Method, apparatus, and system for detecting video code stream

ABSTRACT

A method, apparatus, and system for detecting a video bitstream, and a non-transitory computer-readable storage medium are disclosed. The method may include: receiving a first feature value generated by a source node which transmits a video bitstream, where the first feature value is feature information of the video bitstream generated by the source node according to a preset rule; receiving a second feature value generated by another node which transmits the video bitstream, where the second feature value is feature information of the video bitstream generated by the another node according to the preset rule; determining whether the first feature value is consistent with the second feature value via comparison; and generating an alarm in response to a comparison result that the first feature value is inconsistent with the second feature value.

CROSS-REFERENCE TO RELATED APPLICATION

This application is a national stage filing under 35 U.S.C. § 371 ofinternational application number PCT/CN2020/108680, filed Aug. 12, 2020,which claims priority to Chinese patent application No. 201910739010.Xfiled on Aug. 12, 2019. The contents of these applications areincorporated herein by reference in their entirety.

TECHNICAL FIELD

Embodiments of the present disclosure relate to, but are not limited to,the field of Content Delivery Network (CDN) videos, such as a method, anapparatus, and a system for detecting a video bitstream.

BACKGROUND

With the rapid development of streaming media CDNs, video services ofthe CDNs are gradually popularized. As a result, problems in networksecurity also arise. A lot of information related to pornography andviolence may replace normal bitstreams to be spread to users, causingadverse effects. It is necessary to find a tampered bitstream in thenetwork and generate an alarm as soon as possible.

In existing technology, the following practice is performed to resolvesecurity problems of CDN bitstreams: perform encrypted transmission on atransmitted bitstream, that is, a Digital Rights Management (DRM)technique is used. This scheme can better guarantee security of abitstream, but an implementation cost of this scheme is relatively highbecause an encryption and decryption server and a related key managementsystem are required. In addition, existing encryption systems aremonopolized by some manufacturers, and expenses is high to purchaselicenses.

SUMMARY

An embodiment of the present disclosure provides a method for detectinga video bitstream, which may include: receiving a first feature valuegenerated by a source node which transmits a video bitstream, where thefirst feature value is feature information of the video bitstreamgenerated by the source node according to a preset rule; receiving asecond feature value generated by another node which transmits the videobitstream, where the second feature value is feature information of thevideo bitstream generated by the another node according to the presetrule; determining whether the first feature value is consistent with thesecond feature value via comparison; and generating an alarm in responseto a comparison result that the first feature value is inconsistent withthe second feature value.

An embodiment of the present disclosure provides an apparatus fordetecting a video bitstream, which may include: a first receiving unit,configured to receive a first feature value generated by a source nodewhich transmits a video bitstream, where the first feature value isfeature information of the video bitstream generated by the source nodeaccording to a preset rule; a second receiving unit, configured toreceive a second feature value generated by another node which transmitsthe video bitstream, where the second feature value is featureinformation of the video bitstream generated by the another nodeaccording to the preset rule; a comparison unit, configured to determinewhether the first feature value is consistent with the second featurevalue via comparison; and an alarm unit, configured to generate an alarmin response to a comparison result that the first feature value isinconsistent with the second feature value.

An embodiment of the present disclosure provides a system for detectinga video bitstream, which may include: a File Transfer Protocol (FTP)server and a comparison server, where the FTP server is configured to:receive a first feature value generated and sent by a source node whichtransmits a video bitstream, where the first feature value is featureinformation of the video bitstream generated by the source nodeaccording to a preset rule; and send the first feature value to thecomparison server; the FTP server is further configured to: receive asecond feature value generated and sent by another node which transmitsthe video bitstream, where the second feature value is featureinformation of the video bitstream generated by the another nodeaccording to the preset rule; and send the second feature value to thecomparison server; and the comparison server is configured to: determinewhether the first feature value is consistent with the second featurevalue via comparison; and generate an alarm in response to a comparisonresult that the first feature value is inconsistent with the secondfeature value.

An embodiment of the present disclosure provides an apparatus fordetecting a video bitstream, which may include a memory, a processor,and a computer program stored in the memory and executable by theprocessor, where the computer program, when executed by the processor,implements the foregoing method for detecting a video bitstream.

An embodiment of the present disclosure provides a non-transitorycomputer-readable storage medium, where the non-transitorycomputer-readable storage medium stores an information processingprogram, and the information processing program, when executed by aprocessor, implements the foregoing method for detecting a videobitstream.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 is a flowchart of a method for detecting a video bitstreamaccording to an embodiment of the present disclosure;

FIG. 2 is a schematic structural diagram of an apparatus for detecting avideo bitstream according to an embodiment of the present disclosure;

FIG. 3 is a schematic structural diagram of a system for detecting avideo bitstream according to an embodiment of the present disclosure;

FIG. 4 is a flowchart of another method for detecting a video bitstreamaccording to an embodiment of the present disclosure;

FIG. 5 is a flowchart of still another method for detecting a videobitstream according to an embodiment of the present disclosure;

FIG. 6 is a schematic architectural diagram of a system for detecting avideo bitstream according to an embodiment of the present disclosure;

FIG. 7 is a flowchart of yet another method for detecting a videobitstream according to an embodiment of the present disclosure;

FIG. 8 is a schematic architectural diagram of another system fordetecting a video bitstream according to an embodiment of the presentdisclosure;

FIG. 9 is a flowchart of still yet another method for detecting a videobitstream according to an embodiment of the present disclosure; and

FIG. 10 is a schematic architecture diagram of still another system fordetecting a video bitstream according to an embodiment of the presentdisclosure.

DETAILED DESCRIPTION

Several embodiments of the present disclosure are described in detailbelow with reference to the accompanying drawings. It should be notedthat, in the case of no conflict, the embodiments of the presentdisclosure and features in the embodiments may be arbitrarily combinedwith each other.

The steps shown in the flowcharts of the drawings may be performed in acomputer system, such as with a set of computer-executable instructions.Moreover, although a logical order is shown in the flowcharts, in somecases, the steps shown or described may be performed in an orderdifferent from that shown or described herein.

FIG. 1 is a flowchart of a method for detecting a video bitstreamaccording to an embodiment of the present disclosure. As shown in FIG. 1, the method includes steps 101 to 104.

At step 101, a first feature value generated by a source node whichtransmits a video bitstream is received, where the first feature valueis feature information of the video bitstream generated by the sourcenode according to a preset rule.

At step 102, a second feature value generated by another node whichtransmits the video bitstream is received, where the second featurevalue is feature information of the video bitstream generated by theanother node according to the preset rule.

At step 103, whether the first feature value is consistent with thesecond feature value is determined via comparison.

At step 104, an alarm is generated in response to a comparison resultthat the first feature value is inconsistent with the second featurevalue.

The source node or the another node generates the feature information ofthe video bitstream according to the preset rule includes: generatingthe feature information of the video bitstream according to a Real-timeTransport Protocol (RTP) packet of I-frame data of the video bitstream.

The feature information of the video bitstream includes: an identifierof the bitstream, an RTP packet identifier of the I-frame data, andinformation about the RTP packet.

Generating the feature information of the video bitstream according toan RTP packet of I-frame data of the video bitstream includes: selectinga plurality of RTP packets of the I-frame data of the video bitstream,generating a Message-Digest algorithm 5 (MD5) value of an actual load ofeach selected RTP packet, and performing XOR operation on a plurality ofgenerated MD5 values, to obtain the feature information of the videobitstream.

Selecting a plurality of RTP packets of the I-frame data of the videobitstream includes: selecting the RTP packets which comprises at leastone packet in ascending order of (N*20+1) and a tail packet, where N isan integer equal to or greater than 0, for example, selecting the RTPpackets in an order of 1, 21, 41, . . . , and a tail packet, where

when the tail packet being a head packet of the at least one packet, anMD5 value is only generated once for the head packet or the tail packet;

when the tail packet is exactly the (N*20+1)_(th) RTP packet, where N isan integer greater than 0, an MD5 value is not generated separately forthe tail packet.

The method further includes: skipping generating an alarm in response toa comparison result that the first feature value is consistent with thesecond feature value.

FIG. 2 is a schematic structural diagram of an apparatus for detecting avideo bitstream according to an embodiment of the present disclosure. Asshown in FIG. 2 , the apparatus includes a first receiving unit, asecond receiving unit, a comparison unit, and an alarm unit.

The first receiving unit is configured to receive a first feature valuegenerated by a source node which transmits a video bitstream, where thefirst feature value is feature information of the video bitstreamgenerated by the source node according to a preset rule.

The second receiving unit is configured to receive a second featurevalue generated by another node which transmits the video bitstream,where the second feature value is feature information of the videobitstream generated by the another node according to the preset rule.

The comparison unit is configured to determine whether the first featurevalue is consistent with the second feature value via comparison.

The alarm unit is configured to generate an alarm in response to acomparison result that the first feature value is inconsistent with thesecond feature value.

The source node or the another node generates the feature information ofthe video bitstream according to the preset rule includes: generatingthe feature information of the video bitstream according to an RTPpacket of I-frame data of the video bitstream.

The feature information of the video bitstream includes: an identifierof the bitstream, an RTP packet identifier of the I-frame data, andinformation about the RTP packet.

Generating the feature information of the video bitstream according toan RTP packet of I-frame data of the video bitstream includes: selectinga plurality of RTP packets of the I-frame data of the video bitstream,generating an MD5 value of an actual load of each selected RTP packet,and performing XOR operation on a plurality of generated MD5 values, toobtain the feature information of the video bitstream.

Selecting a plurality of RTP packets of the I-frame data of the videobitstream includes: selecting the RTP packets which comprises at leastone packet in ascending order of (N*20+1) and a tail packet, where N isan integer equal to or greater than 0, for example, selecting the RTPpackets in an order of 1, 21, 41, . . . , and a tail packet, where

when the tail packet being a head packet of the at least one packet, anMD5 value is only generated once for the head packet or the tail packet;

when the tail packet is exactly the (N*20+1)_(th) RTP packet, where N isan integer greater than 0, an MD5 value is not generated separately forthe tail packet.

The alarm unit is further configured to skip generating an alarm inresponse to a comparison result that the first feature value isconsistent with the second feature value.

The apparatus may be disposed in a separate server, for example, acomparison server.

FIG. 3 is a schematic structural diagram of a system for detecting avideo bitstream according to an embodiment of the present disclosure. Asshown in FIG. 3 , the system includes: an FTP server and a comparisonserver.

The FTP server is configured to: receive a first feature value generatedand sent by a source node which transmits a video bitstream, where thefirst feature value is feature information of the video bitstreamgenerated by the source node according to a preset rule; and send thefirst feature value to the comparison server.

The FTP server is further configured to: receive a second feature valuegenerated and sent by another node which transmits the video bitstream,where the second feature value is feature information of the videobitstream generated by the another node according to the preset rule;and send the second feature value to the comparison server.

The comparison server is configured to: determine whether the firstfeature value is consistent with the second feature value viacomparison; and generate an alarm in response to a comparison resultthat the first feature value is inconsistent with the second featurevalue.

The source node or the another node generates the feature information ofthe video bitstream according to the preset rule includes: generatingthe feature information of the video bitstream according to an RTPpacket of I-frame data of the video bitstream.

The feature information of the video bitstream includes: an identifierof the bitstream, an RTP packet identifier of the I-frame data, andinformation about the RTP packet.

Generating the feature information of the video bitstream according toan RTP packet of I-frame data of the video bitstream includes: selectinga plurality of RTP packets of the I-frame data of the video bitstream,generating an MD5 value of an actual load of each selected RTP packet,and performing XOR operation on a plurality of generated MD5 values, toobtain the feature information of the video bitstream.

Selecting a plurality of RTP packets of the I-frame data of the videobitstream includes: selecting the RTP packets which comprises at leastone packet in ascending order of (N*20+1) and a tail packet, where N isan integer equal to or greater than 0, for example, selecting the RTPpackets in an order of 1, 21, 41, . . . , and a tail packet, where

when the tail packet being a head packet of the at least one packet, anMD5 value is only generated once for the head packet or the tail packet;

when the tail packet is exactly the (N*20+1)_(th) RTP packet, where N isan integer greater than 0, an MD5 value is not generated separately forthe tail packet.

The comparison server is further configured to skip generating an alarmin response to a comparison result that the first feature value isconsistent with the second feature value.

FIG. 4 is a flowchart of another method for detecting a video bitstreamaccording to an embodiment of the present disclosure. As shown in FIG. 4, the method includes steps 401 to 405.

At step 401, a source node which transmits a video bitstream generates afirst feature value of the video bitstream according to a preset rule,and sends the first feature value to a comparison server.

The source node may generate feature information, namely, the firstfeature value, according to an RTP packet of I-frame data of the videobitstream.

The feature information includes at least one selected from: anidentifier of the bitstream, an RTP packet identifier of the I-framedata, and information about the RTP packet. The information about theRTP packet refers to an MD5 value of an actual load of each RTP packet.

For example, a plurality of RTP packets of the I-frame data of the videobitstream are selected; an MD5 value of an actual load of each selectedRTP packet is generated; and XOR operation is performed on a pluralityof generated MD5 values, to obtain the feature information of the videobitstream.

There may be a plurality of RTP packets in one I-frame. Not all of theseRTP packets are required to generate a check code (namely, an MD5value). For example, these RTP packets may be generated in an order of1, 21, 41, . . . , and a tail packet, namely, an order of a head packet,one packet extracted from every 20 packets, and the tail packet. Whenthe head packet and the tail packet are identical, an MD5 value is onlygenerated once; and when the tail packet is exactly the (N*20+1)_(th)RTP packet, where N is an integer greater than 0, an MD5 value is notgenerated separately for the tail packet. The check code is an MD5 valueof an actual load of a generated RTP packet. Then, XOR operation isperformed on a plurality of check codes, to generate the featureinformation of the video bitstream.

At step 402, another node which transmits the video bitstream generatesa second feature value of the video bitstream according to the presetrule, and sends the second feature value to the comparison server.

The another node and the source node generate the feature valuesaccording to the same rule.

The another node and the source node may send the feature values to thecomparison server via files or messages.

At step 403, the comparison server determines whether the first featurevalue is consistent with the second feature value via comparison.

The comparison server may obtain the feature information of the videobitstream, that is, the feature values, via file or messagetransmission.

For example, corresponding feature information may be obtained accordingto the identifier of the bitstream and the RTP packet identifier thatare in the feature information.

Step 404 is performed in response to a comparison result that the firstfeature value is inconsistent with the second feature value; or step 405is performed in response to a comparison result that the first featurevalue is consistent with the second feature value.

At step 404, an alarm is generated.

At step 405, no alarm is generated.

When the first feature value is inconsistent with the second featurevalue, it is considered that the bitstream is changed. For example, thebitstream is tampered or is replaced by another bitstream. When thefirst feature value is consistent with the second feature value, it isconsidered that the bitstream is not changed.

According to the technical scheme provided by this embodiment of thepresent disclosure, a tampered bitstream can be found in time, and analarm can be generated.

FIG. 5 is a flowchart of still another method for detecting a videobitstream according to an embodiment of the present disclosure.

This embodiment is applied to a system shown in FIG. 6 . As shown inFIG. 6 , a node generating a source bitstream feature value may bedeployed at a source node of a CDN network, namely, a first nodereceiving a bitstream. A node generating a detection bitstream featurevalue is deployed at another service node (namely, the another node inthe embodiments of the present disclosure), that is, a bitstreamdetection point and a service node are co-deployed. The another servicenode is an internal node of the CDN network, such as a regional node andan edge node. There may be at least one service node at which the nodegenerating a detection bitstream feature value (namely, the secondfeature value) is deployed. This embodiment is described by taking anexample in which nodes generating a detection bitstream feature valueare deployed at two service nodes 1 and 2.

An FTP server is also deployed, and is configured to: receive bitstreamfeature values uploaded by the source node and the another service node,and provide the values to a comparison server at the same time.Alternatively, a comparison server may be separately deployed, andconfigured to: receive bitstream feature values that are of a videobitstream and uploaded by the FTP server, and determine whether thevalues are consistent via comparison. An alarm is generated when it isdetermined that the values are inconsistent.

As shown in FIG. 5 , the method includes steps 501 to 506.

At step 501, a source node generates a first feature value of a videobitstream according to an RTP packet of I-frame data of the videobitstream, and sends the first feature value to the FTP server.

At step 502, a service node 1 generates a second feature value of thevideo bitstream according to the RTP packet of the I-frame data of thevideo bitstream, and sends the second feature value to the FTP server.

At step 503, a service node 2 generates a third feature value of thevideo bitstream according to the RTP packet of the I-frame data of thevideo bitstream, and sends the third feature value to the FTP server.

An order to perform steps 502 and 503 is not fixed.

At step 504, the FTP server sends the first feature value, the secondfeature value, and the third feature value to a comparison server.

At step 505, the comparison server determines whether the first featurevalue is consistent with the second feature value via comparison, andwhether the first feature value is consistent with the third featurevalue via comparison.

At step 506, an alarm is generated in response to a comparison resultthat the first feature value is inconsistent with at least one of thesecond feature value or the third feature value; or no alarm isgenerated in response to a comparison result that the first featurevalue is consistent with the second feature value and the third featurevalue respectively.

When the first feature value is inconsistent with at least one of thesecond feature value or the third feature value, it is considered thatthe video bitstream is changed. Therefore, an alarm may be generated ona user interface.

A comparison module and an alarm module may be deployed in thecomparison server. The comparison module is configured to: determinewhether the first feature value is consistent with the second featurevalue via comparison, and whether the first feature value is consistentwith the third feature value via comparison; and instruct the alarmmodule to generate an alarm in response to the comparison result thatthe first feature value is inconsistent with at least one of the secondfeature value or the third feature value. A user interface may also bedisposed. Alarm information is displayed on the user interface.Alternatively, the alarm information may be directly sent to anadministrator.

According to the technical scheme provided by this embodiment, atampered bitstream can be found in time, and an alarm can be generated.In addition, a video bitstream detection point and a service node areco-deployed, so that the cost is low.

FIG. 7 is a flowchart of yet another method for detecting a videobitstream according to an embodiment of the present disclosure.

This embodiment is applied to a system shown in FIG. 8 . As shown inFIG. 8 , a node generating a source bitstream feature value is deployedat a source node of a CDN network, namely, a first node receiving abitstream, and a node generating a detection bitstream feature value isdeployed at another service node which transmits the bitstream. In otherwords, a service node and a bitstream detection point are separatelydeployed physically, but are still one node logically.

The another service node is an internal node of the CDN network, such asa regional node and an edge node. There may be at least one service nodeat which the node generating a detection bitstream feature value isdeployed. This embodiment is described by taking an example in whichnodes generating a detection bitstream feature value are deployed at twoservice nodes 1 and 2.

An FTP server is also deployed, and is configured to: receive bitstreamfeature values uploaded by the source node and the another service node,and provide the values to a comparison server at the same time.Alternatively, a comparison server may be separately deployed, andconfigured to: receive bitstream feature values that are of a videobitstream and uploaded by the FTP server, and determine whether thevalues are consistent via comparison. An alarm is generated when it isdetermined that the values are inconsistent.

As shown in FIG. 7 , the method includes steps 701 to 706.

At step 701, a node generating a bitstream feature value at a sourcenode generates a first feature value of a video bitstream according toan RTP packet of I-frame data of the video bitstream, and sends thefirst feature value to the FTP server.

At step 702, a node generating a bitstream feature value at a servicenode 1 generates a second feature value of the video bitstream accordingto the RTP packet of the I-frame data of the video bitstream, and sendsthe second feature value to the FTP server.

At step 703, a node generating a bitstream feature value at a servicenode 2 generates a third feature value of the video bitstream accordingto the RTP packet of the I-frame data of the video bitstream, and sendsthe third feature value to the FTP server.

An order to perform steps 702 and 703 is not fixed.

At step 704, the FTP server sends the first feature value, the secondfeature value, and the third feature value to a comparison server.

At step 705, the comparison server determines whether the first featurevalue is consistent with the second feature value via comparison, andwhether the first feature value is consistent with the third featurevalue via comparison.

At step 706, an alarm is generated in response to a comparison resultthat the first feature value is inconsistent with at least one of thesecond feature value or the third feature value; or no alarm isgenerated in response to a comparison result that the first featurevalue is consistent with the second feature value and the third featurevalue respectively.

When the first feature value is inconsistent with at least one of thesecond feature value or the third feature value, it is considered thatthe video bitstream is changed. Therefore, an alarm may be generated ona user interface.

A comparison module and an alarm module may be deployed in thecomparison server. The comparison module is configured to: determinewhether the first feature value is consistent with the second featurevalue via comparison, and whether the first feature value is consistentwith the third feature value via comparison; and instruct the alarmmodule to generate an alarm in response to the comparison result thatthe first feature value is inconsistent with at least one of the secondfeature value or the third feature value.

According to the technical scheme provided by this embodiment, atampered bitstream can be found in time, and an alarm can be generated.In addition, a video bitstream detection point and a service node areco-deployed, so that the cost is low.

FIG. 9 is a flowchart of yet another method for detecting a videobitstream according to an embodiment of the present disclosure.

This embodiment is applied to a system shown in FIG. 10 . As shown inFIG. 10 , there is a CDN network whose nodes consist of a live broadcastprivate network node and three levels of service nodes. The three levelsof service nodes are a central node, regional nodes, and edge nodes.

The live broadcast private network node is used as a starting pointintroducing a bitstream into the CDN network, and is used as a sourcenode which transmits a video bitstream, to deploy a node generating asource bitstream feature value (namely, a first feature value). Allother service nodes are used as detection points, to deploy nodesgenerating a detection bitstream feature value.

An FTP server is also deployed, and is configured to: receive sourcebitstream feature values and detection bitstream feature values uploadedby the live broadcast private network node and the other service nodes,and provide the values to a comparison server at the same time.

Alternatively, a comparison server may be separately deployed, andconfigured to: receive source bitstream feature values and detectionbitstream feature values that are of a video bitstream and uploaded bythe FTP server, and determine whether the values are consistent viacomparison. An alarm is generated when it is determined that the valuesare inconsistent.

As shown in FIG. 9 , the method includes steps 901 to 911.

At step 901, the live broadcast private network node generates a firstfeature value of a video bitstream according to an RTP packet of I-framedata of the video bitstream, and sends the first feature value to theFTP server.

At step 902, the central node generates a second feature value of thevideo bitstream according to the RTP packet of the I-frame data of thevideo bitstream, and sends the second feature value to the FTP server.

At step 903, a regional node 1 generates a third feature value of thevideo bitstream according to the RTP packet of the I-frame data of thevideo bitstream, and sends the third feature value to the FTP server.

At step 904, a regional node 2 generates a fourth feature value of thevideo bitstream according to the RTP packet of the I-frame data of thevideo bitstream, and sends the fourth feature value to the FTP server.

At step 905, an edge node 1 generates a fifth feature value of the videobitstream according to the RTP packet of the I-frame data of the videobitstream, and sends the fifth feature value to the FTP server.

At step 906, an edge node 2 generates a sixth feature value of the videobitstream according to the RTP packet of the I-frame data of the videobitstream, and sends the sixth feature value to the FTP server.

At step 907, an edge node 3 generates a seventh feature value of thevideo bitstream according to the RTP packet of the I-frame data of thevideo bitstream, and sends the seventh feature value to the FTP server.

At step 908, an edge node 4 generates an eighth feature value of thevideo bitstream according to the RTP packet of the I-frame data of thevideo bitstream, and sends the eighth feature value to the FTP server.

An order to perform steps 902 to 908 is not fixed.

Each of the foregoing feature values carries an identifier of thebitstream, an RTP packet identifier of the I-frame data, and informationabout the RTP packet. File description information uploaded to the FTPserver may further carry service node identifiers. The service nodeidentifiers are used to distinguish between feature values sent bydifferent service nodes.

At step 909, the FTP server sends the first feature value, the secondfeature value, the third feature value, the fourth feature value, thefifth feature value, the sixth feature value, the seventh feature value,and the eighth feature value to the comparison server.

At step 910, the comparison server determines whether the first featurevalue is consistent with the second feature value via comparison,whether the first feature value is consistent with the third featurevalue via comparison, whether the first feature value is consistent withthe fourth feature value via comparison, whether the first feature valueis consistent with the fifth feature value via comparison, whether thefirst feature value is consistent with the sixth feature value viacomparison, whether the first feature value is consistent with theseventh feature value via comparison, and whether the first featurevalue is consistent with the eighth feature value via comparison.

At step 911, an alarm is generated in response to a comparison resultthat the first feature value is inconsistent with any of the otherfeature values; or no alarm is generated in response to a comparisonresult that the first feature value is consistent with each of the otherfeature values.

When the first feature value is inconsistent with any of the otherfeature values, it is considered that the video bitstream is changed.Therefore, an alarm may be generated on a user interface. The otherfeature values include the second feature value, the third featurevalue, the fourth feature value, the fifth feature value, the sixthfeature value, the seventh feature value, and the eighth feature value.

A comparison module and an alarm module may be deployed in thecomparison server. The comparison module is configured to: determinewhether the first feature value is consistent with the other featurevalues via comparison; and instruct the alarm module to generate analarm in response to a comparison result that the first feature value isinconsistent with any of the other feature values.

According to the technical scheme provided by this embodiment, atampered bitstream can be found in time, and an alarm can be generated.In addition, a video bitstream detection point and a service node may beco-deployed or deployed separately.

According to the technical scheme provided by this embodiment of thepresent disclosure, in a process of bitstream transmission, a bitstreamthat is changed can be detected quickly when the bitstream is tamperedor is replaced by another bitstream, and an alarm can be generated.Therefore, operation and maintenance personnel can quickly take measuresto prevent diffusion of the tampered bitstream and ensure bitstreamsecurity.

An embodiment of the present disclosure provides an apparatus fordetecting a video bitstream, including a memory, a processor, and acomputer program stored in the memory and executable by the processor,where the computer program, when executed by the processor, implementsany of the foregoing methods for detecting a video bitstream.

An embodiment of the present disclosure provides a non-transitorycomputer-readable storage medium, where the non-transitorycomputer-readable storage medium stores an information processingprogram, and the information processing program, when executed by aprocessor, implements any of the foregoing methods for detecting a videobitstream.

It can be understood by those having ordinary skills in the art that allor some of the steps of the methods, systems and functionalmodules/units in the devices disclosed above can be implemented assoftware, firmware, hardware and appropriate combinations thereof. Inthe hardware implementation, the division between functionalmodules/units mentioned in the above description does not necessarilycorrespond to the division of physical components; for example, aphysical component may have a plurality of functions, or a function orstep may be performed cooperatively by a plurality of physicalcomponents. Some or all of the components may be implemented as softwareexecuted by a processor, such as a digital signal processor or amicroprocessor, or as hardware, or as an integrated circuit, such as anapplication-specific integrated circuit. Such software can bedistributed on computer-readable media, which may include computerstorage media (or non-transitory media) and communication media (ortransitory media). As well known to those of ordinary skills in the art,the term computer-readable storage medium includes volatile andnonvolatile, removable and non-removable media implemented in any methodor technology for storing information, such as computer-readableinstructions, data structures, program modules or other data. Thecomputer storage media include, but are not limited to, random accessmemory (RAM), read-only memory (ROM), electrically erasable programmableread-only memory (EEPROM), flash memory or other memory technologies,compact disc read-only memory (CD-ROM), digital versatile disc (DVD) orother optical disc storage, cassettes, magnetic tapes, magnetic discstorage or other magnetic storage devices, or any other media that canbe configured to store desired information and can be accessed bycomputers. Furthermore, it is well known to those of ordinary skills inthe art that communication media typically contain computer-readableinstructions, data structures, program modules or other data in amodulated data signal such as a carrier wave or other transmissionmechanism, and can include any information transmission media.

The invention claimed is:
 1. A method for detecting a video bitstream,comprising: receiving a first feature value generated by a source nodewhich transmits a video bitstream, wherein the first feature value isfeature information of the video bitstream generated by the source nodeaccording to a preset rule; receiving a second feature value generatedby another node which transmits the video bitstream, wherein the secondfeature value is feature information of the video bitstream generated bythe another node according to the preset rule; determining whether thefirst feature value is consistent with the second feature value viacomparison; and generating an alarm in response to a comparison resultthat the first feature value is inconsistent with the second featurevalue; wherein the source node or the another node generating thefeature information of the video bitstream according to the preset rulecomprises: selecting a plurality of Real-time Transport Protocol (RTP)packets of I-frame data of the video bitstream, which comprises at leastone packet in ascending order of (N*20+1) and a tail packet, where N isan integer equal to or greater than 0, wherein: in response to the tailpacket being a head packet of the at least one packet, an Message-Digestalgorithm 5 (MD5) value is only generated once for the head packet orthe tail packet; and in response to the tail packet being the (N*20+1)thRTP packet, where N is an integer greater than 0, an MD5 value is notgenerated separately for the tail packet; and performing XOR operationon a plurality of generated MD5 values, to obtain the featureinformation of the video bitstream.
 2. The method of claim 1, whereinthe feature information of the video bitstream comprises: an identifierof the bitstream, an RTP packet identifier of the I-frame data, andinformation about the RTP packet.
 3. A non-transitory computer-readablestorage medium, wherein the non-transitory computer-readable storagemedium stores an information processing program, and the informationprocessing program, when executed by a processor, implements the methodfor detecting a video bitstream of claim
 2. 4. The method of claim 1,further comprising: skipping generating an alarm in response to acomparison result that the first feature value is consistent with thesecond feature value.
 5. A non-transitory computer-readable storagemedium, wherein the non-transitory computer-readable storage mediumstores an information processing program, and the information processingprogram, when executed by a processor, implements the method fordetecting a video bitstream of claim
 4. 6. A non-transitorycomputer-readable storage medium, wherein the non-transitorycomputer-readable storage medium stores an information processingprogram, and the information processing program, when executed by aprocessor, implements the method for detecting a video bitstream ofclaim
 1. 7. An apparatus for detecting a video bitstream, comprising: afirst receiving unit, configured to receive a first feature valuegenerated by a source node which transmits a video bitstream, whereinthe first feature value is feature information of the video bitstreamgenerated by the source node according to a preset rule; a secondreceiving unit, configured to receive a second feature value generatedby another node which transmits the video bitstream, wherein the secondfeature value is feature information of the video bitstream generated bythe another node according to the preset rule; a comparison unit,configured to determine whether the first feature value is consistentwith the second feature value via comparison; and an alarm unit,configured to generate an alarm in response to a comparison result thatthe first feature value is inconsistent with the second feature value;wherein the source node or the another node generating the featureinformation of the video bitstream according to the preset rulecomprises: selecting a plurality of Real-time Transport Protocol (RTP)packets of I-frame data of the video bitstream, which comprises at leastone packet in ascending order of (N*20+1) and a tail packet, where N isan integer equal to or greater than 0, wherein: in response to the tailpacket being a head packet of the at least one packet, an Message-Digestalgorithm 5 (MD5) value is only generated once for the head packet orthe tail packet; and in response to the tail packet being the (N*20+1)thRTP packet, where N is an integer greater than 0, an MD5 value is notgenerated separately for the tail packet; and performing XOR operationon a plurality of generated MD5 values, to obtain the featureinformation of the video bitstream.
 8. The apparatus of claim 7, whereinthe feature information of the video bitstream comprises: an identifierof the bitstream, an RTP packet identifier of the I-frame data, andinformation about the RTP packet.
 9. The device of claim 7, wherein thealarm unit is further configured to skip generating an alarm in responseto a comparison result that the first feature value is consistent withthe second feature value.
 10. An apparatus for detecting a videobitstream, comprising a memory, a processor, and a computer programstored in the memory and executable by the processor, wherein thecomputer program, when executed by the processor, implements a methodfor detecting a video bitstream comprising: receiving a first featurevalue generated by a source node which transmits a video bitstream,wherein the first feature value is feature information of the videobitstream generated by the source node according to a preset rule;receiving a second feature value generated by another node whichtransmits the video bitstream, wherein the second feature value isfeature information of the video bitstream generated by the another nodeaccording to the preset rule; determining whether the first featurevalue is consistent with the second feature value via comparison; andgenerating an alarm in response to a comparison result that the firstfeature value is inconsistent with the second feature value; wherein thesource node or the another node generating the feature information ofthe video bitstream according to the preset rule comprises: selecting aplurality of Real-time Transport Protocol (RTP) packets of I-frame dataof the video bitstream, which comprises at least one packet in ascendingorder of (N*20+1) and a tail packet, where N is an integer equal to orgreater than 0, wherein: in response to the tail packet being a headpacket of the at least one packet, an Message-Digest algorithm 5 (MD5)value is only generated once for the head packet or the tail packet; andin response to the tail packet being the (N*20+1)th RTP packet, where Nis an integer greater than 0, an MD5 value is not generated separatelyfor the tail packet; and performing XOR operation on a plurality ofgenerated MD5 values, to obtain the feature information of the videobitstream.