CN110113535A - End message source tracing method, device, terminal and medium - Google Patents
End message source tracing method, device, terminal and medium Download PDFInfo
- Publication number
- CN110113535A CN110113535A CN201910397866.3A CN201910397866A CN110113535A CN 110113535 A CN110113535 A CN 110113535A CN 201910397866 A CN201910397866 A CN 201910397866A CN 110113535 A CN110113535 A CN 110113535A
- Authority
- CN
- China
- Prior art keywords
- terminal
- target image
- information
- identification information
- image
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 48
- 238000005516 engineering process Methods 0.000 claims abstract description 16
- 238000001228 spectrum Methods 0.000 claims description 39
- 230000009466 transformation Effects 0.000 claims description 18
- 230000001815 facial effect Effects 0.000 claims description 8
- 238000000605 extraction Methods 0.000 claims description 5
- 238000004590 computer program Methods 0.000 claims description 3
- 230000000694 effects Effects 0.000 abstract description 7
- 230000015572 biosynthetic process Effects 0.000 abstract 1
- 230000006399 behavior Effects 0.000 description 25
- 238000010586 diagram Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 5
- 238000013473 artificial intelligence Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 4
- 239000000284 extract Substances 0.000 description 4
- 230000005291 magnetic effect Effects 0.000 description 4
- 238000012544 monitoring process Methods 0.000 description 4
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 4
- 230000002093 peripheral effect Effects 0.000 description 3
- 238000007726 management method Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 239000012141 concentrate Substances 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 239000006185 dispersion Substances 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 238000010191 image analysis Methods 0.000 description 1
- 210000003733 optic disk Anatomy 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000002441 reversible effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000010008 shearing Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T5/00—Image enhancement or restoration
- G06T5/10—Image enhancement or restoration using non-spatial domain filtering
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/20—Movements or behaviour, e.g. gesture recognition
- G06V40/23—Recognition of whole body movements, e.g. for sport training
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N23/00—Cameras or camera modules comprising electronic image sensors; Control thereof
- H04N23/80—Camera processing pipelines; Components thereof
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2207/00—Indexing scheme for image analysis or image enhancement
- G06T2207/20—Special algorithmic details
- G06T2207/20048—Transform domain processing
- G06T2207/20056—Discrete and fast Fourier transform, [DFT, FFT]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2207/00—Indexing scheme for image analysis or image enhancement
- G06T2207/30—Subject of image; Context of image processing
- G06T2207/30196—Human being; Person
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N5/00—Details of television systems
- H04N5/76—Television signal recording
- H04N5/91—Television signal processing therefor
- H04N5/913—Television signal processing therefor for scrambling ; for copy protection
- H04N2005/91307—Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal
- H04N2005/91335—Television signal processing therefor for scrambling ; for copy protection by adding a copy protection signal to the video signal the copy protection signal being a watermark
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Computer Vision & Pattern Recognition (AREA)
- General Health & Medical Sciences (AREA)
- Psychiatry (AREA)
- Social Psychology (AREA)
- Human Computer Interaction (AREA)
- Image Processing (AREA)
Abstract
The embodiment of the invention discloses a kind of end message source tracing method, device, terminal and media, wherein this method comprises: obtaining the identification information of terminal;The target image of terminal camera captured in real-time is obtained, and utilizes the human body attitude in image recognition technology recognition target image;If identification human body attitude belongs to the behavior of taking pictures, by encoding to target image and identification information, blind watermatking is generated, and show on a terminal screen, so that tracing to the source based on the information that the blind watermatking on terminal screen reveals terminal.The effect effectively traced to the source based on the information that the blind watermatking shown on terminal screen reveals terminal may be implemented in the embodiment of the present invention, the security protection ability of information in terminal can be improved, and, the realization process of the present embodiment technical solution is simple and convenient, the generation of blind watermatking needs not rely on other external equipments, and formation efficiency is higher, will not influence the operational efficiency of terminal.
Description
Technical field
The present embodiments relate to field of computer technology more particularly to a kind of end message source tracing methods, device, terminal
And medium.
Background technique
With the fast development of computer technology, using computer carry out data storage with share it is very universal.For example, political affairs
Mansion, army, company, financial institution, hospital and individual enterprise have accumulated a large amount of in relation to their employee, customer, product, research
With the confidential information of finance data, most such information are collected, generate and are stored in computer, and pass through network
It is transmitted in other computers.The safety for ensuring confidential information in computer is commercial demand, and morals and method
Demand in rule.
Currently, the scheme for preventing confidential information from revealing is mainly by encrypting file, or the access to file
The mode that permission is managed realizes that perhaps access authority is cracked or internal staff utilizes movement once password is leaked
The camera function steal confidential information of terminal, after confidential information is lost, the information for the person that can not determine information stealth leads to computer
The security protection ability of upper confidential information is weaker.
Summary of the invention
The embodiment of the present invention provides a kind of end message source tracing method, device, terminal and medium, is based on end panel to realize
The effect that the information that the blind watermatking shown on curtain reveals terminal is effectively traced to the source improves the security protection energy of information in terminal
Power.
In a first aspect, the embodiment of the invention provides a kind of end message source tracing methods, this method comprises:
Obtain the identification information of terminal;
The target image of terminal camera captured in real-time is obtained, and is identified on the target image using image recognition technology
Human body attitude;
If identifying that the human body attitude belongs to the behavior of taking pictures, by the target image and the identification information into
Row coding generates blind watermatking, and shows on a terminal screen, so that being revealed based on the blind watermatking on the terminal screen terminal
Information trace to the source.
Second aspect, traces to the source device the embodiment of the invention also provides a kind of end message, which includes:
Terminal identification information obtains module, for obtaining the identification information of terminal;
Target image obtains module, for obtaining the target image of terminal camera captured in real-time, and utilizes image recognition
Technology identifies the human body attitude on the target image;
Blind watermatking generates and display module, if for identifying that the human body attitude belongs to the behavior of taking pictures, by institute
It states target image and the identification information is encoded, generate blind watermatking, and show on a terminal screen, so that being based on the end
The information that blind watermatking on the screen of end reveals terminal is traced to the source.
The third aspect, the embodiment of the invention also provides a kind of terminals, comprising:
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processing
Device realizes the end message source tracing method as described in any embodiment of the present invention.
Fourth aspect, the embodiment of the invention also provides a kind of computer readable storage mediums, are stored thereon with computer
Program realizes the end message source tracing method as described in any embodiment of the present invention when the program is executed by processor.
The embodiment of the present invention is by utilizing artificial intelligence AI behavior monitoring technology, the mesh based on terminal camera captured in real-time
Behavior of taking pictures before logo image analysing terminal, when determine for terminal take pictures behavior after, utilize currently obtain user figure
Picture and terminal identification information generate blind watermatking, are shown in terminal screen, so that will during user takes pictures to terminal screen
The blind watermatking is added to together on the information image of user's shooting, and the subsequent blind watermatking that can use on the information image traces back
Source, so that it is determined that the leakage source of end message.The information that the embodiment of the present invention solves in terminal in the prior art is stolen
Can not trace to the source afterwards and terminal on information the weak problem of security protection ability, realize based on the blind water shown on terminal screen
The effect effectively traced to the source the information that terminal is revealed is printed, the security protection ability of information in terminal, also, this hair are improved
The technical solution of bright embodiment realizes that process is simple and convenient, and the generation of blind watermatking needs not rely on other external equipments, and raw
It is higher at efficiency, it will not influence the operational efficiency of terminal.
Detailed description of the invention
Fig. 1 is the flow chart for the end message source tracing method that the embodiment of the present invention one provides;
Fig. 2 is the flow chart of the recognition methods of human body attitude on the target image of the offer of the embodiment of the present invention one;
Fig. 3 is the flow chart of end message source tracing method provided by Embodiment 2 of the present invention;
Fig. 4 is that the end message that the embodiment of the present invention three provides is traced to the source the structural schematic diagram of device;
Fig. 5 is a kind of structural schematic diagram for terminal that the embodiment of the present invention four provides.
Specific embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched
The specific embodiment stated is used only for explaining the present invention rather than limiting the invention.It also should be noted that in order to just
Only the parts related to the present invention are shown in description, attached drawing rather than entire infrastructure.
Embodiment one
Fig. 1 is the flow chart for the end message source tracing method that the embodiment of the present invention one provides, and the present embodiment is applicable to work as
Someone shoots terminal screen using camera, steals the confidential information in terminal, passes through the hum pattern shot to the user
As being parsed, blind watermatking is obtained, thus the case where tracing to the source the information revealed in terminal, this method can be believed by terminal
Breath traces to the source device to execute, which can be realized by the way of software and/or hardware, and can be integrated at the terminal.
As shown in Figure 1, end message source tracing method provided in this embodiment may include:
S110, the identification information for obtaining terminal.
In the present embodiment, before generating blind watermatking, the acquisition opportunity about terminal identification information has no specific restriction.Example
Such as, can be after terminal booting, just the acquisition operation of automatic trigger terminal identification information, can also detect to machine in terminal
After the access request of confidential information, the acquisition of triggering terminal identification information is operated.The identification information of terminal is for recording current end
When tracing to the source in order to the subsequent information to leakage, user information and used is accurately positioned in client information and user information
Terminal, specifically, the identification information of terminal include but is not limited to the MAC Address of terminal, terminal user log-on message and
Current time, the log-on message of terminal user may include the uniqueness identifier such as job code of user.
S120, the target image for obtaining terminal camera captured in real-time, and utilize image recognition technology recognition target image
On human body attitude.
Terminal system can enable terminal automatically simultaneously and set camera, can also detect to end after terminal booting
On end after the access request of confidential information, terminal camera is enabled, captured in real-time then is carried out to the environmental information in front of terminal,
Target image is obtained, and then target image is identified using image recognition technology, including determines and whether is deposited on target image
In user images and the current pose of user.When determining the current pose on target image there are user images and the user
Belong to the behavior of taking pictures, that is, thinking active user, there may be the possibility of steal confidential information, belong to violation or pirates shoot behavior, then touch
Send out blind watermatking generation operation, be equivalent to the present embodiment terminal camera is become one by artificial intelligence AI behavior monitoring can
From the terminal device of source controlling terminal information security.
Fig. 2 is as an example, show a kind of flow chart of the recognition methods of human body attitude on target image.As shown in Fig. 2, first
First target image is pre-processed, including filtering is removed dryness with image enhancement etc.;The target image being then based on after pretreatment,
Extract human action feature;Finally, the human action feature based on extraction, determines whether the current pose of user belongs to row of taking pictures
For.
The identification information of terminal is obtained about S110 and S120 obtains target image, is had no stringent execution sequence and is limited,
The identification information that terminal can be obtained first obtains target image again, can also obtain first target image and obtain terminal again
Identification information.
If S130, identification human body attitude belong to the behavior of taking pictures, by being encoded to target image and identification information,
Blind watermatking is generated, and is shown on a terminal screen, so that being carried out based on the blind watermatking on terminal screen to the information that terminal is revealed
It traces to the source.
The present embodiment is not especially limited specific coding mode, in the stability and secret of the blind watermatking for guaranteeing to generate
On the basis of property, the arbitrarily available coding mode in this field be can be used.For example, can use Fourier Transform Algorithm, respectively
Encryption and Fourier transformation are carried out to target image and identification information, to generate the blind watermatking of encryption, and are shown in end panel
On curtain.About the display arrangement mode of blind watermatking on a terminal screen, the present embodiment is also not especially limited, for example, can be by
Blind watermatking is paved with terminal screen according to certain intervals.In addition, the target of confidential information can also be shown on terminal screen by detecting
Region shows blind watermatking in the target area of terminal screen, i.e., can be according to confidential information in terminal after blind watermatking generates
Display position on screen quickly adapts to the display position for sexually revising itself, so that blind watermatking is on a terminal screen
Display position has flexibility.It should be noted that blind watermatking is different from common watermark, be to user's naked eyes it is sightless,
Therefore, blind watermatking crypticity with higher.
In the present embodiment, blind watermatking is shown on a terminal screen, no matter specific secret whether is shown on terminal screen
Information, the blind watermatking exist, i.e., the blind watermatking in the present embodiment be not for the specific information stored in terminal, but it is right
Any information stored in terminal is available, subsequent to trace to the source the information being arbitrarily leaked, i.e., so that violation and robber
The file information of bat has good grounds, and helps to improve the security protection ability of the information stored in terminal.
Optionally, by encoding to target image and identification information, blind watermatking is generated, comprising:
Facial image is extracted from target image;
The facial image and identification information of extraction are encoded, blind watermatking is generated.
I.e. during generating blind watermatking, information on target image can be screened, extract effective face figure
One of source information as information as blind watermatking, and the background image information on target image can then abandon, and realize to redundancy
Information is deleted.
Based on the above technical solution, optionally, this method further include:
Obtain the information image by being shot to terminal screen;
Information image is parsed, the blind watermatking for including on information image is obtained;
By parsing to obtained blind watermatking, the target image for including in blind watermatking and terminal identification information are determined.
After i.e. confidential information is stolen by way of taking pictures by user in terminal, the information image of user's shooting is obtained, into
Row image analysis, such as the original image for being not added with blind watermatking corresponding with the confidential information make information subtraction, obtain blind watermatking
Then data utilize decoding process corresponding with the coding mode used when generating blind watermatking, parse, extract to blind watermatking
The information for including in blind watermatking out, so that it is determined that the terminal that the user information and user use, realizes and trace back to leakage information
Source.
The technical solution of the present embodiment is clapped by utilizing artificial intelligence AI behavior monitoring technology based on terminal camera in real time
Behavior of taking pictures before the target image analysing terminal taken the photograph, when determine for terminal take pictures behavior after, utilize what is currently obtained
Target image and terminal identification information generate the blind watermatking of encryption, are shown in terminal screen, so that user claps terminal screen
The blind watermatking is added to together on the information image of user's shooting according to during, it is subsequent to can use on the information image
Blind watermatking is traced to the source, so that it is determined that the leakage source of end message, the information solved in terminal in the prior art are stolen
Can not trace to the source afterwards and terminal on information the weak problem of security protection ability, realize based on the blind water shown on terminal screen
The effect effectively traced to the source the information that terminal is revealed is printed, the security protection ability of information in terminal is improved;Also, this reality
The technical solution for applying example realizes that process is simple and convenient, and the generation of blind watermatking needs not rely on other external equipments, and generates effect
Rate is higher, will not influence the operational efficiency of terminal.
Embodiment two
Fig. 3 is the flow chart of end message source tracing method provided by Embodiment 2 of the present invention, and the present embodiment is in above-mentioned reality
Further progress optimizes on the basis of applying example.As shown in figure 3, this method may include:
S210, the identification information for obtaining terminal.
S220, the target image for obtaining terminal camera captured in real-time, and utilize image recognition technology recognition target image
On human body attitude.
If S230, identification human body attitude belong to the behavior of taking pictures, the pixel of target image is extracted, and according to predetermined order
Rule rearranges the pixel order of target image.
For example, using the key of setting, according to the corresponding relationship of key and pixel arrangement rule, to the pixel of target image
Sequence rearranges, and is equivalent to the pixel original alignment sequence by upsetting target image, improves the crypticity of blind watermatking information
With safety.The pixel arrangement sequence of target image upsets process and belongs to reversible process, using the key of setting, can determine and adopt
Pixel arrangement rule, during tracing to the source the information that terminal is revealed, based on obtained blind watermatking data, utilizes this
The inverse process of pixel arrangement rule arranges the pixel of target image in blind watermatking, and the pixel that can restore target image is former
Beginning puts in order.
If what is utilized is the facial image extracted from target image, then extracts the people during generating blind watermatking
The pixel of face image, and execute pixel order and rearrange operation and Fourier transform operation.
In addition, when identify human body attitude belong to take pictures behavior after, the present embodiment can also include: generate end message let out
The warning information of dew, and management level are sent to, so that management level take corresponding safeguard procedures in time, interrupt stealing for active user
Behavior.
S240, pixel order is rearranged after target image carry out Fourier transformation, obtain the frequency spectrum of target image
Information.
S250, the identification information of terminal is encoded, obtains the spectrum information of the identification information.
Target image and identification information are encoded respectively in the present embodiment, obtain target image spectrum information and
The spectrum information of identification information.
S260, the spectrum information of the spectrum information of target image and identification information is overlapped, obtains target spectrum letter
Breath.
It should be noted that this effect will disperse when increasing on frequency domain the amplitude of some signal component
In time domain in each pixel, i.e., the additional information added on frequency domain is dispersion in the time domain, if directly right in the time domain
Signal component addition additional information (such as existing various explicit watermarks) is all to concentrate, therefore, the hiding information on frequency domain
Effect is relatively good, blind watermatking information can be made to have based on the operation on frequency domain preferable invisible.Also, the present embodiment obtains
The blind watermatking arrived robustness with higher can resist most of attack, no matter carry out to the information image comprising blind watermatking
The operations such as rotation, shearing, scaling or smearing, can not all destroy the blind watermatking hidden in the information image.
S270, frequency spectrum inverse transformation is carried out to target spectrum information, obtains blind watermatking.
Frequency spectrum inverse transformation refers to the spectrum information that the spectrum information of frequency domain is transformed to time domain.For being calculated using Fourier transformation
When method is encoded, frequency spectrum inverse transformation carries out inverse Fourier transform to target spectrum information.In the present embodiment, adoptable Fu
In leaf transformation algorithm include continuous fourier transform algorithm, Fourier space, discrete time Fourier transform algorithm, direct computation of DFT
Leaf transformation etc., the variant multiplicity of Fourier Transform Algorithm, each algorithm is all extensible or is changing into another coding or adds
Close mode.
S280, blind watermatking is shown on a terminal screen, so that terminal is revealed based on the blind watermatking on terminal screen
Information is traced to the source.
The technical solution of the present embodiment is clapped by utilizing artificial intelligence AI behavior monitoring technology based on terminal camera in real time
Behavior of taking pictures before the target image analysing terminal taken the photograph, when determine for terminal take pictures behavior after, to the mesh currently obtained
Logo image executes original pixels sequence and upsets operation and Fourier transformation, obtains the spectrum information of target image, and then combine
The spectrum information of the terminal identification information of acquisition carries out spectrum information superposition, obtains blind watermatking finally by frequency spectrum inverse transformation, and
Display on a terminal screen, the present embodiment generate blind watermatking robustness with higher with it is invisible, improve and believe in terminal
The security protection ability of breath ensure that the enforceability of tracing to the source for revealing information in terminal, solve in terminal in the prior art
Information can not trace to the source after being stolen and terminal on information the weak problem of security protection ability.
Embodiment three
Fig. 4 is that the end message that the embodiment of the present invention three provides is traced to the source the structural schematic diagram of device, and the present embodiment is applicable
Terminal screen is shot using camera in as someone, the confidential information in terminal is stolen, passes through the letter shot to the user
Breath image is parsed, and blind watermatking is obtained, thus the case where tracing to the source the information revealed in terminal.The device can use
The mode of software and/or hardware is realized, and can be integrated at the terminal.
As shown in figure 4, end message provided in this embodiment is traced to the source, device may include that terminal identification information obtains module
310, target image obtains module 320 and blind watermatking generates and display module 330, in which:
Terminal identification information obtains module 310, for obtaining the identification information of terminal;
Target image obtains module 320, knows for obtaining the target image of terminal camera captured in real-time, and using image
Human body attitude in other technology recognition target image;
Blind watermatking generates and display module 330, if for identifying that human body attitude belongs to the behavior of taking pictures, by target
Image and identification information are encoded, and generate blind watermatking, and show on a terminal screen, so that based on the blind water on terminal screen
The information for revealing terminal is printed to trace to the source.
Optionally, the identification information of terminal includes the MAC Address of terminal and the log-on message of terminal user.
Optionally, blind watermatking, which is generated with display module 330, includes:
Facial image extraction unit, if extracted from target image for identifying that human body attitude belongs to the behavior of taking pictures
Facial image;
Blind watermatking generation unit, for extraction facial image and identification information encode, generate blind watermatking;
Blind watermatking display unit, for showing on a terminal screen blind watermatking, so that based on the blind water on terminal screen
The information for revealing terminal is printed to trace to the source.
Optionally, blind watermatking, which is generated with display module 330, includes:
Spectrum information determination unit, if for identifying that human body attitude belongs to the behavior of taking pictures, respectively to target image and
Identification information is encoded, and the spectrum information of target image and the spectrum information of identification information are obtained;
Spectrum information superpositing unit, for folding the spectrum information of the spectrum information of target image and identification information
Add, obtains target spectrum information;
Frequency spectrum inverse transformation block obtains blind watermatking for carrying out frequency spectrum inverse transformation to target spectrum information.
Optionally, spectrum information determination unit includes:
Target image pixel arrangement subelement, if extracting target figure for identifying that human body attitude belongs to the behavior of taking pictures
The pixel of picture, and according to predetermined order rule, the pixel order of target image is rearranged;
Fourier transformation subelement carries out Fourier transformation for the target image after rearranging to pixel order.
Optionally, spectrum information determination unit is specifically used for:
If identification human body attitude belongs to the behavior of taking pictures, Fourier Transform Algorithm is utilized, respectively to target image and mark
Know information and carry out encryption and Fourier transformation, obtains the spectrum information of target image and the spectrum information of identification information.
Optionally, the device further include:
Information image obtains module, for obtaining the information image by being shot to terminal screen;
Information image parsing module obtains the blind watermatking for including on information image for parsing to information image;
Blind watermatking parsing module, for determining the target for including in blind watermatking by parsing to obtained blind watermatking
Image and terminal identification information.
End provided by any embodiment of the invention can be performed in the device of tracing to the source of end message provided by the embodiment of the present invention
Client information source tracing method has the corresponding functional module of execution method and beneficial effect.Not detailed description is interior in the present embodiment
Holding can be with reference to the description in any means embodiment of the present invention.
Example IV
Fig. 5 is a kind of structural schematic diagram for terminal that the embodiment of the present invention four provides.Fig. 5, which is shown, to be suitable for being used to realizing this
The block diagram of the exemplary terminal 412 of invention embodiment.The terminal 412 that Fig. 5 is shown is only an example, should not be to the present invention
The function and use scope of embodiment bring any restrictions.
As shown in figure 5, terminal 412 is showed in the form of general purpose terminal.The component of terminal 412 can include but is not limited to:
One or more processor 416, storage device 428 connect different system components (including storage device 428 and processor
416) bus 418.
Bus 418 indicates one of a few class bus structures or a variety of, including storage device bus or storage device control
Device processed, peripheral bus, graphics acceleration port, processor or total using the local of any bus structures in a variety of bus structures
Line.For example, these architectures include but is not limited to industry standard architecture (Industry Subversive
Alliance, ISA) bus, microchannel architecture (Micro Channel Architecture, MAC) bus is enhanced
Isa bus, Video Electronics Standards Association (Video Electronics Standards Association, VESA) local are total
Line and peripheral component interconnection (Peripheral Component Interconnect, PCI) bus.
Terminal 412 typically comprises a variety of computer system readable media.These media can be it is any can be by terminal
The usable medium of 412 access, including volatile and non-volatile media, moveable and immovable medium.
Storage device 428 may include the computer system readable media of form of volatile memory, such as arbitrary access
Memory (Random Access Memory, RAM) 430 and/or cache memory 432.Terminal 412 can be wrapped further
Include other removable/nonremovable, volatile/non-volatile computer system storage mediums.Only as an example, storage system
434 can be used for reading and writing immovable, non-volatile magnetic media (Fig. 5 do not show, commonly referred to as " hard disk drive ").Although
It is not shown in Fig. 5, the disc driver for reading and writing to removable non-volatile magnetic disk (such as " floppy disk ") can be provided, and
To removable anonvolatile optical disk, such as CD-ROM (Compact Disc Read-Only Memory, CD-ROM), number
Optic disk (Digital Video Disc-Read Only Memory, DVD-ROM) or other optical mediums) read-write CD drive
Dynamic device.In these cases, each driver can be connected by one or more data media interfaces with bus 418.It deposits
Storage device 428 may include at least one program product, which has one group of (for example, at least one) program module, this
A little program modules are configured to perform the function of various embodiments of the present invention.
Program/utility 440 with one group of (at least one) program module 442 can store in such as storage dress
It sets in 428, such program module 442 includes but is not limited to operating system, one or more application program, other program moulds
It may include the realization of network environment in block and program data, each of these examples or certain combination.Program module
442 usually execute function and/or method in embodiment described in the invention.
Terminal 412 can also be logical with one or more external equipments 414 (such as keyboard, direction terminal, display 424 etc.)
Letter, can also be enabled a user to one or more terminal interact with the terminal 412 communicate, and/or with make the terminal 412
Any terminal (such as network interface card, modem etc.) communication that can be communicated with one or more of the other computing terminal.This
Kind communication can be carried out by input/output (I/O) interface 422.Also, terminal 412 can also by network adapter 420 with
One or more network (such as local area network (Local Area Network, LAN), wide area network (Wide Area Network,
WAN) and/or public network, for example, internet) communication.As shown in figure 5, network adapter 420 passes through bus 418 and terminal 412
Other modules communication.It should be understood that although not shown in the drawings, other hardware and/or software mould can be used in conjunction with terminal 412
Block, including but not limited to: microcode, device driver, redundant processor, external disk drive array, disk array
(Redundant Arrays of Independent Disks, RAID) system, tape drive and data backup storage system
System etc..
The program that processor 416 is stored in storage device 428 by operation, thereby executing various function application and number
According to processing, such as realize end message source tracing method provided by any embodiment of the invention, this method may include:
Obtain the identification information of terminal;
The target image of terminal camera captured in real-time is obtained, and is identified on the target image using image recognition technology
Human body attitude;
If identifying that the human body attitude belongs to the behavior of taking pictures, by the target image and the identification information into
Row coding generates blind watermatking, and shows on a terminal screen, so that being revealed based on the blind watermatking on the terminal screen terminal
Information trace to the source.
Embodiment five
The embodiment of the present invention five additionally provides a kind of computer readable storage medium, is stored thereon with computer program, should
Realize that such as end message source tracing method provided by any embodiment of the invention, this method can wrap when program is executed by processor
It includes:
Obtain the identification information of terminal;
The target image of terminal camera captured in real-time is obtained, and is identified on the target image using image recognition technology
Human body attitude;
If identifying that the human body attitude belongs to the behavior of taking pictures, by the target image and the identification information into
Row coding generates blind watermatking, and shows on a terminal screen, so that being revealed based on the blind watermatking on the terminal screen terminal
Information trace to the source.
The computer storage medium of the embodiment of the present invention, can be using any of one or more computer-readable media
Combination.Computer-readable medium can be computer-readable signal media or computer readable storage medium.It is computer-readable
Storage medium for example may be-but not limited to-the system of electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, device or
Device, or any above combination.The more specific example (non exhaustive list) of computer readable storage medium includes: tool
There are electrical connection, the portable computer diskette, hard disk, random access memory (RAM), read-only memory of one or more conducting wires
(ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-
ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.In this document, computer-readable storage
Medium can be any tangible medium for including or store program, which can be commanded execution system, device or device
Using or it is in connection.
Computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal,
Wherein carry computer-readable program code.The data-signal of this propagation can take various forms, including but unlimited
In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can
Any computer-readable medium other than storage medium is read, which can send, propagates or transmit and be used for
By the use of instruction execution system, device or device or program in connection.
The program code for including on computer-readable medium can transmit with any suitable medium, including --- but it is unlimited
In wireless, electric wire, optical cable, RF etc. or above-mentioned any appropriate combination.
The computer for executing operation of the present invention can be write with one or more programming languages or combinations thereof
Program code, described program design language include object oriented program language-such as Java, Smalltalk, C++,
It further include conventional procedural programming language-such as " C " language or similar programming language.Program code can be with
It fully executes, partly execute on the user computer on the user computer, being executed as an independent software package, portion
Divide and partially executes or executed on remote computer or terminal completely on the remote computer on the user computer.It is relating to
And in the situation of remote computer, remote computer can pass through the network of any kind --- including local area network (LAN) or extensively
Domain net (WAN)-be connected to subscriber computer, or, it may be connected to outer computer (such as provided using Internet service
Quotient is connected by internet).
Note that the above is only a better embodiment of the present invention and the applied technical principle.It will be appreciated by those skilled in the art that
The invention is not limited to the specific embodiments described herein, be able to carry out for a person skilled in the art it is various it is apparent variation,
It readjusts and substitutes without departing from protection scope of the present invention.Therefore, although being carried out by above embodiments to the present invention
It is described in further detail, but the present invention is not limited to the above embodiments only, without departing from the inventive concept, also
It may include more other equivalent embodiments, and the scope of the invention is determined by the scope of the appended claims.
Claims (10)
1. a kind of end message source tracing method characterized by comprising
Obtain the identification information of terminal;
The target image of terminal camera captured in real-time is obtained, and identifies the people on the target image using image recognition technology
Body posture;
If identifying that the human body attitude belongs to the behavior of taking pictures, by being compiled to the target image and the identification information
Code is generated blind watermatking, and shown on a terminal screen, so that the letter revealed based on the blind watermatking on the terminal screen terminal
Breath is traced to the source.
2. the method according to claim 1, wherein the identification information of the terminal includes the MAC of the terminal
The log-on message of address and terminal user.
3. the method according to claim 1, wherein by the target image and identification information progress
Coding generates blind watermatking, comprising:
Facial image is extracted from the target image;
Facial image and the identification information to extraction encode, and generate the blind watermatking.
4. the method according to claim 1, wherein by the target image and identification information progress
Coding generates blind watermatking, comprising:
The target image and the identification information are encoded respectively, obtain the spectrum information of the target image and described
The spectrum information of identification information;
The spectrum information of the spectrum information of the target image and the identification information is overlapped, target spectrum letter is obtained
Breath;
Frequency spectrum inverse transformation is carried out to the target spectrum information, obtains the blind watermatking.
5. according to the method described in claim 4, it is characterized in that, being encoded to the target image, comprising:
The pixel of the target image is extracted, and according to predetermined order rule, the pixel order of the target image is arranged again
Column;
Target image after rearranging to pixel order carries out Fourier transformation.
6. the method stated according to claim 4, which is characterized in that compiled respectively to the target image and the identification information
Code, comprising:
Using Fourier Transform Algorithm, encryption and Fourier transformation are carried out to the target image and the identification information respectively.
7. the method stated according to claim 1, which is characterized in that the method also includes:
Obtain the information image by being shot to the terminal screen;
The information image is parsed, the blind watermatking for including on the information image is obtained;
By parsing to obtained blind watermatking, the target image for including in the blind watermatking and terminal identification information are determined.
The device 8. a kind of end message is traced to the source characterized by comprising
Terminal identification information obtains module, for obtaining the identification information of terminal;
Target image obtains module, for obtaining the target image of terminal camera captured in real-time, and utilizes image recognition technology
Identify the human body attitude on the target image;
Blind watermatking generates and display module, if for identifying that the human body attitude belongs to the behavior of taking pictures, by the mesh
Logo image and the identification information are encoded, and blind watermatking is generated, and are shown on a terminal screen, so that being based on the end panel
The information that blind watermatking on curtain reveals terminal is traced to the source.
9. a kind of terminal characterized by comprising
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processors are real
The now end message source tracing method as described in any in claim 1-7.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor
The end message source tracing method as described in any in claim 1-7 is realized when execution.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910397866.3A CN110113535A (en) | 2019-05-14 | 2019-05-14 | End message source tracing method, device, terminal and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910397866.3A CN110113535A (en) | 2019-05-14 | 2019-05-14 | End message source tracing method, device, terminal and medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110113535A true CN110113535A (en) | 2019-08-09 |
Family
ID=67489982
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910397866.3A Pending CN110113535A (en) | 2019-05-14 | 2019-05-14 | End message source tracing method, device, terminal and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110113535A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110602455A (en) * | 2019-09-10 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Video storage system, video processing method, device, equipment and storage medium |
CN111932432A (en) * | 2020-10-14 | 2020-11-13 | 腾讯科技(深圳)有限公司 | Blind watermark implanting method, blind watermark detecting method, blind watermark implanting device, blind watermark detecting equipment and storage medium |
CN112598564A (en) * | 2020-12-26 | 2021-04-02 | 中国农业银行股份有限公司 | Information recording and information tracing method and device |
CN112616056A (en) * | 2020-12-18 | 2021-04-06 | 广州虎牙科技有限公司 | Reporting alarm method and device based on watermark monitoring |
CN112954403A (en) * | 2019-11-26 | 2021-06-11 | 腾讯科技(深圳)有限公司 | Video encryption method, device, equipment and storage medium |
CN114067441A (en) * | 2022-01-14 | 2022-02-18 | 合肥高维数据技术有限公司 | Shooting and recording behavior detection method and system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110212717A1 (en) * | 2008-08-19 | 2011-09-01 | Rhoads Geoffrey B | Methods and Systems for Content Processing |
CN106792268A (en) * | 2017-02-27 | 2017-05-31 | 首影科技(深圳)有限公司 | The playing device and player method of the person's of copying illegally information can be reviewed |
CN107748847A (en) * | 2017-10-11 | 2018-03-02 | 惠州Tcl移动通信有限公司 | A kind of browsing method, storage medium and the mobile terminal of user's secret file |
CN108492238A (en) * | 2018-03-07 | 2018-09-04 | 小明太极(湖北)国漫文化有限公司 | Blind watermatking embedding grammar and extracting method |
-
2019
- 2019-05-14 CN CN201910397866.3A patent/CN110113535A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110212717A1 (en) * | 2008-08-19 | 2011-09-01 | Rhoads Geoffrey B | Methods and Systems for Content Processing |
CN106792268A (en) * | 2017-02-27 | 2017-05-31 | 首影科技(深圳)有限公司 | The playing device and player method of the person's of copying illegally information can be reviewed |
CN107748847A (en) * | 2017-10-11 | 2018-03-02 | 惠州Tcl移动通信有限公司 | A kind of browsing method, storage medium and the mobile terminal of user's secret file |
CN108492238A (en) * | 2018-03-07 | 2018-09-04 | 小明太极(湖北)国漫文化有限公司 | Blind watermatking embedding grammar and extracting method |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110602455A (en) * | 2019-09-10 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Video storage system, video processing method, device, equipment and storage medium |
CN112954403A (en) * | 2019-11-26 | 2021-06-11 | 腾讯科技(深圳)有限公司 | Video encryption method, device, equipment and storage medium |
CN112954403B (en) * | 2019-11-26 | 2023-02-17 | 深圳市雅阅科技有限公司 | Video encryption method, device, equipment and storage medium |
CN111932432A (en) * | 2020-10-14 | 2020-11-13 | 腾讯科技(深圳)有限公司 | Blind watermark implanting method, blind watermark detecting method, blind watermark implanting device, blind watermark detecting equipment and storage medium |
CN111932432B (en) * | 2020-10-14 | 2021-01-15 | 腾讯科技(深圳)有限公司 | Blind watermark implanting method, blind watermark detecting method, blind watermark implanting device, blind watermark detecting equipment and storage medium |
CN112616056A (en) * | 2020-12-18 | 2021-04-06 | 广州虎牙科技有限公司 | Reporting alarm method and device based on watermark monitoring |
CN112616056B (en) * | 2020-12-18 | 2023-04-07 | 广州虎牙科技有限公司 | Reporting alarm method and device based on watermark monitoring |
CN112598564A (en) * | 2020-12-26 | 2021-04-02 | 中国农业银行股份有限公司 | Information recording and information tracing method and device |
CN114067441A (en) * | 2022-01-14 | 2022-02-18 | 合肥高维数据技术有限公司 | Shooting and recording behavior detection method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110113535A (en) | End message source tracing method, device, terminal and medium | |
Schneegass et al. | Smudgesafe: Geometric image transformations for smudge-resistant user authentication | |
CN106503655B (en) | A kind of electric endorsement method and sign test method based on face recognition technology | |
Yu et al. | Privacy protecting visual processing for secure video surveillance | |
CN104239815A (en) | Electronic document encryption and decryption method and method based on iris identification | |
JP2011129096A (en) | Method and device of for privacy masking image | |
CN110175573B (en) | Face and iris coding and verification method, system and computer storage medium | |
CN110414271A (en) | A kind of private data guard method, device and computer readable storage medium | |
Yu et al. | Intelligent video data security: a survey and open challenges | |
CN104680055A (en) | Control method for performing management on U disk after access into industrial control system network | |
CN106101140B (en) | A kind of method and server of authentification of message | |
Luo et al. | Anonymous subject identification and privacy information management in video surveillance | |
CN110516775B (en) | User secret information hiding method based on QR code | |
Yusuf et al. | A survey of biometric approaches of authentication | |
Saraswathi et al. | Retinal biometrics based authentication and key exchange system | |
CN110069907A (en) | Big data source tracing method and system based on digital watermarking | |
Pic et al. | Remote KYC: Attacks and counter-measures | |
Ara et al. | An efficient privacy-preserving user authentication scheme using image processing and blockchain technologies | |
Prabhu | Image based authentication using illusion pin for shoulder surfing attack | |
CN113033243A (en) | Face recognition method, device and equipment | |
CN113254904B (en) | Intelligent processing method, device, equipment and medium for multi-dimensional information acquisition and identification | |
CN115134473B (en) | Image encryption method and device | |
Dutta et al. | A secure algorithm for biometric-based digital image watermarking in DCT domain | |
CN110706145A (en) | Reversible remote sensing image information hiding method and device | |
CN204926093U (en) | Computer information safety protection system based on face identification technique |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190809 |