Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

IP video tamper-proofing monitoring method and system

A tamper-proof, video technology, applied in the field of video processing, can solve problems such as inability to transmit effective monitoring

Inactive Publication Date: 2019-12-06
北京市博汇科技股份有限公司
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the centralized deployment of video streams, it is impossible to effectively monitor the transmission of each link

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IP video tamper-proofing monitoring method and system
  • IP video tamper-proofing monitoring method and system
  • IP video tamper-proofing monitoring method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] figure 1 It is a schematic diagram of an application scenario of an IP video anti-tampering monitoring system provided by Embodiment 1 of the present invention.

[0051]refer to figure 1 , the system includes a signal source platform, a service platform, a metropolitan area network and a sub-node platform; the system is not limited to the above-mentioned platforms, and other platforms can also be added for expansion.

[0052] The sampling point 1 is between the signal source platform and the service platform, the sampling point 2 is between the service platform and the MAN, and the sampling point 3 is between the MAN and the sub-node platform. Sampling point 1 corresponds to video anti-tampering feature extraction module 1, sampling point 2 corresponds to video anti-tampering feature extraction module 2, and sampling point 3 corresponds to video anti-tampering feature extraction module 3, and also includes a video anti-tampering comparison module.

[0053] The video a...

Embodiment 2

[0061] figure 2 It is a flowchart of an IP video anti-tampering monitoring method provided by Embodiment 2 of the present invention.

[0062] refer to figure 2 , the method includes the following steps:

[0063] Step S101, obtaining the signal source information between the signal source platform and the service platform and the first video source information between the service platform and the MAN;

[0064] Here, the signal source information between the signal source platform and the service platform and the first video source information between the service platform and the MAN are acquired through the monitoring probe.

[0065] Step S102, performing feature extraction on the signal source information and the first video source information respectively, to obtain the first valid frame information corresponding to the signal source information and the second valid frame information corresponding to the first video source information;

[0066] Step S103: Pass the first ...

Embodiment 3

[0090] image 3 It is a schematic diagram of an IP video anti-tampering monitoring system provided by Embodiment 3 of the present invention.

[0091] refer to image 3 , the system supports simultaneous extraction of not less than 600 channels of video source information, including multiple IP (Internet Protocol, Internet Protocol) video streams such as standard definition video streams, high-definition video streams, and 4K video streams.

[0092] The system comprises: a first video anti-tampering feature extraction module 1 and a first video anti-tampering comparison module 2, the first video anti-tampering feature extraction module 1 is connected with the first video anti-tampering comparison module 2;

[0093] The first video anti-tampering feature extraction module 1 is used to obtain the signal source information between the signal source platform and the service platform and the first video source information between the service platform and the metropolitan area netwo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an IP video tamper-proofing monitoring method and system. The method comprises the following steps: acquiring signal source information between a signal source platform and a service platform and first video source information between the service platform and a metropolitan area network; respectively carrying out feature extraction on the signal source information and the first video source information to obtain first effective frame information and second effective frame information; respectively processing the first effective frame information and the second effectiveframe information through a hash algorithm to obtain a plurality of first characteristic values and a plurality of second characteristic values, and taking the plurality of first characteristic valuesas reference characteristic values; matching the plurality of second characteristic values with the reference characteristic value; if the first matching result reaches the preset matching rate, determining that the first video source information is not tampered; and if the first matching result does not reach the preset matching rate, determining that the first video source information is tampered. The source video does not need to be modified, and the video source information of each link can be effectively monitored by adopting a distributed deployment mode.

Description

technical field [0001] The invention relates to the technical field of video processing, in particular to an IP video tamper-proof monitoring method and system. Background technique [0002] At present, there are two main methods for video anti-tampering monitoring. The first method is to add watermark to the source video during the production process. Whether the watermarks are the same, and if they are the same, it means that they have not been tampered with; this method performs anti-tampering monitoring on the source video by adding watermarks, but there is a certain degree of modification to the source video. [0003] The second way is to extract the pixel domain and frequency domain features of the video signal in the source link, and extract the pixel domain and frequency domain features of the video signal in the broadcast link, and combine the pixel domain and frequency domain features of the video signal in the source link with the broadcast The pixel domain and f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04N21/234H04N21/442H04N21/24H04N21/643H04N21/647G06K9/00G06K9/62
CPCH04N21/23418H04N21/442H04N21/2407H04N21/64322H04N21/64715G06V20/46G06V10/757
Inventor 张家明张家斌姜卫平纪军郭忠武李国华洪太海
Owner 北京市博汇科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products