CN110610456A - Imaging system and video processing method - Google Patents
Imaging system and video processing method Download PDFInfo
- Publication number
- CN110610456A CN110610456A CN201910924955.9A CN201910924955A CN110610456A CN 110610456 A CN110610456 A CN 110610456A CN 201910924955 A CN201910924955 A CN 201910924955A CN 110610456 A CN110610456 A CN 110610456A
- Authority
- CN
- China
- Prior art keywords
- video
- privacy
- face
- module
- original
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 16
- 238000003384 imaging method Methods 0.000 title abstract description 5
- 239000013598 vector Substances 0.000 claims abstract description 54
- 230000008859 change Effects 0.000 claims abstract description 12
- 238000005242 forging Methods 0.000 claims abstract description 6
- 238000000034 method Methods 0.000 claims description 26
- 238000012545 processing Methods 0.000 claims description 13
- 238000004590 computer program Methods 0.000 claims description 6
- 238000004422 calculation algorithm Methods 0.000 description 10
- 230000001360 synchronised effect Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 230000006399 behavior Effects 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000003042 antagnostic effect Effects 0.000 description 2
- 238000013528 artificial neural network Methods 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000012067 mathematical method Methods 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 238000000586 desensitisation Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000008030 elimination Effects 0.000 description 1
- 238000003379 elimination reaction Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 230000000873 masking effect Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000001681 protective effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T3/00—Geometric image transformations in the plane of the image
- G06T3/04—Context-preserving transformations, e.g. by using an importance map
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/161—Detection; Localisation; Normalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/168—Feature extraction; Face representation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N19/00—Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
- H04N19/46—Embedding additional information in the video signal during the compression process
- H04N19/467—Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N23/00—Cameras or camera modules comprising electronic image sensors; Control thereof
- H04N23/50—Constructional details
- H04N23/54—Mounting of pick-up tubes, electronic image sensors, deviation or focusing coils
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N23/00—Cameras or camera modules comprising electronic image sensors; Control thereof
- H04N23/80—Camera processing pipelines; Components thereof
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- General Health & Medical Sciences (AREA)
- Human Computer Interaction (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Studio Devices (AREA)
- Image Processing (AREA)
Abstract
The invention provides an imaging system and a video processing method. The system comprises: the video acquisition module is used for acquiring an original video image; a privacy removal module comprising; the face recognition module is used for acquiring all face regions in an original video and respectively extracting feature vectors of faces; the characteristic vector change module is used for changing the characteristic vector quantity of the face extracted by the face recognition module into a forged face characteristic vector; the face counterfeiting module is used for forming a counterfeit face according to the counterfeit face feature vector formed by the feature vector changing module; and the privacy-removing video generation module is used for covering the forged faces formed by the face forging module on the original faces of the original videos respectively to form privacy-removing videos. The invention can protect privacy while the video is effective security or commercial data.
Description
Technical Field
The present invention relates to the field of face recognition, and in particular, to a camera system and a video processing method.
Background
The face recognition technology has a high development prospect and economic benefit in the fields of public security investigation, access control systems, target tracking and other civil safety control systems. However, the face recognition technology may become the most effective security tool and may be disadvantageous for protecting personal privacy. In the prior art, once data leakage occurs, serious consequences can be caused. How to seek balance between personal privacy and public security or effectively protect the personal privacy and the security becomes an urgent problem to be solved.
The prior art fails to provide a good solution. For example, CN201510028289 is a method for disguising pictures, a method for viewing pictures, a system and a terminal, and the method of this patent is mainly to encrypt the pictures and then put them after the data of the disguised pictures. The effect of hiding the encrypted picture while displaying the disguised picture is achieved. CN201811361542, a method and a device for identifying, masking and sensing whether to view sensitive information in a picture, the method of this patent is: the method is mainly applied to a front-end interaction stage, and mainly comprises the steps of automatically identifying sensitive information (mainly including a number, a head portrait and the like in an identity card and the like) in an image, simply generating a covering area on the sensitive area when the front end displays the sensitive area, and unlocking and displaying the covering area by a mouse clicking method. CN201910040691, a method and system for image desensitization based on computer vision, the method of this patent is: and finding the sensitive area of the picture by a machine vision method, and fuzzifying the image of the sensitive area to realize the effect of automatic coding.
The prior art does not solve the problem of how to make a video become effective security or business data and protect privacy for the video set by the camera.
Disclosure of Invention
In order to solve the problems in the prior art, at least one embodiment of the present invention provides an image capturing system and a video processing method, which can protect privacy while a video is effective security or business data.
In a first aspect, an embodiment of the present invention provides an imaging system, where the system includes: the video acquisition module is used for acquiring an original video image; a privacy removal module comprising; the face recognition module is used for acquiring all face regions in the original video and respectively extracting feature vectors of the faces; the characteristic vector change module is used for changing the characteristic vector quantity of the face extracted by the face recognition module into a forged face characteristic vector; the face counterfeiting module is used for forming a counterfeit face according to the counterfeit face feature vector formed by the feature vector changing module; and the privacy-removing video generation module is used for covering the forged faces formed by the face forging module on the original faces of the original videos respectively to form privacy-removing videos.
In some embodiments, the camera system further comprises: the encryption module is used for encrypting the original video image; alternatively, the de-privacy video is encrypted.
In some embodiments, the decryption module is configured to decrypt the encrypted original video image or decrypt the encrypted privacy-removed video.
In some embodiments, the encryption module encrypts the original video or the de-privacy video frame by frame; or encrypting a data block with a preset size in the original video or the privacy-removed video; or the encryption module encrypts a data block with preset time in the original video or the privacy-removed video; or encrypting the original video or the privacy-removed video in its entirety.
In some embodiments, the video capture module, the de-privacy module, and the encryption module are packaged in a single camera; or the video acquisition module is positioned in one camera, and the privacy removing module and the encryption module are positioned in the background of the system.
In a second aspect, an embodiment of the present invention further provides a video processing method, including: acquiring an original video image; identifying all face regions in the original video, and respectively extracting feature vectors of faces; carrying out change operation on the feature vector of the extracted face to form a forged face feature vector; forming a forged face according to the forged face feature vector; and covering the forged faces on the original faces of the original videos respectively to form privacy-removed videos.
In some embodiments, the video processing method further comprises: encrypting the original video image; alternatively, the de-privacy video is encrypted.
In some embodiments, the video processing method further comprises: and decrypting the encrypted original video image or decrypting the encrypted privacy-removed video.
In some embodiments, the video processing method, the encrypting is: encrypting the original video or the privacy-removed video frame by frame; or encrypting a data block with a preset size in the original video or the privacy-removed video; encrypting a data block with preset time in the original video or the privacy-removed video; or encrypting the original video or the privacy-removed video in its entirety.
In a third aspect, an embodiment of the present invention further provides a video processing apparatus, including: at least one processor; a memory coupled with the at least one processor, the memory storing executable instructions, wherein the executable instructions, when executed by the at least one processor, cause the method of any of the second aspects above to be implemented.
In a fourth aspect, the present invention also provides a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the computer program implements the method according to any one of the second aspects above.
Therefore, in at least one embodiment of the embodiments of the present invention, after extracting feature vectors from all faces in an acquired original video and performing imitation, the imitated faces are respectively covered on the faces of the original video to form a privacy-removed video, where the privacy-removed video does not include any face in the original video, can still be normally viewed, and can normally analyze information such as pedestrian behaviors and crowd distribution from the privacy-removed video. The video can be used as effective security or business data while the privacy is protected.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required to be used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive labor.
FIG. 1 is a schematic diagram of a configuration of an embodiment of a camera system according to the present invention;
fig. 2 is a flowchart of an embodiment of a video processing method according to the present invention.
Detailed description of the preferred embodiments
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
It is noted that, in this document, relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions.
As shown in fig. 1, in a first aspect, the present embodiment provides an image capturing system, including:
a video acquisition module 200 for acquiring an original video image;
a de-privacy module 300 comprising;
the face recognition module 310 is configured to obtain all face regions in the original video, and extract feature vectors of faces respectively. If a plurality of faces exist in the original video, extracting the feature vectors of the faces respectively. Meanwhile, the corresponding position of each face in the video can be recorded, so that each forged face can be covered on the corresponding original face position when a privacy removing module is finally generated.
And the feature vector change module 320 is configured to change the feature vector of the face extracted by the face recognition module into a fake face feature vector. Specifically, the feature vector change module may change the feature vector into a new face feature vector through a one-way hash (hash) algorithm, such as md5 algorithm, or other mathematical methods, and may record the new face feature vector as a fake feature vector.
And the face counterfeiting module 330 is used for forming a counterfeit face according to the counterfeit face feature vector formed by the feature vector change module. For example, a new face is generated according to the forged feature vector through a face generation algorithm based on an antagonistic neural network, such as a deepfake algorithm, and the face is different from the original face and is marked as a forged face. Because the forged face is formed according to the feature vector of the original face, the faces with the same feature vector can form the same or similar faces after forging in different occasions. The method can ensure that the forged face formed by the same original face is similar to the forged face formed by the same original face under any condition within the preset time. The transverse consistency of the forged face is ensured.
And the privacy-removed video generation module 340 is used for covering the forged faces formed by the face forging module on the original faces of the original videos respectively to form privacy-removed videos.
In this embodiment, after extracting feature vectors from all faces in an acquired original video and performing imitation, the imitated faces are respectively covered on the faces in the original video to form a privacy-removed video.
It can be understood that overlaying a fake face onto a face in an original video requires that the fake face be attached to the original video at the location and at the time of the appearance of the corresponding original face. Specifically, the time and the position of the original face appearing in the video are recorded, and after the fake face is generated, the fake face is pasted back to the original video according to the time and the position of the original face appearing in the video.
The privacy-removing video does not contain the face in any original video, can still be normally watched, and can normally analyze information such as pedestrian behaviors, crowd distribution and the like. The video can be used as effective security or business data while the privacy is protected.
Furthermore, the imaging system of the present embodiment may further include: the encryption module is used for encrypting the original video image; alternatively, the privacy removed video is encrypted. And, may further include: and the decryption module is used for decrypting the encrypted original video image or decrypting the encrypted privacy-removed video. The encryption module encrypts the original video or the privacy-removed video frame by frame; or, encrypting a data block with a preset size in the original video or the privacy-removed video; or encrypting a data block with preset time in the original video or the privacy-removed video; alternatively, the entire video of the original video or the privacy-removed video is encrypted.
Specifically, the encryption module may use, for example, an RSA encryption algorithm, and may perform one-way encryption through a public key. The specific method can be to encrypt the video frame by frame, or encrypt each data block with certain size, or directly encrypt the whole video. The encrypted video is stored, and cannot be decrypted without an authorized private key, so that the safety of the encrypted video is ensured. And during decryption, similar to the encryption mode, the original video is obtained through decryption by the private key.
In one embodiment, the video capture module, the privacy removal module and the encryption module of the camera system are packaged in one camera. The chip modules with different functions can be electrically connected with each other to transmit data signals and perform data processing, or a plurality of software modules can be arranged in a central processing unit to perform data processing. For example, the privacy-removing module and the encryption chip are packaged in a camera with a video acquisition module, the original video is obtained through the camera, the encryption operation is performed through the encryption chip or a general-purpose processor, and the privacy-removing module calculation is performed through an AI chip or a general-purpose attached processor (gpu) or a central processing unit (cpu).
In this embodiment, the chip module packaged in the camera first encrypts or de-encrypts the video data and then transmits the video data to the background server through a wired or wireless network or a combination thereof. Because the transmitted video data is encrypted or subjected to privacy removal processing, the occurrence of secret leakage can be reduced, and the reliability of the system is improved.
In another embodiment, the video capture module of the camera system is located in a camera, and the privacy removal module and the encryption module are located in the background of the system. For example, the privacy removing module and the encryption and decryption module are extracted from the camera and integrated on a background server in the form of a chip module or a software module. The front end camera just general camera can.
In this embodiment, when different camera systems need to be encrypted and privacy-free upgraded, the system can be directly upgraded in the background without replacing one camera or performing respective upgrade processing on each camera. The updating efficiency is improved, and the cost is reduced.
As shown in fig. 2, in a second aspect, the present embodiment provides a video processing method, including:
400, an original video image is obtained, and the original video image can be obtained by any camera in the prior art or the future technology.
And 410, recognizing all face areas in the original video, and respectively extracting feature vectors of the faces. If a plurality of faces exist in the original video, extracting the feature vectors of the faces respectively through recognition.
And 420, performing change operation on the feature vector of the extracted face to form a forged face feature vector which can be recorded as a forged feature vector. The change operation may be performed by a one-way hash (hash) algorithm, such as md5 algorithm, or other mathematical methods.
And 430, forming a forged face according to the forged face feature vector. Specifically, a new face can be generated by a face generation algorithm based on an antagonistic neural network, such as a deepfake algorithm, according to the forged feature vector. The face is different from the original face and is marked as a forged face. Because the forged face is formed according to the feature vector of the original face, the faces with the same feature vector can form the same or similar faces after forging in different occasions. The method can ensure that the forged face formed by the same original face is similar to the forged face formed by the same original face under any condition within the preset time. The transverse consistency of the forged face is ensured.
And 440, covering the fake human faces on the original human faces of the original videos respectively to form privacy-removed videos.
In this embodiment, after extracting feature vectors from all faces in an acquired original video and performing imitation, the imitated faces are respectively covered on the faces in the original video to form a privacy-removed video.
It can be understood that overlaying a fake face onto a face in an original video requires that the fake face be attached to the original video at the location and at the time of the appearance of the corresponding original face. Specifically, the time and the position of the original face appearing in the video are recorded, and after the fake face is generated, the fake face is pasted back to the original video according to the time and the position of the original face appearing in the video.
In the embodiment, after extracting feature vectors from all human faces in the acquired original video for imitation, the imitated human faces are respectively covered on the human faces in the original video to form the privacy-removed video, the privacy-removed video does not contain the human faces in any original video, can still be normally watched, and can normally analyze information such as pedestrian behaviors, crowd distribution and the like. The video can be used as effective security or business data while the privacy is protected.
In another embodiment, a video processing method further includes: encrypting an original video image; alternatively, the privacy removed video is encrypted.
It can be understood that, in the embodiment of the present invention, the order of encryption and privacy elimination is not limited, where encrypting an original video is to encrypt first and then eliminate privacy, and encrypting a video without privacy is to encrypt first and then eliminate privacy.
And, after encrypting, further comprising: decrypting the encrypted original video image or decrypting the encrypted privacy-removed video.
Specifically, during encryption, the original video or the privacy-removed video can be encrypted frame by frame; or, encrypting a data block with a preset size in the original video or the privacy-removed video; or encrypting a data block with preset time in the original video or the privacy-removed video; alternatively, the entire video of the original video or the privacy-removed video is encrypted.
It is understood that decryption is a process corresponding to encryption, and the method of decryption may be adapted to the manner of encryption.
In a third aspect, the present invention also provides a video processing apparatus comprising:
at least one processor; a memory coupled to the at least one processor, the memory storing executable instructions, wherein the executable instructions, when executed by the at least one processor, cause the method of the second aspect of the invention to be carried out.
The present embodiment provides a video processing apparatus including: at least one processor; a memory coupled to the at least one processor. For example, the memory may include random access memory, flash memory, read only memory, programmable read only memory, non-volatile memory or registers, and the like. The processor may be a Central Processing Unit (CPU) or the like. The memory may store executable instructions. The processor may execute executable instructions stored in the memory to implement the various processes described herein.
It will be appreciated that the memory in this embodiment can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. The non-volatile memory may be a ROM (Read-only memory), a PROM (programmable Read-only memory), an EPROM (erasable programmable Read-only memory), an EEPROM (electrically erasable programmable Read-only memory), or a flash memory. The volatile memory may be a RAM (random access memory) which serves as an external cache. By way of illustration and not limitation, many forms of RAM are available, such as SRAM (staticaram, static random access memory), DRAM (dynamic RAM, dynamic random access memory), SDRAM (synchronous DRAM ), DDRSDRAM (double data rate SDRAM, double data rate synchronous DRAM), ESDRAM (Enhanced SDRAM, Enhanced synchronous DRAM), SLDRAM (synchlink DRAM, synchronous link DRAM), and DRRAM (directrrambus RAM, direct memory random access memory). The memory 42 described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
In some embodiments, the memory stores elements, upgrade packages, executable units, or data structures, or a subset thereof, or an extended set thereof: an operating system and an application program.
The operating system includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, and is used for implementing various basic services and processing hardware-based tasks. The application programs comprise various application programs and are used for realizing various application services. The program for implementing the method of the embodiment of the present invention may be included in the application program.
In an embodiment of the present invention, the processor is configured to execute the method steps provided in the second aspect by calling a program or an instruction stored in the memory, specifically, a program or an instruction stored in the application program.
Furthermore, in a fourth aspect, the present invention also provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the method of the second aspect of the present invention.
For example, the machine-readable storage medium may include, but is not limited to, various known and unknown types of non-volatile memory.
Those of skill in the art would understand that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the technical solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments of the present application, the disclosed system, apparatus and method may be implemented in other ways. For example, the division of the unit is only one logic function division, and there may be another division manner in actual implementation. For example, multiple units or components may be combined or may be integrated into another system. In addition, the coupling between the respective units may be direct coupling or indirect coupling. In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or may exist separately and physically.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a machine-readable storage medium. Therefore, the technical solution of the present application may be embodied in the form of a software product, which may be stored in a machine-readable storage medium and may include several instructions to cause an electronic device to perform all or part of the processes of the technical solution described in the embodiments of the present application. The storage medium may include various media that can store program codes, such as ROM, RAM, a removable disk, a hard disk, a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present application, and the scope of the present application is not limited thereto. Those skilled in the art can make changes or substitutions within the technical scope disclosed in the present application, and such changes or substitutions should be within the protective scope of the present application.
Claims (11)
1. A camera system, characterized in that the system comprises:
the video acquisition module is used for acquiring an original video image;
a privacy removal module comprising;
the face recognition module is used for acquiring all face regions in the original video and respectively extracting feature vectors of the faces;
the characteristic vector change module is used for changing the characteristic vector quantity of the face extracted by the face recognition module into a forged face characteristic vector;
the face counterfeiting module is used for forming a counterfeit face according to the counterfeit face feature vector formed by the feature vector changing module;
and the privacy-removing video generation module is used for covering the forged faces formed by the face forging module on the original faces of the original videos respectively to form privacy-removing videos.
2. The camera system according to claim 1, further comprising:
the encryption module is used for encrypting the original video image; or
Encrypting the de-privacy video.
3. The camera system according to claim 2, further comprising:
the decryption module is used for decrypting the encrypted original video image; or
The encrypted de-privacy video is decrypted.
4. The camera system according to claim 2, wherein the encryption module encrypts the original video or the privacy-removed video frame by frame; or
The encryption module encrypts a data block with a preset size in the original video or the privacy-removed video; or
The encryption module encrypts a data block with preset time in the original video or the privacy-removed video; or
Encrypting the original video or the privacy removed video in its entirety.
5. The camera system according to any one of claims 2-4, wherein the video capture module, the privacy removal module, and the encryption module are packaged in a single camera; or
The video acquisition module is positioned in one camera, and the privacy removal module and the encryption module are positioned in the background of the system.
6. A video processing method, comprising:
acquiring an original video image;
identifying all face regions in the original video, and respectively extracting feature vectors of faces;
carrying out change operation on the feature vector of the extracted face to form a forged face feature vector;
forming a forged face according to the forged face feature vector;
and covering the forged faces on the original faces of the original videos respectively to form privacy-removed videos.
7. The video processing method of claim 6, further comprising:
encrypting the original video image; or
Encrypting the de-privacy video.
8. The video processing method of claim 7, further comprising:
decrypting the encrypted original video image; or
Decrypting the encrypted de-privacy video.
9. The video processing method according to claim 7 or 8, wherein the encryption is:
encrypting the original video or the privacy-removed video frame by frame; or
Encrypting a data block with a preset size in the original video or the privacy-removed video; or
Encrypting a data block with preset time in the original video or the privacy-removed video; or
Encrypting the original video or the privacy removed video in its entirety.
10. A video processing apparatus comprising:
at least one processor;
a memory coupled with the at least one processor, the memory storing executable instructions, wherein the executable instructions, when executed by the at least one processor, cause the method of any of claims 6 to 9 to be implemented.
11. A computer-readable storage medium, characterized in that a computer program is stored thereon, which computer program, when being executed by a processor, realizes the steps of the method according to any one of the preceding claims 6 to 9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910924955.9A CN110610456A (en) | 2019-09-27 | 2019-09-27 | Imaging system and video processing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910924955.9A CN110610456A (en) | 2019-09-27 | 2019-09-27 | Imaging system and video processing method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110610456A true CN110610456A (en) | 2019-12-24 |
Family
ID=68893611
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910924955.9A Pending CN110610456A (en) | 2019-09-27 | 2019-09-27 | Imaging system and video processing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110610456A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111654664A (en) * | 2020-05-08 | 2020-09-11 | 浙江大华技术股份有限公司 | High-altitude parabolic detection method and system, computer equipment and storage medium |
CN112668401A (en) * | 2020-12-09 | 2021-04-16 | 中国科学院信息工程研究所 | Face privacy protection method and device based on feature decoupling |
CN112770049A (en) * | 2020-12-30 | 2021-05-07 | 维沃移动通信有限公司 | Shooting method, shooting device and storage medium |
CN113139527A (en) * | 2021-05-28 | 2021-07-20 | 深圳文达智通技术有限公司 | Video privacy protection method, device, equipment and storage medium |
CN113486394A (en) * | 2021-06-18 | 2021-10-08 | 武汉科技大学 | Privacy protection and tamper-proofing method and system based on face block chain |
CN115086718A (en) * | 2022-07-19 | 2022-09-20 | 广州万协通信息技术有限公司 | Video stream encryption method and device |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101167361A (en) * | 2005-04-25 | 2008-04-23 | 松下电器产业株式会社 | Monitoring camera system, imaging device, and video display device |
CN103327231A (en) * | 2012-03-19 | 2013-09-25 | 卡西欧计算机株式会社 | Image creating device and image creating method |
CN107067429A (en) * | 2017-03-17 | 2017-08-18 | 徐迪 | Video editing system and method that face three-dimensional reconstruction and face based on deep learning are replaced |
CN108427918A (en) * | 2018-02-12 | 2018-08-21 | 杭州电子科技大学 | Face method for secret protection based on image processing techniques |
CN108537126A (en) * | 2018-03-13 | 2018-09-14 | 东北大学 | A kind of face image processing system and method |
CN110135195A (en) * | 2019-05-21 | 2019-08-16 | 司马大大(北京)智能系统有限公司 | Method for secret protection, device, equipment and storage medium |
-
2019
- 2019-09-27 CN CN201910924955.9A patent/CN110610456A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101167361A (en) * | 2005-04-25 | 2008-04-23 | 松下电器产业株式会社 | Monitoring camera system, imaging device, and video display device |
CN103327231A (en) * | 2012-03-19 | 2013-09-25 | 卡西欧计算机株式会社 | Image creating device and image creating method |
CN107067429A (en) * | 2017-03-17 | 2017-08-18 | 徐迪 | Video editing system and method that face three-dimensional reconstruction and face based on deep learning are replaced |
CN108427918A (en) * | 2018-02-12 | 2018-08-21 | 杭州电子科技大学 | Face method for secret protection based on image processing techniques |
CN108537126A (en) * | 2018-03-13 | 2018-09-14 | 东北大学 | A kind of face image processing system and method |
CN110135195A (en) * | 2019-05-21 | 2019-08-16 | 司马大大(北京)智能系统有限公司 | Method for secret protection, device, equipment and storage medium |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111654664A (en) * | 2020-05-08 | 2020-09-11 | 浙江大华技术股份有限公司 | High-altitude parabolic detection method and system, computer equipment and storage medium |
CN111654664B (en) * | 2020-05-08 | 2022-04-08 | 浙江大华技术股份有限公司 | High-altitude parabolic detection method and system, computer equipment and storage medium |
CN112668401A (en) * | 2020-12-09 | 2021-04-16 | 中国科学院信息工程研究所 | Face privacy protection method and device based on feature decoupling |
CN112668401B (en) * | 2020-12-09 | 2023-01-17 | 中国科学院信息工程研究所 | Face privacy protection method and device based on feature decoupling |
CN112770049A (en) * | 2020-12-30 | 2021-05-07 | 维沃移动通信有限公司 | Shooting method, shooting device and storage medium |
CN113139527A (en) * | 2021-05-28 | 2021-07-20 | 深圳文达智通技术有限公司 | Video privacy protection method, device, equipment and storage medium |
CN113139527B (en) * | 2021-05-28 | 2023-09-22 | 深圳文达智通技术有限公司 | Video privacy protection method, device, equipment and storage medium |
CN113486394A (en) * | 2021-06-18 | 2021-10-08 | 武汉科技大学 | Privacy protection and tamper-proofing method and system based on face block chain |
CN115086718A (en) * | 2022-07-19 | 2022-09-20 | 广州万协通信息技术有限公司 | Video stream encryption method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110620891B (en) | Imaging system and video processing method | |
CN110610456A (en) | Imaging system and video processing method | |
CN110674765A (en) | Imaging system and video processing method | |
CN110647659B (en) | Image pickup system and video processing method | |
US11157646B2 (en) | Systems and methods for processing and handling privacy-sensitive image data | |
CN108985081B (en) | Watermark encryption method, device, medium and electronic equipment | |
KR100878579B1 (en) | Watermarking Method, Watermark Validation Method, Watermarking Device and Watermark Validation Device | |
CN110572604B (en) | Imaging system and video processing method | |
CN112949545B (en) | Method, apparatus, computing device and medium for recognizing face image | |
US20100103193A1 (en) | Image monitor apparatus and computer-readable storage medium storing image monitor program | |
WO2016188154A1 (en) | Method and device for image processing | |
CN111931145A (en) | Face encryption method, face recognition method, face encryption device, face recognition device, electronic equipment and storage medium | |
KR101951605B1 (en) | Cctv image security system to prevent image leakage | |
US20200250341A1 (en) | Privacy masking method using format-preserving encryption in image security system and recording medium for performing same | |
KR101809086B1 (en) | System for Suppling and Authenticating Digital Contents using Real Time Image Watermarking Technic | |
US8453248B2 (en) | Method and devices for video processing rights enforcement | |
CN114745373A (en) | File transmission method, device, equipment and storage medium | |
CN114387155A (en) | Image processing method, apparatus and storage medium | |
CN116975923A (en) | Face information desensitization protection method, system and medium based on two-dimension code | |
JP5353147B2 (en) | Face matching system | |
CN111259407A (en) | Picture processing method and device, storage medium and terminal | |
Abboud | Multifactor authentication for software protection | |
CN115250314A (en) | Image encryption and decryption method, electronic device, storage medium, and program product | |
CN111860726B (en) | Two-dimensional code display method, verification method, device and computer readable storage medium | |
JP5718757B2 (en) | Image management apparatus, image management program, and image management method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191224 |