A video file piracy detection method and system based on a block chain technology
A technology for video files and detection methods, applied in transmission systems, televisions, electrical components, etc., can solve the problems of reduction in the amount of characteristic data, confusion, damage to the interests of video copyright owners, etc. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0040] S101: Collect legitimate video files and store them in the central authentication server:
[0041] The owner of the genuine video file applies for submitting the genuine video file to the central authentication server, and requests the central authentication server to sign and endorse.
[0042] S102: The central authentication server splits the signed and endorsed genuine video file into I frames (I1, I2, I3, I4, I5...In), P frames (P1, P2, P3, P4, P5 ...Pn) 2 sets of sequence framing data.
[0043] S103: Carry out linear sampling to all the I frames and P frame sequence framing data collected above, and the sampled I , frame (I , 1. I , 2. I , 3. I , 4. I , 5...I , m), P , frame (P , 1.P , 2.P , 3.P , 4.P , 5...P , m) Sequence framing data is hashed separately, and the component hashes Ihash and Phash are reserved.
[0044] S104: Upload the genuine video data to the blockchain: Hash the components of the legitimate video file Ihash, Phash and the ownersh...
Embodiment 2
[0049] S101: Collect legitimate video files and store them in the central authentication server:
[0050] The owner of the genuine video file applies for submitting the genuine video file to the central authentication server, and requests the central authentication server to sign and endorse.
[0051] S102: The central authentication server splits the signed and endorsed genuine video file into I frames (I1, I2, I3, I4, I5...In), B frames (B1, B2, B3, B4, B5 ...Bn), P frame (P1, P2, P3, P4, P5...Pn) three sets of sequence framing data;
[0052] The principle of splitting legitimate video files into I frame, B frame, and P frame sequence frame data is as follows: (1) The integrity of the file can be confirmed, such as when the frame data of the collection point is incomplete or not covered by the comparison sequence. Quick discovery; (2) Since the data volume of the I frame in the video file is less than that of the B frame, and the data volume of the B frame is less than that o...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com