CN110505455A - A kind of the monitor video access method and system of secret protection - Google Patents

A kind of the monitor video access method and system of secret protection Download PDF

Info

Publication number
CN110505455A
CN110505455A CN201910814471.9A CN201910814471A CN110505455A CN 110505455 A CN110505455 A CN 110505455A CN 201910814471 A CN201910814471 A CN 201910814471A CN 110505455 A CN110505455 A CN 110505455A
Authority
CN
China
Prior art keywords
user
monitor video
permission
video
level
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910814471.9A
Other languages
Chinese (zh)
Inventor
丁文斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qingyue Technology Co Ltd
Original Assignee
Beijing Qingyue Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qingyue Technology Co Ltd filed Critical Beijing Qingyue Technology Co Ltd
Priority to CN201910814471.9A priority Critical patent/CN110505455A/en
Publication of CN110505455A publication Critical patent/CN110505455A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses the monitor video access methods and system of a kind of secret protection, this method comprises: obtaining the video access request and user information of user, the access authority of user is determined according to the user information;Video access according to user requests to search the monitor video for needing to access in monitor video library, and the access authority according to user pre-processes the monitor video, obtains pretreated monitor video;Show pretreated monitor video.This method realizes protection individual privacy data, improves safety.

Description

A kind of the monitor video access method and system of secret protection
Technical field
The present invention relates to monitor video technical fields, a kind of monitor video access method more particularly to secret protection and System.
Background technique
The camera in many places is more and more at present, including each community, cell, public arena etc..The video of monitoring More and more stifled, the various individual privacies being related in video are also more and more crucial, how to be both able to satisfy monitoring demand, guarantee normal Query monitor video demand, and the personal privacy occurred in monitor video can be protected, become more and more important.It is logical at present Way is exactly according to different people roles or to have the permission of query monitor video or be exactly no query monitor view The permission of frequency.This way is not able to satisfy people for the query demand of monitor video completely, once and permission control it is bad, It will result in serious data, the problems such as individual privacy leaks, safety is lower.In addition to simple role-security controls, how to protect Individual privacy data are protected, and can guarantee that normal query monitor demand becomes more and more urgent.
Summary of the invention
The object of the present invention is to provide the monitor video access methods and system of a kind of secret protection, to realize that protection is personal Private data improves safety.
In order to solve the above technical problems, the present invention provides a kind of monitor video access method of secret protection, this method packet It includes:
The video access request and user information for obtaining user, the access authority of user is determined according to the user information;
Video access according to user requests to search the monitor video for needing to access in monitor video library;
Access authority according to user pre-processes the monitor video, obtains pretreated monitor video;
Show pretreated monitor video.
Preferably, the access authority includes level-one permission, second level permission, three-level permission and level Four permission.
Preferably, the access authority according to user pre-processes the monitor video, obtains pretreated Video, comprising:
If the access authority of user is second level permission, all persons' head portrait inside monitor video is replaced with into cartoon head Picture obtains replaced monitor video;
If the access permission level of user is three-level permission, the head portrait of the designated person inside monitor video is substituted for card Logical head portrait, obtains replaced monitor video.
Preferably, the method also includes:
If the access authority of user is level-one permission, refusal provides monitor video;
If the access authority of user is level Four permission, untreated original monitor video is provided a user.
The present invention also provides a kind of monitor videos of secret protection to access system, for realizing the above method, the system packet It includes:
Module is obtained, the video access for obtaining user is requested and user information, determines and uses according to the user information The access authority at family;
Searching module requests to search the monitoring for needing to access view in monitor video library for the video access according to user Frequently,
Preprocessing module pre-processes the monitor video for the access authority according to user, is pre-processed Monitor video afterwards;
Display module, for showing pretreated monitor video.
Preferably, the access authority includes level-one permission, second level permission, three-level permission and level Four permission.
Preferably, the preprocessing module includes:
First replacement unit, if the access authority for user is second level permission, by all persons inside monitor video Head portrait replaces with cartoon head portrait, obtains replaced monitor video;
Second replacement unit will be specified inside monitor video if the access permission level for user is three-level permission The head portrait of personage is substituted for cartoon head portrait, obtains replaced monitor video.
Preferably, the system also includes:
Video refuses module, if the access authority for user is level-one permission, refusal provides the monitoring view for needing to access Frequently;
Video provides module, if the access authority for user is level Four permission, provides a user untreated original prison Control video.
The monitor video access method and system of a kind of secret protection provided by the present invention, obtain the video access of user Request and user information, the access authority of user is determined according to the user information;Video access request according to user is being supervised The monitor video for needing to access is searched in control video library;Access authority according to user pre-processes the monitor video, Obtain pretreated monitor video;Show pretreated monitor video.As it can be seen that needing basis after getting monitor video The access authority of user pre-processes monitor video, obtains pretreated monitor video, such different access permission The monitor video that user sees be it is different, the pretreatment of video can be monitored according to the access authority of user, in this way It is able to satisfy the demand of query monitor, and can effectively guarantee other proprietary individual privacies in region, guarantees proprietary power Benefit prevents leakage of information, reaches realization protection individual privacy data, improves safety.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow chart of the monitor video access method of secret protection provided by the present invention;
Fig. 2 is rights management flow chart;
Fig. 3 is the flow chart that face is handled in video;
Fig. 4 is algorithm flow chart of changing face.
Fig. 5 is that a kind of monitor video of secret protection provided by the present invention accesses system structure diagram.
Specific embodiment
Core of the invention is to provide the monitor video access method and system of a kind of secret protection, to realize that protection is personal Private data improves safety.
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
Referring to FIG. 1, Fig. 1 is a kind of flow chart of the monitor video access method of secret protection provided by the present invention, Method includes the following steps:
S11: the video access request and user information of user are obtained, the access authority of user is determined according to user information;
S12: the video access according to user requests to search the monitor video for needing to access in monitor video library;
S13: the access authority according to user pre-processes monitor video, obtains pretreated monitor video;
S14: pretreated monitor video is shown.
As it can be seen that needing to locate monitor video in advance according to the access authority of user after this method gets monitor video Reason, obtains pretreated monitor video, the monitor video that the user of such different access permission sees be it is different, can It is monitored the pretreatment of video according to the access authority of user, is able to satisfy the demand of query monitor in this way, and can effectively protect Other proprietary individual privacies in region are demonstrate,proved, guarantees proprietary equity, prevents leakage of information, it is personal hidden to reach realization protection Private data improve safety.
Based on the above method, specifically, access authority includes level-one permission, second level permission, three-level permission and level Four permission. Access permission level successively includes: level-one, second level, three-level and level Four according to ascending divide, i.e. level-one access authority is minimum, Level Four access authority is maximum.
Further, step S13 process specifically includes the following steps:
S21: if the access authority of user is second level permission, all persons' head portrait inside monitor video is replaced with into cartoon Head portrait obtains replaced monitor video;
S22: if the access permission level of user is three-level permission, the head portrait of the designated person inside monitor video is replaced At cartoon head portrait, replaced monitor video is obtained.
Further, the method also includes following steps:
S31: if the access authority of user is level-one permission, refusal provides monitor video;
S32: if the access authority of user is level Four permission, untreated original monitor video is provided a user.
Referring to FIG. 2, Fig. 2 is rights management flow chart.It is detailed, access authority is divided into four etc. first, first-class nothing is appointed What permission, second-class only nature permission, third particular persons permission, four wait whole permissions.All videos were according to every 10 minutes For a time quantum, each section is a physical unit, what position is the permission opened in this way be exactly some level privileges in Set the video when range holds.Second-class permission is nature permission, sees monitor video under this permission, all in video Personage can be processed, and head can be replaced by cartoon head portrait, can only see all natural landscape and some animal videos, such as Pet etc..Third permission is particular persons permission, sees monitor video under this permission, in addition to specified specific people in video It can be seen that facial video, other personages can be processed, and head can be replaced by cartoon head portrait, can thus see formulation These specific people all in What for, gone where, without leaking other people privacy.The permissions such as four are whole power Limit, permission control is very stringent, only opens on other occasions to core person.These permissions are open open and access day Will is as audit.
By this method, it had not only been able to satisfy the demand of query monitor, but also can effectively guarantee that other are proprietary in region Individual privacy guarantees proprietary equity, prevents leakage of information.
It is detailed, in order to go out personage by Computer Vision Recognition, the important entrance to monitoring area is needed, it is each Path, camera is all disposed in the place such as fork in the road, for tracking and identifying pedestrian.And it is disposed in core entrance and nucleus High-definition camera can recognize that face characteristic, and all cameras are linked on the server on backstage, by camera data It stores in server.
Wherein, when there is demand, user applies for the access authority of video data, and manager according to the actual needs, gives The applicant of video data opens corresponding permission, there is this permission, and user can be accessed accordingly by platform Monitor video data after the completion of access, will withdraw permission, and user has any permission no longer.
Wherein, by carrying out Face datection, face critical point detection, face alignment, recognition of face etc. respectively to video frame Algorithm identifies specific personnel, and the face replaced will be needed by algorithm of changing face, change the face in video frame into replacement Face afterwards.According to pedestrian tracking algorithm, provide pedestrian in tracking video first frame original state (such as position, greatly It is small), it is automatic to estimate the state of target pedestrian in subsequent frames, accelerate continuity of the subsequent personage in video.Please refer to Fig. 3 And Fig. 4, Fig. 3 are the flow chart that face is handled in video, Fig. 4 is algorithm flow chart of changing face.
Detailed, Face datection uses the deep learning method of detection algorithm one-stage, is mentioned using multilayer neural network Feature is taken, main policies process is as follows:
(1) it uses and extracts anchor anchor in target detection SSD algorithm on multiple dimensioned characteristic pattern feature map Thought, improve precision;
(2) Inception module is used, inside modules capture more scales using different size of convolution kernel and believe Breath improves precision;
(3) using the parameter stride of convolutional layer as big as possible, (total 32) reduce rapidly characteristic pattern feature Map improves speed.
Wherein, face critical point detection is using the enhancing face Keypoint detector under unsupervised learning, and main policies are such as Under:
(1) factions' filtering CPM algorithm is used as basic frame;
(2) it introduces the timing based on optical flow algorithm Lucas-Kanade tracking module and is registrated loss function.
Wherein, the process of face alignment includes: that place is normalized to the set of keypoints that face critical point detection obtains Reason calculates mean value and obtains standard shape, and finds each sample shape to the affine of this standard shape using least square method Mapping mode, thus obtain photo to template affine transformation matrix.
Wherein, the process of recognition of face includes: main face after detecting face and positioning facial key feature points Region can be cut out, after pretreatment, obtain the feature vector of current face, and the known face with inventory It is compared, completes final classification.
Wherein, the process of pedestrian tracking includes: original state (such as the position for providing pedestrian in tracking video first frame Set, size), it is automatic to estimate the state of target pedestrian in subsequent frames.
This method gives each user role permission, but Permission Levels divide many grades.Wherein, lack of competence is not can enter Video system sees anything;Highest level is to see full content;It is secondary it is high-grade can see the information including related person, He is handled incoherent personage's head portrait by computer vision processing system, and head portrait is substituted with cartoon character;What is had permission is low Grade, all people's object head portrait be all it is treated, can only see natural landscape, all people's object all be can't see.To each Permission, and some qualifications can be set, the monitor video in certain places in some period.It is entire to be after handling in this way System is just able to satisfy many conditions of demand.For example want to look at surface conditions, it is only necessary to the lowest class having permission.Want to track certain A stranger just only needs to open the Permission Levels of this stranger's relevant information.Not only actual need of work had been met, but also maximum The private data that ensure that all people of limit.
Referring to FIG. 5, the monitor video that Fig. 5 is a kind of secret protection provided by the present invention accesses system structure signal Figure, the system include: for realizing the above method, the system
Module 101 is obtained, the video access for obtaining user is requested and user information, determines user according to user information Access authority;
Searching module 102 requests to search the prison for needing to access in monitor video library for the video access according to user Video is controlled,
Preprocessing module 103 pre-processes monitor video for the access authority according to user, after obtaining pretreatment Monitor video;
Display module 104, for showing pretreated monitor video.
As it can be seen that preprocessing module needs the access right according to user after acquisition module gets monitor video in the system Limit pre-processes monitor video, obtains pretreated monitor video, the prison that the user of such different access permission sees Control video be it is different, the pretreatment of video can be monitored according to the access authority of user, be able to satisfy in this way inquiry prison The demand of control, and can effectively guarantee other proprietary individual privacies in region, guarantee proprietary equity, prevents information from letting out Leakage reaches realization protection individual privacy data, improves safety.
Based on above system, specifically, access authority includes level-one permission, second level permission, three-level permission and level Four permission.
Further, preprocessing module includes:
First replacement unit, if the access authority for user is second level permission, by all persons inside monitor video Head portrait replaces with cartoon head portrait, obtains replaced monitor video;
Second replacement unit will be specified inside monitor video if the access permission level for user is three-level permission The head portrait of personage is substituted for cartoon head portrait, obtains replaced monitor video.
Further, the system also includes:
Video refuses module, if the access authority for user is level-one permission, refusal provides the monitoring view for needing to access Frequently;
Video provides module, if the access authority for user is level Four permission, provides a user untreated original prison Control video.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with it is other The difference of embodiment, same or similar part may refer to each other between each embodiment.For being disclosed in embodiment For system, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place is referring to method part Explanation.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These Function is implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Profession Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered Think beyond the scope of this invention.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor The combination of capable software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only deposit Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology In any other form of storage medium well known in field.
Detailed Jie has been carried out to the monitor video access method and system of a kind of secret protection provided by the present invention above It continues.Used herein a specific example illustrates the principle and implementation of the invention, and the explanation of above embodiments is only It is to be used to help understand method and its core concept of the invention.It should be pointed out that for those skilled in the art For, it without departing from the principle of the present invention, can be with several improvements and modifications are made to the present invention, these improve and repair Decorations are also fallen within the protection scope of the claims of the present invention.

Claims (8)

1. a kind of monitor video access method of secret protection characterized by comprising
The video access request and user information for obtaining user, the access authority of user is determined according to the user information;
Video access according to user requests to search the monitor video for needing to access in monitor video library;
Access authority according to user pre-processes the monitor video, obtains pretreated monitor video;
Show pretreated monitor video.
2. the method as described in claim 1, which is characterized in that the access authority includes level-one permission, second level permission, three-level Permission and level Four permission.
3. method according to claim 2, which is characterized in that the access authority according to user to the monitor video into Row pretreatment, obtains pretreated video, comprising:
If the access authority of user is second level permission, all persons' head portrait inside monitor video is replaced with into cartoon head portrait, is obtained To replaced monitor video;
If the access permission level of user is three-level permission, the head portrait of the designated person inside monitor video is substituted for cartoon head Picture obtains replaced monitor video.
4. method as claimed in claim 3, which is characterized in that further include:
If the access authority of user is level-one permission, refusal provides monitor video;
If the access authority of user is level Four permission, untreated original monitor video is provided a user.
5. a kind of monitor video of secret protection accesses system, which is characterized in that for realizing any in such as Claims 1-4 Method described in one, comprising:
Module is obtained, the video access for obtaining user is requested and user information, determines user's according to the user information Access authority;
Searching module requests to search the monitor video for needing to access in monitor video library for the video access according to user,
Preprocessing module pre-processes the monitor video for the access authority according to user, obtains pretreated Monitor video;
Display module, for showing pretreated monitor video.
6. system as claimed in claim 5, which is characterized in that the access authority include level-one permission, second level permission, Three-level permission and level Four permission.
7. system as claimed in claim 6, which is characterized in that the preprocessing module includes:
First replacement unit, if the access authority for user is second level permission, by all persons' head portrait inside monitor video Cartoon head portrait is replaced with, replaced monitor video is obtained;
Second replacement unit, if the access permission level for user is three-level permission, by the designated person inside monitor video Head portrait be substituted for cartoon head portrait, obtain replaced monitor video.
8. system as claimed in claim 7, which is characterized in that further include:
Video refuses module, if the access authority for user is level-one permission, refusal provides the monitor video for needing to access;
Video provides module, if the access authority for user is level Four permission, provides a user untreated original monitoring view Frequently.
CN201910814471.9A 2019-08-30 2019-08-30 A kind of the monitor video access method and system of secret protection Pending CN110505455A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910814471.9A CN110505455A (en) 2019-08-30 2019-08-30 A kind of the monitor video access method and system of secret protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910814471.9A CN110505455A (en) 2019-08-30 2019-08-30 A kind of the monitor video access method and system of secret protection

Publications (1)

Publication Number Publication Date
CN110505455A true CN110505455A (en) 2019-11-26

Family

ID=68590723

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910814471.9A Pending CN110505455A (en) 2019-08-30 2019-08-30 A kind of the monitor video access method and system of secret protection

Country Status (1)

Country Link
CN (1) CN110505455A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111629227A (en) * 2020-04-08 2020-09-04 北京百度网讯科技有限公司 Video conversion method, device, system, electronic equipment and storage medium
CN111654664A (en) * 2020-05-08 2020-09-11 浙江大华技术股份有限公司 High-altitude parabolic detection method and system, computer equipment and storage medium
CN113032801A (en) * 2021-02-26 2021-06-25 深圳市元征科技股份有限公司 Traffic video viewing method, system, device and computer readable storage medium
CN113312660A (en) * 2021-05-06 2021-08-27 北京航空航天大学 Remote monitoring privacy protection method and system based on computer vision
CN114938465A (en) * 2022-07-25 2022-08-23 广州万协通信息技术有限公司 Encrypted data transmission method and device based on characteristic sequence

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103152556A (en) * 2013-03-15 2013-06-12 云南大学 Surveillance video encryption method for protecting privacy
US20140132772A1 (en) * 2012-11-13 2014-05-15 International Business Machines Corporation Automated Authorization to Access Surveillance Video Based on Pre-Specified Events
CN104486083A (en) * 2014-12-19 2015-04-01 小米科技有限责任公司 Supervisory video processing method and device
CN106330886A (en) * 2016-08-18 2017-01-11 浙江大华技术股份有限公司 Method and equipment for protecting video privacy in remote monitoring
CN108040230A (en) * 2017-12-19 2018-05-15 司马大大(北京)智能系统有限公司 A kind of monitoring method and device for protecting privacy
CN109743538A (en) * 2018-11-30 2019-05-10 与德科技有限公司 Monitor video checks control method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140132772A1 (en) * 2012-11-13 2014-05-15 International Business Machines Corporation Automated Authorization to Access Surveillance Video Based on Pre-Specified Events
CN103152556A (en) * 2013-03-15 2013-06-12 云南大学 Surveillance video encryption method for protecting privacy
CN104486083A (en) * 2014-12-19 2015-04-01 小米科技有限责任公司 Supervisory video processing method and device
CN106330886A (en) * 2016-08-18 2017-01-11 浙江大华技术股份有限公司 Method and equipment for protecting video privacy in remote monitoring
CN108040230A (en) * 2017-12-19 2018-05-15 司马大大(北京)智能系统有限公司 A kind of monitoring method and device for protecting privacy
CN109743538A (en) * 2018-11-30 2019-05-10 与德科技有限公司 Monitor video checks control method

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111629227A (en) * 2020-04-08 2020-09-04 北京百度网讯科技有限公司 Video conversion method, device, system, electronic equipment and storage medium
CN111654664A (en) * 2020-05-08 2020-09-11 浙江大华技术股份有限公司 High-altitude parabolic detection method and system, computer equipment and storage medium
CN111654664B (en) * 2020-05-08 2022-04-08 浙江大华技术股份有限公司 High-altitude parabolic detection method and system, computer equipment and storage medium
CN113032801A (en) * 2021-02-26 2021-06-25 深圳市元征科技股份有限公司 Traffic video viewing method, system, device and computer readable storage medium
CN113312660A (en) * 2021-05-06 2021-08-27 北京航空航天大学 Remote monitoring privacy protection method and system based on computer vision
CN114938465A (en) * 2022-07-25 2022-08-23 广州万协通信息技术有限公司 Encrypted data transmission method and device based on characteristic sequence
CN114938465B (en) * 2022-07-25 2022-10-18 广州万协通信息技术有限公司 Encrypted data transmission method and device based on characteristic sequence

Similar Documents

Publication Publication Date Title
CN110505455A (en) A kind of the monitor video access method and system of secret protection
CN110516586A (en) A kind of facial image clustering method, system, product and medium
US8634601B2 (en) Surveillance-based high-resolution facial recognition
CN102201061B (en) Intelligent safety monitoring system and method based on multilevel filtering face recognition
CN108564052A (en) Multi-cam dynamic human face recognition system based on MTCNN and method
CN110210276A (en) A kind of motion track acquisition methods and its equipment, storage medium, terminal
CN110446015A (en) A kind of abnormal behaviour monitoring method based on computer vision and system
US20080273088A1 (en) Intelligent surveillance system and method for integrated event based surveillance
CN108197453A (en) A kind of image method for secret protection and system
Nguyen et al. Anomaly detection in traffic surveillance videos with gan-based future frame prediction
Rao et al. Image-based fusion for video enhancement of night-time surveillance
CN108269331A (en) A kind of intelligent video big data processing system
CN106156747B (en) The method of the monitor video extracting semantic objects of Behavior-based control feature
CN115881286A (en) Epidemic prevention management scheduling system
Wójtowicz et al. New challenges for user privacy in cyberspace
Feris et al. Case study: IBM smart surveillance system
Black et al. A hierarchical database for visual surveillance applications
Thuraisingham et al. Access control, confidentiality and privacy for video surveillance databases
KR20170095599A (en) System and method for video searching
Delgado et al. Urban security and crime prevention in smart cities: a quantitative systematic review
Fitzpatrick et al. Law, Property and Disasters: Adaptive Perspectives from the Global South
Babaguchi et al. Psychological study for designing privacy protected video surveillance system: PriSurv
Hemalatha et al. CNN Based Image Forgery Segmentation and Classification for Forensic Verification
Zhu et al. Privacy-preserving camera-based monitoring and tracking system for parking spaces
Qiu Application analysis of face recognition technology in video investigation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191126

RJ01 Rejection of invention patent application after publication