Video real-time transmission safety monitoring method, system, device and readable storage medium

A technology of real-time transmission and security monitoring, applied in the direction of transmission system, digital transmission system, closed-circuit television system, etc., can solve the problems of inability to obtain the real situation of the monitoring location, poor detection effect of fake video, and affecting network monitoring security, etc., to prevent Effects of video forgery attack, avoiding video picture quality, and improving security

Active Publication Date: 2021-11-30
XI AN JIAOTONG UNIV
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

First, attackers can implant viruses, Trojan horses, or other malicious codes in monitoring computers or other equipment, so that monitoring interruptions continue to play non-real-time false videos, and then, if figure 2 As shown, the attacker transmits non-real-time forged surveillance video to the surveillance terminal through a certain attack method from a certain point between the camera and the surveillance terminal, so that the normal video cannot be played.
The above attack methods will deceive the monitoring personnel, making them unable to obtain the real situation of the monitoring location, which seriously affects the security of network monitoring. At present, the network security monitoring is not effective in detecting fake videos. When the network is unstable, frame loss will occur. It is easy to be misjudged as a counterfeit attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Video real-time transmission safety monitoring method, system, device and readable storage medium
  • Video real-time transmission safety monitoring method, system, device and readable storage medium
  • Video real-time transmission safety monitoring method, system, device and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0041] Embodiment: a section of video stream is provided with 5 NALU units, and several RTP packets are included in each NALU unit, and the specific data format is: {{P (0,0)}, {P (1,0) , P (1,1) , P (1,2) ,P (1,3) ,P (1,4)},{P (2,0) ,P (2,1) ,P (2,2) ,P (2,3)},{P (3,0) ,P (3,1) ,P (3,2) ,P (3,3) ,P (3,4)},{P (4,0) ,P (4,1) ,P (4,2) ,P (4,3) ,P (4,4)}} The sender sends the above data in order, and after the link transmission, the packets received by the receiver are P (0,0) ,P (1,0) ,P (1,2) ,P (1,3) ,P (1,4) ,P (x,0) ,P (x,1) ,...

[0042] (1) The sender first randomly generates 3 random number seeds, which are 88, 66, and 44 respectively, and encrypts them using the ECC algorithm. In order to ensure the reliability of the transmission, the ciphertext is sent to the receiver using the TCP protocol ; At the same time, based on the 3 random number seeds, the pseudo-random number generation algorithm in the Crypto++ library is used to generate 3 random n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a video real-time transmission safety monitoring method, a system, a device and a readable storage medium, and the method comprises the steps: carrying out the encryption through employing an ECC encryption method before video transmission, generating a random number seed, generating a random number token according to the random number seed, adding the generated random number token into a payload of an RTP package of a video, transmitting the video to the receiver, the receiver can verify the consistency of the token of the receiving packet and the token stored in the receiving packet and detect the forged video, the security of real-time video transmission is improved, the negative influence of the forged video on the society is reduced, the payload of the RTP packet is used for bearing the random number token, the token content added to the video data packet is prevented from being too long, the effective load of the data packet is reduced, when the network is unstable, the quality of a normally played video picture can be avoided, and the method is suitable for engineering with real-time monitoring property, ensures the authenticity of an online monitoring picture and prevents video forgery attack.

Description

technical field [0001] The invention belongs to the technical field of real-time video stream reliable transmission, and relates to a method, system, device and readable storage medium for real-time video transmission safety monitoring. Background technique [0002] At present, the video surveillance system with network cameras as the core, as a "data probe" for maintaining public safety, is increasingly deployed in every corner of the city, forming an all-round coverage of video surveillance of key parts of public safety, greatly improving It improves the ability and level of public security organs to maintain social order and respond to emergencies. After years of construction, nearly 100 million cameras have formed a "skynet" covering urban and rural areas. Video surveillance systems are widely used in public security, government, finance, railways, electric power and many other industries and fields. The security of surveillance video transmission is an important guara...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/32H04L29/06H04N7/18
CPCH04L9/0869H04L9/3213H04L9/3297H04N7/18H04L65/65
Inventor 孙钦东林凯
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products