CN112615975A - Scanning method, storage medium, electronic device, and scanning device - Google Patents

Scanning method, storage medium, electronic device, and scanning device Download PDF

Info

Publication number
CN112615975A
CN112615975A CN202011488681.2A CN202011488681A CN112615975A CN 112615975 A CN112615975 A CN 112615975A CN 202011488681 A CN202011488681 A CN 202011488681A CN 112615975 A CN112615975 A CN 112615975A
Authority
CN
China
Prior art keywords
picture
scanning
information
tracing
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011488681.2A
Other languages
Chinese (zh)
Other versions
CN112615975B (en
Inventor
田辉
虞智
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei Suotou Information Technology Co ltd
Original Assignee
Hefei Suotou Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei Suotou Information Technology Co ltd filed Critical Hefei Suotou Information Technology Co ltd
Priority to CN202011488681.2A priority Critical patent/CN112615975B/en
Publication of CN112615975A publication Critical patent/CN112615975A/en
Application granted granted Critical
Publication of CN112615975B publication Critical patent/CN112615975B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • G06F17/14Fourier, Walsh or analogous domain transformations, e.g. Laplace, Hilbert, Karhunen-Loeve, transforms
    • G06F17/141Discrete Fourier transforms
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T5/70
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/90Determination of colour characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00838Preventing unauthorised reproduction
    • H04N1/0084Determining the necessity for prevention
    • H04N1/00854Recognising an unauthorised user or user-associated action
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00838Preventing unauthorised reproduction
    • H04N1/00856Preventive measures
    • H04N1/00859Issuing an alarm or the like
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/04Scanning arrangements, i.e. arrangements for the displacement of active reading or reproducing elements relative to the original or reproducing medium, or vice versa
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32154Transform domain methods
    • H04N1/3216Transform domain methods using Fourier transforms

Abstract

The invention discloses a scanning method, a storage medium, an electronic device and a scanning device, wherein the scanning method comprises the following steps: obtaining traceability information, and generating a traceability identifier according to the traceability information; converting the tracing identifier into an invisible watermark picture; and performing frequency domain fusion on the invisible watermark picture and the initial scanned picture so as to hide the invisible watermark picture in the initial scanned picture and obtain a target scanned picture. The scanning method can obtain the target scanning picture which contains the hidden traceable identification, the target scanning picture does not affect the visual effect of the file, the watermark information can be ensured not to be erased and damaged, and simultaneously, the traceable of the target scanning picture can be facilitated.

Description

Scanning method, storage medium, electronic device, and scanning device
Technical Field
The present invention relates to the field of scanning technologies, and in particular, to a scanning method, a storage medium, an electronic device, and a scanning device.
Background
Currently, when protecting and marking an output scanned picture file, a mainstream scanner device generally adds specific Logo, characters, pictures, two-dimensional codes and other visible watermarks, and has the following disadvantages: the original seriousness of documents, books, official documents and the like is greatly discounted due to the visual influence on the source files, meanwhile, the visible watermark is easily erased and damaged by tools such as PS (packet switched) and the like, and once the watermark information fails, the safety protection and marking functions are lost.
Disclosure of Invention
The present invention is directed to solving, at least to some extent, one of the technical problems in the related art. Therefore, an object of the present invention is to provide a scanning method, which obtains a target scanned picture containing hidden tracing identifiers, where the target scanned picture does not affect the visual effect of a file, and can ensure that the watermark information cannot be erased and damaged, and at the same time, can facilitate tracing of the target scanned picture.
A second object of the invention is to propose a computer-readable storage medium.
A third object of the invention is to propose an electronic device.
A fourth object of the invention is to propose a scanning device.
In order to achieve the above object, an embodiment of a first aspect of the present invention provides a scanning method, including the following steps: obtaining traceability information, and generating a traceability identifier according to the traceability information; converting the tracing identifier into an invisible watermark picture; and performing frequency domain fusion on the invisible watermark picture and the initial scanned picture so as to hide the invisible watermark picture in the initial scanned picture and obtain a target scanned picture.
To achieve the above object, a second aspect of the present invention provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the scanning method of the above embodiment.
To achieve the above object, a third aspect of the present invention provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory, and when the computer program is executed by the processor, the scanning method of the above embodiment is implemented.
To achieve the above object, a fourth aspect of the present invention provides a scanning device, including the electronic device of the above embodiment.
According to the scanning method, the storage medium, the electronic device and the scanning device, the target scanning picture containing the hidden traceable identification can be obtained, the visual effect of the file is not influenced by the target scanning picture, the watermark information can be ensured not to be erased and damaged, and meanwhile traceable of the target scanning picture can be facilitated.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
FIG. 1 is a flow chart of a scanning method of one embodiment of the present invention;
FIG. 2 is a flow chart of frequency domain fusion according to a specific example of the present invention;
FIG. 3 is a flow chart of a scanning method of another embodiment of the present invention;
fig. 4 is a block diagram of the electronic device according to an embodiment of the present invention.
FIG. 5 is a block diagram of a scanning device according to an embodiment of the present invention;
FIG. 6 is a flowchart of a method for tracing a source of a picture according to an embodiment of the present invention;
fig. 7 is a block diagram of an electronic apparatus according to another embodiment of the present invention.
Fig. 8 is a block diagram of a host device of an embodiment of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are illustrative and intended to be illustrative of the invention and are not to be construed as limiting the invention.
A scanning method, a storage medium, an electronic apparatus, and a scanning apparatus of embodiments of the present invention are described below with reference to the accompanying drawings.
Fig. 1 is a flowchart of a scanning method according to an embodiment of the present invention.
In an embodiment of the present invention, the scanning method may be applied to a scanning Device, such as a scanner, and may be specifically performed after an initial scanning picture is acquired by an imaging Device of the scanner, such as a CCD (Charge Coupled Device) sensor. In summary, when picture processing is performed after picture taking and imaging through the CCD, an invisible watermark embedding function can be automatically called, embedding and adding of the invisible watermark are performed on submitted picture files, and then the pictures are filed and stored in a specific directory. By the method, all the collected, edited and submitted filed pictures are automatically embedded with the invisible watermark information, and the scanning equipment directly outputs the electronic pictures with invisible watermark identification information.
As shown in fig. 1, the scanning method specifically includes the following steps:
and S1, obtaining the tracing information and generating a tracing identifier according to the tracing information.
The source tracing information includes at least two of first device information (such as an ID code of the scanning device) of the scanning device, scanning time, and second device information of a control terminal (such as a PC, a smart phone, a tablet PC, etc.) connected (including wired connection and wireless connection) with the scanning device, where the second device information includes at least one of IP/MAC information and login account information (such as account information logged in by a client installed in the control terminal for controlling the scanning device to perform scanning work). Therefore, the source of the picture can be determined when the picture is traced.
As an example, the MarkInfo interface may be used to perform acquisition and encoding of an initial scanned picture watermark, and automatically acquire device information of a scanning device, IP and MAC information of a control terminal connected to the scanning device, and login account information, and generate a tracing identifier.
And S2, converting the tracing identifier into an invisible watermark picture.
Specifically, the tracing information may be converted into binary information, and then the binary information is converted into a picture, so as to obtain the invisible watermark picture.
And S3, performing frequency domain fusion on the invisible watermark picture and the initial scanned picture so as to enable the invisible watermark picture to be hidden in the initial scanned picture and obtain a target scanned picture.
Specifically, a user can preset that the scanner works in a watermark steganography mode, after an initial scanning picture is obtained through the CCD sensor, the initial scanning picture can be stored in a preset source folder, then the initial scanning picture can be cut, zoomed and the like according to scanning parameters preset by the user, and the processed picture is submitted so as to embed the hidden watermark based on the processed initial scanning picture.
In this embodiment, the initial scan picture is a picture in RGB format. As shown in fig. 2, the frequency domain fusion of the invisible watermark picture and the scanned picture to obtain the target scanned picture may include:
s31, converting the initial scan picture from RGB format to a first picture in YCbCr format, and extracting a luminance component of the first picture.
The luminance component is Y-channel data of the first picture in YCbCr format.
S32, carrying out wiener filtering on the brightness component of the first picture, and generating the self-adaptive embedding strength according to the filtering result.
In the picture region where the filtering loss exceeds a certain threshold (i.e., the region with high gaussian noise), the corresponding adaptive embedding strength value is large.
And S33, zooming the invisible watermark picture to be the same as the size of the initial scanned picture to obtain a second picture.
Specifically, the entire pattern matrix of the invisible watermark picture is horizontally and longitudinally tiled to the length and width of the initial scanned picture to be embedded, so that a basic watermark matrix is formed.
Of course, if the size of the invisible watermark picture is the same as the size of the initial scanned picture, for example, when the invisible watermark picture is generated, the size of the initial scanned picture may be obtained first, and then the invisible watermark picture with the same size as the initial scanned picture is generated, and at this time, step S33 may not be executed, and the invisible watermark picture is directly used as the second picture for the subsequent processing.
And S34, performing luminance component embedding processing on the second picture by using the self-adaptive embedding strength to obtain a third picture.
And S35, overlapping the third picture with the first picture to obtain a fourth picture.
Specifically, the third picture may be equal to a product of a corresponding position of the basic watermark matrix and the corresponding adaptive embedding strength, and the third picture is directly synthesized with the first picture, for example, the third picture may be overlaid on the first picture to obtain a fourth picture.
And S36, converting the fourth picture into a picture in an RGB format to obtain a target scanning picture.
Because the watermark obtained by the method has small disturbance, the target scanned picture obtained after the watermark is embedded into the initial scanned picture has better overall visual effect.
In an embodiment of the present invention, the tracing information may further include a picture information identifier, so as to better ensure the uniqueness of the target scanned picture, avoid the problem of repeated scanning and archiving caused by different business operators or the same operator collecting at different times, solve the problem that multiple identical electronic file files exist in the same business management system or database, and provide reliable support for the uniqueness reference of subsequent electronic documents.
Accordingly, obtaining traceability information may include: carrying out image recognition on the initial scanning picture; and coding the recognition result by using a preset coding algorithm to obtain the picture information identifier. The fields corresponding to the tracing information may sequentially include a picture information identification field, a first device information field, a second device information field, and a scanning time field. In addition, some verification information may be included.
For example, for a paper document, the header (e.g., paper name) of each page is generally the same; for an enterprise file, each page of the enterprise file typically has the same footer (e.g., the file's volume number). At this time, when the image recognition is performed on the initial scanned picture, the header/footer content can be separately encoded for filing, i.e. the scanned pictures corresponding to the same file are grouped together for management.
As an example, as shown in fig. 3, the scanning method may further include:
s4, detecting whether there is duplication in the picture information identifier of the current initial scanned picture.
Specifically, the corresponding initial scanned pictures of the same paper piece are the same, so as to avoid repeated scanning, the picture information identifiers of the initial scanned pictures can be checked for duplication, and for example, pictures scanned by the scanning device before can be traversed to detect whether the initial scanned pictures appear before.
As an example, when the scanning device performs the scanning operation, the scanning device may further store the picture information identifier corresponding to the obtained target scanned picture, and establish a mapping relationship between the picture information identifier and the target scanned picture. For example, the picture information identification and the mapping relationship may be stored in a preset relational database so that the query is invoked when needed.
S5, if there is no duplication, directly archiving the target scanning picture corresponding to the current initial scanning picture.
And S6, if the repetition exists, searching the historical target scanning picture which has the same picture information identification with the current initial scanning picture.
And S7, obtaining the tracing information of the historical target scanning picture, and sending out first prompt information according to the tracing information.
The first prompt information may be directly displayed on a display screen of the scanning device, such as "repeat scanning, please confirm whether to continue scanning", or may be displayed on a display screen of a control terminal connected to the scanning device, such as a PC, a smart phone, or may be sent out through an indicator light, a buzzer, or the like provided on the scanning device.
Specifically, after the scanning device scans the target scanned picture, the tracing information corresponding to the target scanned picture may be filed together, and then the scanning device may directly call the tracing information in the subsequent scanning work, so as to determine whether the picture information identifier exists in step S4 and obtain the corresponding tracing information. In addition, the tracing information of the history target scanned picture can be obtained by the picture tracing method of the following embodiment, and after the history target scanned picture is determined, the history target scanned picture can be submitted to the tracing management platform for tracing. Compared with the former, the latter has wider application range.
Optionally, after the tracing information of the historical target scanned picture is acquired, reference information can be generated according to the tracing information of the historical target scanned picture; and generating a tracing identifier according to the reference information and the tracing information of the current initial scanning picture.
Therefore, the unique identity of the electronic archive file can be given, the system can carry out invisible embedding in a mode that human eyes cannot see while de-duplicating, and the non-tampering characteristic and the traceable characteristic of the safety identification information are achieved.
In summary, the scanning method of the embodiment of the present invention can obtain the target scanned picture containing the hidden tracing identifier, and the target scanned picture does not affect the visual effect of the file, and can ensure that the watermark information cannot be erased and damaged, and at the same time, the tracing of the target scanned picture can be facilitated.
The invention also proposes a computer-readable storage medium on which a computer program is stored which, when being executed by a processor, carries out the scanning method described above.
In the computer-readable storage medium according to the embodiment of the present invention, when the computer program corresponding to the scanning method stored in the computer-readable storage medium is executed by the processor, the target scanned picture containing the hidden traceable identifier can be obtained, the target scanned picture does not affect the visual effect of the file, and the watermark information can be ensured not to be erased and damaged, and meanwhile, the traceable of the target scanned picture can be facilitated.
The invention also provides the electronic equipment.
Fig. 4 is a block diagram of the electronic device of the embodiment of the present invention.
As shown in fig. 4, the electronic device 10 comprises a memory 11, a processor 12 and a computer program 13 stored on the memory 11, the computer program 13 implementing the scanning method described above when executed by the processor 12.
In the electronic device of the embodiment of the present invention, when the computer program corresponding to the scanning method stored in the memory of the electronic device is executed by the processor, the target scanned picture containing the hidden traceable identifier can be obtained, the target scanned picture does not affect the visual effect of the file, the watermark information can be ensured not to be erased and damaged, and the traceable of the target scanned picture can be facilitated.
Fig. 5 is a block diagram of a scanning apparatus according to an embodiment of the present invention.
As shown in fig. 5, the scanning apparatus 100 includes the electronic apparatus 10 of the above-described embodiment.
According to the scanning device provided by the embodiment of the invention, the target scanning picture containing the hidden tracing identifier can be obtained through the electronic device, the visual effect of the file is not influenced by the target scanning picture, the watermark information can be ensured not to be erased and damaged, and meanwhile, the tracing of the target scanning picture can be facilitated.
Furthermore, the invention also provides a picture tracing method, a storage medium, electronic equipment and host equipment. The to-be-traced picture used in this embodiment can be obtained based on the scanning method of the above embodiment.
Fig. 6 is a flowchart of an image tracing method according to an embodiment of the present invention.
In this embodiment, the image tracing method may be implemented by a specific management platform for the host device. The management platform can provide a function of evidence obtaining and tracing for the picture files filed on the ground, and the target picture embedded with the invisible watermark codes and realized by the embodiment is analyzed and translated for the invisible watermark information to generate source information which can be understood by natural language and position the source generated by the picture.
As shown in fig. 6, the method for tracing a picture source may specifically include the following steps:
s101, preprocessing a picture to be traced to obtain a frequency domain characteristic gray-scale image.
As an example, preprocessing a to-be-traced picture to obtain a frequency domain characteristic grayscale map may include: carrying out gray level processing on the picture to be traced, and carrying out denoising processing on the picture subjected to the gray level processing by using a DnCNN model to obtain a noise gray level picture; and performing two-dimensional discrete Fourier transform on the noise gray level picture, and performing frequency domain product and inverse Fourier transform to obtain a frequency domain characteristic gray level picture.
S102, detecting the frequency domain characteristic gray-scale image by using a target detection model so as to determine whether the to-be-traced picture contains the invisible watermark.
Specifically, detecting the frequency domain characteristic grayscale image by using the target detection model to determine whether the to-be-traced picture contains the invisible watermark may include: identifying the region which accords with the watermark characteristic in the frequency domain characteristic gray scale image by using a target detection model to obtain a coordinate region and a confidence coefficient thereof; and determining whether the to-be-traced picture contains the invisible watermark or not according to the coordinate area and the confidence coefficient of the to-be-traced picture.
As an example, determining whether the to-be-traced picture includes an invisible watermark according to the coordinate region and the confidence thereof may include: comparing the coordinate region with a preset region of the picture to be traced, and comparing the confidence with a first preset value; if the coincidence degree of the coordinate area and the preset area is greater than a second preset value, and the confidence degree is greater than a first preset value, determining that the to-be-traced picture contains the invisible watermark; and if the contact ratio is less than or equal to a second preset value, or the confidence coefficient is less than or equal to a first preset value, determining that the to-be-traced picture does not contain the invisible watermark.
The values of the first preset value and the second preset value can be calibrated according to needs, for example, the first preset value and the second preset value can both be values larger than 90%.
S103, if the hidden watermark contains the tracing information, tracing information in the hidden watermark is extracted, wherein the tracing information comprises first equipment information of the scanning equipment.
Optionally, the tracing information may further include at least one of a scanning time and second device information of a control terminal connected to the scanning device, where the second device information includes at least one of IP/MAC information and login account information.
In an embodiment of the present invention, the method for tracing the source of the picture may further include: judging whether the scanning equipment corresponding to the first equipment information is target scanning equipment or not; if not, terminating the tracing; and if so, generating a traceability report according to the traceability information.
Wherein, the target scanning device is multiple.
Specifically, an organization/unit/enterprise/company may be equipped with many scanning devices and many host devices, and at this time, all the scanning devices may be used as target scanning devices, and at the same time, a management platform may log in an account to perform management of tracing identification and watermark coding, so as to implement tracing determination of scanned pictures. Traversing and comparing the analyzed device ID, if the scanning device is not the scanning device of the organization/unit/enterprise/company, terminating tracing, and outputting corresponding prompt information, for example, displaying a 'scanning generation diagram of the organization of the non-local unit' on a display screen of the host device; if the scanning device IDs are matched, other information such as operators and generation time can be further analyzed, a complete traceability report is generated, and a detailed picture generation source is positioned.
In summary, the image tracing method of the embodiment of the invention can realize the tracing of the image, so as to know the source of the image and provide a basis for investigation and evidence collection.
The invention also provides another computer readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the method for tracing the source of the picture is realized.
In the computer-readable storage medium according to the embodiment of the present invention, when the computer program corresponding to the image tracing method stored in the computer-readable storage medium is executed by the processor, the tracing of the image can be realized, so that the source of the image can be known, and a basis can be provided for investigation and evidence collection.
The invention also provides another electronic device.
Fig. 7 is a block diagram of an electronic apparatus according to another embodiment of the present invention.
As shown in fig. 7, the electronic device 20 includes a memory 21, a processor 22 and a computer program 23 stored in the memory 21, and when the computer program 23 is executed by the processor 22, the above-mentioned picture tracing method is implemented.
In the electronic device according to the embodiment of the present invention, when the computer program corresponding to the image tracing method stored in the memory of the electronic device is executed by the processor, the tracing of the image can be realized, so that the source of the image can be known, and a basis can be provided for investigation and evidence collection.
Fig. 8 is a block diagram of a host device of an embodiment of the present invention.
As shown in fig. 8, the host device 200 includes the electronic device 20 of the above-described embodiment.
In this embodiment, the host device 200 may be a PC, a smartphone, or the like.
The host device according to the embodiment of the present invention can trace the source of the picture through the electronic device 20, so as to know the source of the picture, and provide a basis for investigation and evidence collection.
It should be noted that the logic and/or steps represented in the flowcharts or otherwise described herein, such as an ordered listing of executable instructions that can be considered to implement logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Additionally, the computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
In the description of the present invention, it is to be understood that the terms "central," "longitudinal," "lateral," "length," "width," "thickness," "upper," "lower," "front," "rear," "left," "right," "vertical," "horizontal," "top," "bottom," "inner," "outer," "clockwise," "counterclockwise," "axial," "radial," "circumferential," and the like are used in the orientations and positional relationships indicated in the drawings for convenience in describing the invention and to simplify the description, and are not intended to indicate or imply that the referenced devices or elements must have a particular orientation, be constructed and operated in a particular orientation, and are therefore not to be considered limiting of the invention.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present invention, "a plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
In the present invention, unless otherwise expressly stated or limited, the terms "mounted," "connected," "secured," and the like are to be construed broadly and can, for example, be fixedly connected, detachably connected, or integrally formed; can be mechanically or electrically connected; they may be directly connected or indirectly connected through intervening media, or they may be connected internally or in any other suitable relationship, unless expressly stated otherwise. The specific meanings of the above terms in the present invention can be understood by those skilled in the art according to specific situations.
In the present invention, unless otherwise expressly stated or limited, the first feature "on" or "under" the second feature may be directly contacting the first and second features or indirectly contacting the first and second features through an intermediate. Also, a first feature "on," "over," and "above" a second feature may be directly or diagonally above the second feature, or may simply indicate that the first feature is at a higher level than the second feature. A first feature being "under," "below," and "beneath" a second feature may be directly under or obliquely under the first feature, or may simply mean that the first feature is at a lesser elevation than the second feature.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.

Claims (10)

1. A scanning method, comprising the steps of:
obtaining traceability information, and generating a traceability identifier according to the traceability information;
converting the tracing identifier into an invisible watermark picture;
and performing frequency domain fusion on the invisible watermark picture and the initial scanned picture so as to hide the invisible watermark picture in the initial scanned picture and obtain a target scanned picture.
2. The scanning method according to claim 1, wherein the tracing information includes at least two of first device information of a scanning device, a scanning time, and second device information of a control terminal connected to the scanning device, wherein the second device information includes at least one of IP/MAC information and login account information.
3. The scanning method of claim 1, wherein said converting the traceability marking into an invisible watermark picture comprises:
converting the tracing information into binary information;
and converting the binary information into a picture to obtain the invisible watermark picture.
4. The scanning method of claim 1, wherein the initial scanned picture is a RGB-formatted picture, and the frequency domain fusion of the invisible watermark picture and the scanned picture to obtain a target scanned picture comprises:
converting the initial scanning picture from an RGB format into a first picture in a YCbCr format, and extracting a brightness component of the first picture;
carrying out wiener filtering on the brightness component of the first picture, and generating self-adaptive embedding strength according to the filtering result;
zooming the invisible watermark picture to be the same as the size of the initial scanned picture to obtain a second picture;
performing luminance component embedding processing on the second picture by using the self-adaptive embedding strength to obtain a third picture;
superposing the third picture and the first picture to obtain a fourth picture;
and converting the fourth picture into a picture in an RGB format to obtain the target scanning picture.
5. The scanning method according to claim 2, wherein the tracing information further includes a picture information identifier, and the obtaining the tracing information includes:
carrying out image recognition on the initial scanning picture;
and coding the recognition result by using a preset coding algorithm to obtain the picture information identifier.
6. The scanning method of claim 5, wherein the method further comprises:
detecting whether the picture information identification of the current initial scanning picture has repetition or not;
if the repetition does not exist, directly archiving the target scanning picture corresponding to the current initial scanning picture;
if the repetition exists, searching a historical target scanning picture which has the same picture information identifier as the current initial scanning picture;
and obtaining the tracing information of the historical target scanning picture, and sending out first prompt information according to the tracing information.
7. The scanning method according to claim 6, wherein after obtaining the traceability information of the historical target scan picture, the method further comprises:
generating citation information according to the source tracing information of the historical target scanning picture;
and generating a tracing identifier according to the reference information and the tracing information of the current initial scanning picture.
8. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the scanning method according to any one of claims 1 to 7.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory, characterized in that the computer program, when executed by the processor, implements the scanning method according to any one of claims 1-7.
10. A scanning device, characterized in that it comprises an electronic device as claimed in claim 9.
CN202011488681.2A 2020-12-16 2020-12-16 Scanning method, storage medium, electronic device, and scanning device Active CN112615975B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011488681.2A CN112615975B (en) 2020-12-16 2020-12-16 Scanning method, storage medium, electronic device, and scanning device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011488681.2A CN112615975B (en) 2020-12-16 2020-12-16 Scanning method, storage medium, electronic device, and scanning device

Publications (2)

Publication Number Publication Date
CN112615975A true CN112615975A (en) 2021-04-06
CN112615975B CN112615975B (en) 2022-07-22

Family

ID=75239728

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011488681.2A Active CN112615975B (en) 2020-12-16 2020-12-16 Scanning method, storage medium, electronic device, and scanning device

Country Status (1)

Country Link
CN (1) CN112615975B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113393363A (en) * 2021-06-29 2021-09-14 合肥高维数据技术有限公司 Watermark embedding method, watermark extracting method, storage medium and electronic equipment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5745604A (en) * 1993-11-18 1998-04-28 Digimarc Corporation Identification/authentication system using robust, distributed coding
CN107622470A (en) * 2017-09-01 2018-01-23 杭州趣维科技有限公司 A kind of real-time robust embedding algorithm and extracting method based on Quick Response Code
CN108053371A (en) * 2017-11-30 2018-05-18 努比亚技术有限公司 A kind of image processing method, terminal and computer readable storage medium
CN109427029A (en) * 2017-08-21 2019-03-05 苏宁云商集团股份有限公司 A kind of method and device generating watermark
CN109816077A (en) * 2019-01-16 2019-05-28 王诗会 A kind of hidden method of two-dimensional barcode information, device, electronic equipment and storage medium
CN111010490A (en) * 2019-12-12 2020-04-14 上海众源网络有限公司 Watermark adding method, watermark adding device, electronic equipment and computer readable storage medium
CN111737662A (en) * 2020-06-16 2020-10-02 北京达佳互联信息技术有限公司 Watermark adding method, watermark extracting method, watermark adding device, watermark extracting device and electronic equipment
CN112085643A (en) * 2020-08-24 2020-12-15 中国人民公安大学 Image desensitization processing method, verification method, device, equipment and medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5745604A (en) * 1993-11-18 1998-04-28 Digimarc Corporation Identification/authentication system using robust, distributed coding
CN109427029A (en) * 2017-08-21 2019-03-05 苏宁云商集团股份有限公司 A kind of method and device generating watermark
CN107622470A (en) * 2017-09-01 2018-01-23 杭州趣维科技有限公司 A kind of real-time robust embedding algorithm and extracting method based on Quick Response Code
CN108053371A (en) * 2017-11-30 2018-05-18 努比亚技术有限公司 A kind of image processing method, terminal and computer readable storage medium
CN109816077A (en) * 2019-01-16 2019-05-28 王诗会 A kind of hidden method of two-dimensional barcode information, device, electronic equipment and storage medium
CN111010490A (en) * 2019-12-12 2020-04-14 上海众源网络有限公司 Watermark adding method, watermark adding device, electronic equipment and computer readable storage medium
CN111737662A (en) * 2020-06-16 2020-10-02 北京达佳互联信息技术有限公司 Watermark adding method, watermark extracting method, watermark adding device, watermark extracting device and electronic equipment
CN112085643A (en) * 2020-08-24 2020-12-15 中国人民公安大学 Image desensitization processing method, verification method, device, equipment and medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
NOUR EL-HOUDA GOLÉA等: "A bind RGB color image watermarking based on singular value decomposition", 《ACS/IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS - AICCSA 2010》 *
底亚峰: "基于变换域的可移除及高鲁棒性数字水印研究", 《中国优秀硕士学位论文全文数据库(电子期刊)》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113393363A (en) * 2021-06-29 2021-09-14 合肥高维数据技术有限公司 Watermark embedding method, watermark extracting method, storage medium and electronic equipment
CN113393363B (en) * 2021-06-29 2024-05-07 合肥高维数据技术有限公司 Watermark embedding and extracting method, storage medium and electronic device

Also Published As

Publication number Publication date
CN112615975B (en) 2022-07-22

Similar Documents

Publication Publication Date Title
Iakovidou et al. Content-aware detection of JPEG grid inconsistencies for intuitive image forensics
CN110705405B (en) Target labeling method and device
CN108961138B (en) Watermark data embedding and extracting method
CN101443785B (en) Detecting compositing in a previously conpressed image
US10430687B2 (en) Trademark graph element identification method, apparatus and system, and computer storage medium
CN108549836B (en) Photo copying detection method, device, equipment and readable storage medium
Qu et al. Detect digital image splicing with visual cues
CN110532746B (en) Face checking method, device, server and readable storage medium
WO2009094446A1 (en) Method and apparatus for cropping images
CN112615975B (en) Scanning method, storage medium, electronic device, and scanning device
KR101960290B1 (en) Method for embedding and extraction of watermarking data
CN111445058A (en) Data analysis method, device, equipment and computer readable storage medium
CN110210467B (en) Formula positioning method of text image, image processing device and storage medium
CN112699919B (en) Wood identification method and device based on three-dimensional convolutional neural network model
CN112581549B (en) Picture tracing method, storage medium, electronic device and host device
CN112070748A (en) Metal oil pipe defect detection method and device
CN110263708B (en) Image source identification method, device and computer readable storage medium
JP6311557B2 (en) Watermark embedding strength setting method and computer program
CN113326749B (en) Target detection method and device, storage medium and electronic equipment
JP6006675B2 (en) Marker detection apparatus, marker detection method, and program
CN106055693A (en) Information processing method and terminal
CN107092912A (en) A kind of recognition methods of car plate and device
CN106682627A (en) Identifying method and device of palm print data
KR101972857B1 (en) Method for managing security of output document and document managing server based deep learning
CN116778563B (en) Image processing method based on teeth and attached gingiva and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant