Unlock instant, AI-driven research and patent intelligence for your innovation.

Attack code stream generation method, device and equipment

A code stream and generation strategy technology, applied in the field of data processing, can solve the problems of low security and stability of media products, achieve the effect of solving low security and stability and improving security and stability

Active Publication Date: 2022-01-28
HANGZHOU HIKVISION DIGITAL TECH
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the embodiment of the present application is to provide a method, device and equipment for generating an attack code stream, so as to apply the generated attack code stream to the security test of multimedia products and solve the problem of low security and stability of media products

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack code stream generation method, device and equipment
  • Attack code stream generation method, device and equipment
  • Attack code stream generation method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to enable those skilled in the art to better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0026] figure 1 For a schematic flowchart of a method for generating an attack code stream provided by one or more embodiments of this specification, see figure 1 , the method may specifically include the following steps:

[0027] Step 102, acquiring code stream samples to be processed;

[0028] The execution subject of the method for ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an attack code stream generation method, device and equipment. The method comprises the following steps: acquiring a code stream sample to be processed; analyzing the obtained code stream sample to obtain information of at least one key position of the code stream sample; according to a preset code stream generation strategy and the obtained information of the key position, carrying out transformation processing on the code stream sample to obtain an attack code stream. According to the embodiment of the invention, the generation of the attack code stream is realized on the basis of not paying attention to the source, the packaging format and the like of the code stream sample; the generated attack code stream has universality and can be applied to safety tests of various multimedia products, so that the test effect is closer to real attacks, and the safety and stability of the corresponding multimedia products can be improved.

Description

technical field [0001] The present application relates to the technical field of data processing, and in particular to a method, device and equipment for generating an attack code stream. Background technique [0002] With the rapid development of the Internet and the Internet of Things, multimedia data will become the main media type of network transmission, especially after the commercial application of 5G networks is fully implemented, multimedia applications will become more and more abundant, such as live broadcast, remote Medical care, online education, unmanned driving, instant messaging, etc. However, due to the low security and stability of some current multimedia products, attacks on multimedia products occur frequently. Therefore, how to improve the security and stability of multimedia products has become an urgent problem to be solved. Contents of the invention [0003] The purpose of the embodiment of the present application is to provide a method, device an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04N21/4402H04L9/40
CPCH04N21/4402H04L63/1416Y02D30/50
Inventor 张龙黄凡夫陈喆
Owner HANGZHOU HIKVISION DIGITAL TECH