method,
    The first region and the second region are defined in the original image;
    The processor is
    When encoding the first region in the original image, the second region in the reference image is not referred to, and when encoding the second region in the original image, the second region in the reference image is not performed. Encoding without reference to one region,
    The moving image generation method according to claim 1.
  5.  所定の符号化方式に従って符号化された符号化済み動画を構成する情報改ざん検出情報を付された動画をプロセッサが復号する、改ざん検出方法であって、
     前記動画を構成する画像は第1の画像領域と第2の画像領域を有し、
     前記プロセッサは、
     前記動画の有する情報のうち、前記第1の画像領域における画像情報を含み、前記第2の画像領域における画像情報を含まない情報から、第1の画像領域が改ざんされたか否かを検出する為の情報である第1の検証用改ざん検出情報を算出し、
     第1の改ざん検出情報を前記動画の情報から抽出し、
     前記第1の検証用改ざん検出情報と前記第1の改ざん検出情報を比較することで前記第1の画像領域に改ざんがあったか否かを検出する、
     改ざん検出方法。
    A falsification detection method in which a processor decodes a moving image with information falsification detection information constituting an encoded moving image encoded according to a predetermined encoding method,
    The image constituting the moving image has a first image region and a second image region,
    The processor is
    To detect whether or not the first image area has been tampered with from information that includes the image information in the first image area and does not include the image information in the second image area, among the information of the moving image The first verification falsification detection information that is the information of
    Extracting first alteration detection information from the information of the moving image;
    Detecting whether the first image area has been altered by comparing the first verification alteration detection information with the first alteration detection information;
    Tamper detection method.
  6.  前記プロセッサは、
     前記動画の有する情報のうち、前記第2の画像領域における画像情報を含み、前記第1の画像領域における画像情報を含まない情報から、前記第2の画像領域が改ざんされたか否かを検出する為の情報である第2の検証用改ざん検出情報を算出し、
     第2の改ざん検出情報を前記動画の情報から抽出し、
     前記第2の検証用改ざん検出情報と前記第2の改ざん検出情報を比較することで前記第2の画像領域に改ざんがあったか否かを検出する、
     請求項5に記載の改ざん検出方法。
    The processor is
    It is detected whether or not the second image area has been tampered with from information that includes the image information in the second image area and does not include the image information in the first image area among the information of the moving image. Second alteration detection information for verification, which is information for the purpose,
    Extracting second alteration detection information from the information of the video,
    Detecting whether or not the second image area has been altered by comparing the second verification alteration detection information and the second alteration detection information;
    The falsification detection method according to claim 5.
  7.  前記符号化済み動画を構成する情報は前記符号化済み動画の符号化方式に関する情報を含む補助情報を有し、
     前記補助情報は、前記第1の検証用改ざん検出情報および前記第2の検証用改ざん検出情報の双方の算出に用いられる、
     請求項6に記載の改ざん検出方法。
    The information constituting the encoded video has auxiliary information including information on the encoding method of the encoded video,
    The auxiliary information is used to calculate both the first verification falsification detection information and the second verification falsification detection information.
    The falsification detection method according to claim 6.
  8.  所定の符号化方式に従って符号化された符号化済み動画を構成する情報に改ざん検出情報を付加することで動画を生成する、動画生成装置であって、
     前記符号化済み動画を構成する画像は第1の画像領域と第2の画像領域を有し、
     前記動画生成装置が有するプロセッサは、
     前記符号化済み動画を構成する情報のうち、前記第1の画像領域における画像情報を含み、前記第2の画像領域における画像情報を含まない情報から、前記第1の画像領域が改ざんされたか否かを検出する為の情報である第1の改ざん検出情報を算出し、
     前記算出された第1の改ざん検出情報を、前記符号化済み動画を構成する情報に付加する、
     動画生成装置。
    A moving image generating device for generating a moving image by adding falsification detection information to information constituting an encoded moving image encoded according to a predetermined encoding method,
    The image constituting the encoded moving image has a first image region and a second image region,
    The processor included in the moving image generating device is:
    Whether or not the first image area has been tampered with from information that includes the image information in the first image area and does not include the image information in the second image area among the information constituting the encoded moving image Calculating first alteration detection information that is information for detecting
    Adding the calculated first alteration detection information to information constituting the encoded moving image;
    Movie generator.
  9.  前記プロセッサは、
     前記符号化済み動画を構成する情報のうち、前記第2の画像領域における画像情報を含み、前記第1の画像領域における画像情報を含まない情報から、前記第2の画像領域が改ざんされたか否かを検出する為の情報である第2の改ざん検出情報を算出し、
     前記算出された第1の改ざん検出情報および第2の改ざん検出情報を、前記符号化済み動画を構成する情報に付加する、
     請求項8に記載の動画生成装置。
    The processor is
    Whether the second image area has been tampered with from the information that includes the image information in the second image area and does not include the image information in the first image area among the information constituting the encoded moving image Calculating second alteration detection information that is information for detecting
    Adding the calculated first alteration detection information and second alteration detection information to information constituting the encoded moving image;
    The moving image generating apparatus according to claim 8.
  10.  前記符号化済み動画を構成する情報は前記符号化済み動画の符号化方式に関する情報を含む補助情報を有し、
     前記補助情報は、前記第1の改ざん検出情報および前記第2の改ざん検出情報の双方の算出に用いられる、
     請求項9に記載の動画生成装置。
    The information constituting the encoded video has auxiliary information including information on the encoding method of the encoded video,
    The auxiliary information is used to calculate both the first alteration detection information and the second alteration detection information.
    The moving image generating apparatus according to claim 9.
  11.  前記所定の符号化方式は、符号化前の動画を構成する各々の原画像を符号化する際に、前記符号化済み動画を構成する画像である参照画像の有する領域を参照して符号化する方式であって、
     前記第1の領域および前記第2の領域は前記原画像において定義され、
     前記プロセッサは、
     前記原画像における前記第1の領域を符号化する際は前記参照画像における前記第2の領域を参照せず、前記原画像における前記第2の領域を符号化する際は前記参照画像における前記第1の領域を参照せずに符号化する、
     請求項8に記載の動画生成装置。
    In the predetermined encoding method, when each original image constituting the moving image before encoding is encoded, encoding is performed with reference to a region included in a reference image which is an image forming the encoded moving image. A method,
    The first region and the second region are defined in the original image;
    The processor is
    When encoding the first region in the original image, the second region in the reference image is not referred to, and when encoding the second region in the original image, the second region in the reference image is not performed. Encoding without reference to one region,
    The moving image generating apparatus according to claim 8.
  12.  所定の符号化方式に従って符号化された符号化済み動画を構成する情報に第1の改ざん検出情報および第2の改ざん検出情報を付された動画の改ざんを検出する、改ざん検出装置であって、
     前記動画を構成する画像は第1の画像領域と第2の画像領域を有し、
     前記改ざん検出装置が有するプロセッサは、
     前記動画の有する情報のうち、前記第1の画像領域における画像情報を含み、前記第2の画像領域における画像情報を含まない情報から、前記第1の画像領域が改ざんされたか否かを検出する為の情報である第1の検証用改ざん検出情報を算出し、
     第1の改ざん検出情報を前記動画の情報から抽出し、
     前記第1の検証用改ざん検出情報と前記第1の改ざん検出情報を比較することで前記第1の画像領域に改ざんがあったか否かを検出する、
     改ざん検出装置。
    An alteration detection device for detecting alteration of a moving image in which first alteration detection information and second alteration detection information are attached to information constituting an encoded movie encoded according to a predetermined encoding method,
    The image constituting the moving image has a first image region and a second image region,
    The tamper detection device has a processor,
    It is detected whether or not the first image area has been falsified from information that includes the image information in the first image area and does not include image information in the second image area, among the information of the moving image. To calculate first verification falsification detection information that is information for
    Extracting first alteration detection information from the information of the moving image;
    Detecting whether the first image area has been altered by comparing the first verification alteration detection information with the first alteration detection information;
    Tamper detection device.
  13.  前記プロセッサは、
     前記動画の有する情報のうち、前記第2の画像領域における画像情報を含み、前記第1の画像領域における画像情報を含まない情報から、前記第2の画像領域が改ざんされたか否かを検出する為の情報である第2の検証用改ざん検出情報を算出し、
     第2の改ざん検出情報を前記動画の情報から抽出し、
     前記第2の検証用改ざん検出情報と前記第2の改ざん検出情報を比較することで前記第2の画像領域に改ざんがあったか否かを検出する、
     請求項12に記載の改ざん検出装置。
    The processor is
    It is detected whether or not the second image area has been tampered with from information that includes the image information in the second image area and does not include the image information in the first image area among the information of the moving image. Second alteration detection information for verification, which is information for the purpose,
    Extracting second alteration detection information from the information of the video,
    Detecting whether or not the second image area has been altered by comparing the second verification alteration detection information and the second alteration detection information;
    The falsification detection device according to claim 12.
  14.  前記符号化済み動画を構成する情報は前記符号化済み動画の符号化方式に関する情報を含む補助情報を有し、
     前記補助情報は、前記第1の検証用改ざん検出情報および前記第2の検証用改ざん検出情報の双方の算出に用いられる、
     請求項13に記載の改ざん検出装置。
    The information constituting the encoded video has auxiliary information including information on the encoding method of the encoded video,
    The auxiliary information is used to calculate both the first verification falsification detection information and the second verification falsification detection information.
    The falsification detection device according to claim 13.
  15.  所定の符号化方式に従って符号化された符号化済み動画を構成する情報に改ざん検出情報を付加することで動画を生成する、動画生成装置と、
     所定の符号化方式に従って符号化された符号化済み動画を構成する情報に第1の改ざん検出情報および第2の改ざん検出情報を付された動画の改ざんを検出する、改ざん検出装置と、を有する改ざん検出システムであって、
     前記符号化済み動画を構成する画像は第1の画像領域と第2の画像領域を有し、
     前記動画生成装置が有するプロセッサは、
     前記符号化済み動画を構成する情報のうち、前記第1の画像領域における画像情報を含み、前記第2の画像領域における画像情報を含まない情報から、前記第1の画像領域が改ざんされたか否かを検出する為の情報である第1の改ざん検出情報を算出し、
     前記算出された第1の改ざん検出情報を、前記符号化済み動画を構成する情報に付加し、
     前記改ざん検出装置が有するプロセッサは、
     前記動画の有する情報のうち、前記第1の画像領域における画像情報を含み、前記第2の画像領域における画像情報を含まない情報から、前記第1の画像領域が改ざんされたか否かを検出する為の情報である第1の検証用改ざん検出情報を算出し、
     前記第1の改ざん検出情報を前記動画の情報から抽出し、
     前記第1の検証用改ざん検出情報と前記第1の改ざん検出情報を比較することで前記第1の画像領域に改ざんがあったか否かを検出する、
     改ざん検出システム。
    A moving image generating device for generating a moving image by adding falsification detection information to information constituting an encoded moving image encoded according to a predetermined encoding method;
    A tamper detection device that detects tampering of a moving image in which first tampering detection information and second tampering detection information are added to information constituting an encoded moving image encoded according to a predetermined encoding method. A tamper detection system,
    The image constituting the encoded moving image has a first image region and a second image region,
    The processor included in the moving image generating device is:
    Whether or not the first image area has been tampered with from information that includes the image information in the first image area and does not include the image information in the second image area among the information constituting the encoded moving image Calculating first alteration detection information that is information for detecting
    Adding the calculated first alteration detection information to information constituting the encoded moving image;
    The tamper detection device has a processor,
    It is detected whether or not the first image area has been falsified from information that includes the image information in the first image area and does not include image information in the second image area, among the information of the moving image. To calculate first verification falsification detection information that is information for
    Extracting the first alteration detection information from the information of the moving image;
    Detecting whether the first image area has been altered by comparing the first verification alteration detection information with the first alteration detection information;
    Tamper detection system.
  16.  前記動画生成装置が有するプロセッサは、
     前記符号化済み動画を構成する情報のうち、前記第2の画像領域における画像情報を含み、前記第1の画像領域における画像情報を含まない情報から、前記第2の画像領域が改ざんされたか否かを検出する為の情報である第2の改ざん検出情報を算出し、
     前記算出された第1の改ざん検出情報および第2の改ざん検出情報を、前記符号化済み動画を構成する情報に付加し、
     前記改ざん検出装置が有するプロセッサは、
     前記符号化済み動画を構成する情報のうち、前記第2の画像領域における画像情報を含み、前記第1の画像領域における画像情報を含まない情報から、前記第2の画像領域が改ざんされたか否かを検出する為の情報である第2の検証用改ざん検出情報を算出し、
     第2の改ざん検出情報を前記動画の情報から抽出し、
     前記第2の検証用改ざん検出情報と前記第2の改ざん検出情報を比較することで前記第2の画像領域に改ざんがあったか否かを検出する、
     請求項15に記載の改ざん検出システム。
    The processor included in the moving image generating device is:
    Whether the second image area has been tampered with from the information that includes the image information in the second image area and does not include the image information in the first image area among the information constituting the encoded moving image Calculating second alteration detection information that is information for detecting
    Adding the calculated first alteration detection information and second alteration detection information to information constituting the encoded moving image;
    The tamper detection device has a processor,
    Whether the second image area has been tampered with from the information that includes the image information in the second image area and does not include the image information in the first image area among the information constituting the encoded moving image Calculating second verification falsification detection information which is information for detecting
    Extracting second alteration detection information from the information of the video,
    Detecting whether or not the second image area has been altered by comparing the second verification alteration detection information and the second alteration detection information;
    The falsification detection system according to claim 15.
  17.  前記符号化済み動画を構成する情報は前記符号化済み動画の符号化方式に関する情報を含む補助情報を有し、
     前記補助情報は、前記第1の改ざん検出情報および前記第2の改ざん検出情報の双方の算出に用いられる、
     請求項16に記載の改ざん検出システム。
    The information constituting the encoded video has auxiliary information including information on the encoding method of the encoded video,
    The auxiliary information is used to calculate both the first alteration detection information and the second alteration detection information.
    The falsification detection system according to claim 16.
  18.  前記所定の符号化方式は、符号化前の動画を構成する各々の原画像を符号化する際に、前記符号化済み動画を構成する画像である参照画像の有する領域を参照して符号化する方式であって、
     前記第1の領域および前記第2の領域は前記原画像において定義され、
     前記動画生成装置が有するプロセッサは、
     前記原画像における前記第1の領域を符号化する際は前記参照画像における前記第2の領域を参照せず、前記原画像における前記第2の領域を符号化する際は前記参照画像における前記第1の領域を参照せずに符号化する、
     請求項15に記載の改ざん検出システム。
    In the predetermined encoding method, when each original image constituting the moving image before encoding is encoded, encoding is performed with reference to a region included in a reference image which is an image forming the encoded moving image. A method,
    The first region and the second region are defined in the original image;
    The processor included in the moving image generating device is:
    When encoding the first region in the original image, the second region in the reference image is not referred to, and when encoding the second region in the original image, the second region in the reference image is not performed. Encoding without reference to one region,
    The falsification detection system according to claim 15.
PCT/JP2015/005900 2014-12-25 2015-11-27 Moving image generating method, tamper detecting method, moving image generating device, tamper detecting device, and tamper detecting system WO2016103581A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2014262183 2014-12-25
JP2014-262183 2014-12-25

Publications (1)

Publication Number Publication Date
WO2016103581A1 true WO2016103581A1 (en) 2016-06-30

Family

ID=56149652

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2015/005900 WO2016103581A1 (en) 2014-12-25 2015-11-27 Moving image generating method, tamper detecting method, moving image generating device, tamper detecting device, and tamper detecting system

Country Status (1)

Country Link
WO (1) WO2016103581A1 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2013038540A (en) * 2011-08-05 2013-02-21 Nippon Telegr & Teleph Corp <Ntt> Video recording method, integrity determining method, video recording apparatus, integrity determining apparatus, and program
JP2013126183A (en) * 2011-12-15 2013-06-24 Fujitsu Ltd Verification method, verification device, and verification program

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2013038540A (en) * 2011-08-05 2013-02-21 Nippon Telegr & Teleph Corp <Ntt> Video recording method, integrity determining method, video recording apparatus, integrity determining apparatus, and program
JP2013126183A (en) * 2011-12-15 2013-06-24 Fujitsu Ltd Verification method, verification device, and verification program

Similar Documents

Publication Publication Date Title
US20230360165A1 (en) Method and apparatus for protecting digital photos from alteration
US10176309B2 (en) Systems and methods for authenticating video using watermarks
JP5193124B2 (en) Digital watermark embedding method and apparatus
US20160294781A1 (en) Partial or complete image obfuscation and recovery for privacy protection
US8731235B2 (en) Fingerprinting a data object
JP2006311548A (en) Method for securing integrity of image set
JP2012525769A5 (en)
JP2008536371A (en) Digital image watermark method and related apparatus and digital camera capable of adding watermark
CN1581957A (en) Access control for digital video stream data
JP2011103589A5 (en)
JP2005236442A (en) Watermark padding device and method, and watermark extracting device and method
JP2002016596A (en) Image transmitter and image receiver
TWI650673B (en) Anti-counterfeiting electronic signature method
WO2016103581A1 (en) Moving image generating method, tamper detecting method, moving image generating device, tamper detecting device, and tamper detecting system
CN102946531A (en) GOP (group of picture) frame structure combined video watermarking method and system
WO2017128788A1 (en) Sharing method and sharing system of wifi password
JP2005217598A (en) Device for embedding digital watermark, digital watermark detector, method for embedding digital watermark, and method for detecting digital watermark
JP2006191491A (en) Information processing apparatus and method thereof, and program and storage medium
JP2019205140A (en) Imaging apparatus, information processing apparatus, generation method, and verification method
JP2013197889A (en) Image processing device and image processing method
JP4728136B2 (en) Content distribution system and content distribution method
JP2012138095A (en) Device and system for detecting falsification of motion video contents
WO2016181611A1 (en) Method for generating moving image and device for generating moving image
CN110378829B (en) Method, device and equipment for providing information and extracting watermark
JP6172745B2 (en) Digital watermark detection method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15872158

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15872158

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: JP