CN110610456A - Imaging system and video processing method - Google Patents

Imaging system and video processing method Download PDF

Info

Publication number
CN110610456A
CN110610456A CN201910924955.9A CN201910924955A CN110610456A CN 110610456 A CN110610456 A CN 110610456A CN 201910924955 A CN201910924955 A CN 201910924955A CN 110610456 A CN110610456 A CN 110610456A
Authority
CN
China
Prior art keywords
video
privacy
face
module
original
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910924955.9A
Other languages
Chinese (zh)
Inventor
魏子昆
张至先
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Is According To Figure Network Technology Co Ltd
Shanghai Yitu Network Science and Technology Co Ltd
Original Assignee
Shanghai Is According To Figure Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Is According To Figure Network Technology Co Ltd filed Critical Shanghai Is According To Figure Network Technology Co Ltd
Priority to CN201910924955.9A priority Critical patent/CN110610456A/en
Publication of CN110610456A publication Critical patent/CN110610456A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T3/00Geometric image transformations in the plane of the image
    • G06T3/04Context-preserving transformations, e.g. by using an importance map
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/168Feature extraction; Face representation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/46Embedding additional information in the video signal during the compression process
    • H04N19/467Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/50Constructional details
    • H04N23/54Mounting of pick-up tubes, electronic image sensors, deviation or focusing coils
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/80Camera processing pipelines; Components thereof

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Studio Devices (AREA)
  • Image Processing (AREA)

Abstract

The invention provides an imaging system and a video processing method. The system comprises: the video acquisition module is used for acquiring an original video image; a privacy removal module comprising; the face recognition module is used for acquiring all face regions in an original video and respectively extracting feature vectors of faces; the characteristic vector change module is used for changing the characteristic vector quantity of the face extracted by the face recognition module into a forged face characteristic vector; the face counterfeiting module is used for forming a counterfeit face according to the counterfeit face feature vector formed by the feature vector changing module; and the privacy-removing video generation module is used for covering the forged faces formed by the face forging module on the original faces of the original videos respectively to form privacy-removing videos. The invention can protect privacy while the video is effective security or commercial data.

Description

Imaging system and video processing method
Technical Field
The present invention relates to the field of face recognition, and in particular, to a camera system and a video processing method.
Background
The face recognition technology has a high development prospect and economic benefit in the fields of public security investigation, access control systems, target tracking and other civil safety control systems. However, the face recognition technology may become the most effective security tool and may be disadvantageous for protecting personal privacy. In the prior art, once data leakage occurs, serious consequences can be caused. How to seek balance between personal privacy and public security or effectively protect the personal privacy and the security becomes an urgent problem to be solved.
The prior art fails to provide a good solution. For example, CN201510028289 is a method for disguising pictures, a method for viewing pictures, a system and a terminal, and the method of this patent is mainly to encrypt the pictures and then put them after the data of the disguised pictures. The effect of hiding the encrypted picture while displaying the disguised picture is achieved. CN201811361542, a method and a device for identifying, masking and sensing whether to view sensitive information in a picture, the method of this patent is: the method is mainly applied to a front-end interaction stage, and mainly comprises the steps of automatically identifying sensitive information (mainly including a number, a head portrait and the like in an identity card and the like) in an image, simply generating a covering area on the sensitive area when the front end displays the sensitive area, and unlocking and displaying the covering area by a mouse clicking method. CN201910040691, a method and system for image desensitization based on computer vision, the method of this patent is: and finding the sensitive area of the picture by a machine vision method, and fuzzifying the image of the sensitive area to realize the effect of automatic coding.
The prior art does not solve the problem of how to make a video become effective security or business data and protect privacy for the video set by the camera.
Disclosure of Invention
In order to solve the problems in the prior art, at least one embodiment of the present invention provides an image capturing system and a video processing method, which can protect privacy while a video is effective security or business data.
In a first aspect, an embodiment of the present invention provides an imaging system, where the system includes: the video acquisition module is used for acquiring an original video image; a privacy removal module comprising; the face recognition module is used for acquiring all face regions in the original video and respectively extracting feature vectors of the faces; the characteristic vector change module is used for changing the characteristic vector quantity of the face extracted by the face recognition module into a forged face characteristic vector; the face counterfeiting module is used for forming a counterfeit face according to the counterfeit face feature vector formed by the feature vector changing module; and the privacy-removing video generation module is used for covering the forged faces formed by the face forging module on the original faces of the original videos respectively to form privacy-removing videos.
In some embodiments, the camera system further comprises: the encryption module is used for encrypting the original video image; alternatively, the de-privacy video is encrypted.
In some embodiments, the decryption module is configured to decrypt the encrypted original video image or decrypt the encrypted privacy-removed video.
In some embodiments, the encryption module encrypts the original video or the de-privacy video frame by frame; or encrypting a data block with a preset size in the original video or the privacy-removed video; or the encryption module encrypts a data block with preset time in the original video or the privacy-removed video; or encrypting the original video or the privacy-removed video in its entirety.
In some embodiments, the video capture module, the de-privacy module, and the encryption module are packaged in a single camera; or the video acquisition module is positioned in one camera, and the privacy removing module and the encryption module are positioned in the background of the system.
In a second aspect, an embodiment of the present invention further provides a video processing method, including: acquiring an original video image; identifying all face regions in the original video, and respectively extracting feature vectors of faces; carrying out change operation on the feature vector of the extracted face to form a forged face feature vector; forming a forged face according to the forged face feature vector; and covering the forged faces on the original faces of the original videos respectively to form privacy-removed videos.
In some embodiments, the video processing method further comprises: encrypting the original video image; alternatively, the de-privacy video is encrypted.
In some embodiments, the video processing method further comprises: and decrypting the encrypted original video image or decrypting the encrypted privacy-removed video.
In some embodiments, the video processing method, the encrypting is: encrypting the original video or the privacy-removed video frame by frame; or encrypting a data block with a preset size in the original video or the privacy-removed video; encrypting a data block with preset time in the original video or the privacy-removed video; or encrypting the original video or the privacy-removed video in its entirety.
In a third aspect, an embodiment of the present invention further provides a video processing apparatus, including: at least one processor; a memory coupled with the at least one processor, the memory storing executable instructions, wherein the executable instructions, when executed by the at least one processor, cause the method of any of the second aspects above to be implemented.
In a fourth aspect, the present invention also provides a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the computer program implements the method according to any one of the second aspects above.
Therefore, in at least one embodiment of the embodiments of the present invention, after extracting feature vectors from all faces in an acquired original video and performing imitation, the imitated faces are respectively covered on the faces of the original video to form a privacy-removed video, where the privacy-removed video does not include any face in the original video, can still be normally viewed, and can normally analyze information such as pedestrian behaviors and crowd distribution from the privacy-removed video. The video can be used as effective security or business data while the privacy is protected.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required to be used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive labor.
FIG. 1 is a schematic diagram of a configuration of an embodiment of a camera system according to the present invention;
fig. 2 is a flowchart of an embodiment of a video processing method according to the present invention.
Detailed description of the preferred embodiments
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
It is noted that, in this document, relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions.
As shown in fig. 1, in a first aspect, the present embodiment provides an image capturing system, including:
a video acquisition module 200 for acquiring an original video image;
a de-privacy module 300 comprising;
the face recognition module 310 is configured to obtain all face regions in the original video, and extract feature vectors of faces respectively. If a plurality of faces exist in the original video, extracting the feature vectors of the faces respectively. Meanwhile, the corresponding position of each face in the video can be recorded, so that each forged face can be covered on the corresponding original face position when a privacy removing module is finally generated.
And the feature vector change module 320 is configured to change the feature vector of the face extracted by the face recognition module into a fake face feature vector. Specifically, the feature vector change module may change the feature vector into a new face feature vector through a one-way hash (hash) algorithm, such as md5 algorithm, or other mathematical methods, and may record the new face feature vector as a fake feature vector.
And the face counterfeiting module 330 is used for forming a counterfeit face according to the counterfeit face feature vector formed by the feature vector change module. For example, a new face is generated according to the forged feature vector through a face generation algorithm based on an antagonistic neural network, such as a deepfake algorithm, and the face is different from the original face and is marked as a forged face. Because the forged face is formed according to the feature vector of the original face, the faces with the same feature vector can form the same or similar faces after forging in different occasions. The method can ensure that the forged face formed by the same original face is similar to the forged face formed by the same original face under any condition within the preset time. The transverse consistency of the forged face is ensured.
And the privacy-removed video generation module 340 is used for covering the forged faces formed by the face forging module on the original faces of the original videos respectively to form privacy-removed videos.
In this embodiment, after extracting feature vectors from all faces in an acquired original video and performing imitation, the imitated faces are respectively covered on the faces in the original video to form a privacy-removed video.
It can be understood that overlaying a fake face onto a face in an original video requires that the fake face be attached to the original video at the location and at the time of the appearance of the corresponding original face. Specifically, the time and the position of the original face appearing in the video are recorded, and after the fake face is generated, the fake face is pasted back to the original video according to the time and the position of the original face appearing in the video.
The privacy-removing video does not contain the face in any original video, can still be normally watched, and can normally analyze information such as pedestrian behaviors, crowd distribution and the like. The video can be used as effective security or business data while the privacy is protected.
Furthermore, the imaging system of the present embodiment may further include: the encryption module is used for encrypting the original video image; alternatively, the privacy removed video is encrypted. And, may further include: and the decryption module is used for decrypting the encrypted original video image or decrypting the encrypted privacy-removed video. The encryption module encrypts the original video or the privacy-removed video frame by frame; or, encrypting a data block with a preset size in the original video or the privacy-removed video; or encrypting a data block with preset time in the original video or the privacy-removed video; alternatively, the entire video of the original video or the privacy-removed video is encrypted.
Specifically, the encryption module may use, for example, an RSA encryption algorithm, and may perform one-way encryption through a public key. The specific method can be to encrypt the video frame by frame, or encrypt each data block with certain size, or directly encrypt the whole video. The encrypted video is stored, and cannot be decrypted without an authorized private key, so that the safety of the encrypted video is ensured. And during decryption, similar to the encryption mode, the original video is obtained through decryption by the private key.
In one embodiment, the video capture module, the privacy removal module and the encryption module of the camera system are packaged in one camera. The chip modules with different functions can be electrically connected with each other to transmit data signals and perform data processing, or a plurality of software modules can be arranged in a central processing unit to perform data processing. For example, the privacy-removing module and the encryption chip are packaged in a camera with a video acquisition module, the original video is obtained through the camera, the encryption operation is performed through the encryption chip or a general-purpose processor, and the privacy-removing module calculation is performed through an AI chip or a general-purpose attached processor (gpu) or a central processing unit (cpu).
In this embodiment, the chip module packaged in the camera first encrypts or de-encrypts the video data and then transmits the video data to the background server through a wired or wireless network or a combination thereof. Because the transmitted video data is encrypted or subjected to privacy removal processing, the occurrence of secret leakage can be reduced, and the reliability of the system is improved.
In another embodiment, the video capture module of the camera system is located in a camera, and the privacy removal module and the encryption module are located in the background of the system. For example, the privacy removing module and the encryption and decryption module are extracted from the camera and integrated on a background server in the form of a chip module or a software module. The front end camera just general camera can.
In this embodiment, when different camera systems need to be encrypted and privacy-free upgraded, the system can be directly upgraded in the background without replacing one camera or performing respective upgrade processing on each camera. The updating efficiency is improved, and the cost is reduced.
As shown in fig. 2, in a second aspect, the present embodiment provides a video processing method, including:
400, an original video image is obtained, and the original video image can be obtained by any camera in the prior art or the future technology.
And 410, recognizing all face areas in the original video, and respectively extracting feature vectors of the faces. If a plurality of faces exist in the original video, extracting the feature vectors of the faces respectively through recognition.
And 420, performing change operation on the feature vector of the extracted face to form a forged face feature vector which can be recorded as a forged feature vector. The change operation may be performed by a one-way hash (hash) algorithm, such as md5 algorithm, or other mathematical methods.
And 430, forming a forged face according to the forged face feature vector. Specifically, a new face can be generated by a face generation algorithm based on an antagonistic neural network, such as a deepfake algorithm, according to the forged feature vector. The face is different from the original face and is marked as a forged face. Because the forged face is formed according to the feature vector of the original face, the faces with the same feature vector can form the same or similar faces after forging in different occasions. The method can ensure that the forged face formed by the same original face is similar to the forged face formed by the same original face under any condition within the preset time. The transverse consistency of the forged face is ensured.
And 440, covering the fake human faces on the original human faces of the original videos respectively to form privacy-removed videos.
In this embodiment, after extracting feature vectors from all faces in an acquired original video and performing imitation, the imitated faces are respectively covered on the faces in the original video to form a privacy-removed video.
It can be understood that overlaying a fake face onto a face in an original video requires that the fake face be attached to the original video at the location and at the time of the appearance of the corresponding original face. Specifically, the time and the position of the original face appearing in the video are recorded, and after the fake face is generated, the fake face is pasted back to the original video according to the time and the position of the original face appearing in the video.
In the embodiment, after extracting feature vectors from all human faces in the acquired original video for imitation, the imitated human faces are respectively covered on the human faces in the original video to form the privacy-removed video, the privacy-removed video does not contain the human faces in any original video, can still be normally watched, and can normally analyze information such as pedestrian behaviors, crowd distribution and the like. The video can be used as effective security or business data while the privacy is protected.
In another embodiment, a video processing method further includes: encrypting an original video image; alternatively, the privacy removed video is encrypted.
It can be understood that, in the embodiment of the present invention, the order of encryption and privacy elimination is not limited, where encrypting an original video is to encrypt first and then eliminate privacy, and encrypting a video without privacy is to encrypt first and then eliminate privacy.
And, after encrypting, further comprising: decrypting the encrypted original video image or decrypting the encrypted privacy-removed video.
Specifically, during encryption, the original video or the privacy-removed video can be encrypted frame by frame; or, encrypting a data block with a preset size in the original video or the privacy-removed video; or encrypting a data block with preset time in the original video or the privacy-removed video; alternatively, the entire video of the original video or the privacy-removed video is encrypted.
It is understood that decryption is a process corresponding to encryption, and the method of decryption may be adapted to the manner of encryption.
In a third aspect, the present invention also provides a video processing apparatus comprising:
at least one processor; a memory coupled to the at least one processor, the memory storing executable instructions, wherein the executable instructions, when executed by the at least one processor, cause the method of the second aspect of the invention to be carried out.
The present embodiment provides a video processing apparatus including: at least one processor; a memory coupled to the at least one processor. For example, the memory may include random access memory, flash memory, read only memory, programmable read only memory, non-volatile memory or registers, and the like. The processor may be a Central Processing Unit (CPU) or the like. The memory may store executable instructions. The processor may execute executable instructions stored in the memory to implement the various processes described herein.
It will be appreciated that the memory in this embodiment can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. The non-volatile memory may be a ROM (Read-only memory), a PROM (programmable Read-only memory), an EPROM (erasable programmable Read-only memory), an EEPROM (electrically erasable programmable Read-only memory), or a flash memory. The volatile memory may be a RAM (random access memory) which serves as an external cache. By way of illustration and not limitation, many forms of RAM are available, such as SRAM (staticaram, static random access memory), DRAM (dynamic RAM, dynamic random access memory), SDRAM (synchronous DRAM ), DDRSDRAM (double data rate SDRAM, double data rate synchronous DRAM), ESDRAM (Enhanced SDRAM, Enhanced synchronous DRAM), SLDRAM (synchlink DRAM, synchronous link DRAM), and DRRAM (directrrambus RAM, direct memory random access memory). The memory 42 described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
In some embodiments, the memory stores elements, upgrade packages, executable units, or data structures, or a subset thereof, or an extended set thereof: an operating system and an application program.
The operating system includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, and is used for implementing various basic services and processing hardware-based tasks. The application programs comprise various application programs and are used for realizing various application services. The program for implementing the method of the embodiment of the present invention may be included in the application program.
In an embodiment of the present invention, the processor is configured to execute the method steps provided in the second aspect by calling a program or an instruction stored in the memory, specifically, a program or an instruction stored in the application program.
Furthermore, in a fourth aspect, the present invention also provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the method of the second aspect of the present invention.
For example, the machine-readable storage medium may include, but is not limited to, various known and unknown types of non-volatile memory.
Those of skill in the art would understand that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the technical solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments of the present application, the disclosed system, apparatus and method may be implemented in other ways. For example, the division of the unit is only one logic function division, and there may be another division manner in actual implementation. For example, multiple units or components may be combined or may be integrated into another system. In addition, the coupling between the respective units may be direct coupling or indirect coupling. In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or may exist separately and physically.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a machine-readable storage medium. Therefore, the technical solution of the present application may be embodied in the form of a software product, which may be stored in a machine-readable storage medium and may include several instructions to cause an electronic device to perform all or part of the processes of the technical solution described in the embodiments of the present application. The storage medium may include various media that can store program codes, such as ROM, RAM, a removable disk, a hard disk, a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present application, and the scope of the present application is not limited thereto. Those skilled in the art can make changes or substitutions within the technical scope disclosed in the present application, and such changes or substitutions should be within the protective scope of the present application.

Claims (11)

1. A camera system, characterized in that the system comprises:
the video acquisition module is used for acquiring an original video image;
a privacy removal module comprising;
the face recognition module is used for acquiring all face regions in the original video and respectively extracting feature vectors of the faces;
the characteristic vector change module is used for changing the characteristic vector quantity of the face extracted by the face recognition module into a forged face characteristic vector;
the face counterfeiting module is used for forming a counterfeit face according to the counterfeit face feature vector formed by the feature vector changing module;
and the privacy-removing video generation module is used for covering the forged faces formed by the face forging module on the original faces of the original videos respectively to form privacy-removing videos.
2. The camera system according to claim 1, further comprising:
the encryption module is used for encrypting the original video image; or
Encrypting the de-privacy video.
3. The camera system according to claim 2, further comprising:
the decryption module is used for decrypting the encrypted original video image; or
The encrypted de-privacy video is decrypted.
4. The camera system according to claim 2, wherein the encryption module encrypts the original video or the privacy-removed video frame by frame; or
The encryption module encrypts a data block with a preset size in the original video or the privacy-removed video; or
The encryption module encrypts a data block with preset time in the original video or the privacy-removed video; or
Encrypting the original video or the privacy removed video in its entirety.
5. The camera system according to any one of claims 2-4, wherein the video capture module, the privacy removal module, and the encryption module are packaged in a single camera; or
The video acquisition module is positioned in one camera, and the privacy removal module and the encryption module are positioned in the background of the system.
6. A video processing method, comprising:
acquiring an original video image;
identifying all face regions in the original video, and respectively extracting feature vectors of faces;
carrying out change operation on the feature vector of the extracted face to form a forged face feature vector;
forming a forged face according to the forged face feature vector;
and covering the forged faces on the original faces of the original videos respectively to form privacy-removed videos.
7. The video processing method of claim 6, further comprising:
encrypting the original video image; or
Encrypting the de-privacy video.
8. The video processing method of claim 7, further comprising:
decrypting the encrypted original video image; or
Decrypting the encrypted de-privacy video.
9. The video processing method according to claim 7 or 8, wherein the encryption is:
encrypting the original video or the privacy-removed video frame by frame; or
Encrypting a data block with a preset size in the original video or the privacy-removed video; or
Encrypting a data block with preset time in the original video or the privacy-removed video; or
Encrypting the original video or the privacy removed video in its entirety.
10. A video processing apparatus comprising:
at least one processor;
a memory coupled with the at least one processor, the memory storing executable instructions, wherein the executable instructions, when executed by the at least one processor, cause the method of any of claims 6 to 9 to be implemented.
11. A computer-readable storage medium, characterized in that a computer program is stored thereon, which computer program, when being executed by a processor, realizes the steps of the method according to any one of the preceding claims 6 to 9.
CN201910924955.9A 2019-09-27 2019-09-27 Imaging system and video processing method Pending CN110610456A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910924955.9A CN110610456A (en) 2019-09-27 2019-09-27 Imaging system and video processing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910924955.9A CN110610456A (en) 2019-09-27 2019-09-27 Imaging system and video processing method

Publications (1)

Publication Number Publication Date
CN110610456A true CN110610456A (en) 2019-12-24

Family

ID=68893611

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910924955.9A Pending CN110610456A (en) 2019-09-27 2019-09-27 Imaging system and video processing method

Country Status (1)

Country Link
CN (1) CN110610456A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111654664A (en) * 2020-05-08 2020-09-11 浙江大华技术股份有限公司 High-altitude parabolic detection method and system, computer equipment and storage medium
CN112668401A (en) * 2020-12-09 2021-04-16 中国科学院信息工程研究所 Face privacy protection method and device based on feature decoupling
CN112770049A (en) * 2020-12-30 2021-05-07 维沃移动通信有限公司 Shooting method, shooting device and storage medium
CN113139527A (en) * 2021-05-28 2021-07-20 深圳文达智通技术有限公司 Video privacy protection method, device, equipment and storage medium
CN113486394A (en) * 2021-06-18 2021-10-08 武汉科技大学 Privacy protection and tamper-proofing method and system based on face block chain
CN115086718A (en) * 2022-07-19 2022-09-20 广州万协通信息技术有限公司 Video stream encryption method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101167361A (en) * 2005-04-25 2008-04-23 松下电器产业株式会社 Monitoring camera system, imaging device, and video display device
CN103327231A (en) * 2012-03-19 2013-09-25 卡西欧计算机株式会社 Image creating device and image creating method
CN107067429A (en) * 2017-03-17 2017-08-18 徐迪 Video editing system and method that face three-dimensional reconstruction and face based on deep learning are replaced
CN108427918A (en) * 2018-02-12 2018-08-21 杭州电子科技大学 Face method for secret protection based on image processing techniques
CN108537126A (en) * 2018-03-13 2018-09-14 东北大学 A kind of face image processing system and method
CN110135195A (en) * 2019-05-21 2019-08-16 司马大大(北京)智能系统有限公司 Method for secret protection, device, equipment and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101167361A (en) * 2005-04-25 2008-04-23 松下电器产业株式会社 Monitoring camera system, imaging device, and video display device
CN103327231A (en) * 2012-03-19 2013-09-25 卡西欧计算机株式会社 Image creating device and image creating method
CN107067429A (en) * 2017-03-17 2017-08-18 徐迪 Video editing system and method that face three-dimensional reconstruction and face based on deep learning are replaced
CN108427918A (en) * 2018-02-12 2018-08-21 杭州电子科技大学 Face method for secret protection based on image processing techniques
CN108537126A (en) * 2018-03-13 2018-09-14 东北大学 A kind of face image processing system and method
CN110135195A (en) * 2019-05-21 2019-08-16 司马大大(北京)智能系统有限公司 Method for secret protection, device, equipment and storage medium

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111654664A (en) * 2020-05-08 2020-09-11 浙江大华技术股份有限公司 High-altitude parabolic detection method and system, computer equipment and storage medium
CN111654664B (en) * 2020-05-08 2022-04-08 浙江大华技术股份有限公司 High-altitude parabolic detection method and system, computer equipment and storage medium
CN112668401A (en) * 2020-12-09 2021-04-16 中国科学院信息工程研究所 Face privacy protection method and device based on feature decoupling
CN112668401B (en) * 2020-12-09 2023-01-17 中国科学院信息工程研究所 Face privacy protection method and device based on feature decoupling
CN112770049A (en) * 2020-12-30 2021-05-07 维沃移动通信有限公司 Shooting method, shooting device and storage medium
CN113139527A (en) * 2021-05-28 2021-07-20 深圳文达智通技术有限公司 Video privacy protection method, device, equipment and storage medium
CN113139527B (en) * 2021-05-28 2023-09-22 深圳文达智通技术有限公司 Video privacy protection method, device, equipment and storage medium
CN113486394A (en) * 2021-06-18 2021-10-08 武汉科技大学 Privacy protection and tamper-proofing method and system based on face block chain
CN115086718A (en) * 2022-07-19 2022-09-20 广州万协通信息技术有限公司 Video stream encryption method and device

Similar Documents

Publication Publication Date Title
CN110620891B (en) Imaging system and video processing method
CN110610456A (en) Imaging system and video processing method
CN110674765A (en) Imaging system and video processing method
CN110647659B (en) Image pickup system and video processing method
US11157646B2 (en) Systems and methods for processing and handling privacy-sensitive image data
CN108985081B (en) Watermark encryption method, device, medium and electronic equipment
KR100878579B1 (en) Watermarking Method, Watermark Validation Method, Watermarking Device and Watermark Validation Device
CN110572604B (en) Imaging system and video processing method
CN112949545B (en) Method, apparatus, computing device and medium for recognizing face image
US20100103193A1 (en) Image monitor apparatus and computer-readable storage medium storing image monitor program
WO2016188154A1 (en) Method and device for image processing
CN111931145A (en) Face encryption method, face recognition method, face encryption device, face recognition device, electronic equipment and storage medium
KR101951605B1 (en) Cctv image security system to prevent image leakage
US20200250341A1 (en) Privacy masking method using format-preserving encryption in image security system and recording medium for performing same
KR101809086B1 (en) System for Suppling and Authenticating Digital Contents using Real Time Image Watermarking Technic
US8453248B2 (en) Method and devices for video processing rights enforcement
CN114745373A (en) File transmission method, device, equipment and storage medium
CN114387155A (en) Image processing method, apparatus and storage medium
CN116975923A (en) Face information desensitization protection method, system and medium based on two-dimension code
JP5353147B2 (en) Face matching system
CN111259407A (en) Picture processing method and device, storage medium and terminal
Abboud Multifactor authentication for software protection
CN115250314A (en) Image encryption and decryption method, electronic device, storage medium, and program product
CN111860726B (en) Two-dimensional code display method, verification method, device and computer readable storage medium
JP5718757B2 (en) Image management apparatus, image management program, and image management method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191224