CN103312770B - Method for auditing resources of cloud platform - Google Patents

Method for auditing resources of cloud platform Download PDF

Info

Publication number
CN103312770B
CN103312770B CN201310139000.5A CN201310139000A CN103312770B CN 103312770 B CN103312770 B CN 103312770B CN 201310139000 A CN201310139000 A CN 201310139000A CN 103312770 B CN103312770 B CN 103312770B
Authority
CN
China
Prior art keywords
video
pornographic
cloud platform
image
detected
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201310139000.5A
Other languages
Chinese (zh)
Other versions
CN103312770A (en
Inventor
戴元顺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Electronic Science And Technology Of Sichuan Foundation For Education Development, University of
Original Assignee
WUXI UESTC TECHNOLOGY DEVELOPMENT Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WUXI UESTC TECHNOLOGY DEVELOPMENT Co Ltd filed Critical WUXI UESTC TECHNOLOGY DEVELOPMENT Co Ltd
Priority to CN201310139000.5A priority Critical patent/CN103312770B/en
Publication of CN103312770A publication Critical patent/CN103312770A/en
Application granted granted Critical
Publication of CN103312770B publication Critical patent/CN103312770B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Image Analysis (AREA)

Abstract

The invention discloses a method for auditing resources of a cloud platform. The method comprises the following steps: capturing key data contained in the resources to be audited, wherein the key data comprises the content; performing illegal content detection on the content in parallel by utilizing a signature matching algorithm, an identification matching algorithm and a dynamic characteristic analysis method; if the detection is passed completely, allowing the resources to be shared, if not, forbidding the resources to be shared. Multi-aspect security and legality auditing is performed on the resources/content provide by each terminal, and the updating of the service is monitored in the whole life, so that the security and legality of the resources in the cloud platform are ensured, and absolutely original, legal and secure resources and a good cloud platform environment are provided for all users.

Description

A kind of method of cloud platform resource examination & verification
Technical field
The present invention relates to field of cloud calculation, more particularly to a kind of method of cloud platform resource examination & verification.
Background technology
At present, there is various illegal or unsafe resource on network, threaten users.For such case, Network police is mainly taken to safeguard the safety of network, the webpage of close bad at present.But, due to uploading the money on network daily Source electrode is more, and distribution is extremely wide, can not possibly be audited without unified solution or all.
The content of the invention
In view of this, the technical problem to be solved in the present invention is to provide a kind of method of cloud platform resource examination & verification, by right The resource submitted in cloud platform carries out security and legitimacy examination & verification, and closes resource safety-of-life by monitoring management system Method for terminal service, it is ensured that the security and legitimacy of resource in cloud platform.
To reach above-mentioned purpose, the present invention is achieved through the following technical solutions:
A kind of method of cloud platform resource examination & verification, including:
The critical data that pending nuclear resource is included is captured, the critical data includes content;
The content is carried out parallel in illegal using Signature matching algorithms, identification matching algorithm and dynamic analysis method Hold detection, such as detect and all pass through, then allow the resource-sharing;Otherwise, the resource-sharing is forbidden.
Further, the critical data that the pending nuclear resource of the crawl is included is to adopt DOM Document Object Model(DOM)Side What method was completed.
Further, pirate video is detected using the Signature matching algorithms, the algorithm includes,
Segmentation is carried out to video in time-domain and obtains video lens segment;
The brief introduction feature of the video lens segment is extracted as signature, and video is classified, the video lens The brief introduction feature of fragment includes the semantic information and video content prompt of video lens segment;
According to the original video of the type selecting same type of inquiry video, by the signature of the video with aspect indexing storehouse In original video signature registered in advance matched, such as the match is successful, then be legal video, is pirate video otherwise.
It is further, described classification is carried out to video to include,
The time occurred in video according to familiar things and space characteristics, video different types are divided into;
The familiar things include personage, building, trees, vehicle and street.
Further, the edit of the pirate video includes that geometric transformation, extraneous information insertion, video sequences change Become, the insertion of many pictures and video quality change.
Further, detect that the algorithm includes to pornographic image using the identification matching algorithm,
The sensitizing range of human body parts in identification image;
Brightness, tone, shape according to the sensitizing range in digital picture, profile, edge, the feature of roughness, Skin area is detected;
Skin pixels ratio, tone according to skin area in digital picture, the feature at edge are right in skin area Human body reproductive organ detected,
Set up according to reproductive organs masterplate or built-in rule, if set up successfully, the image is pornographic image, Otherwise, it is non-pornographic image;
Further, detect that the algorithm includes to pornographic image using the identification matching algorithm,
Extract each area of skin color in image;
Count dermatoglyph direction histogram, roughness, the texture density feature composition characteristic vector of each area of skin color;
Pornographic image and non-pornographic image are distinguished according to the characteristic vector.
Further, pornographic video is detected using the dynamic analysis method, the dynamic analysis method Including,
Go to recognize pornographic frame using the recognition methods of pornographic image;
Obtain video dynamic characteristic;
Physical activity is detected according to video dynamic characteristic, so as to judge pornographic video and non-pornographic video.
Further, the method that the kinetic characteristic is obtained includes, extracts motion vector characteristic;Or, extract light stream special Levy;Or, extract sensitive information point;Or, using the motion model of camera.
Technical scheme, by carrying out security in all directions and conjunction to resource/content that each terminal is provided Method is audited, and monitors the upgrading renewal of the service all the life, it is ensured that the security and legitimacy of resource in cloud platform, is all User provides absolute legal, legal, safe resource and a good cloud platform environment.
Description of the drawings
The flow chart of the method that Fig. 1 is audited for the cloud platform resource of the embodiment of the present invention.
Specific embodiment
With reference to the accompanying drawings and examples the invention will be further described.
The method flow diagram that Fig. 1 is audited for the cloud platform resource of the embodiment of the present invention.As shown in figure 1, the method include as Lower step:
Step 101:The critical data that pending nuclear resource is included is captured, the critical data includes content.
In cloud platform, it is pending that content provider uploads resources into after server of cloud platform etc..Server is first The critical data that the resource is included is analyzed, the key messages such as Data subject, issuing time, content are such as analyzed.Because cloud is passed Data form in defeated differs widely, and can adopt DOM Document Object Model(DOM)Method, pre-build a variety of documents Model, these document models are contrasted with the Doctype of the resource for uploading, and come quick using immediate document model Analyze the critical data of pending nuclear resource.The mode that this resource is processed increased the efficiency of data processing.
Step 102:Using Signature matching algorithms, identification matching algorithm and dynamic analysis method the content is entered parallel Row illegal contents are detected.
Wherein, the illegal contents detection includes Pornograph detection and pirate content detection.
Pornograph detection technique includes the detection of pornographic image and the detection of pornographic video.Based on the content for grabbing, Pornographic image generally has two kinds of recognition methods,
First method:The sensitizing range of human body parts in identification pornographic image;Skin region is detected in the sensitizing range Domain;In detection of skin regions sensitivity organ;Set up according to sensitive organ masterplate or built-in rule, if set up successfully, Then the image is pornographic image, is non-pornographic image otherwise.
Wherein, according to the sensitizing range of human body parts in digital picture it is brightness, tone, shape, profile, edge, thick The feature of rugosity, detects in skin area to female breast etc..Skin picture according to sensitizing range in digital picture Plain ratio, tone, the feature at edge, detect in skin area to human body reproductive organ, according to reproductive organs masterplate or Built-in rule is set up, if set up successfully, the image is pornographic image, is non-pornographic image otherwise;
The particular content of human body parts is to attempt to understand people in pornographic image by algorithm in the identification pornographic image What the particular content of body portion was realized.
Second method:Extract each area of skin color in image;The dermatoglyph direction for counting each area of skin color is straight Fang Tu, roughness, texture density feature composition characteristic vector;Pornographic image and non-pornographic figure are distinguished according to the characteristic vector Picture..
The main feature of pornographic image is containing a large amount of human body skin areas.Each area of skin color of image is marked, Both redundant information can have been filtered, resource overhead when feature extraction and machine learning can have been reduced again.Therefore, split in the picture It is the important prerequisite for carrying out feature extraction to go out area of skin color.Area of skin color in pornographic image accounts for the large percentage of entire image, And in normal picture area of skin color to account for the ratio of entire image then corresponding less, using the size of area of skin color as a feature Value;Another of pornographic image is mainly characterized by containing a large amount of smooth, area of skin color without substantially periodicity and directionality, performance The pixel ratio of i.e. texture-free is more on " grain direction histogram ".By the addition of " grain direction histogram " characteristic value, can To reduce the erroneous judgement to the image with a large amount of skin pixels but without dermatoglyph.It is " thick in the area of skin color of pornographic image Rugosity " value shows that color change is slow in colour of skin area than larger, and interior in a big way the consistent of color is kept.Normal picture Color has typically fluctuated in spatial domain, just changes significantly within the scope of less, so the value of " roughness " is general It is all smaller., used as a kind of special texture, its " texture density " is than general non-broca scale as much smaller for dermatoglyph. Statistical analysis technique has an obvious advantage for Texture classification and Texture Segmentation, and with processing speed it is fast the characteristics of, thus make With " grain direction histogram ", " roughness ", " the texture density " based on statistics as another characteristic value.
The detection of pornographic video can utilize the recognition methods of pornographic image to go to recognize pornographic frame, then using the dynamic of video Step response detecting the erotic activity of human body, so as to judge pornographic video and non-pornographic video.The video motion characteristic is carried Take including following several schemes:
Scheme 1:Motion vector characteristic is extracted, the size and Orientation of motion vector is analyzed and is counted.
If neighbor frame difference method is exactly to extract a kind of algorithm of motion vector, the adjacent two field pictures respective pixel phase of general principle Respective pixel value is subtracted each other, in the case of ambient brightness change less, if respective pixel value difference very little, then it is assumed that be herein Static, if the pixel value changes in image-region somewhere are very big, it is believed that caused by motion problems in image, by these areas Field mark out, carries out motion vector characteristic extraction.
Scheme 2:Optical-flow Feature is extracted, the size and Orientation of motion is passed judgment on.
Optical flow method detects that the general principle of moving object is:A speed arrow is given to each pixel in image Amount, which forms an image motion field, in a particular moment of motion, the point on image and the point one on three-dimensional body One correspondence, this corresponding relation can be obtained by projection relation, according to the velocity feature of each pixel, image can be entered Mobile state is analyzed.If without moving object in image, light stream vector is continually varying in whole image region.Work as image In when having moving object, there is relative motion in target and image background, velocity certainty and neighborhood that moving object is formed Background velocity vector is different, so as to detect moving object and position.The advantage of optical flow method is that light stream not only carries motion The movable information of object, but also the abundant information about scenery three-dimensional structure is carried, it can not know appointing for scene In the case of what information, Moving Objects are detected.
Scheme 3:Sensitive information point is extracted, sensitive information point is tracked and trajectory analysis.
Scheme 4:Using the motion model of camera, the pushing away, draw, shaking of camera, shifting movement type are judged.
The characteristics of pirate content detection technique is by analyzing video piracy, in inquiry video, edits for every class is pirate Means are detected;According to pirate edit blocking and change degree to video original contents, screen is selectively extracted The brief introduction feature of frame is used as signature;Then the signature of inquiry video is signed with original video registered in advance in aspect indexing storehouse Matched, such as the match is successful, then be legal video, is pirate video otherwise.Whole signature search procedure, using cloud computing Rational calculating task coordinated allocation is carried out, efficient parallel computation is realized, so as to improve effectiveness of retrieval.
In the present embodiment, pirate video is detected using the Signature matching algorithms, examined using video shot boundary Method of determining and calculating, carries out segmentation and obtains video lens segment in time-domain to video;The brief introduction for extracting the video lens segment is special Levy as signature, and video is classified, the brief introduction feature of the video lens fragment includes the semanteme of video lens segment Information and video content prompt;According to the original video of the type selecting same type of inquiry video, by the label of the video Name is matched with original video signature registered in advance in aspect indexing storehouse, and such as the match is successful, then be legal video, otherwise, For pirate video.
It is described classification is carried out to video to include, the time occurred in video according to familiar things and space characteristics, regarding Frequency is divided into different types;The familiar things include personage, building, trees, vehicle and street.
The key technology of video frequency searching during the video shot boundary algorithm.Regarded by shot segmentation or Shot change Frequency is detected.In the present embodiment, video is split in time-domain, split the video lens segment for obtaining, as source video Subset, extract the semantic information of video that segmentation is obtained, video is classified such that it is able to the content according to video, according to The designator of video content, selectively carries out the matching of video, reduces the number of times of video matching, according to personage, building Time and space characteristics that the familiar things such as thing, trees, vehicle, street occur in video, video is divided into different classes Type.Then, according to the type of inquiry video, the original video for selecting same type is matched, and greatly improves matching Efficiency.
The edit of pirate video is mainly 5 big class:Geometric transformation(Such as the change of screen frame displaying ratio), extra letter The insertion of breath(Such as captions and TV station's station symbol), picture-in-picture(As simultaneously small one and large one two videos are played), under video quality Drop(Such as noise)With the change of video sequences(Such as fall frame and insertion frame).When video is inquired about, for every class piracy edit Detected.
Step 103:Judge whether content detection all passes through, such as all pass through, execution step 105, otherwise execution step 104。
Step 104:Forbid the resource-sharing, reduce the credit grade of resource uploader, and reported and submitted according to violation content Relevant departments are processed.
Step 105:Allow the resource-sharing;
Step 106:Judge whether the resource has renewal or upgrade, if any execution step 101;Otherwise, to resource other Aspect is supervised.
By above-mentioned many-side cloud platform resource is audited parallel, it is ensured that the legitimacy and security of content.
Additionally, present disclosure review mechanism can be monitored management, the i.e. resource to servicing to cloud platform The monitoring for being used, or see that it whether there is the illegal operation for violating safety, and renewal of upgrading to it is also carried out examination & verification, Ensure the safety-of-life and legitimacy of resource.
Pass(platform as a service)The program development framework provided under pattern is, it is ensured that its security, is somebody's turn to do , it is ensured that it will not serve the devil, the program to developing should have certain function monitor to the program developed under pattern, under preventing pass The possibility that utilized by Malware of cloud platform.
In order to solve the problems, such as that installing external network after fire wall can not access internal network server, and for setting up Buffering area between non-security system and security system, DMZ(demilitarized zone)The web application for using, leads to Such a DMZ regions are crossed, internal network is more efficiently protected.This network design, compared with general fire wall scheme, Again many one outposts of the tax office, can filter the attack initiated based on protocol bug for attacker, precisely control user's Access, reduce the order abuse risk exposed because of useless order opening.
In DMZ schemes, including two fire walls, external firewall keeps out the attack of external network, and manages all outer Access of portion's network to DMZ.Interior firewall manages DMZ for the access of internal network.Interior firewall is internal network 3rd road security perimeter (above including external firewall and Bastion Host), when external firewall fails, it can be with Play the function of protection internal network.And inside LAN, the access for Internet is by interior firewall and positioned at DMZ's Bastion Host is controlled.In such structure, a hacker must pass through three independent regions, and (external firewall, inside are anti- Wall with flues and Bastion Host) LAN can be reached.Attack difficulty to greatly reinforce, the security of respective inner network is also just significantly Strengthen.Resource uploader uploads resource, then it is audited by cloud platform content auditing system, if the resource has Poison, due to the design of cloud platform DMZ security architecture, the virus can not be threatened the final resource composition in high in the clouds, and can be by The resource is destroyed immediately.
Technical scheme, by carrying out security in all directions and conjunction to resource/content that each terminal is provided Method is audited, and monitors the upgrading renewal of the service all the life, it is ensured that the security and legitimacy of resource in cloud platform, is all User provides absolute legal, legal, safe resource and a good cloud platform environment.
All or part of content in the technical scheme that above example is provided can instruct the hard of correlation by program Completing, described program can be stored in a computer read/write memory medium part, and the program is accordingly introduced The step of perform, described storage medium, such as:ROM/RAM, magnetic disc, CD etc..
Above are only presently preferred embodiments of the present invention and institute's application technology principle, any technology people for being familiar with the art In the technical scope of present disclosure, the change or replacement that can be readily occurred in all should be covered in protection scope of the present invention member It is interior.

Claims (8)

1. a kind of method that cloud platform resource is audited, it is characterised in that include:
The critical data that pending nuclear resource is included is captured, the critical data includes content;
Pirate video is detected using Signature matching algorithms, pornographic image is detected using identification matching algorithm, profit Pornographic video is detected with dynamic analysis method, wherein, pirate video is examined using the Signature matching algorithms Survey, the algorithm includes,
Segmentation is carried out to video in time-domain and obtains video lens segment;
The brief introduction feature of the video lens segment is extracted as signature, and video is classified, the video lens fragment Brief introduction feature including video lens segment semantic information and video content prompt;
According to the original video of the type selecting same type of inquiry video, by the signature of the video with pre- in aspect indexing storehouse The original video signature first registered is matched, and such as the match is successful, then be legal video, is pirate video otherwise;
Such as detect and all pass through, then allow the resource-sharing;Otherwise, the resource-sharing is forbidden.
2. the method for cloud platform resource according to claim 1 examination & verification, it is characterised in that the pending nuclear resource bag of the crawl The critical data for containing is completed using the method for DOM Document Object Model (DOM).
3. the method that cloud platform resource according to claim 1 is audited, it is characterised in that described that classification bag is carried out to video Include,
The time occurred in video according to familiar things and space characteristics, video different types are divided into;
The familiar things include personage, building, trees, vehicle and street.
4. the method that cloud platform resource according to claim 1 is audited, it is characterised in that editor's hand of the pirate video Section includes geometric transformation, extraneous information insertion, video sequences change, the insertion of many pictures and video quality change.
5. the method that cloud platform resource according to claim 1 is audited, it is characterised in that using the identification matching algorithm Pornographic image is detected, the algorithm includes,
The sensitizing range of human body parts in identification image;
Brightness, tone, shape according to the sensitizing range in digital picture, profile, edge, the feature of roughness, to skin Detected in skin region;
Skin pixels ratio, tone according to skin area in digital picture, the feature at edge, to human body in skin area Reproductive organs detected,
Set up according to reproductive organs masterplate or built-in rule, if set up successfully, the image is pornographic image, no Then, it is non-pornographic image.
6. the method that cloud platform resource according to claim 1 is audited, it is characterised in that using the identification matching algorithm Pornographic image is detected, the algorithm includes,
Extract each area of skin color in image;
Count dermatoglyph direction histogram, roughness, the texture density feature composition characteristic vector of each area of skin color;
Pornographic image and non-pornographic image are distinguished according to the characteristic vector.
7. the method that cloud platform resource according to claim 1 is audited, it is characterised in that using the dynamic analysis Method detects that the dynamic analysis method includes to pornographic video,
Go to recognize pornographic frame using the recognition methods of pornographic image;
Obtain video dynamic characteristic;
Physical activity is detected according to video dynamic characteristic, so as to judge pornographic video and non-pornographic video.
8. the method that cloud platform resource according to claim 7 is audited, it is characterised in that the acquisition side of the dynamic characteristic Method includes:Extract motion vector characteristic;Or, extract Optical-flow Feature;Or, extract sensitive information point;Or, using camera Motion model, judge the pushing away, draw, shaking of camera, shifting movement type.
CN201310139000.5A 2013-04-19 2013-04-19 Method for auditing resources of cloud platform Expired - Fee Related CN103312770B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310139000.5A CN103312770B (en) 2013-04-19 2013-04-19 Method for auditing resources of cloud platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310139000.5A CN103312770B (en) 2013-04-19 2013-04-19 Method for auditing resources of cloud platform

Publications (2)

Publication Number Publication Date
CN103312770A CN103312770A (en) 2013-09-18
CN103312770B true CN103312770B (en) 2017-05-03

Family

ID=49137547

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310139000.5A Expired - Fee Related CN103312770B (en) 2013-04-19 2013-04-19 Method for auditing resources of cloud platform

Country Status (1)

Country Link
CN (1) CN103312770B (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103686244A (en) * 2013-12-26 2014-03-26 乐视网信息技术(北京)股份有限公司 Video data managing method and system
US9668020B2 (en) * 2014-04-07 2017-05-30 The Nielsen Company (Us), Llc Signature retrieval and matching for media monitoring
CN104158844A (en) * 2014-07-14 2014-11-19 上海东方延华节能技术服务股份有限公司 Remote real-time monitoring system
WO2017107209A1 (en) * 2015-12-25 2017-06-29 王晓光 Method and system for image recognition in video software
CN105868747B (en) * 2016-06-27 2018-04-13 厦门久凌创新科技有限公司 Cloud computing system
US9872056B1 (en) * 2016-12-16 2018-01-16 Google Inc. Methods, systems, and media for detecting abusive stereoscopic videos by generating fingerprints for multiple portions of a video frame
CN108171222B (en) * 2018-02-11 2020-08-25 清华大学 Real-time video classification method and device based on multi-stream neural network
WO2020010568A1 (en) * 2018-07-12 2020-01-16 深圳齐心集团股份有限公司 Big data artificial intelligence analysis device
CN109766508B (en) * 2018-12-28 2021-09-21 广州华多网络科技有限公司 Information auditing method and device and electronic equipment
CN110572693A (en) * 2019-08-23 2019-12-13 贵州省广播电视信息网络股份有限公司 Media asset transcoding method based on artificial intelligence
CN111967493A (en) * 2020-06-29 2020-11-20 北京百度网讯科技有限公司 Image auditing method and device, electronic equipment and storage medium
CN112333189B (en) * 2020-11-06 2021-07-30 北京木铭春天文化传媒有限公司 Data processing method based on Internet of things communication and live broadcast platform and cloud computing center

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102143120A (en) * 2010-02-01 2011-08-03 中兴通讯股份有限公司 Method and device for realizing grading multi-media files
CN102292726A (en) * 2009-01-23 2011-12-21 日本电气株式会社 video identifier extracting device

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1323370C (en) * 2004-05-28 2007-06-27 中国科学院计算技术研究所 Method for detecting pornographic images
CN100363943C (en) * 2004-06-21 2008-01-23 南开大学 Color image matching analytical method based on color content and distribution
CN101296148B (en) * 2008-06-26 2011-01-05 蓝汛网络科技(北京)有限公司 Verification method, system and device for validity of multimedia contents
CN101299690A (en) * 2008-06-26 2008-11-05 蓝汛网络科技(北京)有限公司 Method, system and apparatus for monitoring multimedia contents
CN102073841B (en) * 2009-11-20 2012-08-01 中国移动通信集团广东有限公司 Poor video detection method and device
CN102184419B (en) * 2011-04-13 2013-05-01 深圳市迈科龙影像技术有限公司 Pornographic image recognizing method based on sensitive parts detection
CN102236796B (en) * 2011-07-13 2014-01-22 Tcl集团股份有限公司 Method and system for sorting defective contents of digital video
CN102970164B (en) * 2012-11-20 2016-05-11 无锡成电科大科技发展有限公司 A kind of cloud platform management monitoring system and method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102292726A (en) * 2009-01-23 2011-12-21 日本电气株式会社 video identifier extracting device
CN102143120A (en) * 2010-02-01 2011-08-03 中兴通讯股份有限公司 Method and device for realizing grading multi-media files

Also Published As

Publication number Publication date
CN103312770A (en) 2013-09-18

Similar Documents

Publication Publication Date Title
CN103312770B (en) Method for auditing resources of cloud platform
Verdoliva Media forensics and deepfakes: an overview
US8619135B2 (en) Detection of abnormal behaviour in video objects
US20170289624A1 (en) Multimodal and real-time method for filtering sensitive media
Zabłocki et al. Intelligent video surveillance systems for public spaces–a survey
US20060239506A1 (en) Line textured target detection and tracking with applications to "Basket-run" detection
CN113255518B (en) Video abnormal event detection method and chip
CN111866600B (en) Method, device and system for protecting privacy
Kim et al. Defending Physical Adversarial Attack on Object Detection via Adversarial Patch-Feature Energy
KR20160116585A (en) Method and apparatus for blocking harmful area of moving poctures
Frejlichowski et al. SmartMonitor: An approach to simple, intelligent and affordable visual surveillance system
Patil et al. AlexNet based pirate detection system
Upadhyay et al. Learning based video authentication using statistical local information
Sitara et al. Automated camera sabotage detection for enhancing video surveillance systems
CN115546906A (en) System and method for detecting human face activity in image and electronic equipment
CN113596354B (en) Image processing method, image processing device, computer equipment and storage medium
CN113095272B (en) Living body detection method, living body detection device, living body detection medium and computer program product
Kaur Background subtraction in video surveillance
Tang et al. C-14: assured timestamps for drone videos
Xie et al. PROVES: Establishing Image Provenance using Semantic Signatures
Gupta et al. Unusual Activity Detection Using Machine Learning
Fischer et al. Privacy-aware smart video surveillance revisited
Mancas Attention-based dense crowds analysis
Bheechook et al. The need for automatic detection of uncommon behaviour in surveillance systems: A short review
Kandavalli et al. Design and implementation of colour texture‐based multiple object detection using morphological gradient approach

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20210113

Address after: No.2006 Xiyuan Avenue, Chengdu, Sichuan 611731

Patentee after: University of Electronic Science and technology of Sichuan foundation for education development

Address before: Room 402, area a, Liye building, science and Technology Park, China sensor network university, Taike Park, Wuxi New District, Wuxi City, Jiangsu Province, 214135

Patentee before: WUXI UESTC TECHNOLOGY DEVELOPMENT Co.,Ltd.

TR01 Transfer of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170503