CN110505455A - A kind of the monitor video access method and system of secret protection - Google Patents
A kind of the monitor video access method and system of secret protection Download PDFInfo
- Publication number
- CN110505455A CN110505455A CN201910814471.9A CN201910814471A CN110505455A CN 110505455 A CN110505455 A CN 110505455A CN 201910814471 A CN201910814471 A CN 201910814471A CN 110505455 A CN110505455 A CN 110505455A
- Authority
- CN
- China
- Prior art keywords
- user
- monitor video
- permission
- video
- level
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses the monitor video access methods and system of a kind of secret protection, this method comprises: obtaining the video access request and user information of user, the access authority of user is determined according to the user information;Video access according to user requests to search the monitor video for needing to access in monitor video library, and the access authority according to user pre-processes the monitor video, obtains pretreated monitor video;Show pretreated monitor video.This method realizes protection individual privacy data, improves safety.
Description
Technical field
The present invention relates to monitor video technical fields, a kind of monitor video access method more particularly to secret protection and
System.
Background technique
The camera in many places is more and more at present, including each community, cell, public arena etc..The video of monitoring
More and more stifled, the various individual privacies being related in video are also more and more crucial, how to be both able to satisfy monitoring demand, guarantee normal
Query monitor video demand, and the personal privacy occurred in monitor video can be protected, become more and more important.It is logical at present
Way is exactly according to different people roles or to have the permission of query monitor video or be exactly no query monitor view
The permission of frequency.This way is not able to satisfy people for the query demand of monitor video completely, once and permission control it is bad,
It will result in serious data, the problems such as individual privacy leaks, safety is lower.In addition to simple role-security controls, how to protect
Individual privacy data are protected, and can guarantee that normal query monitor demand becomes more and more urgent.
Summary of the invention
The object of the present invention is to provide the monitor video access methods and system of a kind of secret protection, to realize that protection is personal
Private data improves safety.
In order to solve the above technical problems, the present invention provides a kind of monitor video access method of secret protection, this method packet
It includes:
The video access request and user information for obtaining user, the access authority of user is determined according to the user information;
Video access according to user requests to search the monitor video for needing to access in monitor video library;
Access authority according to user pre-processes the monitor video, obtains pretreated monitor video;
Show pretreated monitor video.
Preferably, the access authority includes level-one permission, second level permission, three-level permission and level Four permission.
Preferably, the access authority according to user pre-processes the monitor video, obtains pretreated
Video, comprising:
If the access authority of user is second level permission, all persons' head portrait inside monitor video is replaced with into cartoon head
Picture obtains replaced monitor video;
If the access permission level of user is three-level permission, the head portrait of the designated person inside monitor video is substituted for card
Logical head portrait, obtains replaced monitor video.
Preferably, the method also includes:
If the access authority of user is level-one permission, refusal provides monitor video;
If the access authority of user is level Four permission, untreated original monitor video is provided a user.
The present invention also provides a kind of monitor videos of secret protection to access system, for realizing the above method, the system packet
It includes:
Module is obtained, the video access for obtaining user is requested and user information, determines and uses according to the user information
The access authority at family;
Searching module requests to search the monitoring for needing to access view in monitor video library for the video access according to user
Frequently,
Preprocessing module pre-processes the monitor video for the access authority according to user, is pre-processed
Monitor video afterwards;
Display module, for showing pretreated monitor video.
Preferably, the access authority includes level-one permission, second level permission, three-level permission and level Four permission.
Preferably, the preprocessing module includes:
First replacement unit, if the access authority for user is second level permission, by all persons inside monitor video
Head portrait replaces with cartoon head portrait, obtains replaced monitor video;
Second replacement unit will be specified inside monitor video if the access permission level for user is three-level permission
The head portrait of personage is substituted for cartoon head portrait, obtains replaced monitor video.
Preferably, the system also includes:
Video refuses module, if the access authority for user is level-one permission, refusal provides the monitoring view for needing to access
Frequently;
Video provides module, if the access authority for user is level Four permission, provides a user untreated original prison
Control video.
The monitor video access method and system of a kind of secret protection provided by the present invention, obtain the video access of user
Request and user information, the access authority of user is determined according to the user information;Video access request according to user is being supervised
The monitor video for needing to access is searched in control video library;Access authority according to user pre-processes the monitor video,
Obtain pretreated monitor video;Show pretreated monitor video.As it can be seen that needing basis after getting monitor video
The access authority of user pre-processes monitor video, obtains pretreated monitor video, such different access permission
The monitor video that user sees be it is different, the pretreatment of video can be monitored according to the access authority of user, in this way
It is able to satisfy the demand of query monitor, and can effectively guarantee other proprietary individual privacies in region, guarantees proprietary power
Benefit prevents leakage of information, reaches realization protection individual privacy data, improves safety.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow chart of the monitor video access method of secret protection provided by the present invention;
Fig. 2 is rights management flow chart;
Fig. 3 is the flow chart that face is handled in video;
Fig. 4 is algorithm flow chart of changing face.
Fig. 5 is that a kind of monitor video of secret protection provided by the present invention accesses system structure diagram.
Specific embodiment
Core of the invention is to provide the monitor video access method and system of a kind of secret protection, to realize that protection is personal
Private data improves safety.
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention
Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
Every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
Referring to FIG. 1, Fig. 1 is a kind of flow chart of the monitor video access method of secret protection provided by the present invention,
Method includes the following steps:
S11: the video access request and user information of user are obtained, the access authority of user is determined according to user information;
S12: the video access according to user requests to search the monitor video for needing to access in monitor video library;
S13: the access authority according to user pre-processes monitor video, obtains pretreated monitor video;
S14: pretreated monitor video is shown.
As it can be seen that needing to locate monitor video in advance according to the access authority of user after this method gets monitor video
Reason, obtains pretreated monitor video, the monitor video that the user of such different access permission sees be it is different, can
It is monitored the pretreatment of video according to the access authority of user, is able to satisfy the demand of query monitor in this way, and can effectively protect
Other proprietary individual privacies in region are demonstrate,proved, guarantees proprietary equity, prevents leakage of information, it is personal hidden to reach realization protection
Private data improve safety.
Based on the above method, specifically, access authority includes level-one permission, second level permission, three-level permission and level Four permission.
Access permission level successively includes: level-one, second level, three-level and level Four according to ascending divide, i.e. level-one access authority is minimum,
Level Four access authority is maximum.
Further, step S13 process specifically includes the following steps:
S21: if the access authority of user is second level permission, all persons' head portrait inside monitor video is replaced with into cartoon
Head portrait obtains replaced monitor video;
S22: if the access permission level of user is three-level permission, the head portrait of the designated person inside monitor video is replaced
At cartoon head portrait, replaced monitor video is obtained.
Further, the method also includes following steps:
S31: if the access authority of user is level-one permission, refusal provides monitor video;
S32: if the access authority of user is level Four permission, untreated original monitor video is provided a user.
Referring to FIG. 2, Fig. 2 is rights management flow chart.It is detailed, access authority is divided into four etc. first, first-class nothing is appointed
What permission, second-class only nature permission, third particular persons permission, four wait whole permissions.All videos were according to every 10 minutes
For a time quantum, each section is a physical unit, what position is the permission opened in this way be exactly some level privileges in
Set the video when range holds.Second-class permission is nature permission, sees monitor video under this permission, all in video
Personage can be processed, and head can be replaced by cartoon head portrait, can only see all natural landscape and some animal videos, such as
Pet etc..Third permission is particular persons permission, sees monitor video under this permission, in addition to specified specific people in video
It can be seen that facial video, other personages can be processed, and head can be replaced by cartoon head portrait, can thus see formulation
These specific people all in What for, gone where, without leaking other people privacy.The permissions such as four are whole power
Limit, permission control is very stringent, only opens on other occasions to core person.These permissions are open open and access day
Will is as audit.
By this method, it had not only been able to satisfy the demand of query monitor, but also can effectively guarantee that other are proprietary in region
Individual privacy guarantees proprietary equity, prevents leakage of information.
It is detailed, in order to go out personage by Computer Vision Recognition, the important entrance to monitoring area is needed, it is each
Path, camera is all disposed in the place such as fork in the road, for tracking and identifying pedestrian.And it is disposed in core entrance and nucleus
High-definition camera can recognize that face characteristic, and all cameras are linked on the server on backstage, by camera data
It stores in server.
Wherein, when there is demand, user applies for the access authority of video data, and manager according to the actual needs, gives
The applicant of video data opens corresponding permission, there is this permission, and user can be accessed accordingly by platform
Monitor video data after the completion of access, will withdraw permission, and user has any permission no longer.
Wherein, by carrying out Face datection, face critical point detection, face alignment, recognition of face etc. respectively to video frame
Algorithm identifies specific personnel, and the face replaced will be needed by algorithm of changing face, change the face in video frame into replacement
Face afterwards.According to pedestrian tracking algorithm, provide pedestrian in tracking video first frame original state (such as position, greatly
It is small), it is automatic to estimate the state of target pedestrian in subsequent frames, accelerate continuity of the subsequent personage in video.Please refer to Fig. 3
And Fig. 4, Fig. 3 are the flow chart that face is handled in video, Fig. 4 is algorithm flow chart of changing face.
Detailed, Face datection uses the deep learning method of detection algorithm one-stage, is mentioned using multilayer neural network
Feature is taken, main policies process is as follows:
(1) it uses and extracts anchor anchor in target detection SSD algorithm on multiple dimensioned characteristic pattern feature map
Thought, improve precision;
(2) Inception module is used, inside modules capture more scales using different size of convolution kernel and believe
Breath improves precision;
(3) using the parameter stride of convolutional layer as big as possible, (total 32) reduce rapidly characteristic pattern feature
Map improves speed.
Wherein, face critical point detection is using the enhancing face Keypoint detector under unsupervised learning, and main policies are such as
Under:
(1) factions' filtering CPM algorithm is used as basic frame;
(2) it introduces the timing based on optical flow algorithm Lucas-Kanade tracking module and is registrated loss function.
Wherein, the process of face alignment includes: that place is normalized to the set of keypoints that face critical point detection obtains
Reason calculates mean value and obtains standard shape, and finds each sample shape to the affine of this standard shape using least square method
Mapping mode, thus obtain photo to template affine transformation matrix.
Wherein, the process of recognition of face includes: main face after detecting face and positioning facial key feature points
Region can be cut out, after pretreatment, obtain the feature vector of current face, and the known face with inventory
It is compared, completes final classification.
Wherein, the process of pedestrian tracking includes: original state (such as the position for providing pedestrian in tracking video first frame
Set, size), it is automatic to estimate the state of target pedestrian in subsequent frames.
This method gives each user role permission, but Permission Levels divide many grades.Wherein, lack of competence is not can enter
Video system sees anything;Highest level is to see full content;It is secondary it is high-grade can see the information including related person,
He is handled incoherent personage's head portrait by computer vision processing system, and head portrait is substituted with cartoon character;What is had permission is low
Grade, all people's object head portrait be all it is treated, can only see natural landscape, all people's object all be can't see.To each
Permission, and some qualifications can be set, the monitor video in certain places in some period.It is entire to be after handling in this way
System is just able to satisfy many conditions of demand.For example want to look at surface conditions, it is only necessary to the lowest class having permission.Want to track certain
A stranger just only needs to open the Permission Levels of this stranger's relevant information.Not only actual need of work had been met, but also maximum
The private data that ensure that all people of limit.
Referring to FIG. 5, the monitor video that Fig. 5 is a kind of secret protection provided by the present invention accesses system structure signal
Figure, the system include: for realizing the above method, the system
Module 101 is obtained, the video access for obtaining user is requested and user information, determines user according to user information
Access authority;
Searching module 102 requests to search the prison for needing to access in monitor video library for the video access according to user
Video is controlled,
Preprocessing module 103 pre-processes monitor video for the access authority according to user, after obtaining pretreatment
Monitor video;
Display module 104, for showing pretreated monitor video.
As it can be seen that preprocessing module needs the access right according to user after acquisition module gets monitor video in the system
Limit pre-processes monitor video, obtains pretreated monitor video, the prison that the user of such different access permission sees
Control video be it is different, the pretreatment of video can be monitored according to the access authority of user, be able to satisfy in this way inquiry prison
The demand of control, and can effectively guarantee other proprietary individual privacies in region, guarantee proprietary equity, prevents information from letting out
Leakage reaches realization protection individual privacy data, improves safety.
Based on above system, specifically, access authority includes level-one permission, second level permission, three-level permission and level Four permission.
Further, preprocessing module includes:
First replacement unit, if the access authority for user is second level permission, by all persons inside monitor video
Head portrait replaces with cartoon head portrait, obtains replaced monitor video;
Second replacement unit will be specified inside monitor video if the access permission level for user is three-level permission
The head portrait of personage is substituted for cartoon head portrait, obtains replaced monitor video.
Further, the system also includes:
Video refuses module, if the access authority for user is level-one permission, refusal provides the monitoring view for needing to access
Frequently;
Video provides module, if the access authority for user is level Four permission, provides a user untreated original prison
Control video.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with it is other
The difference of embodiment, same or similar part may refer to each other between each embodiment.For being disclosed in embodiment
For system, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place is referring to method part
Explanation.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure
And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and
The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These
Function is implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Profession
Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered
Think beyond the scope of this invention.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor
The combination of capable software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only deposit
Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology
In any other form of storage medium well known in field.
Detailed Jie has been carried out to the monitor video access method and system of a kind of secret protection provided by the present invention above
It continues.Used herein a specific example illustrates the principle and implementation of the invention, and the explanation of above embodiments is only
It is to be used to help understand method and its core concept of the invention.It should be pointed out that for those skilled in the art
For, it without departing from the principle of the present invention, can be with several improvements and modifications are made to the present invention, these improve and repair
Decorations are also fallen within the protection scope of the claims of the present invention.
Claims (8)
1. a kind of monitor video access method of secret protection characterized by comprising
The video access request and user information for obtaining user, the access authority of user is determined according to the user information;
Video access according to user requests to search the monitor video for needing to access in monitor video library;
Access authority according to user pre-processes the monitor video, obtains pretreated monitor video;
Show pretreated monitor video.
2. the method as described in claim 1, which is characterized in that the access authority includes level-one permission, second level permission, three-level
Permission and level Four permission.
3. method according to claim 2, which is characterized in that the access authority according to user to the monitor video into
Row pretreatment, obtains pretreated video, comprising:
If the access authority of user is second level permission, all persons' head portrait inside monitor video is replaced with into cartoon head portrait, is obtained
To replaced monitor video;
If the access permission level of user is three-level permission, the head portrait of the designated person inside monitor video is substituted for cartoon head
Picture obtains replaced monitor video.
4. method as claimed in claim 3, which is characterized in that further include:
If the access authority of user is level-one permission, refusal provides monitor video;
If the access authority of user is level Four permission, untreated original monitor video is provided a user.
5. a kind of monitor video of secret protection accesses system, which is characterized in that for realizing any in such as Claims 1-4
Method described in one, comprising:
Module is obtained, the video access for obtaining user is requested and user information, determines user's according to the user information
Access authority;
Searching module requests to search the monitor video for needing to access in monitor video library for the video access according to user,
Preprocessing module pre-processes the monitor video for the access authority according to user, obtains pretreated
Monitor video;
Display module, for showing pretreated monitor video.
6. system as claimed in claim 5, which is characterized in that the access authority include level-one permission, second level permission,
Three-level permission and level Four permission.
7. system as claimed in claim 6, which is characterized in that the preprocessing module includes:
First replacement unit, if the access authority for user is second level permission, by all persons' head portrait inside monitor video
Cartoon head portrait is replaced with, replaced monitor video is obtained;
Second replacement unit, if the access permission level for user is three-level permission, by the designated person inside monitor video
Head portrait be substituted for cartoon head portrait, obtain replaced monitor video.
8. system as claimed in claim 7, which is characterized in that further include:
Video refuses module, if the access authority for user is level-one permission, refusal provides the monitor video for needing to access;
Video provides module, if the access authority for user is level Four permission, provides a user untreated original monitoring view
Frequently.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910814471.9A CN110505455A (en) | 2019-08-30 | 2019-08-30 | A kind of the monitor video access method and system of secret protection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910814471.9A CN110505455A (en) | 2019-08-30 | 2019-08-30 | A kind of the monitor video access method and system of secret protection |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110505455A true CN110505455A (en) | 2019-11-26 |
Family
ID=68590723
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910814471.9A Pending CN110505455A (en) | 2019-08-30 | 2019-08-30 | A kind of the monitor video access method and system of secret protection |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110505455A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111629227A (en) * | 2020-04-08 | 2020-09-04 | 北京百度网讯科技有限公司 | Video conversion method, device, system, electronic equipment and storage medium |
CN111654664A (en) * | 2020-05-08 | 2020-09-11 | 浙江大华技术股份有限公司 | High-altitude parabolic detection method and system, computer equipment and storage medium |
CN113032801A (en) * | 2021-02-26 | 2021-06-25 | 深圳市元征科技股份有限公司 | Traffic video viewing method, system, device and computer readable storage medium |
CN113312660A (en) * | 2021-05-06 | 2021-08-27 | 北京航空航天大学 | Remote monitoring privacy protection method and system based on computer vision |
CN114938465A (en) * | 2022-07-25 | 2022-08-23 | 广州万协通信息技术有限公司 | Encrypted data transmission method and device based on characteristic sequence |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103152556A (en) * | 2013-03-15 | 2013-06-12 | 云南大学 | Surveillance video encryption method for protecting privacy |
US20140132772A1 (en) * | 2012-11-13 | 2014-05-15 | International Business Machines Corporation | Automated Authorization to Access Surveillance Video Based on Pre-Specified Events |
CN104486083A (en) * | 2014-12-19 | 2015-04-01 | 小米科技有限责任公司 | Supervisory video processing method and device |
CN106330886A (en) * | 2016-08-18 | 2017-01-11 | 浙江大华技术股份有限公司 | Method and equipment for protecting video privacy in remote monitoring |
CN108040230A (en) * | 2017-12-19 | 2018-05-15 | 司马大大(北京)智能系统有限公司 | A kind of monitoring method and device for protecting privacy |
CN109743538A (en) * | 2018-11-30 | 2019-05-10 | 与德科技有限公司 | Monitor video checks control method |
-
2019
- 2019-08-30 CN CN201910814471.9A patent/CN110505455A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140132772A1 (en) * | 2012-11-13 | 2014-05-15 | International Business Machines Corporation | Automated Authorization to Access Surveillance Video Based on Pre-Specified Events |
CN103152556A (en) * | 2013-03-15 | 2013-06-12 | 云南大学 | Surveillance video encryption method for protecting privacy |
CN104486083A (en) * | 2014-12-19 | 2015-04-01 | 小米科技有限责任公司 | Supervisory video processing method and device |
CN106330886A (en) * | 2016-08-18 | 2017-01-11 | 浙江大华技术股份有限公司 | Method and equipment for protecting video privacy in remote monitoring |
CN108040230A (en) * | 2017-12-19 | 2018-05-15 | 司马大大(北京)智能系统有限公司 | A kind of monitoring method and device for protecting privacy |
CN109743538A (en) * | 2018-11-30 | 2019-05-10 | 与德科技有限公司 | Monitor video checks control method |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111629227A (en) * | 2020-04-08 | 2020-09-04 | 北京百度网讯科技有限公司 | Video conversion method, device, system, electronic equipment and storage medium |
CN111654664A (en) * | 2020-05-08 | 2020-09-11 | 浙江大华技术股份有限公司 | High-altitude parabolic detection method and system, computer equipment and storage medium |
CN111654664B (en) * | 2020-05-08 | 2022-04-08 | 浙江大华技术股份有限公司 | High-altitude parabolic detection method and system, computer equipment and storage medium |
CN113032801A (en) * | 2021-02-26 | 2021-06-25 | 深圳市元征科技股份有限公司 | Traffic video viewing method, system, device and computer readable storage medium |
CN113312660A (en) * | 2021-05-06 | 2021-08-27 | 北京航空航天大学 | Remote monitoring privacy protection method and system based on computer vision |
CN114938465A (en) * | 2022-07-25 | 2022-08-23 | 广州万协通信息技术有限公司 | Encrypted data transmission method and device based on characteristic sequence |
CN114938465B (en) * | 2022-07-25 | 2022-10-18 | 广州万协通信息技术有限公司 | Encrypted data transmission method and device based on characteristic sequence |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110505455A (en) | A kind of the monitor video access method and system of secret protection | |
CN110516586A (en) | A kind of facial image clustering method, system, product and medium | |
US8634601B2 (en) | Surveillance-based high-resolution facial recognition | |
CN102201061B (en) | Intelligent safety monitoring system and method based on multilevel filtering face recognition | |
CN108564052A (en) | Multi-cam dynamic human face recognition system based on MTCNN and method | |
CN110210276A (en) | A kind of motion track acquisition methods and its equipment, storage medium, terminal | |
CN110446015A (en) | A kind of abnormal behaviour monitoring method based on computer vision and system | |
US20080273088A1 (en) | Intelligent surveillance system and method for integrated event based surveillance | |
CN108197453A (en) | A kind of image method for secret protection and system | |
Nguyen et al. | Anomaly detection in traffic surveillance videos with gan-based future frame prediction | |
Rao et al. | Image-based fusion for video enhancement of night-time surveillance | |
CN108269331A (en) | A kind of intelligent video big data processing system | |
CN106156747B (en) | The method of the monitor video extracting semantic objects of Behavior-based control feature | |
CN115881286A (en) | Epidemic prevention management scheduling system | |
Wójtowicz et al. | New challenges for user privacy in cyberspace | |
Feris et al. | Case study: IBM smart surveillance system | |
Black et al. | A hierarchical database for visual surveillance applications | |
Thuraisingham et al. | Access control, confidentiality and privacy for video surveillance databases | |
KR20170095599A (en) | System and method for video searching | |
Delgado et al. | Urban security and crime prevention in smart cities: a quantitative systematic review | |
Fitzpatrick et al. | Law, Property and Disasters: Adaptive Perspectives from the Global South | |
Babaguchi et al. | Psychological study for designing privacy protected video surveillance system: PriSurv | |
Hemalatha et al. | CNN Based Image Forgery Segmentation and Classification for Forensic Verification | |
Zhu et al. | Privacy-preserving camera-based monitoring and tracking system for parking spaces | |
Qiu | Application analysis of face recognition technology in video investigation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191126 |
|
RJ01 | Rejection of invention patent application after publication |