CN110113535A - End message source tracing method, device, terminal and medium - Google Patents

End message source tracing method, device, terminal and medium Download PDF

Info

Publication number
CN110113535A
CN110113535A CN201910397866.3A CN201910397866A CN110113535A CN 110113535 A CN110113535 A CN 110113535A CN 201910397866 A CN201910397866 A CN 201910397866A CN 110113535 A CN110113535 A CN 110113535A
Authority
CN
China
Prior art keywords
terminal
target image
information
identification information
image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910397866.3A
Other languages
Chinese (zh)
Inventor
鲍永伟
王虹超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Soft Intelligence Technology Co Ltd
Original Assignee
Soft Intelligence Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Soft Intelligence Technology Co Ltd filed Critical Soft Intelligence Technology Co Ltd
Priority to CN201910397866.3A priority Critical patent/CN110113535A/en
Publication of CN110113535A publication Critical patent/CN110113535A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T5/00Image enhancement or restoration
    • G06T5/10Image enhancement or restoration using non-spatial domain filtering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/20Movements or behaviour, e.g. gesture recognition
    • G06V40/23Recognition of whole body movements, e.g. for sport training
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/80Camera processing pipelines; Components thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/20Special algorithmic details
    • G06T2207/20048Transform domain processing
    • G06T2207/20056Discrete and fast Fourier transform, [DFT, FFT]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/30Subject of image; Context of image processing
    • G06T2207/30196Human being; Person
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • H04N2005/91307Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal
    • H04N2005/91335Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal the copy protection signal being a watermark

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Health & Medical Sciences (AREA)
  • Psychiatry (AREA)
  • Social Psychology (AREA)
  • Human Computer Interaction (AREA)
  • Image Processing (AREA)

Abstract

The embodiment of the invention discloses a kind of end message source tracing method, device, terminal and media, wherein this method comprises: obtaining the identification information of terminal;The target image of terminal camera captured in real-time is obtained, and utilizes the human body attitude in image recognition technology recognition target image;If identification human body attitude belongs to the behavior of taking pictures, by encoding to target image and identification information, blind watermatking is generated, and show on a terminal screen, so that tracing to the source based on the information that the blind watermatking on terminal screen reveals terminal.The effect effectively traced to the source based on the information that the blind watermatking shown on terminal screen reveals terminal may be implemented in the embodiment of the present invention, the security protection ability of information in terminal can be improved, and, the realization process of the present embodiment technical solution is simple and convenient, the generation of blind watermatking needs not rely on other external equipments, and formation efficiency is higher, will not influence the operational efficiency of terminal.

Description

End message source tracing method, device, terminal and medium
Technical field
The present embodiments relate to field of computer technology more particularly to a kind of end message source tracing methods, device, terminal And medium.
Background technique
With the fast development of computer technology, using computer carry out data storage with share it is very universal.For example, political affairs Mansion, army, company, financial institution, hospital and individual enterprise have accumulated a large amount of in relation to their employee, customer, product, research With the confidential information of finance data, most such information are collected, generate and are stored in computer, and pass through network It is transmitted in other computers.The safety for ensuring confidential information in computer is commercial demand, and morals and method Demand in rule.
Currently, the scheme for preventing confidential information from revealing is mainly by encrypting file, or the access to file The mode that permission is managed realizes that perhaps access authority is cracked or internal staff utilizes movement once password is leaked The camera function steal confidential information of terminal, after confidential information is lost, the information for the person that can not determine information stealth leads to computer The security protection ability of upper confidential information is weaker.
Summary of the invention
The embodiment of the present invention provides a kind of end message source tracing method, device, terminal and medium, is based on end panel to realize The effect that the information that the blind watermatking shown on curtain reveals terminal is effectively traced to the source improves the security protection energy of information in terminal Power.
In a first aspect, the embodiment of the invention provides a kind of end message source tracing methods, this method comprises:
Obtain the identification information of terminal;
The target image of terminal camera captured in real-time is obtained, and is identified on the target image using image recognition technology Human body attitude;
If identifying that the human body attitude belongs to the behavior of taking pictures, by the target image and the identification information into Row coding generates blind watermatking, and shows on a terminal screen, so that being revealed based on the blind watermatking on the terminal screen terminal Information trace to the source.
Second aspect, traces to the source device the embodiment of the invention also provides a kind of end message, which includes:
Terminal identification information obtains module, for obtaining the identification information of terminal;
Target image obtains module, for obtaining the target image of terminal camera captured in real-time, and utilizes image recognition Technology identifies the human body attitude on the target image;
Blind watermatking generates and display module, if for identifying that the human body attitude belongs to the behavior of taking pictures, by institute It states target image and the identification information is encoded, generate blind watermatking, and show on a terminal screen, so that being based on the end The information that blind watermatking on the screen of end reveals terminal is traced to the source.
The third aspect, the embodiment of the invention also provides a kind of terminals, comprising:
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processing Device realizes the end message source tracing method as described in any embodiment of the present invention.
Fourth aspect, the embodiment of the invention also provides a kind of computer readable storage mediums, are stored thereon with computer Program realizes the end message source tracing method as described in any embodiment of the present invention when the program is executed by processor.
The embodiment of the present invention is by utilizing artificial intelligence AI behavior monitoring technology, the mesh based on terminal camera captured in real-time Behavior of taking pictures before logo image analysing terminal, when determine for terminal take pictures behavior after, utilize currently obtain user figure Picture and terminal identification information generate blind watermatking, are shown in terminal screen, so that will during user takes pictures to terminal screen The blind watermatking is added to together on the information image of user's shooting, and the subsequent blind watermatking that can use on the information image traces back Source, so that it is determined that the leakage source of end message.The information that the embodiment of the present invention solves in terminal in the prior art is stolen Can not trace to the source afterwards and terminal on information the weak problem of security protection ability, realize based on the blind water shown on terminal screen The effect effectively traced to the source the information that terminal is revealed is printed, the security protection ability of information in terminal, also, this hair are improved The technical solution of bright embodiment realizes that process is simple and convenient, and the generation of blind watermatking needs not rely on other external equipments, and raw It is higher at efficiency, it will not influence the operational efficiency of terminal.
Detailed description of the invention
Fig. 1 is the flow chart for the end message source tracing method that the embodiment of the present invention one provides;
Fig. 2 is the flow chart of the recognition methods of human body attitude on the target image of the offer of the embodiment of the present invention one;
Fig. 3 is the flow chart of end message source tracing method provided by Embodiment 2 of the present invention;
Fig. 4 is that the end message that the embodiment of the present invention three provides is traced to the source the structural schematic diagram of device;
Fig. 5 is a kind of structural schematic diagram for terminal that the embodiment of the present invention four provides.
Specific embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining the present invention rather than limiting the invention.It also should be noted that in order to just Only the parts related to the present invention are shown in description, attached drawing rather than entire infrastructure.
Embodiment one
Fig. 1 is the flow chart for the end message source tracing method that the embodiment of the present invention one provides, and the present embodiment is applicable to work as Someone shoots terminal screen using camera, steals the confidential information in terminal, passes through the hum pattern shot to the user As being parsed, blind watermatking is obtained, thus the case where tracing to the source the information revealed in terminal, this method can be believed by terminal Breath traces to the source device to execute, which can be realized by the way of software and/or hardware, and can be integrated at the terminal.
As shown in Figure 1, end message source tracing method provided in this embodiment may include:
S110, the identification information for obtaining terminal.
In the present embodiment, before generating blind watermatking, the acquisition opportunity about terminal identification information has no specific restriction.Example Such as, can be after terminal booting, just the acquisition operation of automatic trigger terminal identification information, can also detect to machine in terminal After the access request of confidential information, the acquisition of triggering terminal identification information is operated.The identification information of terminal is for recording current end When tracing to the source in order to the subsequent information to leakage, user information and used is accurately positioned in client information and user information Terminal, specifically, the identification information of terminal include but is not limited to the MAC Address of terminal, terminal user log-on message and Current time, the log-on message of terminal user may include the uniqueness identifier such as job code of user.
S120, the target image for obtaining terminal camera captured in real-time, and utilize image recognition technology recognition target image On human body attitude.
Terminal system can enable terminal automatically simultaneously and set camera, can also detect to end after terminal booting On end after the access request of confidential information, terminal camera is enabled, captured in real-time then is carried out to the environmental information in front of terminal, Target image is obtained, and then target image is identified using image recognition technology, including determines and whether is deposited on target image In user images and the current pose of user.When determining the current pose on target image there are user images and the user Belong to the behavior of taking pictures, that is, thinking active user, there may be the possibility of steal confidential information, belong to violation or pirates shoot behavior, then touch Send out blind watermatking generation operation, be equivalent to the present embodiment terminal camera is become one by artificial intelligence AI behavior monitoring can From the terminal device of source controlling terminal information security.
Fig. 2 is as an example, show a kind of flow chart of the recognition methods of human body attitude on target image.As shown in Fig. 2, first First target image is pre-processed, including filtering is removed dryness with image enhancement etc.;The target image being then based on after pretreatment, Extract human action feature;Finally, the human action feature based on extraction, determines whether the current pose of user belongs to row of taking pictures For.
The identification information of terminal is obtained about S110 and S120 obtains target image, is had no stringent execution sequence and is limited, The identification information that terminal can be obtained first obtains target image again, can also obtain first target image and obtain terminal again Identification information.
If S130, identification human body attitude belong to the behavior of taking pictures, by being encoded to target image and identification information, Blind watermatking is generated, and is shown on a terminal screen, so that being carried out based on the blind watermatking on terminal screen to the information that terminal is revealed It traces to the source.
The present embodiment is not especially limited specific coding mode, in the stability and secret of the blind watermatking for guaranteeing to generate On the basis of property, the arbitrarily available coding mode in this field be can be used.For example, can use Fourier Transform Algorithm, respectively Encryption and Fourier transformation are carried out to target image and identification information, to generate the blind watermatking of encryption, and are shown in end panel On curtain.About the display arrangement mode of blind watermatking on a terminal screen, the present embodiment is also not especially limited, for example, can be by Blind watermatking is paved with terminal screen according to certain intervals.In addition, the target of confidential information can also be shown on terminal screen by detecting Region shows blind watermatking in the target area of terminal screen, i.e., can be according to confidential information in terminal after blind watermatking generates Display position on screen quickly adapts to the display position for sexually revising itself, so that blind watermatking is on a terminal screen Display position has flexibility.It should be noted that blind watermatking is different from common watermark, be to user's naked eyes it is sightless, Therefore, blind watermatking crypticity with higher.
In the present embodiment, blind watermatking is shown on a terminal screen, no matter specific secret whether is shown on terminal screen Information, the blind watermatking exist, i.e., the blind watermatking in the present embodiment be not for the specific information stored in terminal, but it is right Any information stored in terminal is available, subsequent to trace to the source the information being arbitrarily leaked, i.e., so that violation and robber The file information of bat has good grounds, and helps to improve the security protection ability of the information stored in terminal.
Optionally, by encoding to target image and identification information, blind watermatking is generated, comprising:
Facial image is extracted from target image;
The facial image and identification information of extraction are encoded, blind watermatking is generated.
I.e. during generating blind watermatking, information on target image can be screened, extract effective face figure One of source information as information as blind watermatking, and the background image information on target image can then abandon, and realize to redundancy Information is deleted.
Based on the above technical solution, optionally, this method further include:
Obtain the information image by being shot to terminal screen;
Information image is parsed, the blind watermatking for including on information image is obtained;
By parsing to obtained blind watermatking, the target image for including in blind watermatking and terminal identification information are determined.
After i.e. confidential information is stolen by way of taking pictures by user in terminal, the information image of user's shooting is obtained, into Row image analysis, such as the original image for being not added with blind watermatking corresponding with the confidential information make information subtraction, obtain blind watermatking Then data utilize decoding process corresponding with the coding mode used when generating blind watermatking, parse, extract to blind watermatking The information for including in blind watermatking out, so that it is determined that the terminal that the user information and user use, realizes and trace back to leakage information Source.
The technical solution of the present embodiment is clapped by utilizing artificial intelligence AI behavior monitoring technology based on terminal camera in real time Behavior of taking pictures before the target image analysing terminal taken the photograph, when determine for terminal take pictures behavior after, utilize what is currently obtained Target image and terminal identification information generate the blind watermatking of encryption, are shown in terminal screen, so that user claps terminal screen The blind watermatking is added to together on the information image of user's shooting according to during, it is subsequent to can use on the information image Blind watermatking is traced to the source, so that it is determined that the leakage source of end message, the information solved in terminal in the prior art are stolen Can not trace to the source afterwards and terminal on information the weak problem of security protection ability, realize based on the blind water shown on terminal screen The effect effectively traced to the source the information that terminal is revealed is printed, the security protection ability of information in terminal is improved;Also, this reality The technical solution for applying example realizes that process is simple and convenient, and the generation of blind watermatking needs not rely on other external equipments, and generates effect Rate is higher, will not influence the operational efficiency of terminal.
Embodiment two
Fig. 3 is the flow chart of end message source tracing method provided by Embodiment 2 of the present invention, and the present embodiment is in above-mentioned reality Further progress optimizes on the basis of applying example.As shown in figure 3, this method may include:
S210, the identification information for obtaining terminal.
S220, the target image for obtaining terminal camera captured in real-time, and utilize image recognition technology recognition target image On human body attitude.
If S230, identification human body attitude belong to the behavior of taking pictures, the pixel of target image is extracted, and according to predetermined order Rule rearranges the pixel order of target image.
For example, using the key of setting, according to the corresponding relationship of key and pixel arrangement rule, to the pixel of target image Sequence rearranges, and is equivalent to the pixel original alignment sequence by upsetting target image, improves the crypticity of blind watermatking information With safety.The pixel arrangement sequence of target image upsets process and belongs to reversible process, using the key of setting, can determine and adopt Pixel arrangement rule, during tracing to the source the information that terminal is revealed, based on obtained blind watermatking data, utilizes this The inverse process of pixel arrangement rule arranges the pixel of target image in blind watermatking, and the pixel that can restore target image is former Beginning puts in order.
If what is utilized is the facial image extracted from target image, then extracts the people during generating blind watermatking The pixel of face image, and execute pixel order and rearrange operation and Fourier transform operation.
In addition, when identify human body attitude belong to take pictures behavior after, the present embodiment can also include: generate end message let out The warning information of dew, and management level are sent to, so that management level take corresponding safeguard procedures in time, interrupt stealing for active user Behavior.
S240, pixel order is rearranged after target image carry out Fourier transformation, obtain the frequency spectrum of target image Information.
S250, the identification information of terminal is encoded, obtains the spectrum information of the identification information.
Target image and identification information are encoded respectively in the present embodiment, obtain target image spectrum information and The spectrum information of identification information.
S260, the spectrum information of the spectrum information of target image and identification information is overlapped, obtains target spectrum letter Breath.
It should be noted that this effect will disperse when increasing on frequency domain the amplitude of some signal component In time domain in each pixel, i.e., the additional information added on frequency domain is dispersion in the time domain, if directly right in the time domain Signal component addition additional information (such as existing various explicit watermarks) is all to concentrate, therefore, the hiding information on frequency domain Effect is relatively good, blind watermatking information can be made to have based on the operation on frequency domain preferable invisible.Also, the present embodiment obtains The blind watermatking arrived robustness with higher can resist most of attack, no matter carry out to the information image comprising blind watermatking The operations such as rotation, shearing, scaling or smearing, can not all destroy the blind watermatking hidden in the information image.
S270, frequency spectrum inverse transformation is carried out to target spectrum information, obtains blind watermatking.
Frequency spectrum inverse transformation refers to the spectrum information that the spectrum information of frequency domain is transformed to time domain.For being calculated using Fourier transformation When method is encoded, frequency spectrum inverse transformation carries out inverse Fourier transform to target spectrum information.In the present embodiment, adoptable Fu In leaf transformation algorithm include continuous fourier transform algorithm, Fourier space, discrete time Fourier transform algorithm, direct computation of DFT Leaf transformation etc., the variant multiplicity of Fourier Transform Algorithm, each algorithm is all extensible or is changing into another coding or adds Close mode.
S280, blind watermatking is shown on a terminal screen, so that terminal is revealed based on the blind watermatking on terminal screen Information is traced to the source.
The technical solution of the present embodiment is clapped by utilizing artificial intelligence AI behavior monitoring technology based on terminal camera in real time Behavior of taking pictures before the target image analysing terminal taken the photograph, when determine for terminal take pictures behavior after, to the mesh currently obtained Logo image executes original pixels sequence and upsets operation and Fourier transformation, obtains the spectrum information of target image, and then combine The spectrum information of the terminal identification information of acquisition carries out spectrum information superposition, obtains blind watermatking finally by frequency spectrum inverse transformation, and Display on a terminal screen, the present embodiment generate blind watermatking robustness with higher with it is invisible, improve and believe in terminal The security protection ability of breath ensure that the enforceability of tracing to the source for revealing information in terminal, solve in terminal in the prior art Information can not trace to the source after being stolen and terminal on information the weak problem of security protection ability.
Embodiment three
Fig. 4 is that the end message that the embodiment of the present invention three provides is traced to the source the structural schematic diagram of device, and the present embodiment is applicable Terminal screen is shot using camera in as someone, the confidential information in terminal is stolen, passes through the letter shot to the user Breath image is parsed, and blind watermatking is obtained, thus the case where tracing to the source the information revealed in terminal.The device can use The mode of software and/or hardware is realized, and can be integrated at the terminal.
As shown in figure 4, end message provided in this embodiment is traced to the source, device may include that terminal identification information obtains module 310, target image obtains module 320 and blind watermatking generates and display module 330, in which:
Terminal identification information obtains module 310, for obtaining the identification information of terminal;
Target image obtains module 320, knows for obtaining the target image of terminal camera captured in real-time, and using image Human body attitude in other technology recognition target image;
Blind watermatking generates and display module 330, if for identifying that human body attitude belongs to the behavior of taking pictures, by target Image and identification information are encoded, and generate blind watermatking, and show on a terminal screen, so that based on the blind water on terminal screen The information for revealing terminal is printed to trace to the source.
Optionally, the identification information of terminal includes the MAC Address of terminal and the log-on message of terminal user.
Optionally, blind watermatking, which is generated with display module 330, includes:
Facial image extraction unit, if extracted from target image for identifying that human body attitude belongs to the behavior of taking pictures Facial image;
Blind watermatking generation unit, for extraction facial image and identification information encode, generate blind watermatking;
Blind watermatking display unit, for showing on a terminal screen blind watermatking, so that based on the blind water on terminal screen The information for revealing terminal is printed to trace to the source.
Optionally, blind watermatking, which is generated with display module 330, includes:
Spectrum information determination unit, if for identifying that human body attitude belongs to the behavior of taking pictures, respectively to target image and Identification information is encoded, and the spectrum information of target image and the spectrum information of identification information are obtained;
Spectrum information superpositing unit, for folding the spectrum information of the spectrum information of target image and identification information Add, obtains target spectrum information;
Frequency spectrum inverse transformation block obtains blind watermatking for carrying out frequency spectrum inverse transformation to target spectrum information.
Optionally, spectrum information determination unit includes:
Target image pixel arrangement subelement, if extracting target figure for identifying that human body attitude belongs to the behavior of taking pictures The pixel of picture, and according to predetermined order rule, the pixel order of target image is rearranged;
Fourier transformation subelement carries out Fourier transformation for the target image after rearranging to pixel order.
Optionally, spectrum information determination unit is specifically used for:
If identification human body attitude belongs to the behavior of taking pictures, Fourier Transform Algorithm is utilized, respectively to target image and mark Know information and carry out encryption and Fourier transformation, obtains the spectrum information of target image and the spectrum information of identification information.
Optionally, the device further include:
Information image obtains module, for obtaining the information image by being shot to terminal screen;
Information image parsing module obtains the blind watermatking for including on information image for parsing to information image;
Blind watermatking parsing module, for determining the target for including in blind watermatking by parsing to obtained blind watermatking Image and terminal identification information.
End provided by any embodiment of the invention can be performed in the device of tracing to the source of end message provided by the embodiment of the present invention Client information source tracing method has the corresponding functional module of execution method and beneficial effect.Not detailed description is interior in the present embodiment Holding can be with reference to the description in any means embodiment of the present invention.
Example IV
Fig. 5 is a kind of structural schematic diagram for terminal that the embodiment of the present invention four provides.Fig. 5, which is shown, to be suitable for being used to realizing this The block diagram of the exemplary terminal 412 of invention embodiment.The terminal 412 that Fig. 5 is shown is only an example, should not be to the present invention The function and use scope of embodiment bring any restrictions.
As shown in figure 5, terminal 412 is showed in the form of general purpose terminal.The component of terminal 412 can include but is not limited to: One or more processor 416, storage device 428 connect different system components (including storage device 428 and processor 416) bus 418.
Bus 418 indicates one of a few class bus structures or a variety of, including storage device bus or storage device control Device processed, peripheral bus, graphics acceleration port, processor or total using the local of any bus structures in a variety of bus structures Line.For example, these architectures include but is not limited to industry standard architecture (Industry Subversive Alliance, ISA) bus, microchannel architecture (Micro Channel Architecture, MAC) bus is enhanced Isa bus, Video Electronics Standards Association (Video Electronics Standards Association, VESA) local are total Line and peripheral component interconnection (Peripheral Component Interconnect, PCI) bus.
Terminal 412 typically comprises a variety of computer system readable media.These media can be it is any can be by terminal The usable medium of 412 access, including volatile and non-volatile media, moveable and immovable medium.
Storage device 428 may include the computer system readable media of form of volatile memory, such as arbitrary access Memory (Random Access Memory, RAM) 430 and/or cache memory 432.Terminal 412 can be wrapped further Include other removable/nonremovable, volatile/non-volatile computer system storage mediums.Only as an example, storage system 434 can be used for reading and writing immovable, non-volatile magnetic media (Fig. 5 do not show, commonly referred to as " hard disk drive ").Although It is not shown in Fig. 5, the disc driver for reading and writing to removable non-volatile magnetic disk (such as " floppy disk ") can be provided, and To removable anonvolatile optical disk, such as CD-ROM (Compact Disc Read-Only Memory, CD-ROM), number Optic disk (Digital Video Disc-Read Only Memory, DVD-ROM) or other optical mediums) read-write CD drive Dynamic device.In these cases, each driver can be connected by one or more data media interfaces with bus 418.It deposits Storage device 428 may include at least one program product, which has one group of (for example, at least one) program module, this A little program modules are configured to perform the function of various embodiments of the present invention.
Program/utility 440 with one group of (at least one) program module 442 can store in such as storage dress It sets in 428, such program module 442 includes but is not limited to operating system, one or more application program, other program moulds It may include the realization of network environment in block and program data, each of these examples or certain combination.Program module 442 usually execute function and/or method in embodiment described in the invention.
Terminal 412 can also be logical with one or more external equipments 414 (such as keyboard, direction terminal, display 424 etc.) Letter, can also be enabled a user to one or more terminal interact with the terminal 412 communicate, and/or with make the terminal 412 Any terminal (such as network interface card, modem etc.) communication that can be communicated with one or more of the other computing terminal.This Kind communication can be carried out by input/output (I/O) interface 422.Also, terminal 412 can also by network adapter 420 with One or more network (such as local area network (Local Area Network, LAN), wide area network (Wide Area Network, WAN) and/or public network, for example, internet) communication.As shown in figure 5, network adapter 420 passes through bus 418 and terminal 412 Other modules communication.It should be understood that although not shown in the drawings, other hardware and/or software mould can be used in conjunction with terminal 412 Block, including but not limited to: microcode, device driver, redundant processor, external disk drive array, disk array (Redundant Arrays of Independent Disks, RAID) system, tape drive and data backup storage system System etc..
The program that processor 416 is stored in storage device 428 by operation, thereby executing various function application and number According to processing, such as realize end message source tracing method provided by any embodiment of the invention, this method may include:
Obtain the identification information of terminal;
The target image of terminal camera captured in real-time is obtained, and is identified on the target image using image recognition technology Human body attitude;
If identifying that the human body attitude belongs to the behavior of taking pictures, by the target image and the identification information into Row coding generates blind watermatking, and shows on a terminal screen, so that being revealed based on the blind watermatking on the terminal screen terminal Information trace to the source.
Embodiment five
The embodiment of the present invention five additionally provides a kind of computer readable storage medium, is stored thereon with computer program, should Realize that such as end message source tracing method provided by any embodiment of the invention, this method can wrap when program is executed by processor It includes:
Obtain the identification information of terminal;
The target image of terminal camera captured in real-time is obtained, and is identified on the target image using image recognition technology Human body attitude;
If identifying that the human body attitude belongs to the behavior of taking pictures, by the target image and the identification information into Row coding generates blind watermatking, and shows on a terminal screen, so that being revealed based on the blind watermatking on the terminal screen terminal Information trace to the source.
The computer storage medium of the embodiment of the present invention, can be using any of one or more computer-readable media Combination.Computer-readable medium can be computer-readable signal media or computer readable storage medium.It is computer-readable Storage medium for example may be-but not limited to-the system of electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, device or Device, or any above combination.The more specific example (non exhaustive list) of computer readable storage medium includes: tool There are electrical connection, the portable computer diskette, hard disk, random access memory (RAM), read-only memory of one or more conducting wires (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD- ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.In this document, computer-readable storage Medium can be any tangible medium for including or store program, which can be commanded execution system, device or device Using or it is in connection.
Computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal, Wherein carry computer-readable program code.The data-signal of this propagation can take various forms, including but unlimited In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can Any computer-readable medium other than storage medium is read, which can send, propagates or transmit and be used for By the use of instruction execution system, device or device or program in connection.
The program code for including on computer-readable medium can transmit with any suitable medium, including --- but it is unlimited In wireless, electric wire, optical cable, RF etc. or above-mentioned any appropriate combination.
The computer for executing operation of the present invention can be write with one or more programming languages or combinations thereof Program code, described program design language include object oriented program language-such as Java, Smalltalk, C++, It further include conventional procedural programming language-such as " C " language or similar programming language.Program code can be with It fully executes, partly execute on the user computer on the user computer, being executed as an independent software package, portion Divide and partially executes or executed on remote computer or terminal completely on the remote computer on the user computer.It is relating to And in the situation of remote computer, remote computer can pass through the network of any kind --- including local area network (LAN) or extensively Domain net (WAN)-be connected to subscriber computer, or, it may be connected to outer computer (such as provided using Internet service Quotient is connected by internet).
Note that the above is only a better embodiment of the present invention and the applied technical principle.It will be appreciated by those skilled in the art that The invention is not limited to the specific embodiments described herein, be able to carry out for a person skilled in the art it is various it is apparent variation, It readjusts and substitutes without departing from protection scope of the present invention.Therefore, although being carried out by above embodiments to the present invention It is described in further detail, but the present invention is not limited to the above embodiments only, without departing from the inventive concept, also It may include more other equivalent embodiments, and the scope of the invention is determined by the scope of the appended claims.

Claims (10)

1. a kind of end message source tracing method characterized by comprising
Obtain the identification information of terminal;
The target image of terminal camera captured in real-time is obtained, and identifies the people on the target image using image recognition technology Body posture;
If identifying that the human body attitude belongs to the behavior of taking pictures, by being compiled to the target image and the identification information Code is generated blind watermatking, and shown on a terminal screen, so that the letter revealed based on the blind watermatking on the terminal screen terminal Breath is traced to the source.
2. the method according to claim 1, wherein the identification information of the terminal includes the MAC of the terminal The log-on message of address and terminal user.
3. the method according to claim 1, wherein by the target image and identification information progress Coding generates blind watermatking, comprising:
Facial image is extracted from the target image;
Facial image and the identification information to extraction encode, and generate the blind watermatking.
4. the method according to claim 1, wherein by the target image and identification information progress Coding generates blind watermatking, comprising:
The target image and the identification information are encoded respectively, obtain the spectrum information of the target image and described The spectrum information of identification information;
The spectrum information of the spectrum information of the target image and the identification information is overlapped, target spectrum letter is obtained Breath;
Frequency spectrum inverse transformation is carried out to the target spectrum information, obtains the blind watermatking.
5. according to the method described in claim 4, it is characterized in that, being encoded to the target image, comprising:
The pixel of the target image is extracted, and according to predetermined order rule, the pixel order of the target image is arranged again Column;
Target image after rearranging to pixel order carries out Fourier transformation.
6. the method stated according to claim 4, which is characterized in that compiled respectively to the target image and the identification information Code, comprising:
Using Fourier Transform Algorithm, encryption and Fourier transformation are carried out to the target image and the identification information respectively.
7. the method stated according to claim 1, which is characterized in that the method also includes:
Obtain the information image by being shot to the terminal screen;
The information image is parsed, the blind watermatking for including on the information image is obtained;
By parsing to obtained blind watermatking, the target image for including in the blind watermatking and terminal identification information are determined.
The device 8. a kind of end message is traced to the source characterized by comprising
Terminal identification information obtains module, for obtaining the identification information of terminal;
Target image obtains module, for obtaining the target image of terminal camera captured in real-time, and utilizes image recognition technology Identify the human body attitude on the target image;
Blind watermatking generates and display module, if for identifying that the human body attitude belongs to the behavior of taking pictures, by the mesh Logo image and the identification information are encoded, and blind watermatking is generated, and are shown on a terminal screen, so that being based on the end panel The information that blind watermatking on curtain reveals terminal is traced to the source.
9. a kind of terminal characterized by comprising
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processors are real The now end message source tracing method as described in any in claim 1-7.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor The end message source tracing method as described in any in claim 1-7 is realized when execution.
CN201910397866.3A 2019-05-14 2019-05-14 End message source tracing method, device, terminal and medium Pending CN110113535A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910397866.3A CN110113535A (en) 2019-05-14 2019-05-14 End message source tracing method, device, terminal and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910397866.3A CN110113535A (en) 2019-05-14 2019-05-14 End message source tracing method, device, terminal and medium

Publications (1)

Publication Number Publication Date
CN110113535A true CN110113535A (en) 2019-08-09

Family

ID=67489982

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910397866.3A Pending CN110113535A (en) 2019-05-14 2019-05-14 End message source tracing method, device, terminal and medium

Country Status (1)

Country Link
CN (1) CN110113535A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110602455A (en) * 2019-09-10 2019-12-20 腾讯科技(深圳)有限公司 Video storage system, video processing method, device, equipment and storage medium
CN111932432A (en) * 2020-10-14 2020-11-13 腾讯科技(深圳)有限公司 Blind watermark implanting method, blind watermark detecting method, blind watermark implanting device, blind watermark detecting equipment and storage medium
CN112598564A (en) * 2020-12-26 2021-04-02 中国农业银行股份有限公司 Information recording and information tracing method and device
CN112616056A (en) * 2020-12-18 2021-04-06 广州虎牙科技有限公司 Reporting alarm method and device based on watermark monitoring
CN112954403A (en) * 2019-11-26 2021-06-11 腾讯科技(深圳)有限公司 Video encryption method, device, equipment and storage medium
CN114067441A (en) * 2022-01-14 2022-02-18 合肥高维数据技术有限公司 Shooting and recording behavior detection method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110212717A1 (en) * 2008-08-19 2011-09-01 Rhoads Geoffrey B Methods and Systems for Content Processing
CN106792268A (en) * 2017-02-27 2017-05-31 首影科技(深圳)有限公司 The playing device and player method of the person's of copying illegally information can be reviewed
CN107748847A (en) * 2017-10-11 2018-03-02 惠州Tcl移动通信有限公司 A kind of browsing method, storage medium and the mobile terminal of user's secret file
CN108492238A (en) * 2018-03-07 2018-09-04 小明太极(湖北)国漫文化有限公司 Blind watermatking embedding grammar and extracting method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110212717A1 (en) * 2008-08-19 2011-09-01 Rhoads Geoffrey B Methods and Systems for Content Processing
CN106792268A (en) * 2017-02-27 2017-05-31 首影科技(深圳)有限公司 The playing device and player method of the person's of copying illegally information can be reviewed
CN107748847A (en) * 2017-10-11 2018-03-02 惠州Tcl移动通信有限公司 A kind of browsing method, storage medium and the mobile terminal of user's secret file
CN108492238A (en) * 2018-03-07 2018-09-04 小明太极(湖北)国漫文化有限公司 Blind watermatking embedding grammar and extracting method

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110602455A (en) * 2019-09-10 2019-12-20 腾讯科技(深圳)有限公司 Video storage system, video processing method, device, equipment and storage medium
CN112954403A (en) * 2019-11-26 2021-06-11 腾讯科技(深圳)有限公司 Video encryption method, device, equipment and storage medium
CN112954403B (en) * 2019-11-26 2023-02-17 深圳市雅阅科技有限公司 Video encryption method, device, equipment and storage medium
CN111932432A (en) * 2020-10-14 2020-11-13 腾讯科技(深圳)有限公司 Blind watermark implanting method, blind watermark detecting method, blind watermark implanting device, blind watermark detecting equipment and storage medium
CN111932432B (en) * 2020-10-14 2021-01-15 腾讯科技(深圳)有限公司 Blind watermark implanting method, blind watermark detecting method, blind watermark implanting device, blind watermark detecting equipment and storage medium
CN112616056A (en) * 2020-12-18 2021-04-06 广州虎牙科技有限公司 Reporting alarm method and device based on watermark monitoring
CN112616056B (en) * 2020-12-18 2023-04-07 广州虎牙科技有限公司 Reporting alarm method and device based on watermark monitoring
CN112598564A (en) * 2020-12-26 2021-04-02 中国农业银行股份有限公司 Information recording and information tracing method and device
CN114067441A (en) * 2022-01-14 2022-02-18 合肥高维数据技术有限公司 Shooting and recording behavior detection method and system

Similar Documents

Publication Publication Date Title
CN110113535A (en) End message source tracing method, device, terminal and medium
Schneegass et al. Smudgesafe: Geometric image transformations for smudge-resistant user authentication
CN106503655B (en) A kind of electric endorsement method and sign test method based on face recognition technology
Yu et al. Privacy protecting visual processing for secure video surveillance
CN104239815A (en) Electronic document encryption and decryption method and method based on iris identification
JP2011129096A (en) Method and device of for privacy masking image
CN110175573B (en) Face and iris coding and verification method, system and computer storage medium
CN110414271A (en) A kind of private data guard method, device and computer readable storage medium
Yu et al. Intelligent video data security: a survey and open challenges
CN104680055A (en) Control method for performing management on U disk after access into industrial control system network
CN106101140B (en) A kind of method and server of authentification of message
Luo et al. Anonymous subject identification and privacy information management in video surveillance
CN110516775B (en) User secret information hiding method based on QR code
Yusuf et al. A survey of biometric approaches of authentication
Saraswathi et al. Retinal biometrics based authentication and key exchange system
CN110069907A (en) Big data source tracing method and system based on digital watermarking
Pic et al. Remote KYC: Attacks and counter-measures
Ara et al. An efficient privacy-preserving user authentication scheme using image processing and blockchain technologies
Prabhu Image based authentication using illusion pin for shoulder surfing attack
CN113033243A (en) Face recognition method, device and equipment
CN113254904B (en) Intelligent processing method, device, equipment and medium for multi-dimensional information acquisition and identification
CN115134473B (en) Image encryption method and device
Dutta et al. A secure algorithm for biometric-based digital image watermarking in DCT domain
CN110706145A (en) Reversible remote sensing image information hiding method and device
CN204926093U (en) Computer information safety protection system based on face identification technique

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190809