CN109543432A - Facial image encrypts anti-tamper and retrieval method in a kind of video - Google Patents
Facial image encrypts anti-tamper and retrieval method in a kind of video Download PDFInfo
- Publication number
- CN109543432A CN109543432A CN201811409747.7A CN201811409747A CN109543432A CN 109543432 A CN109543432 A CN 109543432A CN 201811409747 A CN201811409747 A CN 201811409747A CN 109543432 A CN109543432 A CN 109543432A
- Authority
- CN
- China
- Prior art keywords
- face
- feature
- facial image
- nalu
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000001815 facial effect Effects 0.000 title claims abstract description 43
- 238000000034 method Methods 0.000 title claims abstract description 18
- 239000000284 extract Substances 0.000 claims abstract description 10
- 238000012795 verification Methods 0.000 claims abstract description 9
- 238000012545 processing Methods 0.000 claims abstract description 7
- 230000009286 beneficial effect Effects 0.000 abstract description 2
- 230000006870 function Effects 0.000 description 3
- 241001269238 Data Species 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000013135 deep learning Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000002996 emotional effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Collating Specific Patterns (AREA)
Abstract
The present invention relates to the present invention relates to technical field of face recognition, in particular to facial image encrypts anti-tamper and retrieval method in a kind of video, it is characterized in that, the following steps are included: A, front end encryption stage, after detecting face using front end IPC, obtained various information is encrypted, integrated, is encoded, the H264 NALU obtained by encoder is sent;B, the rear end decryption processing stage parses self-defining data frame, extracts individual features according to the H264 NALU received;C, face integrity verification and retrieval phase.The beneficial effects of the invention are as follows, quick-searching and Given Face can be decoded in the video comprising facial image, guarantee the integrality, availability and confidentiality of personnel's face, while the invisible processing of shielding rapidly and efficiently is carried out to the irrelevant personnel face in video.
Description
(1) technical field
The present invention relates to technical field of face recognition, in particular to facial image encrypts anti-tamper and retrieval side in a kind of video
Method.
(2) background technique
Face recognition technology based on deep learning graduallys mature, and it is most wide to have become application prospect in intelligent security guard product instantly
One of wealthy technical field can fast and accurately be marked interested specific using face recognition technology in monitoring scene
Facial image makes people not need with the naked eye to identify again, has liberated manpower and improved accuracy.With the technology
It is universal, also there is the problem of some applications, limits the technology and continue to develop, for example, both need to mark in video proof
The image of Given Face out, while in order to protect privacy to be also required to carry out specially treated to other faces, in addition, lack it is a kind of from
Quick-searching goes out the method for Given Face in the video file of magnanimity, is unable to give full play the advantage of recognition of face.
Existing solution and disadvantage: facial image is that may be present be maliciously tampered aiming at the problem that, current method
It is the protection to video file memory, such as password is arranged to video memory.But it is light due to manager's awareness of safety
Thin, password is easy to reveal or be cracked, and can not solve in transmission process due to by man-in-the-middle attack etc. and
The problem of caused video data stream is tampered not can guarantee the integrality and confidentiality of facial image;And to unrelated in video
The processing of face be then by manually plus the modes such as mosaic, it is more time-consuming.
For this reason, it may be desirable to seek a kind of technical solution, at least to mitigate the above problem.
(3) summary of the invention
The present invention in order to make up not can guarantee in the prior art facial image integrality and confidentiality, manually plus mosaic it is time-consuming
Laborious deficiency provides facial image in a kind of video and encrypts anti-tamper and retrieval method.
The present invention is achieved through the following technical solutions:
Facial image encrypts anti-tamper and retrieval method in a kind of video, which comprises the following steps:
A, the front end encryption stage, after detecting face using front end IPC, obtained various information is encrypted, is integrated,
Coding, finally sends the H264 NALU obtained by encoder;
B, the rear end decryption processing stage parses self-defining data frame, extracts individual features according to the H264 NALU received, right
Encrypted content in step A is decrypted;
C, face integrity verification and retrieval phase, compare decryption and encrypted cryptographic Hash carries out integrity verification, user
Face characteristic value compares algorithm comparison face picture to be retrieved and decrypts the characteristic value of descendant's face picture, extracts comparison successfully decryption
Picture NALU saves as video file, completes specific retrieval;
The step A is specifically included:
A1, front end IPC detect face, cut out to obtain face image data block User [0...N] from original image, and be calculated
The information such as face characteristic value Feature [0...N] and face location Pos [0...N], timestamp ts;
A2, encryption key Ke is generated using random function, facial image is encrypted to obtain E (User, Ke) using Encryption Algorithm, it will
The encryption data writes back in original image again, realizes the encryption to face;
A3, the cryptographic Hash H (Feature) for calculating face characteristic value Feature obtained in A1 step;
A4, the digital signature of facial image is obtained as SkA [H using private key SkA encryption H (Feature) of front end
(Feature)], PkB [Ke] is obtained using the key Ke generated in the public key PkB encryption A2 step of rear end;
A5, SkA [H (Feature)]+PkB [Ke]+Pos+ts group is combined into UserData;
A6, a SEI self-defining data frame is filled using UserData;
A7, it the original image comprising face is sent to encoder obtains H264 NALU, added in A6 step before the NALU
SEI self-defining data frame sends H264 NALU finally by network;
The step B is specifically included:
B1, rear end are packaged the H264 NALU that storage receives, and when playing retrieval, read storage file, extract H264 NALU, and examine
Rope goes out SEI self-defining data frame;
B2, parsed from SEI self-defining data frame according to format SkA [H (Feature)], Pk [Ke]+, Pos, ts;
B3, PkB [Ke] is decrypted using the private key of rear end, obtains encryption key Ke;Use the public key decryptions SkA [H of front end
(Feature)] the cryptographic Hash H (Feature) of face characteristic value, is obtained;
B4, it decodes to obtain the original image comprising face encryption from next NALU of SEI self-defining data frame progress H264;
B5, it is cut from original image according to Pos location information and obtains encrypted facial image E (User);
B6, the facial image User using the facial image E (User) in Ke decryption B5 step, after being decrypted;
The step C is specifically included:
C1, the characteristic value Feature ' for calculating facial image User obtained in B6 step, then calculate its cryptographic Hash H
Cryptographic Hash H (Feature) in [Feature '] and A3 step is compared, to verify face integrality;
C2, in video file when retrieval Given Face, the face picture to be retrieved is inputted first and obtains UserX, calculates its spy
Value indicative FeatureX carries out threshold value comparison using the Feature ' in face characteristic value alignment algorithm and C1 step, compares successfully
Afterwards, facial image User data are write back into original image, and these NALU is extracted and save as video file, in this document only
Video frame comprising the Given Face completes retrieval Given Face.
Further, in order to preferably realize the present invention, the Encryption Algorithm in the step A2 is symmetric encipherment algorithm;
The threshold comparison specific steps of step C2 include:
C21, given threshold;
C22, the standard deviation for calculating face picture to be retrieved and decrypting the characteristic value of descendant's face picture, standard deviation are walked less than C21
The threshold value set in rapid, that is, be regarded as same person's face.
The beneficial effects of the present invention are: the present invention quick-searching and can decode spy in the video comprising facial image
Determine face, guarantee the integrality, availability and confidentiality of personnel's face, while the irrelevant personnel face in video is carried out fast
Speed efficiently shields invisible processing.
(4) Detailed description of the invention
Fig. 1 is the front end encryption process sequence figure that facial image encrypts anti-tamper and retrieval method in video of the invention.
Fig. 2 is that facial image encrypts the rear end decryption of anti-tamper and retrieval method in video of the invention and integrality is tested
Demonstrate,prove flow chart.
(5) specific embodiment
The present invention is described in further detail with reference to the accompanying drawings and embodiments.
Fig. 1, Fig. 2 are a kind of specific embodiment of the invention.The embodiment, which is that facial image encryption is anti-in a kind of video, to be usurped
The method for changing and retrieving mainly includes following three big steps:
A, the front end encryption stage, after detecting face using front end IPC, obtained various information is encrypted, is integrated,
Coding, finally sends the H264 NALU obtained by encoder;
B, the rear end decryption processing stage parses self-defining data frame, extracts individual features according to the H264 NALU received, right
Encrypted content in step A is decrypted;
C, face integrity verification and retrieval phase, compare decryption and encrypted cryptographic Hash carries out integrity verification, user
Face characteristic value compares algorithm comparison face picture to be retrieved and decrypts the characteristic value of descendant's face picture, extracts comparison successfully decryption
Picture NALU saves as video file, completes specific retrieval.
Dismantling analysis is carried out to each step below:
If the front end Fig. 1 encryption process sequence is as shown in the figure, step A is specifically included:
A1, front end IPC detect face, cut out to obtain face image data block User [0...N] from original image, and be calculated
The information such as face characteristic value Feature [0...N] and face location Pos [0...N], timestamp ts;
A2, encryption key Ke is generated using random function, facial image is encrypted to obtain E (User, Ke) using Encryption Algorithm, it will
The encryption data writes back in original image again, realizes the encryption to face;
A3, the cryptographic Hash H (Feature) for calculating face characteristic value Feature obtained in A1 step;
A4, the private key Sk using front endAThe digital signature that encryption H (Feature) obtains facial image is SkA[H
(Feature)], using the public key Pk of rear endBThe key Ke generated in encryption A2 step obtains PkB[Ke];
A5, by SkA[H(Feature)] +PkB[Ke]+Pos+ts group is combined into UserData;
A6, a SEI self-defining data frame is filled using UserData;
A7, it the original image comprising face is sent to encoder obtains H264 NALU, added in A6 step before the NALU
SEI self-defining data frame sends H264 NALU finally by network.
As shown in the decryption of the rear end Fig. 2 and integrity verification flow chart, step B is specifically included:
B1, rear end are packaged the H264 NALU that storage receives, and when playing retrieval, read storage file, extract H264 NALU, and examine
Rope goes out SEI self-defining data frame;
B2, Sk is parsed from SEI self-defining data frame according to formatA[H(Feature)] ,Pk[Ke]+,Pos,ts;
B3, Pk is decrypted using the private key of rear endB[Ke] obtains encryption key Ke;Use the public key decryptions Sk of front endA[H
(Feature)] the cryptographic Hash H (Feature) of face characteristic value, is obtained;
B4, it decodes to obtain the original image comprising face encryption from next NALU of SEI self-defining data frame progress H264;
B5, it is cut from original image according to Pos location information and obtains encrypted facial image E (User);
B6, the facial image User using the facial image E (User) in Ke decryption B5 step, after being decrypted.
As shown in the decryption of the rear end Fig. 2 and integrity verification flow chart, step C is specifically included:
C1, the characteristic value Feature ' for calculating facial image User obtained in B6 step, then calculate its cryptographic Hash H
Cryptographic Hash H (Feature) in [Feature '] and A3 step is compared, if it is inconsistent it may be considered that data by
It distorts, to ensure that the integrality of face;
C2, in video file when retrieval Given Face, the face picture to be retrieved is inputted first and obtains UserX, calculates its spy
Value indicative FeatureX carries out threshold value comparison using the Feature ' in face characteristic value alignment algorithm and C1 step, and principle is meter
The standard deviation of two groups of characteristic value datas is calculated, standard deviation is less than a certain threshold value and is regarded as same person's face.If compare at
Function then writes back to User data in original image, and these NALU are extracted and save as video file, then only wraps in this document
Video frame containing the Given Face.Retrieval Given Face can be realized, and other irrelevant personnel facial images are sightless.
Wherein the Encryption Algorithm in step A2 is symmetric encipherment algorithm.
Wherein the threshold comparison specific steps of step C2 include:
C21, given threshold;The method of given threshold can be herein, calculates the same person and takes under different emotional states
All face pictures characteristic value;The characteristic value of all human face photos of the same person is subjected to standard deviation calculating two-by-two, is taken
The average value of standard deviation is as threshold value;
C22, the standard deviation for calculating face picture to be retrieved and decrypting the characteristic value of descendant's face picture, standard deviation are walked less than C21
The threshold value set in rapid, that is, be regarded as same person's face.
Compared with prior art, advantage is as follows for the present embodiment: using after the technical program, including in the video file of video recording
The face information detected can quickly retrieve specific face according to the facial image of input, together from video file
When by ensure that the confidentiality of face to facial image encryption;By adding digital signature to facial image, ensure that
The integrality of face;By the decipherment algorithm of this programme, the availability of facial image ensure that, while protecting other unrelated people
The privacy of member, has achieved the purpose that the technical program, solves that data safety degree in the field is low, retrieval Given Face is tired
Difficult, irrelevant personnel image procossing hardly possible technical problem.
Finally, it is stated that the above examples are only used to illustrate the technical scheme of the present invention and are not limiting, this field is common
Other modifications or equivalent replacement that technical staff makes technical solution of the present invention, without departing from technical solution of the present invention
Spirit and scope, be intended to be within the scope of the claims of the invention.
Claims (3)
1. facial image encrypts anti-tamper and retrieval method in a kind of video, which comprises the following steps:
A, the front end encryption stage, after detecting face using front end IPC, obtained various information is encrypted, is integrated,
Coding, finally sends the H264 NALU obtained by encoder;
B, the rear end decryption processing stage parses self-defining data frame, extracts individual features according to the H264 NALU received, right
Encrypted content in step A is decrypted;
C, face integrity verification and retrieval phase, compare decryption and encrypted cryptographic Hash carries out integrity verification, user
Face characteristic value compares algorithm comparison face picture to be retrieved and decrypts the characteristic value of descendant's face picture, extracts comparison successfully decryption
Picture NALU saves as video file, completes specific retrieval;
The step A is specifically included:
A1, front end IPC detect face, cut out to obtain face image data block User [0...N] from original image, and be calculated
Face characteristic value Feature [0...N] and face location Pos [0...N], timestamp ts information;
A2, encryption key Ke is generated using random function, facial image is encrypted to obtain E (User, Ke) using Encryption Algorithm, it will
The encryption data writes back in original image again, realizes the encryption to face;
A3, the Hash H (Feature) for calculating face characteristic value Feature obtained in A1 step;
A4, the private key Sk using front endAThe digital signature that encryption H (Feature) obtains facial image is SkA[H (Feature)],
Use the public key Pk of rear endBThe key Ke generated in encryption A2 step obtains PkB[Ke];
A5, by SkA[H(Feature)] +PkB[Ke]+Pos+ts group is combined into UserData;
A6, a SEI self-defining data frame is filled using UserData;
A7, it the original image comprising face is sent to encoder obtains H264 NALU, added in A6 step before the NALU
SEI self-defining data frame sends H264 NALU finally by network;
The step B is specifically included:
B1, rear end are packaged the H264 NALU that storage receives, and when playing retrieval, read storage file, extract H264 NALU, and examine
Rope goes out SEI self-defining data frame;
B2, Sk is parsed from SEI self-defining data frame according to formatA[H(Feature)] ,Pk[Ke]+,Pos,ts;
B3, Pk is decrypted using the private key of rear endB[Ke] obtains encryption key Ke;Use the public key decryptions Sk of front endA[H
(Feature)] the cryptographic Hash H (Feature) of face characteristic value, is obtained;
B4, it decodes to obtain the original image comprising face encryption from next NALU of SEI self-defining data frame progress H264;
B5, it is cut from original image according to Pos location information and obtains encrypted facial image E (User);
B6, the facial image User using the facial image E (User) in Ke decryption B5 step, after being decrypted;
The step C is specifically included:
C1, the characteristic value Feature ' for calculating facial image User obtained in B6 step, then calculate its cryptographic Hash H
Cryptographic Hash H (Feature) in [Feature '] and A3 step is compared, to verify face integrality;
C2, in video file when retrieval Given Face, the face picture to be retrieved is inputted first and obtains UserX, calculates its spy
Value indicative FeatureX carries out threshold value comparison using the Feature ' in face characteristic value alignment algorithm and C1 step, compares successfully
Afterwards, facial image User data are write back into original image, and these NALU is extracted and save as video file, in this document only
Video frame comprising the Given Face finally completes retrieval Given Face.
2. facial image according to claim 1 encrypts anti-tamper and retrieval method, it is characterised in that: the step A2
In Encryption Algorithm be symmetric encipherment algorithm.
3. facial image according to claim 1 encrypts anti-tamper and retrieval method, it is characterised in that: the step C2
Threshold comparison specific steps include:
C21, given threshold;
C22, the standard deviation for calculating face picture to be retrieved and decrypting the characteristic value of descendant's face picture, standard deviation are walked less than C21
The threshold value set in rapid, that is, be regarded as same person's face.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811409747.7A CN109543432A (en) | 2018-11-23 | 2018-11-23 | Facial image encrypts anti-tamper and retrieval method in a kind of video |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811409747.7A CN109543432A (en) | 2018-11-23 | 2018-11-23 | Facial image encrypts anti-tamper and retrieval method in a kind of video |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109543432A true CN109543432A (en) | 2019-03-29 |
Family
ID=65849845
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811409747.7A Pending CN109543432A (en) | 2018-11-23 | 2018-11-23 | Facial image encrypts anti-tamper and retrieval method in a kind of video |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109543432A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110135196A (en) * | 2019-05-10 | 2019-08-16 | 内蒙古工业大学 | A kind of data fusion tamper resistant method based on input data compression expression association analysis |
CN111405233A (en) * | 2020-03-25 | 2020-07-10 | 苏州科达科技股份有限公司 | Encrypted graph transmission method, device, storage medium and system in video conference |
CN113674195A (en) * | 2020-05-13 | 2021-11-19 | ***通信集团有限公司 | Image detection method, device, equipment and storage medium |
CN113709523A (en) * | 2020-05-21 | 2021-11-26 | 联咏科技股份有限公司 | Method for encoding and decoding private data and image processing apparatus |
CN116541872A (en) * | 2023-07-07 | 2023-08-04 | 深圳奥联信息安全技术有限公司 | Data information safety transmission method and system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101221612A (en) * | 2007-01-11 | 2008-07-16 | 上海银晨智能识别科技有限公司 | Method for enciphering and deciphering electric document file by face recognition |
CN101694724A (en) * | 2009-10-21 | 2010-04-14 | 重庆大学 | Method for embedding GPS information in JPEG image of digital camera and ensuring safety of image |
CN101957911A (en) * | 2010-09-29 | 2011-01-26 | 汉王科技股份有限公司 | Face identification method and system |
CN103731271A (en) * | 2013-12-30 | 2014-04-16 | 北京工业大学 | On-line face identity authentication method based on homomorphic encrypting and chaotic scrambling |
CN108052915A (en) * | 2017-12-22 | 2018-05-18 | 深圳英飞拓科技股份有限公司 | A kind of method and device that Face datection is carried out to video and is identified |
-
2018
- 2018-11-23 CN CN201811409747.7A patent/CN109543432A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101221612A (en) * | 2007-01-11 | 2008-07-16 | 上海银晨智能识别科技有限公司 | Method for enciphering and deciphering electric document file by face recognition |
CN101694724A (en) * | 2009-10-21 | 2010-04-14 | 重庆大学 | Method for embedding GPS information in JPEG image of digital camera and ensuring safety of image |
CN101957911A (en) * | 2010-09-29 | 2011-01-26 | 汉王科技股份有限公司 | Face identification method and system |
CN103731271A (en) * | 2013-12-30 | 2014-04-16 | 北京工业大学 | On-line face identity authentication method based on homomorphic encrypting and chaotic scrambling |
CN108052915A (en) * | 2017-12-22 | 2018-05-18 | 深圳英飞拓科技股份有限公司 | A kind of method and device that Face datection is carried out to video and is identified |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110135196A (en) * | 2019-05-10 | 2019-08-16 | 内蒙古工业大学 | A kind of data fusion tamper resistant method based on input data compression expression association analysis |
CN111405233A (en) * | 2020-03-25 | 2020-07-10 | 苏州科达科技股份有限公司 | Encrypted graph transmission method, device, storage medium and system in video conference |
CN111405233B (en) * | 2020-03-25 | 2021-08-20 | 苏州科达科技股份有限公司 | Encrypted graph transmission method, device, storage medium and system in video conference |
CN113674195A (en) * | 2020-05-13 | 2021-11-19 | ***通信集团有限公司 | Image detection method, device, equipment and storage medium |
CN113709523A (en) * | 2020-05-21 | 2021-11-26 | 联咏科技股份有限公司 | Method for encoding and decoding private data and image processing apparatus |
CN113709523B (en) * | 2020-05-21 | 2024-02-13 | 联咏科技股份有限公司 | Method for encoding and decoding private data and image processing apparatus |
CN116541872A (en) * | 2023-07-07 | 2023-08-04 | 深圳奥联信息安全技术有限公司 | Data information safety transmission method and system |
CN116541872B (en) * | 2023-07-07 | 2024-04-09 | 深圳奥联信息安全技术有限公司 | Data information safety transmission method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109543432A (en) | Facial image encrypts anti-tamper and retrieval method in a kind of video | |
Panah et al. | On the properties of non-media digital watermarking: a review of state of the art techniques | |
CA2333864C (en) | Biometric identification method and system | |
CN101719205B (en) | Digital copyright management method and system | |
CN102891754B (en) | Method and device for protecting network digital multimedia copyright | |
CN102609890B (en) | A kind of image digital watermark embeds and detecting system | |
US10311215B2 (en) | Secure recording and rendering of encrypted multimedia content | |
CN103152556A (en) | Surveillance video encryption method for protecting privacy | |
WO2017021953A1 (en) | A method and system for differentiated privacy protection | |
CN105897428B (en) | A kind of real-time video safety communication system and method based on iris recognition | |
CN102932650B (en) | Video data integrity protection and verification method, equipment and system | |
CN113411638A (en) | Video file playing processing method and device, electronic equipment and storage medium | |
CN110446105A (en) | Video-encryption, decryption method and device | |
JP2019161643A (en) | Tamper protection and video source identification for video processing pipeline | |
CN102567657A (en) | Digital work ownership authentication system and digital work ownership authentication method | |
CN106778292A (en) | A kind of quick restoring method of Word encrypted documents | |
Yari et al. | An overview and computer forensic challenges in image steganography | |
CN102088611B (en) | H.264 standard motion vector-based method for embedding and extracting fragile watermark | |
KR102387169B1 (en) | Digital forensic data decoding device | |
CN102164303A (en) | Video copyright protection method and system as well as video publisher entity | |
CN108595920A (en) | Network video listens management support rights service subsystem | |
JP5718757B2 (en) | Image management apparatus, image management program, and image management method | |
Bogdanoski et al. | Steganography in support of the global terrorism | |
US20150371013A1 (en) | Method and system for locking content | |
CN109756459B (en) | Data processing method, data identification method, data processing device, data identification device, and data processing medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190329 |