CN112257123A - Image processing method and system - Google Patents

Image processing method and system Download PDF

Info

Publication number
CN112257123A
CN112257123A CN202010929009.6A CN202010929009A CN112257123A CN 112257123 A CN112257123 A CN 112257123A CN 202010929009 A CN202010929009 A CN 202010929009A CN 112257123 A CN112257123 A CN 112257123A
Authority
CN
China
Prior art keywords
target
image
desktop
server
acquiring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010929009.6A
Other languages
Chinese (zh)
Inventor
章杰
刘诣荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Wanxiang Electronics Technology Co Ltd
Original Assignee
Xian Wanxiang Electronics Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Wanxiang Electronics Technology Co Ltd filed Critical Xian Wanxiang Electronics Technology Co Ltd
Priority to CN202010929009.6A priority Critical patent/CN112257123A/en
Publication of CN112257123A publication Critical patent/CN112257123A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T5/00Image enhancement or restoration
    • G06T5/90Dynamic range modification of images or parts thereof
    • G06T5/92Dynamic range modification of images or parts thereof based on global image properties
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/08Protocols specially adapted for terminal emulation, e.g. Telnet

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Image Processing (AREA)

Abstract

The invention provides an image processing method and system, relates to the technical field of electronic information, and can solve the problem that terminal equipment in a cloud desktop system is candid when a server desktop image is displayed. The specific technical scheme is as follows: the method comprises the steps that a server obtains image request information sent by terminal equipment, and obtains a desktop image and a target image sent by the terminal equipment according to the image request information; determining a security level corresponding to the desktop image according to the target image; and carrying out fuzzy processing on the desktop image according to the security level, and sending the desktop image after fuzzy processing to the terminal equipment, so that the terminal equipment is prevented from being candid when displaying the desktop image, and the normal output of the desktop image is not influenced. The present disclosure is for processing of images.

Description

Image processing method and system
Technical Field
The present disclosure relates to the field of electronic information technologies, and in particular, to an image processing method and system.
Background
At present, the cloud desktop office system mainly comprises: the system comprises a cloud server and terminal equipment; the cloud server allocates a virtual machine to each terminal device, and the terminal devices acquire corresponding application services by connecting the corresponding virtual machines. Specifically, after the mobile zero terminal acquires the desktop image of the virtual machine, a reverse control instruction is generated by operating the desktop image, after the reverse control instruction is sent to the virtual machine, the virtual machine locally executes corresponding processing to operate the desktop, and the virtual machine continuously sends the generated desktop image to the mobile zero terminal in real time, so that the mobile zero terminal operates as if it were locally.
At present, the cloud desktop office system has wider application in special industries with high secret relation due to higher safety. Its higher safety is realized in that: the local equipment of the user does not need to store data, all data sources and video images are from images of the cloud, and the watermarks of the user can be added to the images at the cloud, so that the data cannot be easily leaked.
However, the security scheme that data is concentrated in the cloud cannot solve the problem that a shooting device is used for shooting a screen in a peeping mode, and therefore a scheme that a current picture is replaced or a screen is directly locked when people are found to shoot the screen in the peeping-proof shooting scheme in the prior art is proposed.
Disclosure of Invention
The embodiment of the disclosure provides an image processing method and system, which can solve the problem that terminal equipment in a cloud desktop system is candid when a server desktop image is displayed. The technical scheme is as follows:
according to a first aspect of the embodiments of the present disclosure, there is provided an image processing method, applied to a server, including:
acquiring target request information, wherein the target request information is used for requesting to log in a server and acquiring a desktop image of the server, and the target request information comprises target login information of a target user;
after the target login information passes the verification, acquiring a desktop image of the server according to the target request information, and acquiring a target image in a target area of the terminal equipment, wherein the target area comprises an area capable of shooting a display screen of the terminal equipment;
determining a target security level corresponding to the terminal equipment according to the target image;
and performing fuzzification processing on the desktop image according to the target security level.
According to a second aspect of the embodiments of the present disclosure, there is provided an image processing system including:
terminal equipment and server: the terminal device is connected to the server,
the terminal equipment is used for acquiring target login information of a target user;
generating target request information according to the target login information, wherein the target request information is used for requesting to log in a server and acquiring a desktop image of the server, and sending the target request information to the server;
when successful login to the server is detected, acquiring a target image in a target area, and sending the target image to the server, wherein the target area comprises an area capable of shooting a display screen of the terminal equipment;
the server is used for acquiring target request information;
after the target login information passes the verification, acquiring a desktop image of the server according to the target request information, and acquiring a target image sent by the terminal equipment;
determining a target security level corresponding to the terminal equipment according to the target image;
and performing fuzzification processing on the desktop image according to the target security level.
In one embodiment, a server in the system comprises an image acquisition module, an image identification module and an image coding module, wherein the image identification module is respectively connected with the image acquisition module and the image coding module;
the image acquisition module is used for acquiring a desktop image of the server after the terminal equipment successfully logs in the server;
the image identification module is used for determining a target filtering parameter corresponding to the desktop image according to a target security level corresponding to the target user;
performing fuzzification processing on the desktop image according to the target filtering parameter and a preset filtering algorithm; the image acquisition module is used for acquiring the desktop image which is subjected to the fuzzification processing and sending the desktop image to the image coding module;
the image coding module is used for coding the desktop image which is fuzzified, generating target coded data and sending the target coded data to the terminal equipment.
In one embodiment, the image recognition module in the system is further configured to:
acquiring the target image, analyzing the target image, and acquiring a target user in the target image and a target action in the target image;
determining whether the target user is a preset user or not according to the biological characteristic information of the preset user;
when the target user is not a preset user, determining whether the target action is an illegal action according to a preset illegal action;
when the target action is taken as an illegal action, determining the probability of the suspected peeping of the target action;
and determining a target safety level corresponding to the target user according to the probability of the suspected peeping shot.
In one embodiment, the terminal device in the system further includes: the system comprises an image acquisition module and an image processing module;
the image acquisition module is used for starting the image acquisition function after detecting that the target user successfully logs in the server;
acquiring a target image in a target area of the terminal equipment according to a preset acquisition rule, wherein the target area comprises an area capable of shooting a display screen of the terminal equipment;
the image processing module is used for acquiring a target image in a target area of the terminal equipment;
when the target image meets a preset rule, the target image is sent to the server, and the preset rule at least comprises the step of confirming that the target image comprises face information;
and when the target image does not accord with the preset rule, generating warning information and displaying the warning information, wherein the warning information is used for prompting a target user to input a face image through the image acquisition module.
In one embodiment, the terminal device in the system further comprises an image display module:
the image processing module is further configured to receive target encoded data, decode the target encoded data, and acquire the blurred desktop image, where the target encoded data is encoded data of the blurred desktop image;
sending the fuzzified desktop image to the image display module;
and the image display module is used for receiving and displaying the desktop image subjected to the fuzzification processing.
In one embodiment, the terminal device in the system is further adapted to,
receiving the blurred desktop image, and acquiring a target image of the target area;
when the target security level corresponding to the target image of the target area is not matched with the blurred desktop image, generating a control instruction, wherein the control instruction is used for indicating and adjusting the blurring degree of the desktop image;
the image identification module is also used for receiving a control instruction sent by the terminal equipment;
determining a target filtering parameter corresponding to the fuzzy degree according to the control instruction;
and performing fuzzification processing on the desktop image according to the target filtering parameter and a preset filtering algorithm.
The image processing system provided by the embodiment of the disclosure comprises terminal equipment and a server, wherein a user can log in the server through the terminal equipment to obtain a desktop image of the server; when the server acquires the image request information sent by the terminal equipment, acquiring a desktop image and a target image sent by the terminal equipment according to the image request information; determining a security level corresponding to the desktop image according to the target image; and carrying out fuzzy processing on the desktop image according to the security level, and sending the desktop image after fuzzy processing to the terminal equipment, so that the terminal equipment is prevented from being candid when displaying the desktop image, and the normal output of the desktop image is not influenced.
According to the method and the device, the current desktop image can be subjected to fuzzification processing according to the safety level determined by the image analysis mode, and meanwhile, a user can also adjust the fuzzification degree of the current picture according to needs. The method can effectively prevent illegal shooting behavior, and also avoids the problems that the user experience is poor and some real-time display contents are easily missed when the shooting is prevented by directly cutting off or replacing the current picture.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
Fig. 1 is a flowchart of an image processing method provided by an embodiment of the present disclosure;
fig. 2 is a mapping schematic diagram of an image processing method provided by an embodiment of the present disclosure;
fig. 3 is a schematic diagram illustrating an image blurring processing effect of an image processing method according to an embodiment of the disclosure;
fig. 3a is a schematic diagram 1 illustrating an image blurring processing effect of an image processing method according to an embodiment of the present disclosure;
fig. 3b is a schematic diagram 2 illustrating an image blurring processing effect of an image processing method according to an embodiment of the disclosure;
fig. 3c is a schematic diagram 3 illustrating an image blurring processing effect of an image processing method according to an embodiment of the disclosure;
fig. 3d is a schematic diagram 4 illustrating an image blurring processing effect of an image processing method according to an embodiment of the disclosure;
FIG. 4 is a block diagram of an image processing system provided by an embodiment of the present disclosure;
fig. 4a is a block diagram of a terminal device in an image processing system according to an embodiment of the disclosure;
fig. 4b is a block diagram of a server in an image processing system according to an embodiment of the present disclosure.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
An embodiment of the present disclosure provides an image processing method, as shown in fig. 1, the image processing method including the steps of:
101. and acquiring target request information.
The target request information is used for requesting to log in a server and acquiring a desktop image of the server, and the target request information comprises target login information of a target user;
the target request information can be sent to the server through the terminal equipment, and the technical effect of remotely controlling the server is achieved by acquiring the desktop image.
102. And when the target login information passes the verification, acquiring a desktop image of the server according to the target request information, and acquiring a target image in a target area of the terminal equipment.
The target image comprises a corresponding image when the terminal equipment is used.
And after receiving the target request information, the server performs identity authentication according to the target login information, and acquires a desktop image corresponding to the target request information after the authentication is passed.
In the method provided by the disclosure, the desktop image of the server is acquired, and the desktop image can be acquired through the image acquisition module and the target request information in the server.
The method for acquiring the target image sent by the terminal device provided by the disclosure includes:
sending first request information to the terminal equipment, wherein the first request information is used for requesting the terminal equipment to send a target image of a target area according to a preset rule, and the preset rule at least comprises the step of confirming that the target image comprises face information;
and receiving the target image sent by the terminal equipment according to the first request information.
The target image of the target area comprises an area opposite to a target display screen of the desktop image sent by the display server, and the target area is an area capable of shooting the target display screen of the terminal equipment.
The preset rule is to prevent the acquired image of the terminal device from being a blurred image or an image which cannot be identified after being shielded, so that the face identification in the target image is difficult, and how to perform the blurring processing cannot be confirmed.
Specifically, the target image of the target area may be an image that a camera of the terminal device can capture within a certain range in front of the current display. In actual deployment, the image acquisition module can be arranged on a front panel of a zero-terminal display screen, or an independent camera can be used and the position of the camera can be adjusted, so that the camera can shoot images in a certain range in front of a current display of the terminal equipment.
The timing for acquiring the target image sent by the terminal device in the method provided by the disclosure may be before the desktop image is sent to the terminal device, or may be after the desktop image is sent; the method for acquiring the target image sent by the terminal device may be that the terminal device actively sends the target image, or that the server requests the terminal device to send the target image, for example, when the desktop image acquired by the server is an image with a high security level, the target image sent by the terminal device may be acquired first, and after determining that the user in the target image is a preset user and the use action in the image is also a compliance action, the desktop image is sent.
According to the method provided by the disclosure, the desktop image is acquired, and simultaneously the image of the terminal equipment user is acquired, so that not only the safety during data transmission can be ensured, but also the safety during the data use process can be monitored.
103. Determining a target safety level corresponding to the target user according to the target image;
in the method provided by the present disclosure, determining the target security level corresponding to the target user may be performed, for example, from two perspectives of the user and the use action of the target image: the method comprises the following specific steps:
acquiring the target image, analyzing the target image, and acquiring a target user in the target image and a target action in the target image;
determining whether the target user is a preset user or not according to the biological characteristic information of the preset user;
when the target user is not a preset user, determining whether the target action is an illegal action and the probability of suspected peeping according to the preset illegal action
And determining a target safety level corresponding to the target user according to the probability of the suspected peeping shot.
The determination of whether the target user is the preset user in the above steps can be realized by identifying the biological characteristic information of the preset user, specifically, the server stores a pre-stored face image in the biological characteristic information of the legal user in advance, and judges whether the target user in the target image is the preset user by comparing the pre-stored face image with the target image through a face identification technology.
In the above step, according to the preset violation action, it is determined whether the target action is a violation action, and whether there is a behavior action suspected of peeking may be determined according to actions of people other than the legal user, a distance from the display, an angle of the photographing device, and the like.
Of course, the above two determination conditions: whether the target user is a preset user or not and whether the target action is an illegal action or not can be combined, so that the judgment standard is improved, if the target user is the preset user, the target action can be fuzzified as the illegal action, and the corresponding probability of the suspected peeping shot can be set to be low.
Further, the determination result may be represented by a probability value, for example, the probability of the suspected peeking is: 92%, 78%, 65%, etc.
In practical implementation, when the suspected peeking probability is greater than a preset threshold, it may be determined that there is a suspected peeking behavior at present. The preset threshold may be set as required, for example: 20%, 30%, 40%, etc.
After the probability of the current suspected peeping shot is determined in the steps, the current safety level is determined;
as shown in fig. 2, in actual implementation, the corresponding manner between the probability range and the peeking level may be preset, for example, if the security level is 3 levels, the corresponding relationship may be as shown in fig. 2; the above table is only an example, and in practical application, the security level is divided into how many levels, and the corresponding relationship between each level and the suspected spy shooting probability may be set as required, which is not limited herein.
According to the similar corresponding relation table, after the probability of the suspected peeking is determined, the safety level can be obtained correspondingly.
104. And performing fuzzification processing on the desktop image according to the target security level.
The process of blurring the desktop image in the method provided by the present disclosure includes:
determining a target filtering parameter corresponding to the desktop image according to a target security level corresponding to the target user;
and performing fuzzification processing on the desktop image according to the target filtering parameter and a preset filtering algorithm.
Specifically, the preset filtering algorithm may be a method of performing blurring processing on the image by using image low-pass filtering. The classic gaussian blurring algorithm in the low-pass filtering algorithm is used as the image blurring algorithm of the invention.
The gaussian blurring process may be understood as taking an average value of peripheral pixels for each pixel of the pair of images, where the process of taking the average value is called convolution, and may also be understood as a weighted average process, and the value of the value range of the peripheral pixels is called convolution kernel. Therefore, the nature of the gaussian fuzzy algorithm is to use a set gaussian kernel following normal distribution to perform convolution operation on the image to be processed, and the following is a typical gaussian kernel:
the functional expression is:
Figure BDA0002669521930000081
wherein, x and y in the above formula are gaussian kernel window size, filterWindowSize 3, and σ is standard deviation, and takes value 1.5.
From the definition of gaussian filtering, a gaussian kernel can be seen as a weight that is inversely related to the center distance. During smoothing, the adjustment is actually to adjust the influence degree of the surrounding pixels on the current pixel, the increase of the adjustment improves the influence degree of the distant pixels on the central pixel, and the filtering result is smoother, namely fuzzy. The gaussian kernel can be seen as a weight that is inversely related to the center distance.
After the standard deviation σ is determined, the window size needs to be determined next. Above, it is stated that the gaussian kernel is a discrete approximation to a continuous gaussian, the larger the window is, the better the natural approximation is, but the gaussian function is a bell-shaped curve, and the farther from the center, the smaller the value is, and the farther away is enough, the negligible.
Therefore, in the blurring processing in the method provided by the present disclosure, if a suspected peeping event occurs, gaussian filtering processing is performed on the image according to different set standard deviations, so as to achieve the purpose of realizing different blurring degrees according to the security level of the screen.
As shown in fig. 3a, this list illustrates a specific example:
for a 1080p image, the filter parameters may be set to: the filter window size filterWindowSize 50; fig. 3a shows an original image of a 1080p image.
As shown in fig. 3b, when the security level is level 1, the desktop image is completely blurred by the image blurring algorithm, the processed desktop image is not recognizable, and the standard deviation σ is 5;
as shown in fig. 3c, when the security level is level 2, 80% of blurring processing is performed on the desktop image, the processed desktop image needs to be recognized in a short distance, and the standard deviation σ is 3;
as shown in fig. 3d, when the security level is 3, the desktop image is subjected to 60% blurring processing, the processed desktop image is almost recognizable, the character recognition is difficult, and the standard deviation σ is 2.
According to the method provided by the disclosure, the screen display picture output to the zero terminal is blurred through the blurring processing of the desktop image, and meanwhile, a warning window pops up at the specified position of the current screen display picture to remind a user of improving the vigilance.
In the method provided by the disclosure, after the server sends the blurred desktop image to the terminal device, the server can receive feedback information of the terminal device, wherein the feedback information can be that a control picture is more blurred or clearer when the terminal device judges that the peeping risk is reduced or upgraded; the specific implementation mode is as follows:
receiving a control instruction sent by terminal equipment, wherein the control instruction is used for indicating and adjusting the fuzzy degree of the desktop image;
determining a target filtering parameter corresponding to the fuzzy degree according to the control instruction;
and performing fuzzification processing on the desktop image according to the target filtering parameter and a preset filtering algorithm.
The image processing method provided by the embodiment of the disclosure is applied to a server, and when the server acquires image request information sent by terminal equipment, a desktop image and a target image sent by the terminal equipment are acquired according to the image request information; determining a security level corresponding to the desktop image according to the target image; and carrying out fuzzy processing on the desktop image according to the security level, and sending the desktop image after fuzzy processing to the terminal equipment, so that the terminal equipment is prevented from being candid when displaying the desktop image, and the normal output of the desktop image is not influenced.
According to the method and the device, the current desktop image can be subjected to fuzzification processing according to the safety level determined by the image analysis mode, and meanwhile, a user can also adjust the fuzzification degree of the current picture according to needs. The method can effectively prevent illegal shooting behavior, and also avoids the problems that the user experience is poor and some real-time display contents are easily missed when the shooting is prevented by directly cutting off or replacing the current picture.
Example two
Based on the image processing method described in the embodiment corresponding to fig. 1 and fig. 2, the following is an embodiment of the apparatus of the present disclosure, which can be used to execute an embodiment of the method of the present disclosure.
An embodiment of the present disclosure provides an image processing system, as shown in fig. 4, the image processing system 40 includes: terminal device 401 and server 402: the terminal device 401 is connected to the server 402.
The terminal device 401 is configured to obtain target login information of a target user;
generating target request information according to the target login information, wherein the target request information is used for requesting to log in a server and acquiring a desktop image of the server, and sending the target request information to the server;
when successful login to the server is detected, a target image in a target area is acquired, and the target image is sent to the server, wherein the target area comprises an area capable of shooting the display screen of the terminal device 401.
As shown in fig. 4a, in an alternative embodiment, the terminal device 401 in the system 40 further includes: image acquisition module 4011, image processing module 4012 and image display module 4013, wherein image acquisition module 4011 can be hardware module and software module, and this image acquisition module 4011 can set up in the terminal equipment top when specifically deploying, also can set up in terminal equipment 401's outside, is connected with terminal equipment 401 through communication mode, and this image acquisition module 4011 can shoot the image in terminal equipment 401's display target area.
The image acquisition module 4011 is configured to start the image acquisition function after detecting that the target user successfully logs in the server 402;
acquiring a target image in a target area of the terminal equipment 401 according to a preset acquisition rule, wherein the target area comprises an area capable of shooting a display screen of the terminal equipment 401;
the image processing module 4012 is configured to obtain a target image in a target area of the terminal device 401;
when the target image meets a preset rule, sending the target image to the server 402, wherein the preset rule at least comprises confirming that the target image comprises face information;
and when the target image does not accord with the preset rule, generating warning information and displaying the warning information, wherein the warning information is used for prompting a target user to input a face image through the image acquisition module.
The image processing module 4012 is further configured to receive target encoded data sent by the target image receiving server 402, where the target encoded data is encoded data of a blurred desktop image;
decoding the target coded data to obtain a blurred desktop image and a blurred desktop image;
and sends it to the image display module 4013;
the image display module 4013 is configured to receive and display the desktop image subjected to the blurring processing.
The image processing module 4012 in the system 40 is further configured in an alternative embodiment,
receiving the blurred desktop image, and acquiring a target image of the target area;
and when the target security level corresponding to the target image of the target area is not matched with the blurred desktop image, generating a control instruction, wherein the control instruction is used for instructing to adjust the blurring degree of the desktop image.
The method comprises the steps that the terminal equipment determines whether the fuzzy degree of a desktop image needs to be adjusted according to the security level of a target image acquired in real time, and if the target user appearing in the target image is found not to be a preset user but is a management user, the fuzzy degree can be reduced or fuzzy processing is not carried out; for another example, although the target user appearing in the target image is a preset user, the target user takes a behavior of suspected candid shooting, and the degree of blur can also be improved.
The server 402 is configured to obtain target request information;
acquiring a desktop image of the server 402 according to the target request information, and acquiring a target image sent by the terminal device 401;
determining a target security level corresponding to the terminal device 401 according to the target image;
and performing fuzzification processing on the desktop image according to the target security level.
As shown in fig. 4b, in an alternative embodiment, the server 402 in the system 40 includes an image capturing module 4021, an image recognizing module 4022, and an image coding module 4023, and the image recognizing module is connected to the image capturing module and the image coding module respectively;
the image acquisition module 4021 is configured to acquire a desktop image of the server 402 after the terminal device 401 successfully logs in the server 402;
the image identification module 4022 is configured to determine a target filtering parameter corresponding to the desktop image according to a target security level corresponding to the target user;
performing fuzzification processing on the desktop image according to the target filtering parameter and a preset filtering algorithm;
the image acquisition module 4021 is used for acquiring the desktop image subjected to the fuzzification processing and sending the desktop image to the image coding module;
the image encoding module 4023 is configured to perform encoding processing on the desktop image subjected to the blurring processing, and send the desktop image to the terminal device 401.
In an alternative embodiment, the image recognition module 4022 in the system 40 is further configured to:
acquiring the target image, analyzing the target image, and acquiring a target user in the target image and a target action in the target image;
determining whether the target user is a preset user or not according to the biological characteristic information of the preset user;
when the target user is not a preset user, determining whether the target action is an illegal action according to a preset illegal action;
when the target action is taken as an illegal action, determining the probability of the suspected peeping of the target action;
and determining a target safety level corresponding to the target user according to the probability of the suspected peeping shot.
In an alternative embodiment, the image recognition module 4022 in the system 40 is further configured to receive a control instruction sent by the terminal device 401;
determining a target filtering parameter corresponding to the fuzzy degree according to the control instruction;
and performing fuzzification processing on the desktop image according to the target filtering parameter and a preset filtering algorithm.
The image processing system provided by the embodiment of the disclosure comprises terminal equipment and a server, wherein a user can log in the server through the terminal equipment to obtain a desktop image of the server; when the server acquires the image request information sent by the terminal equipment, acquiring a desktop image and a target image sent by the terminal equipment according to the image request information; determining a security level corresponding to the desktop image according to the target image; and carrying out fuzzy processing on the desktop image according to the security level, and sending the desktop image after fuzzy processing to the terminal equipment, so that the terminal equipment is prevented from being candid when displaying the desktop image, and the normal output of the desktop image is not influenced.
According to the method and the device, the current desktop image can be subjected to fuzzification processing according to the safety level determined by the image analysis mode, and meanwhile, a user can also adjust the fuzzification degree of the current picture according to needs. The method can effectively prevent illegal shooting behavior, and also avoids the problems that the user experience is poor and some real-time display contents are easily missed when the shooting is prevented by directly cutting off or replacing the current picture.
Based on the image processing method described in the embodiment corresponding to fig. 1 and fig. 2, an embodiment of the present disclosure further provides a computer-readable storage medium, for example, the non-transitory computer-readable storage medium may be a Read Only Memory (ROM), a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like. The storage medium stores computer instructions for executing the image processing method described in the embodiment corresponding to fig. 1 and fig. 2, which is not described herein again.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.

Claims (11)

1. An image processing system, characterized in that the system comprises a terminal device and a server: the terminal device is connected with the server,
the terminal equipment is used for acquiring target login information of a target user;
generating target request information according to the target login information, and sending the target request information to the server, wherein the target request information is used for requesting to log in the server and acquiring a desktop image of the server;
when successful login to the server is detected, acquiring a target image in a target area, and sending the target image to the server, wherein the target area comprises an area capable of shooting a display screen of the terminal equipment;
the server is used for acquiring the target request information;
after the target login information passes verification, acquiring a desktop image of the server according to the target request information, and acquiring a target image sent by terminal equipment;
determining a target security level corresponding to the terminal equipment according to the target image;
and performing fuzzification processing on the desktop image according to the target security level.
2. The system according to claim 1, wherein the server comprises an image acquisition module, an image recognition module and an image coding module, wherein the image recognition module is respectively connected with the image acquisition module and the image coding module;
the image acquisition module is used for acquiring a desktop image of the server after the terminal equipment successfully logs in the server;
the image identification module is used for determining a target filtering parameter corresponding to the desktop image according to a target security level corresponding to the target user;
performing fuzzification processing on the desktop image according to the target filtering parameter and a preset filtering algorithm;
the image acquisition module is used for acquiring the desktop image which is subjected to the fuzzification processing and sending the desktop image to the image coding module;
and the image coding module is used for coding the fuzzified desktop image to generate target coded data and sending the target coded data to the terminal equipment.
3. The system of claim 2, wherein the image recognition module is further configured to:
acquiring the target image, analyzing the target image, and acquiring a target user in the target image and a target action in the target image;
determining whether the target user is a preset user or not according to the biological characteristic information of the preset user;
when the target user is not a preset user, determining whether the target action is an illegal action according to a preset illegal action;
when the target action is taken as an illegal action, determining the probability of suspected peeping of the target action;
and determining a target safety level corresponding to the target user according to the probability of the suspected peeping.
4. The system of claim 1, wherein the terminal device further comprises: the system comprises an image acquisition module and an image processing module;
the image acquisition module is used for starting the image acquisition function after detecting that the target user successfully logs in the server;
acquiring a target image in a target area of the terminal equipment according to a preset acquisition rule, wherein the target area comprises an area capable of shooting a display screen of the terminal equipment;
the image processing module is used for acquiring a target image in a target area of the terminal equipment;
when the target image meets a preset rule, the target image is sent to the server, and the preset rule at least comprises the step of confirming that the target image comprises face information;
and when the target image does not accord with the preset rule, generating warning information and displaying the warning information, wherein the warning information is used for prompting a target user to input a face image through the image acquisition module.
5. The system according to claim 1, wherein the terminal device further comprises an image display module, the image display module is connected with the image processing module:
the image processing module is further configured to receive target encoded data, where the target encoded data is encoded data of the desktop image that has been subjected to the blurring processing;
decoding the target coded data to obtain the fuzzified desktop image;
sending the fuzzified desktop image to the image display module;
and the image display module is used for receiving and displaying the desktop image subjected to the fuzzification processing.
6. The system of claim 1, wherein the terminal device is further configured to,
receiving the blurred desktop image, and acquiring a target image of the target area;
when the target security level corresponding to the target image of the target area is not matched with the blurred desktop image, generating a control instruction, wherein the control instruction is used for instructing to adjust the blurring degree of the desktop image;
sending the control instruction to the server;
the image identification module is also used for receiving a control instruction sent by the terminal equipment;
determining a target filtering parameter corresponding to the fuzzy degree according to the control instruction;
and performing fuzzification processing on the desktop image according to the target filtering parameter and a preset filtering algorithm.
7. An image processing method applied to a server, the method comprising:
acquiring target request information, wherein the target request information is used for requesting to log in a server and acquiring a desktop image of the server, and the target request information comprises target login information of a target user;
after the target login information passes verification, acquiring a desktop image of the server according to the target request information, and acquiring a target image in a target area of the terminal equipment, wherein the target area comprises an area capable of shooting a display screen of the terminal equipment;
determining a target security level corresponding to the terminal equipment according to the target image;
and performing fuzzification processing on the desktop image according to the target security level.
8. The method of claim 7, wherein the acquiring the target image comprises:
sending first request information to the terminal equipment, wherein the first request information is used for requesting the terminal equipment to send a target image in a target area according to a preset rule, and the preset rule at least comprises the step of confirming that the target image comprises face information;
and receiving the target image sent by the terminal equipment according to the first request information.
9. The method of claim 7, wherein determining the target security level corresponding to the terminal device comprises:
acquiring the target image, analyzing the target image, and acquiring a target user in the target image and a target action in the target image;
determining whether the target user is a preset user or not according to the biological characteristic information of the preset user;
when the target user is not a preset user, determining whether the target action is an illegal action according to a preset illegal action;
when the target action is taken as an illegal action, determining the probability of suspected peeping of the target action;
and determining a target safety level corresponding to the target user according to the probability of the suspected peeping.
10. The method of claim 7, wherein the blurring the desktop image comprises:
determining a target filtering parameter corresponding to the desktop image according to a target security level corresponding to the target user;
and performing fuzzification processing on the desktop image according to the target filtering parameter and a preset filtering algorithm.
11. The method of claim 7, further comprising:
receiving a control instruction sent by terminal equipment, wherein the control instruction is used for indicating and adjusting the fuzzy degree of the desktop image;
determining a target filtering parameter corresponding to the fuzzy degree according to the control instruction;
and performing fuzzification processing on the desktop image according to the target filtering parameter and a preset filtering algorithm.
CN202010929009.6A 2020-09-07 2020-09-07 Image processing method and system Pending CN112257123A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010929009.6A CN112257123A (en) 2020-09-07 2020-09-07 Image processing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010929009.6A CN112257123A (en) 2020-09-07 2020-09-07 Image processing method and system

Publications (1)

Publication Number Publication Date
CN112257123A true CN112257123A (en) 2021-01-22

Family

ID=74231841

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010929009.6A Pending CN112257123A (en) 2020-09-07 2020-09-07 Image processing method and system

Country Status (1)

Country Link
CN (1) CN112257123A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113012034A (en) * 2021-03-05 2021-06-22 西安万像电子科技有限公司 Method, device and system for image display processing
CN113012035A (en) * 2021-03-05 2021-06-22 西安万像电子科技有限公司 Method, device and system for image display processing
CN113642053A (en) * 2021-07-21 2021-11-12 深圳市兆珑科技有限公司 Method, system, equipment and storage medium for remote control interface display

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113012034A (en) * 2021-03-05 2021-06-22 西安万像电子科技有限公司 Method, device and system for image display processing
CN113012035A (en) * 2021-03-05 2021-06-22 西安万像电子科技有限公司 Method, device and system for image display processing
CN113642053A (en) * 2021-07-21 2021-11-12 深圳市兆珑科技有限公司 Method, system, equipment and storage medium for remote control interface display

Similar Documents

Publication Publication Date Title
US20200184059A1 (en) Face unlocking method and apparatus, and storage medium
CN112257123A (en) Image processing method and system
US11314966B2 (en) Facial anti-spoofing method using variances in image properties
US20060056664A1 (en) Security system
US10108793B2 (en) Systems and methods for secure biometric processing
US20060029262A1 (en) Eye image input unit, authentication equipment and image processing method
CN111711794A (en) Anti-candid image processing method and device, terminal and storage medium
WO2015192669A1 (en) Two-dimensional code scanning positioning prompt method and system
CN112257124A (en) Image processing method and device
US9594958B2 (en) Detection of spoofing attacks for video-based authentication
CN110969570B (en) Method and device for processing image
CN109902475B (en) Verification code image generation method and device and electronic equipment
CN112270647A (en) Image processing method and system
CN108769636B (en) Projection method and device and electronic equipment
CN110619239A (en) Application interface processing method and device, storage medium and terminal
US20240104965A1 (en) Face liveness detection methods and apparatuses
US20160125239A1 (en) Systems And Methods For Secure Iris Imaging
CN112672102B (en) Video generation method and device
KR101654797B1 (en) Interactive CAPTCHA System Resilient to Phishing Attacks
CN111507140B (en) Portrait contrast method, system, electronic device and readable storage medium
CN111866573B (en) Video playing method and device, electronic equipment and storage medium
CN114140349A (en) Method and device for generating interference image
US20230005301A1 (en) Control apparatus, control method, and non-transitory computer readable medium
CN112417998A (en) Method and device for acquiring living body face image, medium and equipment
CN111814551A (en) Human face recognition method, device and equipment based on small program and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination