Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for generating and authenticating hidden video tags based on video characteristics and digital signatures

A video feature and digital signature technology, applied in the field of information security, can solve the problems of lack of effective prevention methods for replay behavior, label generation and embedding behavior denial, etc., to achieve high security, resist replay attacks, and enhance robustness Effect

Active Publication Date: 2012-06-27
SHANGHAI JIAO TONG UNIV
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The above-mentioned existing covert label generation and authentication technologies can achieve video content supervision to a certain extent, but there is no effective prevention method for attackers to forge labels or transplant an authorized label into an unauthorized video replay behavior
In addition, video publishing sites that are responsible for video content may also deny tag generation and embedding

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating and authenticating hidden video tags based on video characteristics and digital signatures
  • Method for generating and authenticating hidden video tags based on video characteristics and digital signatures
  • Method for generating and authenticating hidden video tags based on video characteristics and digital signatures

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The embodiments of the present invention are described in detail below. This embodiment is implemented on the premise of the technical solution of the present invention, and detailed implementation methods and specific operating procedures are provided, but the protection scope of the present invention is not limited to the following implementation example.

[0046] The present invention relates to a video hidden label authentication method based on video features and digital signatures, the specific steps are as follows:

[0047] The first step is to convert the original video into the grayscale space, segment the video and extract the key frames of each shot, and obtain the key frame sequence KFS at the sending end.

[0048] 1) Segment the carrier video to obtain the video sequence ShtS=(Sht 1 , Sht 2 ,...,Sht t ), where each shot Sht i , i=1, 2, . . . , there is no shot cut in t.

[0049] 2) For each shot Sht i , extract a key frame KF that best represents the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for generating and authenticating hidden video tags based on video characteristics and digital signatures, belonging to the technical field of information safety. In the method, a way for extracting and optimizing groups based on visual descriptors is used to generate video characteristics serving as one part of the tags, thereby realizing binding of the tags and the video, and effectively resisting conspiracy attack behaviors of attackers to authorized tags. The hidden tags constructed by the method have not only preferably robustness and safety, but also integrity and non-repudiation which are not endowed to the common video watermarks, as well as unique binding of the tags and the video and the like.

Description

technical field [0001] The invention relates to a method in the technical field of information security, in particular to a method for generating and authenticating video concealed labels based on video features and digital signatures. Background technique [0002] With the development of the Internet, online video is more and more integrated into people's life. Due to its characteristics of no need to download, free viewing, and increasing definition, online video has gradually become one of the most important sources of video information for people today. However, with the rapid development of the online video industry, the problem of illegal dissemination of violent, bloody, pornographic and other bad videos has also been exposed more and more. Especially for those mainstream video sites that allow users to upload, once driven by profit, it is very easy to appear bad videos, and the negative social impact it causes has a great coverage. In view of the above problems, th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N7/26H04L29/06H04N21/835H04N21/8358
Inventor 孙锬锋蒋兴浩陆欢周悦
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products