A micro video copyright automatic detection method based on a block chain technology
An automatic detection, micro-video technology, applied in TV, user identity/authority verification, electrical components, etc., can solve the problems of network micro-video copyright infringement, small video capacity, high decoding performance requirements, etc., to achieve traceability and reliability. The effect of sexual assurance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0026] Embodiment 1 - verify whether the micro video file to be submitted is a pirated version.
[0027] The micro-video copyright automatic detection method based on block chain technology includes the following steps:
[0028] Extract the feature information of the micro video file to be submitted, the feature information includes the hash value of each frame of the P frame sequence group composed of the first P frame value after each IDR frame;
[0029] Extract the hash value of each frame of the P frame sequence group with existing data records on the blockchain of the video collection platform;
[0030] Compare the hash value of each frame of the micro video file to be submitted with the hash value of each frame of the existing data record; if the hash value coincidence rate X≥2 of each frame, the micro video file to be submitted is determined to be Pirated Micro Video.
Embodiment 2
[0032] The micro-video copyright automatic detection method based on block chain technology includes the following steps:
[0033] Step 1: The owner of the micro-video file applies for registration to the video collection platform, and the submitted content includes the micro-video file to be submitted and ownership information;
[0034] Step 2: Extract the feature information of the micro video file to be submitted to form a data record
[0035] (1) Take the first P frame value after each IDR frame in the micro video file to be submitted to form a P frame sequence group; since the IDR frame byte data is much larger than the P frame or B frame data, only the IDR frame is selected P frame data, so when hashing it later, the amount of P frame data is small and the hash speed is fast;
[0036] (2) count the number of frames in the P frame sequence group; make things convenient for algorithm code design and write detection;
[0037] (3) Hash each frame in the P frame sequence gr...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com