Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Video file piracy detection method and system based on blockchain technology

A technology of video files and detection methods, applied in transmission systems, televisions, electrical components, etc., can solve the problems of reduced feature data, slow speed, and low hash processing efficiency, and achieve the effect of protecting ownership rights and not being easily tampered

Active Publication Date: 2021-05-04
陕西优米数据技术股份有限公司
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The problem of video piracy has been around for a long time. It not only brings confusion to the market industry, but also seriously damages the interests of video copyright owners. The video quality is observed, and the method of comparing static frames is low in efficiency; the method of machine recognition generally uses the whole file for hash processing, so that the video data is relatively large, and the hash processing efficiency is relatively low and slow. The amount of feature data collected by our own sampling algorithm is greatly reduced, and our comparison algorithm is efficient and accurate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] S101: Collect legitimate video files and store them in the central authentication server:

[0041] The owner of the genuine video file applies for submitting the genuine video file to the central authentication server, and requests the central authentication server to sign and endorse.

[0042] S102: The central authentication server splits the signed and endorsed genuine video file into I frames (I1, I2, I3, I4, I5...In), P frames (P1, P2, P3, P4, P5 ...Pn) 2 sets of sequence framing data.

[0043] S103: Carry out linear sampling to all collected I frames and P frame sequence framing data respectively, and the sampled I , frame (I , 1. I , 2. I , 3. I , 4. I , 5...I , m), P , frame (P , 1.P , 2.P , 3.P , 4.P , 5...P , m) Sequence framing data is hashed separately, and the component hashes Ihash and Phash are reserved.

[0044] S104: Upload the genuine video data to the blockchain: Hash the components of the legitimate video file Ihash, Phash and the owne...

Embodiment 2

[0049] S101: Collect legitimate video files and store them in the central authentication server:

[0050] The owner of the genuine video file applies for submitting the genuine video file to the central authentication server, and requests the central authentication server to sign and endorse.

[0051] S102: The central authentication server splits the signed and endorsed genuine video file into I frames (I1, I2, I3, I4, I5...In), B frames (B1, B2, B3, B4, B5 ...Bn), P frame (P1, P2, P3, P4, P5...Pn) three sets of sequence framing data;

[0052]The principle of splitting legitimate video files into I frame, B frame, and P frame sequence frame data is as follows: (1) The integrity of the file can be confirmed, such as when the frame data of the collection point is incomplete or not covered by the comparison sequence. Quick discovery; (2) Since the data volume of the I frame in the video file is less than that of the B frame, and the data volume of the B frame is less than that ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and system for detecting pirated versions of video files. A video file piracy detection method and system based on blockchain technology, the steps are as follows: collect genuine video files to the central authentication server; the central authentication server splits the genuine video files into sequence framing data, and samples the sequence framing data , obtain the component hash of the sequence frame data after sampling, and upload it to the chain together with the ownership information; the video file to be verified is uploaded to the authentication center server. The video file to be verified is also split, sampled, and the component hash is saved, and the component hash is compared with the component hash of the genuine video file to determine whether it is a genuine video. The invention can confirm the integrity of the file; the results on the block chain are not easy to be tampered with and can be traced back, and the video file to be detected can be quickly sampled and compared, and compared with the genuine video file, it can be detected whether the video file to be detected is genuine, thereby protecting the video file tenure rights.

Description

technical field [0001] The invention relates to a method and system for detecting pirated versions of video files. Background technique [0002] The problem of video piracy has been around for a long time. It not only brings confusion to the market industry, but also seriously damages the interests of video copyright owners. The efficiency of observing the video quality and comparing static frames is low; the method of machine recognition generally uses the whole file for hash processing, so the video data is relatively large, and the hash processing efficiency is relatively low and slow. The amount of feature data collected by our own sampling algorithm is greatly reduced, while using our comparison algorithm is efficient and ensures accuracy. Contents of the invention [0003] The invention improves based on the traditional machine automatic identification, and stores the data hash and owner information in the block chain after sampling the original genuine video file. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N21/234H04N21/83H04N17/00H04L9/32H04L29/08
Inventor 张建中张双牛王艳鹏肖利军梁龙飞
Owner 陕西优米数据技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products