Digital video content security authentication method and system

    公开(公告)号:US10354353B2

    公开(公告)日:2019-07-16

    申请号:US15571857

    申请日:2016-07-13

    Abstract: The disclosure provides a digital video content security authentication method, wherein the method comprises: a secret information embedding step of selectively modifying a pixel grayscale value for each frame image in a digital video so as to complete the embedding of 1-bit secret information; and a secret information extraction and video authentication step of carrying out secret information extraction from the digital video in which the secret information is embedded according to a key so as to realize the security authentication of the digital video content. The disclosure also provides a digital video content security authentication system. According to the technical scheme provided by the disclosure, the authentication security is improved on the basis of not influencing user experience.

    DATA HIDING METHOD AND DATA HIDING SYSTEM
    4.
    发明申请

    公开(公告)号:US20170169736A1

    公开(公告)日:2017-06-15

    申请号:US15444308

    申请日:2017-02-27

    CPC classification number: G09C1/00 G09C5/00 H04L2209/16

    Abstract: The invention relates to the technical field of data hiding, in particular to a data hiding method and a data hiding system. An image is used as a data carrier; after secret data is converted into a bit sequence by a sending end, the values of each bit in the bit sequence are hidden in the image; the image hidden with the secret data is obtained and is sent to a receiving end; and the receiving end can extract the hidden secret data from the image according to a corresponding secret key. During data hiding, each square image block can hide two-bit data through inverse number odd-even properties of a pixel gray value sequence of two diagonal lines of each square image block, so that the volume of data hidden in the image is twice of the number of the image blocks split by the image.

    Method and system for calculating passenger crowdedness degree

    公开(公告)号:US10223597B2

    公开(公告)日:2019-03-05

    申请号:US15628605

    申请日:2017-06-20

    Abstract: The disclosure provides a method for calculating a passenger crowdedness degree, comprising: establishing a video data collection environment and starting collecting video data of passengers getting on and off; reading the collected video data of passengers getting on and off and pre-processing a plurality of successive image frames of the video data; identifying a human head according to the pre-processing result and taking the detected human head as a target object to be tracked by mean-shift; and judging the behaviors of getting on and off of a passenger in the area where the target object is positioned and determining the crowdedness degree of passengers inside a vehicle according to the numbers of the passengers getting on and off. The disclosure also provides a system for calculating a passenger crowdedness degree. The disclosure can effectively reduce the false detection, leak detection and error detection of the head top.

    METHOD AND DEVICE FOR SIMULATING AND DETECTING DDoS ATTACKS IN SOFTWARE DEFINED NETWORKING

    公开(公告)号:US20180324212A1

    公开(公告)日:2018-11-08

    申请号:US15922902

    申请日:2018-03-15

    CPC classification number: H04L63/1458 G06F17/5009 H04L63/1425 H04L63/1433

    Abstract: The present disclosure provides a method and a device for simulating and detecting DDoS Attacks in software defined networking. The method comprises: adding zombie hosts in a preset linear increasing mode and an incremental mode, and launching stealthy DDoS Attacks on a data plane to a preset target switch in a software defined networking through all zombie hosts; synchronously updating a pre-built attack flow monitoring table on a controller of the networking according to updating of flow tables on all switches; periodically detecting the monitoring table to determine whether the monitoring table includes a monitoring table entry having existence duration over a preset duration threshold; and determining that a network flow corresponding to the monitoring table entry is a stealthy attack flow on the data plane of the networking when the monitoring table includes the monitoring table entry having the existence duration over the preset duration threshold.

    Method, apparatus, and system for access control of shared data

    公开(公告)号:US10050968B2

    公开(公告)日:2018-08-14

    申请号:US15024379

    申请日:2014-12-31

    Abstract: A method for access control of shared data includes a data access requester transmitting a request for accessing a shared data to a data storage dealer, obtaining a cipher text of the shared data, a cipher text of an encryption key, an access strategy, and a cipher text attribute component from the data storage dealer, and transmitting a request for obtaining the user attribute component of the data access requester respectively to the attribute authorizers. The attribute authorizers generate the user attribute components of the data access requester respectively and transmit the user attribute components of the data access requester to the data access requester. The data access requester restores the encryption key, and decrypts the cipher text of the shared data according to the encryption key for obtaining the shared data requested to be accessed.

    Record file editing method and system
    8.
    发明授权
    Record file editing method and system 有权
    记录文件编辑方法和系统

    公开(公告)号:US09384782B2

    公开(公告)日:2016-07-05

    申请号:US14432411

    申请日:2014-04-02

    CPC classification number: G11B27/036 G11B27/031 G11B27/034 G11B27/10 G11B27/28

    Abstract: The present invention is applicable to the field of multimedia technologies and provides a record file editing method and system, where the method includes: performing fragmentation on an audio file to acquire multiple audio fragments; performing fragment cutting on the multiple acquired audio fragments; storing a fragment time period, a quantity of audio fragments, a fragment cutting time point, and an audio fragment number in a preset record file of the fragment cutting time point; reading each fragment cutting time point from the record file of the fragment cutting time point, performing time mapping on the fragment cutting time point, and storing, in an array, a new fragment cutting time point that is obtained after the mapping; and reading a prestored interaction mapping file between a document and audio, and performing an adjustment on a time point in the interaction mapping file between a document and audio according to the new fragment cutting time point. According to the present invention, a problem that inconsecutive edited document files and audio are not synchronized during playback can be effectively resolved.

    Abstract translation: 本发明适用于多媒体技术领域,提供了一种记录文件编辑方法和系统,其方法包括:在音频文件上执行碎片以获取多个音频片段; 对多个获取的音频片段执行片段切割; 将片段时间段,音频片段数量,片段剪切时间点和音频片段编号存储在片段裁剪时间点的预设记录文件中; 从片段切割时间点的记录文件中读取每个片段裁剪时间点,对片段裁剪时间点执行时间映射,并且以阵列的形式存储在映射之后获得的新片段裁剪时间点; 并且读取文档和音频之间的预先存储的交互映射文件,并且根据新的片断切割时间点在文档和音频之间的交互映射文件的时间点上执行调整。 根据本发明,可以有效地解决在重放期间不连续编辑的文档文件和音频不同步的问题。

    Method and device for counting pedestrians based on identification of head top of human body

    公开(公告)号:US10650249B2

    公开(公告)日:2020-05-12

    申请号:US15687422

    申请日:2017-08-25

    Abstract: The present disclosure provides a method and device for counting pedestrians. The method comprises: reading a pedestrian depth image, and comparing the pedestrian depth image and a pre-acquired environmental mean image to acquire a foreground image; dividing the foreground image into a plurality of regions, detecting whether or not there is a step in an edge pixel point of each region, and detecting whether or not the region surface formed in each region coincides with the curved surface of the head top; determining that the currently detected region is the region of the head top when there is a step in the point and when the region surface coincides with the curved surface; and counting and outputting the number of pedestrians according to the region of the head top determined from the pedestrian depth image and the region of the head top determined from an adjacent pedestrian depth image.

    Method and device for simulating and detecting DDoS attacks in software defined networking

    公开(公告)号:US10536480B2

    公开(公告)日:2020-01-14

    申请号:US15922902

    申请日:2018-03-15

    Abstract: The present disclosure provides a method and a device for simulating and detecting DDoS Attacks in software defined networking. The method comprises: adding zombie hosts in a preset linear increasing mode and an incremental mode, and launching stealthy DDoS Attacks on a data plane to a preset target switch in a software defined networking through all zombie hosts; synchronously updating a pre-built attack flow monitoring table on a controller of the networking according to updating of flow tables on all switches; periodically detecting the monitoring table to determine whether the monitoring table includes a monitoring table entry having existence duration over a preset duration threshold; and determining that a network flow corresponding to the monitoring table entry is a stealthy attack flow on the data plane of the networking when the monitoring table includes the monitoring table entry having the existence duration over the preset duration threshold.

Patent Agency Ranking