CN109120648B - A kind of anti-tamper verifying system of real-time monitoring data - Google Patents

A kind of anti-tamper verifying system of real-time monitoring data Download PDF

Info

Publication number
CN109120648B
CN109120648B CN201811284699.3A CN201811284699A CN109120648B CN 109120648 B CN109120648 B CN 109120648B CN 201811284699 A CN201811284699 A CN 201811284699A CN 109120648 B CN109120648 B CN 109120648B
Authority
CN
China
Prior art keywords
video
data
strategy
concentration
unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811284699.3A
Other languages
Chinese (zh)
Other versions
CN109120648A (en
Inventor
查敏中
林冬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HANGZHOU HANDSOME DIGITAL EQUIPMENT TECHNOLOGY Co Ltd
Original Assignee
HANGZHOU HANDSOME DIGITAL EQUIPMENT TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HANGZHOU HANDSOME DIGITAL EQUIPMENT TECHNOLOGY Co Ltd filed Critical HANGZHOU HANDSOME DIGITAL EQUIPMENT TECHNOLOGY Co Ltd
Priority to CN201811284699.3A priority Critical patent/CN109120648B/en
Publication of CN109120648A publication Critical patent/CN109120648A/en
Application granted granted Critical
Publication of CN109120648B publication Critical patent/CN109120648B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4408Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Closed-Circuit Television Systems (AREA)

Abstract

The present invention relates to a kind of anti-tamper verifying systems of real-time monitoring data, including monitoring client and server-side;The server-side includes key management module, checking request module, restoration disposal module and comparison module;The monitoring client includes that video transfers unit, the first video upgrading unit, the first data reduction unit and the first DEU data encryption unit, video, which is concentrated in monitoring field, can be effectively compressed original video length, retain the effective ways of original video change information simultaneously, the target retrieval problem common to field of video monitoring is helpful.The present invention relates to a kind of methods that guarantee original video is anti-tamper, and video concentration is applied to the anti-tamper verifying of real-time video, can substantially reduce the operand for the conventional method that encrypted transmission decryption plays directly on original video.

Description

A kind of anti-tamper verifying system of real-time monitoring data
Technical field
The present invention relates to monitoring system fields, more specifically to a kind of anti-tamper verifying system of real-time monitoring data.
Background technique
Typical TV monitor system is mainly by front end supervision equipment, transmission device, rear end storage, control and display equipment This five most of composition, wherein rear end equipment can be further divided into central control equipment and sub-control control equipment.Front and back ends equipment has A variety of constituted modes, connection (also referred to as Transmission system) between them can by the various ways such as cable, optical fiber, microwave come It realizes.
And monitoring system is in security system using most one of systems, the building site monitoring being more suitble on the market now System is handheld video communication equipment, and video monitoring is mainstream now.From earliest simulation monitoring to burning hot number prison a few years ago Control Network Video Surveillance in the ascendant till now again, has occurred earth-shaking variation.Gradually unify global today in IP technology, I It is necessary to re-recognize video monitoring system developing history.From the technical point of view, video monitoring system development is divided into the Generation analog video monitoring system (CCTV) is based on " PC+ multimedia card " digital video monitor system (DVR) to the second generation, arrives The third generation is based entirely on IP network video monitoring system (IPVS).
And presently promotion of the monitoring system due to being dedicated to clarity, so it is bigger compared to previous data volume, and Needs are caused to be locally stored in monitoring client, in this way there have been the risk for being easy to be tampered to data in monitoring system, And since data volume is more huge, it is stored so cloud can not be uploaded in real time, so one kind is needed to be able to detect local The system whether storage is tampered.
Summary of the invention
In view of this, it is an object of the present invention to provide a kind of anti-tamper verifying systems of real-time monitoring data, to solve above-mentioned ask Topic.
In order to solve the above-mentioned technical problem, the technical scheme is that
A kind of anti-tamper verifying system of real-time monitoring data, including monitoring client and server-side;
The server-side includes key management module, checking request module, restoration disposal module and comparison mould Block;
The key management module is used to generate first key and the second key corresponding with first key, and will be described First key is sent to corresponding monitoring client;
The checking solicited message is sent to the prison for generating checking solicited message by the checking request module Control end;
The monitoring client includes that video transfers unit, the first video concentration list for shooting monitor video, the monitoring client Member, the first data reduction unit and the first DEU data encryption unit;
The video transfers unit for obtaining the monitor video of a preset length to generate original video;
The first video upgrading unit is concentrated to obtain first the original video by the first concentration strategy Video is concentrated;
Side of first data reduction unit by the first data reduction strategy to the first concentration video to quantify Formula is simplified to obtain the first data sequence;
First DEU data encryption unit encrypts to obtain first data sequence by the first key First encrypted cipher text;
First encrypted cipher text is uploaded to the server-side after the first encrypted cipher text of the monitoring client acquisition;
After the monitoring client receives checking solicited message, the original video is sent to the server-side;
The restoration disposal module includes the second video upgrading unit and the second data reduction unit;
The second video upgrading unit is concentrated to obtain the original video by the second video concentration strategy The second concentration video, the second video concentration strategy are corresponding with first video concentration strategy;
Side of second data reduction unit by the second data reduction strategy to the second concentration video to quantify Formula is simplified to obtain the second data sequence, and second data reduction strategy is corresponding with first data reduction strategy;
The comparison module includes pretreatment unit and comparison unit;
The pretreatment unit decrypts first encrypted cipher text by the second key to obtain the first data sequence;
The comparison unit compares first data sequence and the second data sequence by a preset comparison strategy Column judge that original video is not modified if the result for comparing strategy meets the corresponding comparison condition of the comparison strategy;If than The corresponding comparison condition of the comparison strategy is unsatisfactory for the result of strategy, then judges that original video is modified.
Further, the first video concentration strategy and second video are concentrated strategy and plan are concentrated using same video Slightly.
Further, video concentration strategy the following steps are included:
Original background extraction step, from the original video background image extracted in the original video in video information;
Motion feature extraction step is divided from the original video according to original video background image and obtains moving person Image information;
Target association step respectively establishes the time shaft that the corresponding image information of each moving person corresponds to original video Time marks to obtain target dynamic associated images;
Video step is concentrated, the original video is added by the time shaft of original video in the target dynamic associated images To obtain corresponding concentration video in background image.
Further, second data reduction strategy and first data reduction strategy use same data reduction plan Slightly.
Further, the data reduction strategy the following steps are included:
Image simplification step extracts each frame image information in concentration video, and will extract obtained image information letter Change obtains the simplification image information with preset resolution ratio;
Binary image step carries out binaryzation to the simplified image information by brightness value to obtain corresponding two-value Change image information, the luminance threshold of binaryzation is the average value of the brightness value of all picture points of simplification image;
Image quantization step arranges binary image information in a predetermined sequence to obtain image quantization data;
Sequence generation step carries out each obtained described image quantized data according to the time sequencing in concentration video Arrangement is to generate corresponding data sequence.
Further, the preset resolution ratio is 64*64.
Further, each first data sequence is made of several first image quantization data, corresponding, Mei Yisuo The second data sequence is stated to be made of several second image quantization data;If corresponding first image quantization data and the second image volume There are preset error values in change data, then judgement is unsatisfactory for the comparison condition;Meet the comparison item conversely, being then judged as Part.
Further, the preset error value is that five bits are inconsistent.
Further, the monitoring client is used to store the concentration video of the first upgrading unit generation configured with memory module.
Further, the memory module is also used to store the first data sequence that first data reduction unit generates Column.
The technology of the present invention effect major embodiment is in the following areas: in Large Scale Video Monitoring System, front-end camera, i.e. side Edge equipment, the media server for obtaining original video and original video being transmitted to video surveillance management center, in monitoring system In, the authenticity of original video is most important.Video, which is concentrated in monitoring field, can be effectively compressed original video length, protect simultaneously The effective ways for staying original video change information, the target retrieval problem common to field of video monitoring are helpful.The present invention It is related to a kind of method that guarantee original video is anti-tamper, video concentration is applied to the anti-tamper verifying of real-time video, it can be significantly Reduce the operand for the conventional method that encrypted transmission decryption plays directly on original video.
Detailed description of the invention
It in order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, below will be to institute in embodiment Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the invention Example, for those of ordinary skill in the art, without creative efforts, can also obtain according to these attached drawings Obtain other attached drawings.
Fig. 1: the system architecture schematic diagram of the anti-tamper verifying system of real-time monitoring data of the invention;
Fig. 2: the monitoring client schematic diagram of the anti-tamper verifying system of real-time monitoring data of the invention;
Fig. 3: the server-side schematic diagram of the anti-tamper verifying system of real-time monitoring data of the invention;
Fig. 4: the video compression principles figure of the anti-tamper verifying system of real-time monitoring data of the invention.
Appended drawing reference: 100, monitoring client;111, video transfers unit;112, the first video upgrading unit;113, the first number According to simplified element;114, the first DEU data encryption unit;120, memory module;200, server-side;210, key management module;220, Checking request module;230, restoration disposal module;231, the second video upgrading unit;232, the second data reduction unit;240, Comparison module.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art's every other embodiment obtained belong to what the present invention protected Range.
Below in conjunction with attached drawing, a specific embodiment of the invention is described in further detail, so that technical solution of the present invention is more It should be readily appreciated that and grasp.
Shown in referring to Fig.1, a kind of anti-tamper verifying system of real-time monitoring data, including monitoring client 100 and server-side 200;
The server-side 200 include key management module 210, checking request module 220, restoration disposal module 230 with And comparison module 240;
The key management module 210 is used to generate first key and the second key corresponding with first key, and will The first key is sent to corresponding monitoring client 100;Second key is for unlocking the ciphertext generated after first key encryption , that is to say, that after encrypting by first key, there is the second key can unlock, guarantees the safety of data in this way.
The checking solicited message is sent to institute for generating checking solicited message by the checking request module 220 State monitoring client 100;Checking solicited message is then to be verified according to thing demand to monitoring client 100.
The monitoring client 100 includes that video transfers the view of unit 111, first for shooting monitor video, the monitoring client 100 Frequency upgrading unit 112, the first data reduction unit 113 and the first DEU data encryption unit 114;
The video transfers unit 111 for obtaining the monitor video of a preset length to generate original video;This length Degree can not do and limit to according to the configuration and parameter definition of monitoring client 100.
The first video upgrading unit 112 is concentrated the original video by the first concentration strategy to obtain the One concentration video;And video is concentrated and is referred to illustrate, preferably, first video concentration strategy and second view Strategy is concentrated using same video concentration strategy in frequency.Video concentration strategy the following steps are included: original background extraction step, From the original video background image extracted in the original video in video information;Motion feature extraction step, according to original view Frequency background image is divided from the original video obtains the image information of moving person;Target association step, respectively will be each The time shaft settling time that the corresponding image information of moving person corresponds to original video marks to obtain target dynamic associated images; Video step is concentrated, the original video background image is added by the time shaft of original video in the target dynamic associated images In to obtain corresponding concentration video.The data volume stored in this way is much smaller than the data volume of original video, can by redundant arithmetic To greatly reduce data volume.It is specific as follows, it is first that original video establishes background, is partitioned into main movement with Algorithms for Background Extraction Target;The moving target that its secondary tracking is each partitioned into;The each moving target being partitioned into carries temporal information, moving target Index data base is stored in the respective value of temporal information;Multiple moving targets and background are reconfigured, according to time order and function It is combined into a series of image sequence frames;Image sequence frame is successively stitched together to obtain concentration video.The data of video are concentrated Amount is far smaller than original video.It, can be with the original video of quick-searching to specific objective according to index data base and concentration video.
First data reduction unit 113 quantifies the first concentration video by the first data reduction strategy Mode is simplified to obtain the first data sequence;By the quantization to image information, guarantee that data simplify enough, so Ensuring that the data for verifying can upload in time.Preferably, second data reduction strategy and described first Data reduction strategy uses same data reduction strategy.The data reduction strategy mentions the following steps are included: image simplification step Each frame image information in concentration video is taken, and obtains that there is preset resolution ratio for obtained image information simplification is extracted Simplify image information;Binary image step carries out binaryzation to the simplified image information by brightness value to be corresponded to Binary image information, the luminance threshold of binaryzation is the average value of the brightness value of all picture points of simplification image;Image volume Change step, binary image information is arranged in a predetermined sequence to obtain image quantization data;Sequence generation step, root Each obtained described image quantized data is arranged to generate corresponding data sequence according to the time sequencing in concentration video Column.The preset resolution ratio is 64*64.HASH algorithm can be specifically used, the method that Hash (HSAH) calculates is used and is based on The calculation method of the low collision of the sequence frame of video is concentrated.In particular, can for example be realized using following fast method.It is right Each frame image of above-mentioned concentration video carries out 64X 64 to the resolution ratio of image first and normalizes;Then normalization is calculated The luminance picture of image afterwards;Calculate the average value of luminance picture all the points;To each of the luminance picture after normalization Pixel is compared with above-mentioned average value, is greater than or equal to average value, otherwise it is 0 that being worth, which is 1,;64 values of above-mentioned 64X are pressed It is cascaded according to particular order, obtains one 4096 integers, here it is the Hash of this frame image (HSAH) values;According to upper Hash (HSAH) value that method calculates the concentration each frame image of video is stated, Hash (HSAH) sequence, that is, first are obtained Data sequence and the second data sequence.
First DEU data encryption unit 114 encrypts to obtain first data sequence by the first key Obtain the first encrypted cipher text;
First encrypted cipher text is uploaded to the server-side 200 after first encrypted cipher text of the acquisition of monitoring client 100;
After the monitoring client 100 receives checking solicited message, the original video is sent to the server-side 200;
The restoration disposal module 230 includes the second video upgrading unit 231 and the second data reduction unit 232;
The second video upgrading unit 231 is concentrated to obtain the original video by the second video concentration strategy The second concentration video is obtained, the second video concentration strategy is tactful corresponding with first video concentration;
Second data reduction unit 232 quantifies the second concentration video by the second data reduction strategy Mode is simplified to obtain the second data sequence, second data reduction strategy and first data reduction strategy pair It answers;
The comparison module 240 includes pretreatment unit and comparison unit;
The pretreatment unit decrypts first encrypted cipher text by the second key to obtain the first data sequence;
The comparison unit compares first data sequence and the second data sequence by a preset comparison strategy Column judge that original video is not modified if the result for comparing strategy meets the corresponding comparison condition of the comparison strategy;If than The corresponding comparison condition of the comparison strategy is unsatisfactory for the result of strategy, then judges that original video is modified.So Available first data sequence and the second data sequence, if original video is modified, the second data sequence will There is apparent difference with the first data sequence.
Each first data sequence is made of several first image quantization data, corresponding, each second number It is made of according to sequence several second image quantization data;If in corresponding first image quantization data and the second image quantization data There are preset error values, then judgement is unsatisfactory for the comparison condition;Meet the comparison condition conversely, being then judged as.It is described pre- If error amount is that five bits are inconsistent.
The monitoring client 100 is used to store the concentration video of the first upgrading unit generation configured with memory module 120.It is described Memory module 120 is also used to store the first data sequence that first data reduction unit 113 generates.
Certainly, above is representative instance of the invention, and in addition to this, the present invention can also have other a variety of specific implementations Mode, all technical solutions formed using equivalent substitution or equivalent transformation, is all fallen within the scope of protection of present invention.

Claims (10)

1. a kind of anti-tamper verifying system of real-time monitoring data, it is characterised in that: including monitoring client and server-side;The service End includes key management module, checking request module, restoration disposal module and comparison module;
The key management module is for generating first key and the second key corresponding with first key, and by described first Key is sent to corresponding monitoring client;
The checking solicited message is sent to the monitoring for generating checking solicited message by the checking request module End;
For the monitoring client for shooting monitor video, the monitoring client includes that video transfers unit, the first video upgrading unit, the One data reduction unit and the first DEU data encryption unit;
The video transfers unit for obtaining the monitor video of a preset length to generate original video;
The first video upgrading unit is concentrated the original video by the first concentration strategy to obtain the first concentration Video;
First data reduction unit the first data reduction strategy to it is described first concentration video in a manner of quantifying into Row simplifies to obtain the first data sequence;
First DEU data encryption unit encrypts to obtain first first data sequence by the first key Encrypted cipher text;
First encrypted cipher text is uploaded to the server-side after the first encrypted cipher text of the monitoring client acquisition;
After the monitoring client receives checking solicited message, the original video is sent to the server-side;
The restoration disposal module includes the second video upgrading unit and the second data reduction unit;
The second video upgrading unit is concentrated to obtain second the original video by the second video concentration strategy Video is concentrated, the second video concentration strategy is corresponding with first video concentration strategy;
Second data reduction unit the second data reduction strategy to it is described second concentration video in a manner of quantifying into Row simplifies to obtain the second data sequence, and second data reduction strategy is corresponding with first data reduction strategy;
The comparison module includes pretreatment unit and comparison unit;
The pretreatment unit decrypts first encrypted cipher text by the second key to obtain the first data sequence;
The comparison unit compares first data sequence and the second data sequence by a preset comparison strategy, if The result for comparing strategy meets the corresponding comparison condition of the comparison strategy, then judges that original video is not modified;If comparing countermeasure Result slightly is unsatisfactory for the corresponding comparison condition of the comparison strategy, then judges that original video is modified.
2. a kind of anti-tamper verifying system of real-time monitoring data as described in claim 1, which is characterized in that first video Concentration strategy and second video concentration strategy are using same video concentration strategy.
3. a kind of anti-tamper verifying system of real-time monitoring data as claimed in claim 2, which is characterized in that the video concentration Strategy the following steps are included:
Original background extraction step, from the original video background image extracted in the original video in video information;Movement is special Extraction step is levied, is divided from the original video according to original video background image and obtains the image information of moving person;
The corresponding image information of each moving person is corresponded to the time shaft settling time of original video by target association step respectively Label is to obtain target dynamic associated images;
Video step is concentrated, the original video background is added by the time shaft of original video in the target dynamic associated images To obtain corresponding concentration video in image.
4. a kind of anti-tamper verifying system of real-time monitoring data as described in claim 1, which is characterized in that second data Simplified strategy and first data reduction strategy use same data reduction strategy.
5. a kind of anti-tamper verifying system of real-time monitoring data as claimed in claim 4, which is characterized in that the data reduction Strategy the following steps are included:
Image simplification step extracts each frame image information in concentration video, and it is simplified to extract obtained image information To the simplification image information with preset resolution ratio;
Binary image step carries out binaryzation to the simplified image information by brightness value to obtain corresponding binary picture As information, the luminance threshold of binaryzation is the average value of the brightness value of all picture points of simplification image;
Image quantization step arranges binary image information in a predetermined sequence to obtain image quantization data;Sequence Generation step arranges each obtained described image quantized data with generation pair according to the time sequencing in concentration video The data sequence answered.
6. a kind of anti-tamper verifying system of real-time monitoring data as claimed in claim 5, which is characterized in that described preset point Resolution is 64*64.
7. a kind of anti-tamper verifying system of real-time monitoring data as described in claim 1, which is characterized in that each described first Data sequence is made of several first image quantization data, corresponding, and each second data sequence is by several second images Quantized data composition;If in corresponding first image quantization data and the second image quantization data, there are preset error values, sentence It is disconnected to be unsatisfactory for the comparison condition;Meet the comparison condition conversely, being then judged as.
8. a kind of anti-tamper verifying system of real-time monitoring data as claimed in claim 7, which is characterized in that the default error Value is that five bits are inconsistent.
9. a kind of anti-tamper verifying system of real-time monitoring data as described in claim 1, which is characterized in that the monitoring client is matched Memory module is equipped with for storing the concentration video of the first video upgrading unit generation.
10. a kind of anti-tamper verifying system of real-time monitoring data as claimed in claim 9, which is characterized in that the storage mould Block is also used to store the first data sequence that first data reduction unit generates.
CN201811284699.3A 2018-10-31 2018-10-31 A kind of anti-tamper verifying system of real-time monitoring data Active CN109120648B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811284699.3A CN109120648B (en) 2018-10-31 2018-10-31 A kind of anti-tamper verifying system of real-time monitoring data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811284699.3A CN109120648B (en) 2018-10-31 2018-10-31 A kind of anti-tamper verifying system of real-time monitoring data

Publications (2)

Publication Number Publication Date
CN109120648A CN109120648A (en) 2019-01-01
CN109120648B true CN109120648B (en) 2019-08-02

Family

ID=64855849

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811284699.3A Active CN109120648B (en) 2018-10-31 2018-10-31 A kind of anti-tamper verifying system of real-time monitoring data

Country Status (1)

Country Link
CN (1) CN109120648B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110035327B (en) * 2019-04-17 2020-07-17 深圳市摩天之星企业管理有限公司 Safe playing method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102905133A (en) * 2012-10-15 2013-01-30 南京邮电大学 Video stream-oriented hybrid encoding and encrypting method
CN104244026A (en) * 2014-09-04 2014-12-24 浙江宇视科技有限公司 Secret key distribution device in video monitoring system
CN204350190U (en) * 2015-01-27 2015-05-20 国家电网公司 A kind of video data enciphering/deciphering system of quick access security access platform
CN107027007A (en) * 2017-04-12 2017-08-08 南京三宝弘正视觉科技有限公司 A kind of video sharing method and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014177215A1 (en) * 2013-05-02 2014-11-06 Telefonaktiebolaget L M Ericsson (Publ) Handling of performance monitoring data
CN104270614B (en) * 2014-10-16 2017-07-14 浙江宇视科技有限公司 A kind of video-encryption decryption method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102905133A (en) * 2012-10-15 2013-01-30 南京邮电大学 Video stream-oriented hybrid encoding and encrypting method
CN104244026A (en) * 2014-09-04 2014-12-24 浙江宇视科技有限公司 Secret key distribution device in video monitoring system
CN204350190U (en) * 2015-01-27 2015-05-20 国家电网公司 A kind of video data enciphering/deciphering system of quick access security access platform
CN107027007A (en) * 2017-04-12 2017-08-08 南京三宝弘正视觉科技有限公司 A kind of video sharing method and system

Also Published As

Publication number Publication date
CN109120648A (en) 2019-01-01

Similar Documents

Publication Publication Date Title
US9288451B2 (en) Image processing apparatus and image processing method
US20120195425A1 (en) Security video transmission apparatus, video data reception apparatus, and key generation method thereof
CN110401818A (en) A kind of safe communication system and method for electric power video transmission
CN107241585B (en) Video monitoring method and system
KR101460552B1 (en) Masking and Recovering Method of Privacy Region
CN115248940A (en) Video evidence storing method, verification method and device based on block chain
CN107027007B (en) A kind of video sharing method and system
CN113762034A (en) Video classification method and device, storage medium and electronic equipment
CN109120648B (en) A kind of anti-tamper verifying system of real-time monitoring data
KR20210084806A (en) Method for Restoring Distortion Video Based on Iris Recognition
KR101331201B1 (en) Cctv media secure transmission system and method thereof
WO2019118294A1 (en) Securing digital data transmission in a communication network
CN101175201A (en) Method for recognizing fake real-time video
CN109165317B (en) A kind of real time monitoring aspect indexing inquiry system
CN109951690B (en) Robot body security system and method based on image analysis of camera array
CN108234467B (en) Method and system for judging authenticity of engineering construction photo
CN115412292A (en) Privacy protection method and device suitable for security monitoring and storage medium
Wei et al. Trustworthy authentication on scalable surveillance video with background model support
CN113762970A (en) Data processing method and device, computer readable storage medium and computer equipment
KR20210084805A (en) Method for Restoring Distortion Video Based on Finger Print Recognition
WO2017047862A1 (en) Image key authentication method and system, which use color histogram and texture information of images
JP2022013298A (en) Information processing system
CN111818237A (en) Video monitoring analysis system and method
KR20210084804A (en) Method for Restoring Distortion Video Based on Identification Card Recognition
CN117216039B (en) Method for constructing three-dimensional base of building based on three-dimensional cadastral database

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant