Tamper-proof audio and video digital signature method and device, and storage medium
A digital signature and anti-tampering technology, which is applied in the field of audio and video, can solve the problems of difficult identification and easy tampering of audio and video files, and achieve the effect of easy operation, prevention of tampering at the same time, and increased difficulty
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0067] In this embodiment, the specific process of generating the hash check code and the specific process of using the hash check code for verification are described exemplarily.
[0068] see figure 2 ,and image 3 The processes of starting a hash verification thread and using the thread to generate a first hash verification code for a series of audio and video files are shown respectively.
[0069] The specific process of generating the first hash check code as a digital signature is: first read the relevant fields of the hash check calculation in the configuration file, and then initialize the hash check code calculation queue, which is used to store the checksum to be calculated Check the file information of the code, and finally start the hash verification thread to prepare to generate the first hash verification code.
[0070] The verification thread is responsible for real-time monitoring of the packaging and generation of video files during system operation. After t...
Embodiment 2
[0076] The tamper-proof audio and video digital signature method can also be used in criminal investigation and case trial of public security and procuratorial organs.
[0077] see Figure 4 , shows the flow chart of generating audio and video recordings during criminal investigation and case trial. When the case is started, the synchronous audio and video recordings are started. After the case is over, the audio and video files are saved, and the hash algorithm is used to calculate the digital signature of the audio and video recordings. Write a hash code and write the file, record the audio, video and digital signature.
[0078] see Figure 5 , shows the flow chart of verifying whether the original video has been tampered with, open the disc, drag the audio and video file to the third-party verification tool, the third-party verification tool calculates the second hash verification code, and signs it with the digital signature, namely The first hash checksum is compared. ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


