Monitoring method and device for protecting privacy
Technical Field
The present application relates to the field of monitoring, and in particular, to a monitoring method and apparatus for protecting privacy.
Background
With the development of internet technology, the application field of video monitoring is wider and wider, including company internal monitoring, community monitoring, hospital monitoring, police monitoring and the like, each monitoring system has its own monitoring key, and one of the purposes of monitoring is to provide strong evidence when special conditions occur.
The current video monitoring system directly stores the video shot by the monitoring camera, the user can directly log in or log in the video monitoring system through an account or a password, monitoring data can be checked and randomly published on the internet, once the account or the password is leaked or the user forgets to log out the account after calling the video, video resources can be leaked, and mechanisms or individuals causing the video leakage can hardly be traced, which can cause great harm to the privacy of the concerned people and cause lower information security.
Disclosure of Invention
In view of this, an embodiment of the present disclosure provides a monitoring method and apparatus for protecting privacy, so as to solve the problem of low information security of a monitoring screen in the prior art.
The embodiment of the application provides a monitoring method for protecting privacy, which comprises the following steps:
detecting whether a target feature matched with a preset reference feature exists in the monitoring picture;
if yes, the target features in the monitoring picture are subjected to detail removal processing, and a monitoring browsing picture is obtained.
Optionally, the method further comprises:
storing the mapping relation between the detail removing processing and the target characteristic;
constructing an incidence relation between the user access authority and the mapping relation, wherein the incidence relation comprises: if the user access right is the first access right, the target characteristics are not allowed to be obtained according to the mapping relation; if the user access right is a second access right, allowing to obtain the target characteristics according to the mapping relation, and displaying a user identifier corresponding to the second access right in a browsed monitoring browsing picture; and if the user access right is the third access right, allowing the target characteristics to be obtained according to the mapping relation.
Optionally, the method further comprises:
receiving an access request for accessing the monitoring browsing picture;
and determining display content according to the user access authority of the access request and the constructed incidence relation.
Optionally, the determining the display content includes:
when the user access right is a first access right, determining the display content as the monitoring browsing picture;
when the user access right is a second access right, determining that the display content is a monitoring recovery picture for performing detail recovery processing on the monitoring browsing picture and the user identifier, wherein the user identifier is in the monitoring recovery picture;
and when the user access right is a third access right, determining that the display content is a monitoring recovery picture for performing detail recovery processing on the monitoring browsing picture.
Optionally, the determining that the display content is a monitoring recovery picture for performing detail recovery processing on the monitoring browsing picture includes:
inquiring the incidence relation, and acquiring a mapping relation corresponding to a user accessing the monitoring browsing picture;
inquiring the mapping relation, and acquiring target characteristics of the detail removing processing mapping adopted by the monitoring browsing picture;
and replacing the area of the monitoring browsing image with the target feature to remove the detail processing to obtain the monitoring recovery image.
Optionally, the detail removing process at least includes one or any combination of a blurring process, a mosaic process, a deletion process and an alternative process.
Optionally, the detail removing process includes a blurring process, and the determining that the display content is a monitoring recovery picture for performing the detail recovery process on the monitoring browsing picture includes:
and acquiring an inverse algorithm of the detail removing algorithm according to the detail removing algorithm adopted by the detail removing processing, and performing detail recovery processing on the monitored browsing image according to the inverse algorithm.
Optionally, the method further comprises:
and tracking the detected target features so as to remove details of the target features in the tracked monitoring pictures.
The embodiment of the application provides a monitoring device of protection privacy, includes:
the detection module is used for detecting whether a target feature matched with a preset reference feature exists in the monitoring picture;
and the removing module is used for removing details of the target features in the monitoring picture after determining that the target features matched with the preset reference features exist in the monitoring picture, so as to obtain a monitoring browsing picture.
Optionally, the apparatus further comprises:
the storage module is used for storing the mapping relation between the detail removing processing and the target characteristic;
a building module, configured to build an association relationship between the user access permission and the mapping relationship, where the association relationship includes: if the user access right is the first access right, the target characteristics are not allowed to be obtained according to the mapping relation; if the user access right is a second access right, allowing to obtain the target characteristics according to the mapping relation, and displaying a user identifier corresponding to the second access right in a browsed monitoring browsing picture; and if the user access right is the third access right, allowing the target characteristics to be obtained according to the mapping relation.
The method and the device for monitoring the privacy protection can achieve the effect of protecting the privacy when the monitoring picture is displayed or called in real time after the target feature in the monitoring picture is subjected to detail removing treatment, and cannot influence the privacy of a party even if the monitoring video leaks, so that the security of the privacy information in the monitoring picture is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained from the drawings without inventive effort.
Fig. 1 is a flowchart illustrating a monitoring method for protecting privacy according to an embodiment of the present application;
fig. 2 shows a schematic structural diagram of a monitoring apparatus for protecting privacy according to a second embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all the embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present application without making any creative effort, shall fall within the protection scope of the present application.
The current video monitoring system directly stores the video shot by the monitoring camera, so that a user can directly log in or log in the video monitoring system through an account and a password, monitoring data can be checked and randomly published on the internet, and once the account and the password are leaked or the user forgets to log out the account after calling the video, the video resource is possibly leaked, and the information security is low. Based on this, embodiments of the present application provide a monitoring method and apparatus for protecting privacy, which are described below with embodiments.
Example one
An embodiment of the present application provides a monitoring method for protecting privacy, and as shown in fig. 1, a flowchart of the monitoring method for protecting privacy provided in the embodiment of the present application is provided, where the method includes:
and S101, detecting whether a target feature matched with a preset reference feature exists in the monitoring picture.
The execution subject of the embodiment of the present application is a server, in the step S101, the monitoring picture is detected through an artificial intelligence algorithm, for example, a human face detection and tracking algorithm or a target detection algorithm matches preset reference features with features in the monitoring picture, and whether target features exist in the monitoring picture is determined by calculating a similarity degree between the features in the monitoring picture and the reference features.
In the embodiment of the application, in addition to automatic detection, detection of the target feature can also designate any area in the monitoring screen as a target feature area according to the requirement of a user for privacy protection on a special area in the monitoring screen.
And S102, if yes, removing details of the target features in the monitoring picture to obtain a monitoring browsing picture.
Specifically, after the monitoring picture is detected based on the step S101, if it is detected that the monitoring picture includes the target feature, for example, the target feature is a moving face feature, the face feature is tracked by using a face detection and tracking algorithm, and the face feature in the monitoring picture is subjected to detail removal processing to obtain a monitoring browsing picture, where the moving face feature in the monitoring browsing picture is an image from which details are removed.
The detail removing processing at least includes one or any combination of blurring processing, mosaic processing, deletion processing and substitution processing.
The fuzzy processing algorithm comprises mean value fuzzy, Gaussian fuzzy, median fuzzy, binary fuzzy and the like, taking the mean value fuzzy as an example, calculating the pixel average value of all pixels of the target characteristic according to a preset formula, and adjusting all pixels of the target characteristic according to the pixel average value until the difference of the pixel points cannot be identified by naked eyes so as to achieve the fuzzy effect; the mosaic processing is to degrade the details of color gradation of target features in a monitoring picture according to a preset algorithm and cause the effect of disorder of color blocks; the deleting process and the replacing process are to extract the target characteristics in the monitoring picture and store the target characteristics in another special format, and the position of the target characteristics in the original monitoring picture is displayed as a black area or other pictures and the like.
In the embodiment of the present application, a plurality of target features in the monitoring screen may be subjected to detail removal processing at the same time, or one or more kinds of detail removal processing may be adopted, for example, the monitoring screen includes a plurality of faces and computers that need to be subjected to detail removal processing at the same time, the faces in the monitoring screen may be tracked and subjected to mosaic processing, and a display screen of a stationary computer in the monitoring screen may be subjected to deletion processing or substitution processing. By simultaneously carrying out privacy protection on a plurality of target features, the target features in the monitoring picture are in a state with higher safety.
In order to ensure the information security of the target features in the monitoring picture, the target features in the monitoring picture are uniformly processed for removing details after the monitoring picture is acquired, and when some special situations occur and it is necessary to obtain evidence from the monitoring picture, it is necessary to provide the original monitoring picture, that is, it is necessary to perform detail recovery processing on the monitoring browsing picture after the details have been removed, so in this embodiment of the present application, after the target features are processed for removing details in step S102, the mapping relationship between the details removed processing and the target features is stored, and an association relationship between the user access right and the mapping relationship is constructed, where the association relationship includes:
if the user access right is the first access right, the target characteristics are not allowed to be obtained according to the mapping relation; if the user access right is a second access right, allowing to obtain the target characteristics according to the mapping relation, and displaying a user identifier corresponding to the second access right in a browsed monitoring browsing picture; and if the user access right is the third access right, allowing the target characteristics to be obtained according to the mapping relation.
For example, in a company, the account of a security guard is set as the first access right, and at this time, the user is not allowed to obtain the target feature, that is, the user is not allowed to view the privacy area in the monitoring picture, so that the security of the privacy information in the monitoring picture is ensured;
setting the account number of the high-level leader of the company as a second access right, allowing the user to obtain the target characteristics at the moment, namely allowing the user to view the privacy area in the monitoring picture, simultaneously displaying the user identification of the currently logged-in account number in the viewed monitoring browsing picture, and once the user reveals the video, determining the people who leak by viewing the user identification on the video. In addition, one or any combination of an Identifier (ID), a physical address (MAC), a production number, and the like of the currently logged-in device may be displayed in the browsed monitoring screen;
and setting the account number with the highest leader of the company as a third access right, allowing the user to obtain the target characteristics, namely allowing the user to view the privacy area in the monitoring picture, and clearly viewing the original monitoring picture when the user needs to obtain evidence from the monitoring picture aiming at special occasions.
The user types of the access permissions are only examples, and the account number of the user can be set as different user access permissions according to actual needs.
Optionally, the server receives an access request for accessing the monitoring browsing screen; and determining the display content according to the user access authority of the access request and the constructed incidence relation.
Specifically, after receiving an access request for accessing a monitored browsing image, a server determines a user access right through a user identifier carried in the access request, and determines display content according to the user access right and a constructed association relationship, including:
(1) when the user access right is a first access right, determining the display content to be the monitoring browsing picture;
(2) when the user access right is a second access right, determining that the display content is a monitoring recovery picture for performing detail recovery processing on the monitoring browsing picture and the user identifier, wherein the user identifier is in the monitoring recovery picture;
the user with the second access right logs in the account and then displays a monitoring recovery picture after details are recovered based on the monitoring browsing picture, at present, two modes are commonly used for monitoring video leakage, one mode is that the monitoring video which is called or displayed in real time is copied after the user logs in the account, the other mode is that the monitoring video is directly shot by other camera equipment, in order to prevent the user with the second access right from being unable to trace the source after the monitoring recovery picture is leaked, the user identifier is displayed on the monitoring recovery picture at the same time, no matter which leaking mode, when the leaked monitoring recovery picture is viewed again, the last login user identification still exists on the picture, therefore, the monitoring recovery picture can be deduced to be leaked by which account or which equipment, and the method ensures that the source can be traced when the monitoring video is leaked.
The user identification can be dragged on the monitoring recovery picture, so that when a user with a second access right views the monitoring recovery picture, if the user identification shields some areas needing important viewing, the user identification can be dragged to other positions on the monitoring recovery picture, so that the areas needing important viewing in the monitoring recovery picture can be browsed, meanwhile, the user with the second access right does not have the right to delete the user identification displayed on the monitoring recovery picture, and the source tracing of the monitoring video when leaked is ensured;
(3) and when the user access right is a third access right, determining the display content to be a monitoring recovery picture for performing detail recovery processing on the monitoring browsing picture.
After the user with the third access right logs in the account, the monitoring recovery picture after recovering details is displayed, the most original monitoring picture can be ensured, the user identification is not shielded, and the process of viewing the monitoring recovery picture is ensured to be free from any processing.
In the embodiment of the application, the method for performing detail recovery processing on the monitored browsing image is to query the association relationship and obtain a mapping relationship corresponding to a user accessing the monitored browsing image; inquiring the mapping relation, and acquiring target characteristics of the detail removing processing mapping adopted by the monitoring browsing picture; and replacing the area of the monitoring browsing image with the target feature to remove the detail processing to obtain the monitoring recovery image.
Specifically, the server firstly determines the user access authority according to the received access request including the user identifier carried in the access request, and acquires the mapping relation corresponding to the user monitoring the browsing picture by inquiring the constructed association relation between the user access authority and the mapping relation, namely whether the target feature can be viewed or not. If the user access right is the first access right, the target feature is not allowed to be obtained according to the mapping relation, namely the target feature containing the privacy is not allowed to be checked; and if the user access authority is the second access authority or the third access authority, allowing the target characteristics to be obtained according to the mapping relation, obtaining the target characteristics of the detail removing processing mapping according to the mapping relation, replacing the area of the detail removing processing in the monitoring browsing picture with the target characteristics, namely recovering the monitoring browsing picture to obtain the same monitoring recovery picture as the original monitoring picture.
The detail removing processing comprises fuzzy processing, the restoring processing is described by taking the fuzzy processing as an example, an inverse algorithm of the detail removing algorithm is obtained according to the detail removing algorithm adopted by the detail removing processing, and the detail restoring processing is carried out on the monitored browsing image according to the inverse algorithm.
Specifically, firstly, identifying target features to be restored in a monitored and browsed picture, and acquiring a detail removing algorithm adopted by detail removing processing, for example, if the detail removing processing is identified to be a fuzzy processing algorithm, restoring all pixels of the target features to be restored to original pixels according to an inverse algorithm of the fuzzy processing algorithm, so as to realize detail restoring processing; for example, if the mosaic processing algorithm is adopted for detail removal processing, the detail-degraded color gradation and the disordered color blocks are restored according to the inverse algorithm of the mosaic processing algorithm, so that detail recovery processing is realized; for example, if it is recognized that the detail removing process is a deletion process or a replacement process, the target feature stored in another special format is called out, and the target feature is used to replace the area of the monitored browsing screen where the detail removing process is performed, so as to implement the detail restoring process for the monitored browsing screen.
Optionally, the detected target feature is tracked, so as to perform detail removal processing on the target feature in each tracked monitoring picture. For example, the detected face features are tracked, and the tracked face features are subjected to detail removal processing, so that the server does not need to detect and calculate each frame of image again, and the processing speed is higher.
According to the monitoring method for protecting the privacy, provided by the embodiment of the application, the target characteristics in the monitoring picture are subjected to detail removal processing, so that the effect of protecting the privacy is achieved when the monitoring picture is displayed or called in real time, even if the monitoring browsing picture is leaked out, the influence on a party is avoided, and the safety of the privacy information in the monitoring picture is improved; and determining the content displayed in the monitoring video according to the access rights of different users, including displaying the content of the recovery detail picture and simultaneously displaying the login account information, so that when the monitoring video is leaked, the personnel who leak the monitoring video can be primarily determined through the user identification in the monitoring video, and the responsibility investigation after the monitoring video is leaked is realized.
Based on the same idea, the second embodiment of the present application provides a monitoring device for protecting privacy.
Example two
An embodiment of the present application provides a monitoring device for protecting privacy, including:
the detection module 201 is configured to detect whether a target feature matched with a preset reference feature exists in the monitoring picture;
a removing module 202, configured to, after determining that a target feature matching a preset reference feature exists in the monitoring picture, perform detail removal processing on the target feature in the monitoring picture to obtain a monitoring browsing picture.
Optionally, the apparatus further comprises:
the storage module is used for storing the mapping relation between the detail removing processing and the target characteristic;
a building module, configured to build an association relationship between the user access permission and the mapping relationship, where the association relationship includes: if the user access right is the first access right, the target characteristics are not allowed to be obtained according to the mapping relation; if the user access right is a second access right, allowing to obtain the target characteristics according to the mapping relation, and displaying a user identifier corresponding to the second access right in a browsed monitoring browsing picture; and if the user access right is the third access right, allowing the target characteristics to be obtained according to the mapping relation.
Optionally, the apparatus further comprises:
the receiving module is used for receiving an access request for accessing the monitoring browsing picture;
and the determining module is used for determining the display content according to the user access authority of the access request and the constructed incidence relation.
Optionally, the determining module is specifically configured to:
when the user access right is a first access right, determining the display content as the monitoring browsing picture;
when the user access right is a second access right, determining that the display content is a monitoring recovery picture for performing detail recovery processing on the monitoring browsing picture and the user identifier, wherein the user identifier is in the monitoring recovery picture;
and when the user access right is a third access right, determining that the display content is a monitoring recovery picture for performing detail recovery processing on the monitoring browsing picture.
Optionally, the determining module is further configured to:
inquiring the incidence relation, and acquiring a mapping relation corresponding to a user accessing the monitoring browsing picture;
inquiring the mapping relation, and acquiring target characteristics of the detail removing processing mapping adopted by the monitoring browsing picture;
and replacing the area of the monitoring browsing image with the target feature to remove the detail processing to obtain the monitoring recovery image.
Optionally, the apparatus further comprises:
and the recovery module is used for acquiring an inverse algorithm of the detail removing algorithm according to the detail removing algorithm adopted by the detail removing processing, and performing detail recovery processing on the monitored browsing image according to the inverse algorithm.
Optionally, the apparatus further comprises:
and the tracking module is used for tracking the detected target features so as to remove the details of the target features in the tracked monitoring pictures.
The embodiment of the application provides a monitoring method and a device for protecting privacy, wherein the method is used for removing details of target features in a monitoring picture, so that the privacy protection effect is achieved when the monitoring picture is displayed or called in real time, even if the monitoring browsing picture is leaked out, the influence on a party is avoided, and the security of privacy information in the monitoring picture is improved; and determining the content displayed in the monitoring video according to the access rights of different users, including displaying the content of the recovery detail picture and simultaneously displaying the login account information, so that when the monitoring video is leaked, the personnel who leak the monitoring video can be primarily determined through the user identification in the monitoring video, and the responsibility investigation after the monitoring video is leaked is realized.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present application, and are used for illustrating the technical solutions of the present application, but not limiting the same, and the scope of the present application is not limited thereto, and although the present application is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope disclosed in the present application; such modifications, changes or substitutions do not depart from the spirit and scope of the present disclosure, which should be construed in light of the above teachings. Are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.