CN110620891B - Imaging system and video processing method - Google Patents

Imaging system and video processing method Download PDF

Info

Publication number
CN110620891B
CN110620891B CN201910924953.XA CN201910924953A CN110620891B CN 110620891 B CN110620891 B CN 110620891B CN 201910924953 A CN201910924953 A CN 201910924953A CN 110620891 B CN110620891 B CN 110620891B
Authority
CN
China
Prior art keywords
video
privacy
module
image
original
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910924953.XA
Other languages
Chinese (zh)
Other versions
CN110620891A (en
Inventor
魏子昆
张至先
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Yitu Technology Co ltd
Original Assignee
Shanghai Yitu Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Yitu Technology Co ltd filed Critical Shanghai Yitu Technology Co ltd
Priority to CN201910924953.XA priority Critical patent/CN110620891B/en
Publication of CN110620891A publication Critical patent/CN110620891A/en
Application granted granted Critical
Publication of CN110620891B publication Critical patent/CN110620891B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation
    • G06V40/166Detection; Localisation; Normalisation using acquisition arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • H04N5/91Television signal processing therefor
    • H04N5/913Television signal processing therefor for scrambling ; for copy protection
    • H04N2005/91357Television signal processing therefor for scrambling ; for copy protection by modifying the video signal
    • H04N2005/91364Television signal processing therefor for scrambling ; for copy protection by modifying the video signal the video signal being scrambled

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Studio Devices (AREA)
  • Image Processing (AREA)

Abstract

The invention provides an imaging system and a video processing method. The system comprises: the video acquisition module is used for acquiring an original video image; a privacy removal module comprising; the face recognition module is used for acquiring all face regions in an original video and respectively extracting feature vectors of faces; the characteristic vector change module is used for changing the characteristic vector quantity of the face extracted by the face recognition module into a forged face characteristic vector; the forgery module is used for forming a forged face according to the forged face feature vector formed by the feature vector change module; and the privacy-removing video generation module is used for covering the forged faces formed by the forging module on the original faces of the original videos respectively to form privacy-removing videos. The invention can protect privacy while the video is effective security or commercial data.

Description

Imaging system and video processing method
Technical Field
The present invention relates to the field of face recognition, and in particular, to a camera system and a video processing method.
Background
The face recognition technology has a high development prospect and economic benefit in the fields of public security investigation, access control systems, target tracking and other civil safety control systems. However, the face recognition technology may not be the most effective security tool, and may also be disadvantageous for protecting personal privacy. In the prior art, once data leakage occurs, serious consequences can be caused. How to seek balance between personal privacy and public security or effectively protect the personal privacy and the security becomes an urgent problem to be solved.
The prior art does not solve the problem of how to make a video become effective security or business data and protect privacy for the video set by the camera.
Disclosure of Invention
In order to solve the problems in the prior art, at least one embodiment of the present invention provides an image capturing system and a video processing method, which can protect privacy while a video is effective security or business data.
In a first aspect, an embodiment of the present invention provides an imaging system, where the system includes: the video acquisition module is used for acquiring an original video image; the face recognition module is used for acquiring all face regions in the original video and respectively extracting feature vectors of the faces; the face recognition module is used for extracting face feature vectors from the images; and the privacy-removing video generation module is used for covering the fake images determined by the fake module on the original faces of the original videos respectively to form privacy-removing videos.
In some embodiments, in the image capturing system, the image forged by the forging module is a virtual human figure or animal head figure corresponding to the face feature vector.
In some embodiments, the image forged by the forging module is a data composite image or an image selected from a database.
In some embodiments, the camera system further comprises an encryption module for encrypting the original video image; alternatively, the de-privacy video is encrypted.
In some embodiments, the camera system further comprises a decryption module for decrypting the encrypted original video image or the encrypted privacy-removed video.
In some embodiments, the encryption module encrypts the original video or the de-privacy video frame by frame; or encrypting a data block with a preset size in the original video or the privacy-removed video; or encrypting the original video or the privacy-removed video in its entirety.
In some embodiments, the video capture module, the face recognition module, the forgery module, the privacy removed video generation module, and the encryption module are packaged in a camera; or the video acquisition module is positioned in one camera, and the face recognition module, the counterfeiting module, the privacy-removing video generation module and the encryption module are positioned in the background of the system.
In a second aspect, an embodiment of the present invention further provides a video processing method, including: acquiring an original video image; identifying all face regions in the original video, and respectively extracting feature vectors of faces; determining a forged image according to the face characteristic vector extracted by the face recognition module; and covering the fake images on original faces of the original videos respectively to form privacy-removed videos.
In some embodiments, the video processing method, wherein the determining a counterfeit image according to the face feature vector extracted by the face recognition module, includes: and determining a virtual human figure or an animal head figure according to the face feature vector extracted by the face recognition module.
In some embodiments, the video processing method, wherein the determining a counterfeit image according to the face feature vector extracted by the face recognition module, includes: and synthesizing images through data or selecting images from a database according to the face characteristic vectors extracted by the face recognition module.
In some embodiments, the video processing method further comprises: and decrypting the encrypted original video image or decrypting the encrypted privacy-removed video.
In some embodiments, the video processing method, the encrypting is: encrypting the original video or the privacy-removed video frame by frame; or encrypting a data block with a preset size in the original video or the privacy-removed video; or encrypting the original video or the privacy-removed video in its entirety.
In a third aspect, an embodiment of the present invention further provides a video processing apparatus, including: at least one processor; a memory coupled with the at least one processor, the memory storing executable instructions, wherein the executable instructions, when executed by the at least one processor, cause the method of any of the second aspects above to be implemented.
In a fourth aspect, the present invention also provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the method according to any one of the second aspect.
Therefore, in at least one embodiment of the embodiments of the present invention, after extracting feature vectors from all faces in an obtained original video, and performing imitation, the imitated graphics are respectively covered on the faces in the original video to form a privacy-removed video, where the privacy-removed video does not include any face in the original video, and can still be viewed normally, and information such as pedestrian behavior and crowd distribution can be normally analyzed from the privacy-removed video. The video can be used as effective security or business data while the privacy is protected.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings used in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive labor.
FIG. 1 is a schematic diagram of a configuration of an embodiment of a camera system according to the present invention;
fig. 2 is a flowchart of an embodiment of a video processing method according to the present invention.
Detailed description of the preferred embodiments
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
It is noted that, in this document, relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions.
As shown in fig. 1, in a first aspect, the present embodiment provides an imaging system, including:
a video acquisition module 200 for acquiring an original video image;
the face recognition module 210 is configured to obtain all face regions in the original video, and extract feature vectors of faces respectively. If a plurality of faces exist in the original video, extracting the feature vectors of the faces respectively. Meanwhile, the corresponding position of each face in the video can be recorded, so that each forged face can be covered on the corresponding original face position when a privacy removing module is finally generated.
And the counterfeiting module 220 is used for determining a counterfeit image according to the face feature vector extracted by the face recognition module. The forged image is a virtual human figure or an animal head figure corresponding to the face feature vector, or the forged image can be a data synthesis image or an image selected from a database.
As long as the extracted face feature vector and a certain forged image are in one-to-one correspondence, the same person, namely the same face feature vector, can be kept to form the same forged image in different occasions, and different persons, namely different face features, correspond to different forged images.
Because the forged image has a one-to-one correspondence relationship with the feature vectors of the original face, the face with the same feature vectors can form an approximate image after forging in different occasions. The method can ensure that the forged images formed by the same original face are the same or similar under any condition within the preset time. Namely, the transverse consistency of the forged face is ensured.
And a privacy-removed video generating module 230, configured to cover the forged images formed by the forging module on original faces of the original videos respectively to form privacy-removed videos.
In the embodiment, after extracting feature vectors from all human faces in the acquired original video for imitation, the imitated images are respectively covered on the human faces in the original video to form the privacy-removed video, the privacy-removed video does not contain any human face in the original video, can still be normally watched, and can normally analyze information such as pedestrian behaviors, crowd distribution and the like. The video can be used as effective security or business data while the privacy is protected.
Furthermore, the imaging system of the present embodiment may further include: the encryption module is used for encrypting the original video image; alternatively, the privacy removed video is encrypted. And, can also include: and the decryption module is used for decrypting the encrypted original video image or decrypting the encrypted privacy-removed video. The encryption module encrypts the original video or the privacy-removed video frame by frame; or, encrypting a data block with a preset size in the original video or the privacy-removed video; alternatively, the entire video of the original video or the privacy-removed video is encrypted.
Specifically, the encryption module may use, for example, an RSA encryption algorithm, and may perform one-way encryption through a public key. The specific method can be to encrypt the video frame by frame, or encrypt each data block with certain size, or directly encrypt the whole video. The encrypted video is stored, and cannot be decrypted without an authorized private key, so that the safety of the encrypted video is ensured. And during decryption, similar to the encryption mode, the original video is obtained through decryption by the private key.
In one embodiment, the video capture module, the face recognition module, the forgery module, the privacy-removed video generation module, and the encryption module of the camera system can be packaged in one camera. For example, all modules are packaged in a camera, and the original video is obtained through the camera. And carrying out encryption operation through an encryption chip or a general-purpose processor. The privacy elimination module calculation is performed by an AI chip or a general attached processor (gpu) or a central processing unit (cpu).
In this embodiment, the chip module packaged in the camera first encrypts or de-encrypts the video data, and then transmits the video data to the background server through a wired or wireless network or a combination thereof. Because the transmitted video data is encrypted or subjected to privacy removal processing, the occurrence of secret leakage can be reduced, and the reliability of the system is improved.
In another embodiment, the video capture module of the camera system is located in a camera, and the privacy removal module and the encryption module are located in the background of the system. For example, the privacy removal module and the encryption and decryption module are extracted from the camera and placed on a background server. The front end camera just general camera can.
In this embodiment, when different camera systems need to be encrypted and privacy-removed, system upgrade can be directly performed in the background without replacing one camera or performing respective upgrade processing on each camera. The updating efficiency is improved, and the cost is reduced.
As shown in fig. 2, in a second aspect, the present embodiment provides a video processing method, including:
400, an original video image is obtained, and specifically, the original video image may be obtained by any camera in the prior art or the future technology.
And 410, recognizing all face areas in the original video, and respectively extracting feature vectors of the faces. If a plurality of faces exist in the original video, extracting the feature vectors of the faces respectively through recognition.
And 420, determining a forged image according to the face feature vector. The forged image is a virtual human figure or an animal head figure corresponding to the face feature vector, or the forged image can be a data synthesis image or an image selected from a database.
The extracted face feature vector and a certain forged image are in one-to-one correspondence, so that the same person, namely the same face feature vector, can form the same forged image in different occasions, and different persons, namely different face features, correspond to different forged images.
Because the forged image has a one-to-one correspondence relationship with the feature vectors of the original face, the face with the same feature vectors can form an approximate image after forging in different occasions. The method can ensure that the forged images formed by the same original face are the same or similar under any condition within the preset time. Namely, the transverse consistency of the forged face is ensured.
430, covering the forged images on the original faces of the original videos respectively to form privacy-removed videos.
In the embodiment, after extracting feature vectors from all human faces in the acquired original video for imitation, the imitated images are respectively covered on the human faces in the original video to form the privacy-removed video, the privacy-removed video does not contain any human face in the original video, can still be normally watched, and can normally analyze information such as pedestrian behaviors, crowd distribution and the like. The video can be used as effective security or business data while the privacy is protected.
In another embodiment, a video processing method further includes: encrypting an original video image; alternatively, the privacy removed video is encrypted.
And, after encrypting, further comprising: decrypting the encrypted original video image or decrypting the encrypted privacy-removed video.
Specifically, during encryption, the original video or the privacy-removed video can be encrypted frame by frame; or, encrypting a data block with a preset size in the original video or the privacy-removed video; alternatively, the entire video of the original video or the privacy-removed video is encrypted.
It is understood that decryption is a process corresponding to encryption, and the method of decryption may be adapted to the manner of encryption.
In a third aspect, the present invention also provides a video processing apparatus comprising:
at least one processor; a memory coupled to the at least one processor, the memory storing executable instructions, wherein the executable instructions, when executed by the at least one processor, cause the method of the second aspect of the invention to be carried out.
The present embodiment provides a video processing apparatus including: at least one processor; a memory coupled to the at least one processor. For example, the memory may include random access memory, flash memory, read only memory, programmable read only memory, non-volatile memory or registers, and the like. The processor may be a Central Processing Unit (CPU) or the like. The memory may store executable instructions. The processor may execute executable instructions stored in the memory to implement the various processes described herein.
It will be appreciated that the memory in this embodiment can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory. The non-volatile memory may be a ROM (Read-only memory), a PROM (programmable ROM), an EPROM (erasable PROM), an EEPROM (electrically erasable PROM), or a flash memory. The volatile memory may be a RAM (random access memory) which serves as an external cache. By way of illustration and not limitation, many forms of RAM are available, such as SRAM (staticaram, static random access memory), DRAM (dynamic RAM, dynamic random access memory), SDRAM (synchronous DRAM ), DDRSDRAM (double data rate SDRAM, double data rate synchronous DRAM), ESDRAM (Enhanced SDRAM, enhanced synchronous DRAM), SLDRAM (synchlink DRAM, synchronous link DRAM), and DRRAM (directrrambus RAM, direct memory bus RAM). The memory 42 described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
In some embodiments, the memory stores elements, upgrade packages, executable units, or data structures, or a subset thereof, or an extended set thereof: an operating system and an application program.
The operating system includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, and is used for implementing various basic services and processing hardware-based tasks. The application programs comprise various application programs and are used for realizing various application services. The program for implementing the method of the embodiment of the present invention may be included in the application program.
In an embodiment of the present invention, the processor is configured to execute the method steps provided in the second aspect by calling a program or an instruction stored in the memory, specifically, a program or an instruction stored in the application program.
Furthermore, in a fourth aspect, the present invention also provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the method of the second aspect of the present invention.
For example, the machine-readable storage medium may include, but is not limited to, various known and unknown types of non-volatile memory.
Those of skill in the art would understand that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the technical solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments of the present application, the disclosed system, apparatus and method may be implemented in other ways. For example, the division of the unit is only one logic function division, and there may be another division manner in actual implementation. For example, multiple units or components may be combined or may be integrated into another system. In addition, the coupling between the respective units may be direct coupling or indirect coupling. In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or may exist separately and physically.
The functions may be stored in a machine-readable storage medium if implemented in the form of software functional units and sold or used as a stand-alone product. Therefore, the technical solution of the present application may be embodied in the form of a software product, which may be stored in a machine-readable storage medium and may include several instructions to cause an electronic device to perform all or part of the processes of the technical solution described in the embodiments of the present application. The storage medium may include various media that can store program codes, such as ROM, RAM, a removable disk, a hard disk, a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present application, and the scope of the present application is not limited thereto. Those skilled in the art can make changes or substitutions within the technical scope disclosed in the present application, and such changes or substitutions should be within the protective scope of the present application.

Claims (13)

1. A camera system, characterized in that the system comprises:
the video acquisition module is used for acquiring an original video image;
the face recognition module is used for acquiring all face regions in the original video and respectively extracting feature vectors of the faces;
the face recognition module is used for extracting face feature vectors from a face image, and extracting the face feature vectors from the face image;
and the privacy-removing video generation module is used for covering the fake images determined by the fake module on the original human faces of the original videos respectively to form privacy-removing videos, and the virtual human figure or animal head figures of the fake images have the correspondence with the human faces based on the human face feature vectors.
2. The camera system according to claim 1, wherein the image forged by the forging means is a data composite image or an image selected from a database.
3. The camera system according to claim 1, further comprising:
the encryption module is used for encrypting the original video image; or alternatively
Encrypting the de-privacy video.
4. The camera system according to claim 3, further comprising: and the decryption module is used for decrypting the encrypted original video image or decrypting the encrypted privacy-removed video.
5. The camera system according to claim 3, wherein the encryption module encrypts the original video or the privacy-removed video frame by frame; or alternatively
Encrypting a data block with a preset size in the original video or the privacy-removed video; or
The encryption module encrypts a data block with preset time in the original video or the privacy-removed video; or
Encrypting the original video or the privacy removed video in its entirety.
6. The camera system according to any one of claims 3-5, wherein the video capture module, the face recognition module, the forgery module, the privacy-removed video generation module, and the encryption module are packaged in a camera; or
The video acquisition module is positioned in a camera, and the face recognition module, the counterfeiting module, the privacy-removing video generation module and the encryption module are positioned in a background of the system.
7. A video processing method, comprising:
acquiring an original video image;
identifying all face regions in the original video, and respectively extracting feature vectors of the faces;
forming a forged image according to the face feature vector, wherein the forged image and the face feature vector are in one-to-one correspondence, and the forged image is a virtual human image or an animal head image;
and covering the forged images on original faces of the original videos respectively to form privacy-removed videos, wherein virtual human or animal head images of the forged images correspond to the faces based on face feature vectors.
8. The video processing method according to claim 7, wherein the forming of the forged image according to the face feature vector comprises:
and synthesizing a virtual character image through data according to the face characteristic vector extracted by the face recognition module or selecting an animal head image from a database.
9. The video processing method of claim 7, further comprising:
encrypting the original video image; or
Encrypting the de-privacy video.
10. The video processing method of claim 9, further comprising:
and decrypting the encrypted original video image or decrypting the encrypted privacy-removed video.
11. The video processing method according to claim 9 or 10, wherein the encryption is:
encrypting the original video or the privacy-removed video frame by frame; or alternatively
Encrypting a data block with a preset size in the original video or the privacy-removed video; or
Encrypting a data block with preset time in the original video or the privacy-removed video; or alternatively
Encrypting the original video or the privacy removed video in its entirety.
12. A video processing apparatus comprising:
at least one processor;
a memory coupled with the at least one processor, the memory storing executable instructions, wherein the executable instructions, when executed by the at least one processor, cause the method of any of claims 7 to 11 to be implemented.
13. A computer-readable storage medium, characterized in that a computer program is stored thereon, which computer program, when being executed by a processor, realizes the steps of the method according to any one of the preceding claims 7 to 11.
CN201910924953.XA 2019-09-27 2019-09-27 Imaging system and video processing method Active CN110620891B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910924953.XA CN110620891B (en) 2019-09-27 2019-09-27 Imaging system and video processing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910924953.XA CN110620891B (en) 2019-09-27 2019-09-27 Imaging system and video processing method

Publications (2)

Publication Number Publication Date
CN110620891A CN110620891A (en) 2019-12-27
CN110620891B true CN110620891B (en) 2023-04-07

Family

ID=68924543

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910924953.XA Active CN110620891B (en) 2019-09-27 2019-09-27 Imaging system and video processing method

Country Status (1)

Country Link
CN (1) CN110620891B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112492383A (en) * 2020-12-03 2021-03-12 珠海格力电器股份有限公司 Video frame generation method and device, storage medium and electronic equipment
CN112418179A (en) * 2020-12-09 2021-02-26 上海领感科技有限公司 Face recognition and collection system based on public place and privacy protection method
CN114567797A (en) * 2021-03-23 2022-05-31 长城汽车股份有限公司 Image processing method and device and vehicle
CN113762138B (en) * 2021-09-02 2024-04-23 恒安嘉新(北京)科技股份公司 Identification method, device, computer equipment and storage medium for fake face pictures
CN115134080B (en) * 2022-08-25 2022-12-20 广州万协通信息技术有限公司 Data transmission method and device based on security encryption chip

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101167361A (en) * 2005-04-25 2008-04-23 松下电器产业株式会社 Monitoring camera system, imaging device, and video display device
CN102724563A (en) * 2012-06-15 2012-10-10 深圳市汇海威视科技有限公司 Monitoring front end and terminal, monitoring system as well as audio/video signal encryption and decryption methods
CN103327231A (en) * 2012-03-19 2013-09-25 卡西欧计算机株式会社 Image creating device and image creating method
JP2014089625A (en) * 2012-10-31 2014-05-15 Tadao Ueda Method of searching for still image or moving image of human in consideration of privacy
CN107070649A (en) * 2017-03-02 2017-08-18 桂林电子科技大学 A kind of big file selective cryptographic method for reducing write-in

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10740617B2 (en) * 2017-12-19 2020-08-11 Intel Corporation Protection and recovery of identities in surveillance camera environments

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101167361A (en) * 2005-04-25 2008-04-23 松下电器产业株式会社 Monitoring camera system, imaging device, and video display device
CN103327231A (en) * 2012-03-19 2013-09-25 卡西欧计算机株式会社 Image creating device and image creating method
CN102724563A (en) * 2012-06-15 2012-10-10 深圳市汇海威视科技有限公司 Monitoring front end and terminal, monitoring system as well as audio/video signal encryption and decryption methods
JP2014089625A (en) * 2012-10-31 2014-05-15 Tadao Ueda Method of searching for still image or moving image of human in consideration of privacy
CN107070649A (en) * 2017-03-02 2017-08-18 桂林电子科技大学 A kind of big file selective cryptographic method for reducing write-in

Also Published As

Publication number Publication date
CN110620891A (en) 2019-12-27

Similar Documents

Publication Publication Date Title
CN110620891B (en) Imaging system and video processing method
CN110647659B (en) Image pickup system and video processing method
CN110610456A (en) Imaging system and video processing method
CN110674765A (en) Imaging system and video processing method
CN108985081B (en) Watermark encryption method, device, medium and electronic equipment
KR101378295B1 (en) Method and Apparatus of privacy masking on Image
KR100878579B1 (en) Watermarking Method, Watermark Validation Method, Watermarking Device and Watermark Validation Device
Winkler et al. Trustcam: Security and privacy-protection for an embedded smart camera based on trusted computing
CN110572604B (en) Imaging system and video processing method
WO2003103217A1 (en) Biometric authentication system
CN110362571A (en) Data safety retroactive method and device based on block chain
US11520931B2 (en) Privacy masking method using format-preserving encryption in image security system and recording medium for performing same
JPWO2009013822A1 (en) Video surveillance device and video surveillance program
KR101951605B1 (en) Cctv image security system to prevent image leakage
CN111931145A (en) Face encryption method, face recognition method, face encryption device, face recognition device, electronic equipment and storage medium
CN111177666A (en) Forensic document anti-counterfeiting and anti-tampering method and system based on fragile watermark
US8453248B2 (en) Method and devices for video processing rights enforcement
CN109345440B (en) Digital media watermark processing method, computer device and storage medium
JP2021006990A (en) Method for highlighting object of interest in image or video
CN114980298A (en) Tamper-proofing method based on positioning system and network time information
CN111860726B (en) Two-dimensional code display method, verification method, device and computer readable storage medium
CN114387155A (en) Image processing method, apparatus and storage medium
CN111444815B (en) Substation identity authentication method, system, device and computer equipment
CN114596615B (en) Face living body detection method, device, equipment and medium based on countermeasure learning
Cichowski et al. Visual data encryption for privacy enhancement in surveillance systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant