Unlock instant, AI-driven research and patent intelligence for your innovation.

Tamper-proof audio and video digital signature method and device, and storage medium

A digital signature and anti-tampering technology, which is applied in the field of audio and video, can solve the problems of difficult identification and easy tampering of audio and video files, and achieve the effect of easy operation, prevention of tampering at the same time, and increased difficulty

Inactive Publication Date: 2018-04-03
王磊
View PDF2 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In view of this, the purpose of the present invention is to propose a audio and video recording, i.e. digital signature technology for audio and video files, to solve the problem that audio and video files are easily tampered and difficult to identify

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Tamper-proof audio and video digital signature method and device, and storage medium
  • Tamper-proof audio and video digital signature method and device, and storage medium
  • Tamper-proof audio and video digital signature method and device, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0067] In this embodiment, the specific process of generating the hash check code and the specific process of using the hash check code for verification are described exemplarily.

[0068] see figure 2 ,and image 3 The processes of starting a hash verification thread and using the thread to generate a first hash verification code for a series of audio and video files are shown respectively.

[0069] The specific process of generating the first hash check code as a digital signature is: first read the relevant fields of the hash check calculation in the configuration file, and then initialize the hash check code calculation queue, which is used to store the checksum to be calculated Check the file information of the code, and finally start the hash verification thread to prepare to generate the first hash verification code.

[0070] The verification thread is responsible for real-time monitoring of the packaging and generation of video files during system operation. After t...

Embodiment 2

[0076] The tamper-proof audio and video digital signature method can also be used in criminal investigation and case trial of public security and procuratorial organs.

[0077] see Figure 4 , shows the flow chart of generating audio and video recordings during criminal investigation and case trial. When the case is started, the synchronous audio and video recordings are started. After the case is over, the audio and video files are saved, and the hash algorithm is used to calculate the digital signature of the audio and video recordings. Write a hash code and write the file, record the audio, video and digital signature.

[0078] see Figure 5 , shows the flow chart of verifying whether the original video has been tampered with, open the disc, drag the audio and video file to the third-party verification tool, the third-party verification tool calculates the second hash verification code, and signs it with the digital signature, namely The first hash checksum is compared. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a tamper-proof audio and video digital signature method and device, and a storage medium. The method comprises the following steps that: storing at least one audio and video file, and generating a Hash value according to each audio and video file to serve as an original digital signature; selecting at least one audio and video file, and generating the Hash value accordingto each audio and video file to serve as a verification digital signature; comparing the two signatures to judge whether the audio and video file is tampered or not; and according to a private key andan original digital signature, through an encryption algorithm, generating a verification token to judge whether the original digital signature is tampered or not. By use of the method, whether the file is tampered or not can be effectively detected, and the method is convenient and easy in operation; the length of the obtained Hash value is small, and algorithm decoding difficulty is increased;the verification token is set so as to prevent the original digital signature and the audio and video file from being simultaneously tampered; and the audio and video file and the original digital signature are simultaneously stored in the storage medium which can not be revised, and tampering difficulty is increased.

Description

technical field [0001] The invention relates to audio and video fields such as security monitoring, and specifically relates to a method, a device and a storage medium for adding digital signatures to audio and video files by using a hash algorithm to prevent the files from being tampered with. Background technique [0002] With the development of multimedia technology, audio and video files play an increasingly important role in all aspects of social life, especially in security. Audio and video files can restore facts and situations that happened in the past. [0003] However, with the development of multimedia software, professional audio and video editing software can make data tampering easier and easier. Ordinary users who have been trained can also tamper with the content of the video without leaving traces, and once the above-mentioned video is used for judicial evidence collection, it will cause serious consequences. [0004] According to the Supreme People's Procu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/10G06F21/64
CPCG06F21/10G06F21/645
Inventor 王磊
Owner 王磊