Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Video tampering detection method and system, storage medium, computer program and terminal

A technology of tampering detection and video, which is applied in the field of information security, can solve the problems of inability to detect surveillance video forgery, difficulty in video processing, and low algorithm efficiency, and achieve the effect of solving the problem of video tampering detection and solving time and space tampering

Pending Publication Date: 2020-08-21
延安市公安局 +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Moreover, the existing algorithms are relatively inefficient and cannot achieve the purpose of real-time forgery detection in surveillance video
The main reasons for the low efficiency of the algorithm are: usually the amount of data in the video is very large, the quality of the equipment used to capture the video varies, and the video is easily affected by external conditions when capturing the video, which brings greater difficulty to video processing
[0004] Through the above analysis, the problems and defects of the existing technology are: the current passive detection method for image tampering is relatively inefficient, and cannot achieve the purpose of real-time forgery detection of surveillance video
[0005] The difficulty in solving the above problems and defects is as follows: the amount of video data is very large, which requires high performance of the algorithm; the accuracy of video forgery detection is relatively high; the storage space of the video forgery detection process takes up more, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Video tampering detection method and system, storage medium, computer program and terminal
  • Video tampering detection method and system, storage medium, computer program and terminal
  • Video tampering detection method and system, storage medium, computer program and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0064] DCT: Discrete Cosine Transform.

[0065] SIFT: Scale Invariant Feature Transform (Scale Invariant Feature Transform,).

[0066] BRIEF: Binary Robust Independent ElementaryFeatures.

[0067] rBRIEF: Rotation-aware BRIEF algorithm (rotation-aware BRIEF).

[0068] FAST: Feature point algorithm for accelerated segment test (features from accelerated segment test).

[0069] oFAST: Fast Fast algorithm (Oriented FAST).

[0070] ORB (Oriented FAST and Rotation Brief).

[0071] DCT Discrete Cosine Transform discrete cosine transform.

[0072] kNN k-NearestNeighbor k nearest neighbor classification algorithm.

[0073] O...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of information security, and discloses a video tampering detection method and system, a storage medium, a computer program and a terminal. The method comprises using a three-frame difference method to extract a video key frame; carrying out DCT on the obtained key frame to reduce high-dimensional video data and carry out de-noising processing to obtaina sub-graph containing most signal energy; performing feature extraction on the sub-graph through an ORB algorithm; and comparing the similarity between a to-be-detected video and an original video through the Hamming distance. The detection performance of the proposed method is evaluated by using a statistical method, feature extraction is performed on the key frame of a test video by using an SIFT algorithm, an ORB algorithm and the algorithm of the invention, and the average feature point number, the average time consumption and the average storage space of the key frame are counted. According to the embodiment of the invention, the number of feature points extracted from the key frame is far less than the number of feature points extracted by an SIFT algorithm and is 40% less than thenumber of feature points extracted by an ORB algorithm.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a video tampering detection method, system, storage medium, computer program, and terminal. Background technique [0002] At present, due to the rapid development of network technology and video surveillance systems, the amount of surveillance video data has shown explosive growth. Surveillance videos always guarantee the safety of people's lives, and the authenticity of its content is becoming more and more important. Therefore, it is very necessary to ensure the authenticity and validity of the surveillance video content. Video tampering detection methods are mainly divided into two types: video active forensics technology and video passive forensics technology. Video active forensics technology mainly focuses on video watermarking and digital signatures. Video watermarking is to embed some identification information in the host video without affecting...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K9/62G06K9/46H04N17/00
CPCH04N17/00H04N2017/008G06V10/40G06F18/22
Inventor 李阳李斌张虎成徐栋赵振
Owner 延安市公安局
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products