Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A video file piracy detection method and system based on a block chain technology

A technology for video files and detection methods, applied in transmission systems, televisions, electrical components, etc., can solve the problems of reduction in the amount of characteristic data, confusion, damage to the interests of video copyright owners, etc. Effect

Active Publication Date: 2019-05-21
陕西优米数据技术股份有限公司
View PDF10 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The problem of video piracy has been around for a long time. It not only brings confusion to the market industry, but also seriously damages the interests of video copyright owners. The video quality is observed, and the method of comparing static frames is low in efficiency; the method of machine recognition generally uses the whole file for hash processing, so that the video data is relatively large, and the hash processing efficiency is relatively low and slow. The amount of feature data collected by our own sampling algorithm is greatly reduced, and our comparison algorithm is efficient and accurate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] S101: Collect legitimate video files and store them in the central authentication server:

[0041] The owner of the genuine video file applies for submitting the genuine video file to the central authentication server, and requests the central authentication server to sign and endorse.

[0042] S102: The central authentication server splits the signed and endorsed genuine video file into I frames (I1, I2, I3, I4, I5...In), P frames (P1, P2, P3, P4, P5 ...Pn) 2 sets of sequence framing data.

[0043] S103: Carry out linear sampling to all the I frames and P frame sequence framing data collected above, and the sampled I , frame (I , 1. I , 2. I , 3. I , 4. I , 5...I , m), P , frame (P , 1.P , 2.P , 3.P , 4.P , 5...P , m) Sequence framing data is hashed separately, and the component hashes Ihash and Phash are reserved.

[0044] S104: Upload the genuine video data to the blockchain: Hash the components of the legitimate video file Ihash, Phash and the ownersh...

Embodiment 2

[0049] S101: Collect legitimate video files and store them in the central authentication server:

[0050] The owner of the genuine video file applies for submitting the genuine video file to the central authentication server, and requests the central authentication server to sign and endorse.

[0051] S102: The central authentication server splits the signed and endorsed genuine video file into I frames (I1, I2, I3, I4, I5...In), B frames (B1, B2, B3, B4, B5 ...Bn), P frame (P1, P2, P3, P4, P5...Pn) three sets of sequence framing data;

[0052] The principle of splitting legitimate video files into I frame, B frame, and P frame sequence frame data is as follows: (1) The integrity of the file can be confirmed, such as when the frame data of the collection point is incomplete or not covered by the comparison sequence. Quick discovery; (2) Since the data volume of the I frame in the video file is less than that of the B frame, and the data volume of the B frame is less than that o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a video file piracy detection method and system. The invention discloses a video file piracy detection method and system based on a block chain technology. The method comprises the following steps: a genuine video file is collected to a central authentication server; The central authentication server splits the genuine video file into sequence framing data, samples the sequence framing data to obtain component hash of the sampled sequence framing data, and links the component hash and ownership information together; And the to-be-verified video file is uploaded to theauthentication center server. And splitting, sampling and storing are carried out on the component hash of the video file to be verified, and the component hash is compared with the component hash ofthe genuine video file to obtain whether the video file is a genuine video or not. The integrity of the file can be confirmed; The result on the block chain is not easily tampered and traceable, the to-be-detected video file is quickly sampled and compared, and whether the to-be-detected video file is a genuine can be detected by comparing the to-be-detected video file with a genuine video file, so that the ownership right of the video file is protected.

Description

technical field [0001] The invention relates to a method and system for detecting pirated versions of video files. Background technique [0002] The problem of video piracy has been around for a long time. It not only brings confusion to the market industry, but also seriously damages the interests of video copyright owners. The efficiency of observing the video quality and comparing static frames is low; the method of machine recognition generally uses the whole file for hash processing, so the video data is relatively large, and the hash processing efficiency is relatively low and slow. The amount of feature data collected by our own sampling algorithm is greatly reduced, while using our comparison algorithm is efficient and ensures accuracy. Contents of the invention [0003] The invention improves based on the traditional machine automatic identification, and stores the data hash and owner information in the block chain after sampling the original genuine video file. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04N21/234H04N21/83H04N17/00H04L9/32H04L29/08
Inventor 张建中张双牛王艳鹏肖利军梁龙飞
Owner 陕西优米数据技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products