Search

KR-20260063881-A - SYSTEM FOR VERIFICATING ORIGINAL AND SOURCE OF SECURITY IMAGE

KR20260063881AKR 20260063881 AKR20260063881 AKR 20260063881AKR-20260063881-A

Abstract

The proposed invention relates to a system technology comprising a camera device that reliably manages the original at the initial generation time when image data is generated in the camera device, wherein the camera device comprises a first authentication block information generation instruction set, and the first authentication block information generation instruction set generates first authentication block information including unique identification information of the camera device and a first hash code generated by hashing at least a portion of security image data requested from a client terminal connected via a network, and encrypted with the private key of the camera device.

Inventors

  • 이상훈
  • 임인택
  • 박진희

Assignees

  • 주식회사 아이디스

Dates

Publication Date
20260507
Application Date
20241031

Claims (15)

  1. A security image source and origin verification camera system comprising one or more camera devices, The above camera device is: It includes a video recording element, a first communication element connected to a client terminal via a network, a first memory element storing an executable first program and security video data, and a first computation element executing the first program. The above first program is: A first authentication block information generation instruction set for generating first authentication block information including first authentication information and unique identification information of a camera device, wherein at least a portion of the security video data requested from a client terminal connected via a network is hashed and the first hashing code recorded in the frames of the security video data is encrypted with the private key of the camera device; including, Security video source and origin verification camera system.
  2. In claim 1, the first program is: The security video data requested from the client terminal is extracted from the first memory element, and a video clip is generated by adding first video clip authentication information to the security video data including the first authentication block information generated by the first authentication block information generation command set. A first video clip service command set for transmitting a video clip containing first video clip authentication information to a client terminal; Includes more, The above first video clip authentication information is, Information obtained by hashing the first hashing code and encrypting the hash code with the camera device's private key, Security video source and origin verification camera system.
  3. In claim 1, the security image source and origin verification camera system is: One or more video recording devices; Includes more, The above video recording device is: It further includes a second communication element that connects to a client terminal and a camera device via a network, a second memory element that stores an executable second program and security video data, and a second computation element that executes the second program. The second program is: A set of instructions for generating a second authentication block information, comprising: second authentication block information in which a second hashing code recorded in the frames of the security video data is encrypted with the private key of the video recording device and unique identification information of the video recording device by hashing at least a portion of the security video data requested from the client terminal; including, Security video source and origin verification camera system.
  4. In claim 3, the second program is: A second video clip service command set for extracting security video data requested from a client terminal from a second memory element, generating a video clip by adding second video clip authentication information to security video data including second authentication block information generated by the second authentication block information generation command set, and transmitting the video clip including the second video clip authentication information to the client terminal; Includes more, The above second video clip authentication information is, Information obtained by hashing a first hashing code or a second hashing code and encrypting the hashing code with the private key of a video recording device, Security video source and origin verification camera system.
  5. In claim 3, The above-mentioned security video source and origin verification camera system is: A key management server that registers and manages unique identification information and public keys of a camera device, or unique identification information and public keys of an image recording device; including, Security video source and origin verification camera system.
  6. In claim 5, the security video source and origin verification camera system is: An original and source verification service server comprising a third communication element connecting to a client terminal, a key management server, and a camera device via a network, a third memory element storing an executable third program, and a third computation element executing the third program; Includes more, The above third program is: A secure video source and origin verification camera system that, in response to a secure video verification request from a client terminal, receives a public key corresponding to unique identification information of a camera device included in a video clip from a key management server, decrypts a first authentication information using the public key of the camera device and compares it with a first hashing code to verify the source and origin of the video clip, or provides the public key of the camera device to the client terminal so that the client verifies the source and origin of the video clip.
  7. In claim 5, the security video source and origin verification camera system is: An original and source verification service server comprising a third communication element connecting to a client terminal, a key management server, and a video recording device via a network, a third memory element storing an executable third program, and a third computation element executing the third program; Includes more, The above third program is: A secure video source and origin verification camera system that, in response to a secure video verification request from a client terminal, receives a public key corresponding to unique identification information of a video recording device included in a video clip from a key management server, decrypts second authentication information using the public key of the video recording device and compares it with a second hashing code to verify the source and origin of the video clip, or provides the camera device and the public key of the video recording device to the client terminal so that the client verifies the source and origin of the video clip.
  8. In claim 1, The video clip above is: It includes a plurality of frames, each including a frame header and a frame body, and The above first authentication information and the unique identification information of the camera device are a secure image source and origin verification camera system included in the frame header.
  9. In claim 8, The video clip above is: Video clip authentication block information is stored in the video clip header, and The video clip authentication block information is, A secure video source and origin verification camera system that further includes unique identification information for the source of the video clip.
  10. In the method for verifying the source and origin of a security image (S1000), A video clip transmission request reception step (S10) of receiving a video clip transmission request containing security video data from a client terminal via a network; A step for generating and managing camera device information (S20) for generating and managing the private key, unique identification information, and public key of the camera device; and A first authentication block information generation step (S30) of hashing at least a portion of the security video data to generate first authentication block information including first authentication information and unique identification information of the camera device, wherein the first hashing code recorded in the frames of the security video data is encrypted with the private key of the camera device; A method for verifying the source and origin of a security image, including
  11. In claim 10, the method for verifying the original and source of a security image (S1000) is: A video clip generation step (S40) of a camera device, which generates a video clip by adding first video clip authentication information to security video data including first authentication block information; Includes more, The above first video clip authentication information is, Information obtained by hashing the first hashing code and encrypting the hash code with the camera device's private key, Method for verifying the source and origin of security footage.
  12. In claim 10, the method for verifying the original and source of a security image (S1000) is: A step for generating and managing video recording device information (S50), which generates and integrates the private key, unique identification information, and public key of the video recording device; A method for verifying the source and origin of a security video, further including
  13. In claim 10, the method for verifying the original and source of a security image (S1000) is: A second authentication block information generation step (S60) for generating second authentication block information including second authentication information and unique identification information of the video recording device, wherein the second hashing code recorded in the frames of the security video data is encrypted with the private key of the video recording device by hashing at least a portion of the security video data; A method for verifying the source and origin of a security video, further including
  14. In claim 13, the method for verifying the original and source of a security image (S1000) is: A video clip generation step (S70) of a video recording device, which generates a video clip by adding second video clip authentication information to security video data including first authentication block information or second authentication block information; and A video clip transmission step (S80) for transmitting a video clip to a client terminal; Includes more, The above second video clip authentication information is, Information obtained by hashing a first hashing code or a second hashing code and encrypting the hashing code with the private key of a video recording device, Method for verifying the source and origin of security footage.
  15. In claim 14, the method for verifying the original and source of a security image (S1000) is: A video clip verification request receiving step (S90) of receiving a video clip verification request from a client terminal via a network; A public key provision step (S100) of providing a public key to a client terminal or an original and source verification service server; and A video clip verification step (S110) in which a client terminal or an original and source verification service server decrypts the first video clip authentication information or the second video clip authentication information using a public key and compares it with the first video clip hashing code or the second video clip hashing code to verify the source of the video clip, and decrypts the first authentication information or the second authentication information and compares it with the first hashing code or the second hashing code to verify the original of the video clip; A method for verifying the source and origin of a security video, further including

Description

Security Image Origin and Source Verification System {SYSTEM FOR VERIFICATING ORIGINAL AND SOURCE OF SECURITY IMAGE} The proposed invention discloses a security image verification technology having a function to verify whether an image has been forged or tampered with and its source. With the advancement of artificial intelligence and deep learning technologies, technologies for generating, editing, or synthesizing video and audio are also advancing significantly. For example, the activity of creating sophisticatedly manipulated photos or videos using AI learning technology known as Generative Adversarial Networks (GANs) is becoming popular among individuals and companies. Consequently, efforts are emerging to legally punish harmful deepfake activities to reduce damage to individuals and organizations caused by false information or hate speech. Generally, "deepfake" is a portmanteau of "deep learning" and "fake," referring to human image synthesis technology based on artificial intelligence. Korean Patent Publication (Registration No.: 10-1628720, “Copy Image Evidence Management System for Proving Authenticity and Integrity”) discloses a copy image evidence management system in which, when an image storage device generates an original image, it adds its hash value so that even if the original image is copied to an image collection device, it can be confirmed that the copy image has been altered from the original image. However, in the case of security images, since the original at the time when image or audio data is generated by the camera device is important, it is necessary to manage the original at the time of initial generation. Meanwhile, in the broadcasting sector, technology exists to encrypt original author or editor information into works for copyright management. However, in the field of video security, rather than from a copyright management perspective, the location of the camera device that generated the original footage and the time of recording are critical factors; therefore, the identification of the device containing the camera and the generation of information regarding the time of creation are required. FIG. 1 illustrates the configuration of a security video source and origin verification camera system according to one embodiment. FIG. 2 illustrates the configuration of a camera device according to one embodiment. FIG. 3 illustrates the configuration of an image recording device according to one embodiment. FIG. 4 illustrates the configuration of an original and source verification server according to one embodiment. FIG. 5 illustrates the structure of an image clip generated by a camera device according to one embodiment. Figure 6 illustrates a flowchart for verifying the source and origin of a video clip. Figure 7 illustrates a method for verifying the source and origin of a video clip. The foregoing and additional aspects are embodied through embodiments described with reference to the accompanying drawings. It is understood that the components of each embodiment may be combined in various ways within the embodiment or with components of other embodiments, unless otherwise stated or contradicted. Based on the principle that the inventor may appropriately define the concepts of terms to best describe his invention, the terms used in this specification and claims shall be interpreted in a meaning and concept consistent with the description or proposed technical idea. Preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings. <Description of Claim 1> FIG. 1 illustrates the configuration of a security video source and origin verification camera system according to one embodiment. FIG. 2 illustrates the configuration of a camera device according to one embodiment. As illustrated in FIG. 1, the security video source and origin verification camera system (1000) according to one embodiment includes one or more camera devices (100, Camera device). The camera device (100) may be an IP camera (Internet Protocol Camera) device, but is not limited thereto. The camera device (100) includes an image capturing element (110), a first communication element (120) that connects to a client terminal (200) via a network, a first memory element (130) that stores an executable first program and security image data, and a first computation element (140) that executes the first program. The camera device (100) captures the dynamic or static appearance of the subject. The network may be encrypted using Transport Layer Security (TLS). The first program includes a 'first authentication block information generation commands set'. The first authentication block information generation commands set hashes at least a portion of the security video data requested from a client terminal (200) connected via a network, and generates first authentication block information that includes (all) first authentication information, which encrypts the first hashin