CN111247785B - Shot image processing method and related equipment - Google Patents

Shot image processing method and related equipment Download PDF

Info

Publication number
CN111247785B
CN111247785B CN201880066491.6A CN201880066491A CN111247785B CN 111247785 B CN111247785 B CN 111247785B CN 201880066491 A CN201880066491 A CN 201880066491A CN 111247785 B CN111247785 B CN 111247785B
Authority
CN
China
Prior art keywords
image
watermark image
watermark
user
data packet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201880066491.6A
Other languages
Chinese (zh)
Other versions
CN111247785A (en
Inventor
熊亮
杨小虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SZ DJI Technology Co Ltd
Original Assignee
SZ DJI Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SZ DJI Technology Co Ltd filed Critical SZ DJI Technology Co Ltd
Publication of CN111247785A publication Critical patent/CN111247785A/en
Application granted granted Critical
Publication of CN111247785B publication Critical patent/CN111247785B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/60Control of cameras or camera modules
    • H04N23/66Remote control of cameras or camera parts, e.g. by remote control devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/46Embedding additional information in the video signal during the compression process
    • H04N19/467Embedding additional information in the video signal during the compression process characterised by the embedded information being invisible, e.g. watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/60Control of cameras or camera modules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/80Camera processing pipelines; Components thereof

Abstract

The embodiment of the invention provides a shot image processing method and related equipment, wherein in the method, a control terminal can acquire a shot image output by a shooting device configured by an unmanned aerial vehicle from the unmanned aerial vehicle, acquire a watermark image and superimpose the watermark image on the shot image to acquire a composite image.

Description

Shot image processing method and related equipment
Technical Field
The present invention relates to the field of image processing technologies, and in particular, to a captured image processing method and a related device.
Background
With the development of the mobile internet, information sharing, resource sharing and the like are more and more accepted by the public in the current era, and various social applications with sharing properties are more and more created from the beginning. With the sharing of various types of photographic works such as videos, photos and the like, the problems of more infringing the copyright of the creator of the photographic works and stealing the photographic works are caused.
At present, watermarking images on photographic works is a main means for preventing the photographic works from being embezzled. However, in the field of unmanned aerial vehicle aerial photography, images shot by unmanned aerial vehicles need to be imported into a computer, and then watermark images of a photography creator are added into the computer. However, this easily causes the original image file to be transferred and stolen, and in addition, the operation flow of watermarking the photographic work is complicated.
Disclosure of Invention
The embodiment of the invention provides a shot image processing method and related equipment, which improve the safety and convenience of superimposing a watermark image on a photographic work.
In a first aspect, an embodiment of the present invention provides a captured image processing method, where the method includes:
acquiring a shot image output by a shooting device configured by the unmanned aerial vehicle from the unmanned aerial vehicle;
acquiring a watermark image;
and superposing the watermark image to the shot image to obtain a composite image.
In a second aspect, an embodiment of the present invention further provides a method for processing a watermark image, where the method includes:
acquiring an initial watermark image uploaded by a user of a control terminal of an unmanned aerial vehicle;
encrypting the initial watermark image according to a preset encryption rule to obtain a watermark image data packet;
and sending the watermark image data packet to a control terminal of the unmanned aerial vehicle, so that the control terminal decrypts the watermark image data packet by using a decryption rule corresponding to the encryption rule to obtain a watermark image, and superimposes the watermark image on a shot image, wherein the shot image is obtained from the unmanned aerial vehicle and is output by a shooting device configured by the unmanned aerial vehicle.
In a third aspect, an embodiment of the present invention provides a control terminal for an unmanned aerial vehicle, including a memory and a processor;
the memory to store program instructions;
the processor, executing the program instructions stored by the memory, when executed, is configured to perform the steps of:
acquiring a shot image output by a shooting device configured by the unmanned aerial vehicle from the unmanned aerial vehicle;
acquiring a watermark image;
and superposing the watermark image to the shot image to obtain a composite image.
In a fourth aspect, an embodiment of the present invention provides a server, including a memory and a processor;
the memory to store program instructions;
the processor, executing the program instructions stored by the memory, when executed, is configured to perform the steps of:
acquiring an initial watermark image uploaded by a user of a control terminal of an unmanned aerial vehicle;
encrypting the initial watermark image according to a preset encryption rule to obtain a watermark image data packet;
and sending the watermark image data packet to a control terminal of the unmanned aerial vehicle, so that the control terminal decrypts the watermark image data packet by using a decryption rule corresponding to the encryption rule to obtain a watermark image, and superimposes the watermark image on a shot image, wherein the shot image is obtained from the unmanned aerial vehicle and is output by a shooting device configured by the unmanned aerial vehicle.
In a fifth aspect, an embodiment of the present invention further provides a captured image processing apparatus, including:
the acquisition unit is used for acquiring a shot image output by a shooting device configured by the unmanned aerial vehicle from the unmanned aerial vehicle; and acquiring a watermark image;
and the superposition unit is used for superposing the watermark image to the shot image to obtain a composite image.
In a sixth aspect, an embodiment of the present invention further provides a device for processing a watermark image, including:
the acquisition unit is used for acquiring an initial watermark image uploaded by a user of a control terminal of the unmanned aerial vehicle;
the encryption unit is used for encrypting the initial watermark image according to a preset encryption rule to obtain a watermark image data packet;
and the sending unit is used for sending the watermark image data packet to a control terminal of the unmanned aerial vehicle so as to enable the control terminal to decrypt the watermark image data packet by utilizing a decryption rule corresponding to the encryption rule to obtain a watermark image, and superimpose the watermark image on a shot image, wherein the shot image is obtained from the unmanned aerial vehicle and is output by a shooting device configured by the unmanned aerial vehicle.
In a seventh aspect, an embodiment of the present invention provides a computer-readable storage medium, in which a computer program is stored, and the computer program, when executed by a processor, implements the captured image processing method.
In an eighth aspect, an embodiment of the present invention provides a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the computer program implements the processing method for the watermark image.
In a ninth aspect, an embodiment of the present invention provides a captured image processing system, including: the system comprises a control terminal, a server and an unmanned aerial vehicle;
the unmanned aerial vehicle is used for responding to the flight control instruction, controlling the unmanned aerial vehicle to fly according to the flight track and controlling a shooting device configured on the unmanned aerial vehicle to shoot;
the control terminal is used for sending a flight control instruction to the aircraft, and the flight control instruction is used for instructing the unmanned aerial vehicle to fly according to the determined flight track; the control terminal is also used for acquiring a shot image output by a shooting device configured by the unmanned aerial vehicle from the unmanned aerial vehicle; acquiring a watermark image; superimposing the watermark image on the shot image to obtain a composite image;
the server is used for acquiring an initial watermark image uploaded by a user of a control terminal of the unmanned aerial vehicle; encrypting the initial watermark image according to a preset encryption rule to obtain a watermark image data packet; and sending the watermark image data packet to a control terminal of the unmanned aerial vehicle, so that the control terminal decrypts the watermark image data packet by using a decryption rule corresponding to the encryption rule to obtain a watermark image, and superimposes the watermark image on a shot image, wherein the shot image is obtained from the unmanned aerial vehicle and is output by a shooting device configured by the unmanned aerial vehicle.
The embodiment of the invention can acquire the shot image output by the shooting device configured by the unmanned aerial vehicle from the unmanned aerial vehicle, acquire the watermark image, and directly superimpose the watermark image on the shot image to acquire the composite image. Therefore, the control terminal can directly print the watermark image on the shot image obtained from the unmanned aerial vehicle to obtain the composite image, so that the problems of complex operation and poor universality of the watermark image printing on the shot image of the unmanned aerial vehicle in the prior art are solved, and the problem that the shot image is arbitrarily embezzled can be effectively solved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
Fig. 1 is a schematic structural diagram of an unmanned aerial vehicle system according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a captured image processing method according to an embodiment of the present invention;
FIG. 3 is a schematic diagram illustrating an interaction flow of another captured image processing method according to an embodiment of the present invention;
fig. 4 is a flowchart illustrating a method for processing a watermark image according to an embodiment of the present invention;
fig. 5 is a schematic flowchart of a captured image processing method according to another embodiment of the present invention;
fig. 6 is a schematic structural diagram of a captured image processing system according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a captured image processing apparatus according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a watermark image processing apparatus according to an embodiment of the present invention;
fig. 9 is a schematic structural diagram of a control terminal according to an embodiment of the present invention;
fig. 10 is a schematic structural diagram of a server according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Some embodiments of the invention are described in detail below with reference to the accompanying drawings. The embodiments described below and the features of the embodiments can be combined with each other without conflict.
In order to solve the problems of complicated operation and poor universality of adding a watermark image in the prior art, the embodiment of the invention provides a shot image processing method which can be applied to a control terminal of an unmanned aerial vehicle or the unmanned aerial vehicle, can acquire a shot image output by a shooting device configured by the unmanned aerial vehicle from the unmanned aerial vehicle, and can directly superimpose the watermark image on the shot image to acquire a composite image after acquiring the watermark image. Therefore, the shot image processing method provided by the embodiment of the invention can be used for directly adding the watermark into the shot image output by the shooting device of the unmanned aerial vehicle, and has the advantages of good universality and convenience in operation. The following describes the relevant contents of the embodiments of the present invention with reference to the drawings.
In the following, the photographed image processing method according to the embodiment of the present invention is described in detail with reference to the above-described unmanned aerial vehicle system.
First, an unmanned aerial vehicle system according to an embodiment of the present invention is introduced, please refer to fig. 1, where fig. 1 is a schematic structural diagram of an unmanned aerial vehicle system according to an embodiment of the present invention, and the system includes: control terminal 11, unmanned aerial vehicle 12 and camera 13.
The control terminal 11 may specifically be one or more of a remote control, a smartphone, a tablet, a laptop, a ground station, a wearable device (watch, bracelet). The drone 12 may be a rotor type drone, such as a quad-rotor drone, a six-rotor drone, an eight-rotor drone, or a fixed-wing drone. Unmanned aerial vehicle includes driving system, and driving system is used for providing flight power for unmanned aerial vehicle, and wherein, driving system includes screw, motor, one or more in the electricity accent. The unmanned aerial vehicle can also include the cloud platform, and shooting device 13 is carried in unmanned aerial vehicle's main part through the cloud platform. The tripod head is a multi-shaft transmission and stability augmentation system, and a tripod head motor compensates the shooting angle of the imaging device by adjusting the rotation angle of the rotation shaft, and prevents or reduces the shaking of the imaging device by arranging a proper buffer mechanism.
In one embodiment, the control terminal 11 establishes a wireless communication link with the drone 12, the control terminal 11 may be configured with an interaction device for implementing human-computer interaction, the interaction device may be one or more of a touch display screen, a keyboard, a key, a joystick, and a wave wheel, a user interface may be provided on the interaction device, a user may set a shooting position through the user interface during the flight of the drone, for example, the user may input a shooting instruction on the user interface, the user may perform a touch operation (such as a click operation or a sliding operation) on the flight trajectory of the drone, the control terminal determines a shooting position according to the touch operation, when the shooting position is received by the control terminal 11, the position information corresponding to the shooting position is sent to the shooting device 13, when the drone flies to the shooting position, the shooting device 13 performs shooting, acquiring and outputting a shot image; the unmanned aerial vehicle can send the shot image to the control terminal 11 through the wireless communication link, and meanwhile, the control terminal can acquire the watermark image and superimpose the watermark image on the shot image, so that a composite image can be obtained, and the composite image is provided with the watermark image, so that the composite image is prevented from being embezzled.
Referring to fig. 2, fig. 2 is a schematic flowchart of a captured image processing method according to an embodiment of the present invention, where the captured image processing method may be applied to a control terminal of an unmanned aerial vehicle, and in an embodiment of the present invention, a watermark image may be obtained locally from the control terminal, for example, from a local storage device of the control terminal, or the control terminal obtains a watermark image uploaded by a user. Specifically, as shown in fig. 2, the captured image processing method may include the steps of:
s201, a control terminal obtains a shot image output by a shooting device configured by an unmanned aerial vehicle from the unmanned aerial vehicle;
as before, control terminal can establish wireless communication link with unmanned aerial vehicle, and the shooting device of unmanned aerial vehicle configuration can shoot the environment around the unmanned aerial vehicle, and the shooting device output shoots the image. The unmanned aerial vehicle can send the shot image to the control terminal through the wireless communication link, and the control terminal can receive the shot image sent by the unmanned aerial vehicle.
S202, the control terminal obtains a watermark image;
the control terminal may obtain a watermark image, where the watermark image may be an image selected by a user of the control terminal, where the image may include one or more of characters, numbers, identification numbers, and patterns. The control terminal may superimpose the watermark image on the photographed image to generate a composite image after acquiring the photographed image.
Optionally, the watermark image may be an image stored in a local storage device, or an image uploaded by a user through a control terminal.
Optionally, after the control terminal obtains the watermark image, at least one of resolution, definition, specification, size, and transparency of the watermark image may be adjusted to obtain an adjusted watermark image, and the adjusted watermark image is superimposed on the captured image. Specifically, the watermark image acquired by the control terminal may be an image selected by a user, for example, an image uploaded by the user through the control terminal; optionally, the watermark image is an image stored in a local storage device. In some cases, the composite image is more beautiful to form a good composition, and at least one of resolution, definition, specification, size, and transparency of the watermark image needs to be adjusted before the superposition to obtain an adjusted watermark image, and then the adjusted watermark image is superposed into the photographed image. In some cases, the adjusting at least one of the resolution, the sharpness, the specification, the size, and the transparency of the watermark image may include: and the control terminal automatically adjusts at least one of the resolution, definition, specification, size and transparency of the watermark image according to a preset rule. In some cases, the adjusting at least one of the resolution, the sharpness, the specification, the size, and the transparency of the watermark image may include: and the control terminal detects the adjustment operation of a user and adjusts at least one of the resolution, the definition, the specification, the size and the transparency of the watermark image according to the detected adjustment operation.
And S203, the control terminal superimposes the watermark image on the shot image to obtain a composite image.
In an alternative embodiment, the controlling terminal superimposes the watermark image on the captured image to obtain the composite image, and may include: and the control terminal superimposes the adjusted watermark image on the shot image to obtain a composite image.
In an alternative embodiment, the controlling terminal superimposes the watermark image on the captured image to obtain the composite image, and may include: the control terminal determines the target position of the watermark image superposed in the shot image according to the size and/or the color information of the shot image; and the control terminal superimposes the watermark image on the target position in the shot image to obtain a composite image.
Specifically, the control terminal may determine the size of the captured image, for example, the length and width of the captured image are L and H, respectively, and the control terminal may determine the target position of the watermark image in the captured image according to the length and width of the captured image, for example, the target position is one fourth H away from the lower boundary of the captured image and one fifth L away from the left boundary of the captured image.
Specifically, the determining, by the control terminal, the target position where the watermark image is superimposed on the captured image according to the color information of the captured image may include: and determining an image area in which the color information of the shot image and the color information of the watermark image meet a preset relationship, and determining the target position according to the image area. For example, the control terminal may determine an image area in the captured image where the contrast between the color information and the color information of the watermark image is the greatest, that is, determine which image area in the captured image has the greatest contrast between the color information and the color information of the watermark image, the control terminal may set the center of the image area as a target position, and the control terminal superimposes the watermark image on the target position in the captured image, so that the display of the watermark image in the composite image is more striking, and the display effect is better.
In an optional implementation manner, after the control terminal acquires the composite image, the captured image processing method may further include: the control terminal calls an application program to execute sharing operation on the synthetic image; or sending the composite image to a live broadcast or relay broadcast device. This embodiment may be more advantageous for sharing of the composite image.
For example, the user may use a sharing control on an application installed in the control terminal to enable the control terminal to share the composite image. For another example, the control terminal may invoke a social application program, for example, a text-based social application program such as a WeChat or a microblog, or a device of a live broadcast platform or a relay broadcast platform such as a live broadcast mini-video.
In summary, the embodiment of the present invention can obtain the captured image output by the capturing device configured by the unmanned aerial vehicle from the unmanned aerial vehicle, and directly superimpose the watermark image on the captured image to obtain the composite image, thereby avoiding the problem that the control terminal needs to send the captured image to other image processing terminals for adding the watermark, being beneficial to avoiding the problem that the captured image is stolen and stolen, and simplifying the operation flow of adding the watermark.
Referring to fig. 3, fig. 3 is an interactive flow chart of another captured image processing method according to an embodiment of the present invention. In the shot image processing method shown in fig. 3, the watermark image may be acquired from a server, and specifically, as shown in fig. 3, the shot image processing method may include the following steps:
s301, the control terminal obtains a shot image output by a shooting device configured by the unmanned aerial vehicle from the unmanned aerial vehicle;
s302, the control terminal acquires a watermark image data packet from the server;
when the control terminal needs to watermark the shot image, the control terminal can establish communication connection with the server, and the control terminal can acquire the watermark image data packet from the server, wherein the server can be a server of an unmanned aerial vehicle manufacturer or a server of a copyright supervision department. The watermark image data packet is obtained by encrypting an initial watermark image by the server according to a preset encryption rule, wherein the initial watermark image is an image uploaded to the server by a user corresponding to the control terminal.
S303, the control terminal decrypts the watermark image data packet by using a decryption rule to obtain a watermark image;
after the control terminal acquires the watermark image data packet, the control terminal can decrypt the watermark image data packet by using a decryption rule, wherein the decryption rule corresponds to an encryption rule of the initial watermark image encrypted by the server. When the decryption is successful, the control terminal can acquire the watermark image. When the control terminal fails to decrypt the watermark image data packet by using the decryption rule, prompt information can be output to prompt that the watermark image acquisition fails. It can be understood that the encryption of the initial watermark image uploaded by the user by the server by using the preset encryption rule is actually an authorization and authentication process, only the initial watermark image encrypted by the server can be decrypted by the control terminal according to the decryption rule corresponding to the encryption rule to obtain the watermark image, otherwise, the decryption fails, and the watermark image cannot be obtained. By the method, the server can effectively manage the watermark image uploaded by the user, and meanwhile, the transmission safety of the watermark image is ensured. For example, in some cases, the server may determine whether the user opens a service for capturing an image superimposed with a watermark image, and when it is determined that the user opens the service, the server encrypts an initial watermark image uploaded by the user, and otherwise, the initial watermark image is not encrypted.
Optionally, the controlling terminal decrypts the watermark image data packet by using the decryption rule to obtain the watermark image, and may include: and the control terminal decrypts the watermark image data packet by using the user information of the user to obtain the watermark image. Specifically, the decryption rule corresponding to the preset encryption rule is a decryption rule determined according to the user information, and the control terminal may decrypt the watermark image data packet by using the user information. In some cases, the preset encryption rule is an encryption rule determined according to user information, and the control terminal may decrypt the watermark image data packet by using the user information. The user information may include at least one of a user account, an identity, and a password corresponding to the user account.
In an alternative embodiment, the control terminal may upload an image to the server, and the server creates a watermark image data packet according to the image so as to send the watermark image data packet to the control terminal, and the control terminal superimposes the watermark image on the shot image.
In one example, the control terminal acquires an image selected by a user and sends the image to the server as an initial watermark image corresponding to the user. In another example, the control terminal may obtain an image uploaded by a user and transmit the image to the server as an initial watermark image corresponding to the user.
S304, the control terminal superimposes the watermark image on the shot image to obtain a composite image.
Step S304 is the same as step S203, and specific descriptions may refer to the related descriptions of the above embodiments, and are not described in detail here.
Therefore, the watermark image acquired by the control terminal is acquired by decrypting the watermark image data packet acquired by the server by using the decryption rule, so that the control terminal can be ensured to directly add the watermark image into the shot image, and the encrypted watermark image authorized by the server can be used for superposition processing, thereby ensuring the legality and safety of the added watermark image and further avoiding the situation that the image shot by the unmanned aerial vehicle is illegally used.
Referring to fig. 4, fig. 4 is a schematic flowchart of a method for processing a watermark image according to an embodiment of the present invention, and as shown in fig. 4, the method for processing a watermark image is explained from the perspective of a server, and the server may authorize an encrypted watermark image data packet to a control terminal, so that the control terminal decrypts the encrypted watermark image to obtain the watermark image to be superimposed on a captured image. Specifically, as shown in fig. 4, the captured image processing method may include the steps of:
s401, a server acquires an initial watermark image uploaded by a user of a control terminal of an unmanned aerial vehicle;
s402, encrypting the initial watermark image by the server according to a preset encryption rule to obtain a watermark image data packet;
and S403, the server sends the watermark image data packet to a control terminal of the unmanned aerial vehicle.
The watermark image data packet is used for decrypting the watermark image data packet by using a decryption rule corresponding to the encryption rule through the control terminal to obtain a watermark image, and the watermark image is superposed into a shot image. The captured image is acquired from the drone and is output by a camera configured with the drone.
In an optional implementation manner, the encrypting, by the server, the initial watermark image according to a preset encryption rule to obtain a watermark image data packet includes: and encrypting the initial watermark image according to the user information of the user to obtain a watermark image data packet. For example, the initial watermark image is encrypted by using the user name of the user, and an encrypted watermark image data packet is obtained.
In an optional implementation manner, before encrypting the watermark image according to a preset encryption rule to obtain a watermark image data packet, the server may further adjust at least one of resolution, definition, specification, size, and transparency of the initial watermark image to obtain an adjusted initial watermark image; and the server encrypts the adjusted initial watermark image according to a preset encryption rule to obtain a watermark image data packet. According to the embodiment, the watermark image obtained subsequently can be superposed on the shot image, and the normal display effect of the shot image cannot be influenced.
In some cases, the server adjusting at least one of resolution, sharpness, size, dimension, and transparency of the original watermark image may include: and the server automatically adjusts at least one of the resolution, the definition, the transparency, the specification, the size and the transparency of the initial watermark image according to preset rules.
In some cases, the server adjusting at least one of the resolution, sharpness, size, and transparency of the initial watermark image may include: and the server detects the adjustment operation of the user and adjusts at least one of the resolution, the definition, the specification, the size and the transparency of the initial watermark image according to the detected adjustment operation.
Therefore, the embodiment of the invention enables the control terminal to obtain the watermark image by authorizing the mode of controlling the encrypted watermark image data packet of the terminal by the server, and can prevent the watermark image of the user and the shot image from being illegally used to a certain extent.
Referring to fig. 6, fig. 6 is a schematic flowchart of another shot image processing method according to an embodiment of the present invention, fig. 5 is a schematic structural diagram of a shot image processing system according to an embodiment of the present invention, and based on the shot image processing system shown in fig. 5, the shot image processing method shown in fig. 6 explains the shot image processing method according to the embodiment of the present invention from a perspective of mutual interaction between a control terminal, a server, and an unmanned aerial vehicle camera. As shown in fig. 5, the photographed image processing method may include:
s501, the control terminal obtains an image selected by a user and sends the image to a server as an initial watermark image corresponding to the user;
s502, the server acquires the initial watermark image and encrypts the initial watermark image according to a preset encryption rule to acquire a watermark image data packet;
s503, the server sends the watermark image data packet to a control terminal;
s504, the control terminal obtains a shot image output by a shooting device configured by the unmanned aerial vehicle, obtains the watermark image data packet, decrypts the watermark image data packet by using a decryption rule, and if decryption is successful, the step S505 is executed; if the decryption fails, go to step S506;
s505, the control terminal superimposes the watermark image obtained by decryption to the shot image to obtain a composite image;
s506, the control terminal outputs prompt information and generates a shot image without a watermark image according to the shot image;
optionally, in step S506, the control terminal outputs a composite image obtained by superimposing the default watermark image on the captured image.
Optionally, before the control terminal sends the image to the server, at least one of the resolution, the definition, the specification, the size, and the transparency of the image may be adjusted and then sent, or before the server encrypts the initial watermark image, at least one of the resolution, the definition, the specification, the size, and the transparency of the initial watermark image may be adjusted and then encrypted.
Optionally, the controlling to superimpose the watermark image onto the captured image to obtain a composite image includes: determining a target position of the watermark image superposed in the shot image according to the size and/or color information of the shot image; and overlaying the watermark image to a target position in the shot image to obtain a composite image.
Optionally, the method further includes: the control terminal calls an application program to execute sharing operation on the synthetic image; or sending the composite image to a live broadcast or relay broadcast device.
In the embodiment of the invention, the user information comprises at least one of a user account, an identity and a password corresponding to the user account.
In the embodiment of the invention, the server can be an issuing server specially authorizing the digital watermark images, and receives the control terminal to upload the self-defined initial watermark images, so that the server uniformly generates the watermark image data packet, and the watermark images superposed by the control terminal are uniformly authorized.
In summary, the shot image processing method shown in fig. 5 can superimpose the shot image by using the authorized watermark image acquired from the server through the control terminal after the shot image is output by the shooting device of the unmanned aerial vehicle, so as to obtain a composite image with the watermark image. In addition, the server sends the watermark images to the control terminal in a unified authorization mode, and the copyright of the user can be protected from the source.
Referring to fig. 7, fig. 7 is a schematic structural diagram of a captured image processing apparatus according to an embodiment of the present invention, and as shown in fig. 7, the captured image processing apparatus may include:
an acquisition unit 601 configured to acquire, from an unmanned aerial vehicle, a captured image output by a capturing device configured to the unmanned aerial vehicle;
the obtaining unit 601 is further configured to obtain a watermark image;
an overlaying unit 602, configured to overlay the watermark image into the captured image to obtain a composite image.
In an optional implementation, the obtaining unit 601 obtains the watermark image, specifically to:
acquiring a watermark image data packet from a server, wherein the watermark image data packet is obtained by encrypting an initial watermark image by the server by using a preset encryption rule; the initial watermark image is an image uploaded to the server by a user corresponding to the control terminal;
decrypting the watermark image data packet by using a decryption rule to obtain a watermark image; the decryption rule corresponds to the encryption rule.
As shown in fig. 7, the captured image processing apparatus may further include an output unit 603, where the output unit 603 is configured to output prompt information when decryption of the watermark image packet by using the decryption rule fails; and the prompt information is used for prompting that the watermark image acquisition fails.
In an optional implementation manner, the captured image processing apparatus further includes a sending unit, where the obtaining unit 601 is further configured to obtain an image selected by a user, and send the image to the server by the sending unit as an initial watermark image corresponding to the user.
The obtaining unit 601 decrypts the watermark image data packet by using a decryption rule to obtain a watermark image, and is specifically configured to:
and decrypting the watermark image data packet by using the user information of the user to obtain the watermark image.
In an alternative embodiment, the obtaining unit 601 obtains the watermark image, and may specifically be configured to obtain the watermark image from a local storage device of the control terminal.
In an optional implementation manner, the obtaining unit 601 obtains a watermark image, which may be specifically used to obtain a watermark image uploaded by a user.
In an optional implementation, the obtaining unit 601 is further configured to: at least one of resolution, definition, specification, size, and transparency of the watermark image is adjusted to obtain an adjusted watermark image, and accordingly, the superimposing unit 602 may superimpose the adjusted watermark image onto the captured image to obtain a composite image.
In an optional implementation manner, the superimposing unit 602 superimposes the watermark image onto the captured image to obtain a composite image, specifically configured to:
determining a target position of the watermark image superposed in the shot image according to the size and/or color information of the shot image;
and overlaying the watermark image to a target position in the shot image to obtain a composite image.
In an optional implementation manner, the sending unit is further configured to invoke an application program to perform a sharing operation on the composite image; or sending the composite image to a live broadcast or relay broadcast device.
The user information comprises at least one of a user account, an identity and a password corresponding to the user account.
In the embodiment of the invention, the shot image processing device can perform superposition processing on the shot image after the shot image is output by the shooting device of the unmanned aerial vehicle, so that the obtained composite image is directly superposed with the watermark image.
Referring to fig. 8, fig. 8 is a schematic structural diagram of a processing apparatus for a watermark image according to an embodiment of the present invention, as shown in fig. 8, the processing apparatus for a watermark image may include:
an obtaining unit 701, configured to obtain an initial watermark image uploaded by a user of a control terminal of an unmanned aerial vehicle;
an encrypting unit 702, configured to encrypt the initial watermark image according to a preset encryption rule to obtain a watermark image data packet;
a sending unit 703, configured to send the watermark image data packet to a control terminal of the unmanned aerial vehicle, so that the control terminal decrypts the watermark image data packet by using a decryption rule corresponding to the encryption rule to obtain a watermark image, and superimposes the watermark image onto a captured image, where the captured image is obtained from the unmanned aerial vehicle and is output by a capturing device configured by the unmanned aerial vehicle.
In this embodiment of the present invention, the encryption unit 702 encrypts the initial watermark image according to a preset encryption rule to obtain a watermark image data packet, and is specifically configured to:
and encrypting the initial watermark image according to the user information of the user to obtain a watermark image data packet.
In an optional implementation manner, the apparatus for processing a watermark image may further include an adjusting unit, configured to adjust at least one of resolution, definition, size, and transparency of the initial watermark image before the encrypting unit 702 encrypts the watermark image according to a preset encryption rule to obtain a watermark image data packet, so as to obtain an adjusted initial watermark image.
In the embodiment of the invention, the processing device of the watermark image can acquire the watermark image by the control terminal in a way of encrypting the watermark image data packet of the authorization control terminal, so that the watermark image of a user and a shot image can be prevented from being embezzled to a certain extent.
Referring to fig. 9, fig. 9 is a schematic structural diagram of a control terminal according to an embodiment of the present invention, as shown in fig. 9, the control terminal includes a processor 801 and a memory 802, the memory 802 and the processor 801 are connected by a bus 803, and the memory 802 is used for storing program instructions. The control terminal further comprises a device such as an operating rod for operating the unmanned aerial vehicle, a display screen for displaying the flight attitude of the unmanned aerial vehicle and the like, and the embodiment of the invention is not limited.
The memory 802 may include volatile memory (volatile memory), such as random-access memory (RAM); the memory 802 may also include a non-volatile memory (non-volatile memory), such as a flash memory (flash memory), a solid-state drive (SSD), etc.; the memory 802 may also comprise a combination of the above-described types of memory.
The processor 801 may be a Central Processing Unit (CPU). The processor 801 may further include a hardware chip. The hardware chip may be an application-specific integrated circuit (ASIC), a Programmable Logic Device (PLD), or the like. The PLD may be a field-programmable gate array (FPGA), a General Array Logic (GAL), or the like. The processor 801 may also be a combination of the above structures.
In the embodiment of the present invention, the memory 802 is used for storing a computer program, the computer program includes program instructions, and the processor 801 is used for executing the program instructions stored in the memory 802, so as to implement the steps of the corresponding methods in the embodiments shown in fig. 2 to 5.
In one embodiment, the processor 801 is configured to execute program instructions stored in the memory 802, and the processor 801 is configured to execute, when calling the program instructions:
acquiring a shot image output by a shooting device configured by the unmanned aerial vehicle from the unmanned aerial vehicle;
acquiring a watermark image;
and superposing the watermark image to the shot image to obtain a composite image.
In an alternative embodiment, the processor 801 calls the program instruction to obtain a watermark image, specifically to:
acquiring a watermark image data packet from a server, wherein the watermark image data packet is obtained by encrypting an initial watermark image by the server by using a preset encryption rule; the initial watermark image is an image uploaded to the server by a user corresponding to the control terminal;
decrypting the watermark image data packet by using a decryption rule to obtain a watermark image; the decryption rule corresponds to the encryption rule.
In an alternative embodiment, the processor 801 calls the program instructions and further performs:
when the decryption rule is utilized to decrypt the watermark image data packet, prompt information is output; and the prompt information is used for prompting that the watermark image acquisition fails.
In an alternative embodiment, the processor 801 calls the program instructions and further performs:
and acquiring an image selected by a user, and sending the image to the server as an initial watermark image corresponding to the user.
In an alternative embodiment, the processor 801 invokes the program instruction to decrypt the watermark image data packet by using a decryption rule to obtain a watermark image, specifically to:
and decrypting the watermark image data packet by using the user information of the user to obtain the watermark image.
In an alternative embodiment, the processor 801 calls the program instruction to obtain a watermark image, specifically to:
and acquiring the watermark image from a local storage device of the control terminal.
In an alternative embodiment, the processor 801 calls the program instruction to obtain a watermark image, specifically to:
and acquiring a watermark image uploaded by a user.
In an alternative embodiment, the processor 801 calls the program instructions to further:
adjusting at least one of resolution, definition, specification, size and transparency of the watermark image to obtain an adjusted watermark image;
correspondingly, the processor 801 invokes the program instruction to superimpose the watermark image onto the captured image to obtain a composite image, specifically configured to:
and superposing the adjusted watermark image to the shot image to obtain a composite image.
In an alternative embodiment, the processor 801 calls the program instruction to superimpose the watermark image onto the captured image to obtain a composite image, specifically for:
determining a target position of the watermark image superposed in the shot image according to the size and/or color information of the shot image;
and overlaying the watermark image to a target position in the shot image to obtain a composite image.
In an alternative embodiment, the processor 801 calls the program instructions and is further configured to perform:
calling an application program to execute sharing operation on the synthetic image; alternatively, the first and second electrodes may be,
and sending the composite image to a live broadcast or rebroadcast device.
In the embodiment of the invention, the user information comprises at least one of a user account, an identity and a password corresponding to the user account.
Referring to fig. 10, fig. 10 is a schematic structural diagram of a server according to an embodiment of the present invention, as shown in fig. 10, the server may include a processor 901 and a memory 902, the memory 902 and the processor 901 are connected through a bus 903, and the memory 902 is used for storing program instructions.
The memory 902 may include volatile memory (volatile memory), such as random-access memory (RAM); the memory 902 may also include a non-volatile memory (non-volatile memory), such as a flash memory (flash memory), a solid-state drive (SSD), etc.; the memory 902 may also comprise a combination of the above-described types of memory.
The processor 901 may be a Central Processing Unit (CPU). The processor 901 may further include a hardware chip. The hardware chip may be an application-specific integrated circuit (ASIC), a Programmable Logic Device (PLD), or the like. The PLD may be a field-programmable gate array (FPGA), a General Array Logic (GAL), or the like. The processor 601 may also be a combination of the above structures.
In the embodiment of the present invention, the memory 902 is used for storing a computer program, the computer program includes program instructions, and the processor 901 is used for executing the program instructions stored in the memory 902, so as to implement the steps of the corresponding method in the embodiment shown in fig. X.
In one embodiment, the processor 901 is configured to execute the program instructions stored in the memory 902, and the processor 901 is configured to execute, when the program instructions are called, the following steps:
acquiring an initial watermark image uploaded by a user of a control terminal of an unmanned aerial vehicle;
encrypting the initial watermark image according to a preset encryption rule to obtain a watermark image data packet;
and sending the watermark image data packet to a control terminal of the unmanned aerial vehicle, so that the control terminal decrypts the watermark image data packet by using a decryption rule corresponding to the encryption rule to obtain a watermark image, and superimposes the watermark image on a shot image, wherein the shot image is obtained from the unmanned aerial vehicle and is output by a shooting device configured by the unmanned aerial vehicle.
In an optional implementation manner, the processor 901 calls the program instruction to encrypt the initial watermark image according to a preset encryption rule to obtain a watermark image data packet, where the program instruction is specifically configured to:
and encrypting the initial watermark image according to the user information of the user to obtain a watermark image data packet.
In an optional implementation manner, the processor 901 calls the program instruction, and before the encrypting the watermark image according to the preset encryption rule to obtain the watermark image data packet, may further perform:
and adjusting at least one of resolution, definition, specification, size and transparency of the initial watermark image to obtain an adjusted initial watermark image.
In an embodiment of the present invention, a computer-readable storage medium is further provided, where the computer-readable storage medium stores a computer program, and the computer program, when executed by a processor, implements the related functions described in the embodiments corresponding to fig. 2 to 5 of the present invention, and may also implement the functions of the related apparatus, the control terminal, or the server described in fig. 7 to 10, which are not described herein again.
The computer readable storage medium may be an internal storage unit of the device according to any of the foregoing embodiments, for example, a hard disk or a memory of the device. The computer readable storage medium may also be an external storage device of the device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), etc. provided on the device. Further, the computer-readable storage medium may also include both an internal storage unit and an external storage device of the apparatus. The computer-readable storage medium is used for storing the computer program and other programs and data required by the terminal. The computer readable storage medium may also be used to temporarily store data that has been output or is to be output.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
The above disclosure is only for the purpose of illustrating the preferred embodiments of the present invention, and it is therefore to be understood that the invention is not limited by the scope of the appended claims.

Claims (16)

1. A shot image processing method is applied to a control terminal of an unmanned aerial vehicle, and comprises the following steps:
acquiring an image selected by a user, and sending the image to a server as an initial watermark image corresponding to the user;
acquiring a shot image output by a shooting device configured by the unmanned aerial vehicle from the unmanned aerial vehicle;
acquiring a watermark image data packet from the server, wherein the watermark image data packet is obtained by encrypting the initial watermark image by the server by using a preset encryption rule;
decrypting the watermark image data packet by using a decryption rule to obtain a watermark image; the decryption rule corresponds to the encryption rule; the encryption rule or the decryption rule is determined according to the collected user information of the user, wherein the user information comprises at least one of a user account, an identity and a password corresponding to the user account; the decrypting the watermark image data packet by using the decryption rule to obtain the watermark image comprises the following steps: decrypting the watermark image data packet by using the user information of the user to obtain a watermark image;
and superposing the watermark image to the shot image to obtain a composite image.
2. The method of claim 1, further comprising:
when the decryption rule is utilized to decrypt the watermark image data packet, prompt information is output; and the prompt information is used for prompting that the watermark image acquisition fails.
3. The method according to claim 1 or 2, characterized in that the method further comprises:
adjusting at least one of resolution, definition, specification size and transparency of the watermark image to obtain an adjusted watermark image;
the superimposing the watermark image to the captured image to obtain a composite image includes:
and superposing the adjusted watermark image to the shot image to obtain a composite image.
4. The method of claim 1, wherein superimposing the watermark image into the captured image to obtain a composite image comprises:
determining a target position of the watermark image superposed in the shot image according to the size and/or color information of the shot image;
and overlaying the watermark image to a target position in the shot image to obtain a composite image.
5. The method of claim 1, further comprising:
calling an application program to execute sharing operation on the synthetic image; alternatively, the first and second electrodes may be,
and sending the composite image to a live broadcast or rebroadcast device.
6. A processing method of a watermark image is applied to a server, and is characterized by comprising the following steps:
acquiring an initial watermark image corresponding to a user uploaded by the user of a control terminal of an unmanned aerial vehicle, wherein the initial watermark image is an image selected by the user;
encrypting the initial watermark image according to a preset encryption rule to obtain a watermark image data packet; the encrypting the initial watermark image according to a preset encryption rule to obtain a watermark image data packet includes: encrypting the initial watermark image according to the user information of the user to obtain a watermark image data packet;
sending the watermark image data packet to a control terminal of the unmanned aerial vehicle, so that the control terminal decrypts the watermark image data packet by using a decryption rule corresponding to the encryption rule to obtain a watermark image, and superimposes the watermark image on a shot image, wherein the shot image is obtained from the unmanned aerial vehicle and is output by a shooting device configured by the unmanned aerial vehicle; the encryption rule or the decryption rule is determined according to the collected user information of the user, and the user information comprises at least one of a user account, an identity and a password corresponding to the user account.
7. The method according to claim 6, wherein before the encrypting the watermark image according to the preset encryption rule to obtain the watermark image data packet, the method further comprises:
adjusting at least one of a resolution, a sharpness, a specification, a size, and a transparency of the initial watermark image.
8. The control terminal of the unmanned aerial vehicle is characterized by comprising a processor and a memory;
the memory for storing a computer program comprising program instructions;
the processor is used for executing the following steps when calling the program instruction:
acquiring an image selected by a user, and sending the image to a server as an initial watermark image corresponding to the user;
acquiring a shot image output by a shooting device configured by the unmanned aerial vehicle from the unmanned aerial vehicle;
acquiring a watermark image data packet from the server, wherein the watermark image data packet is obtained by encrypting the initial watermark image by the server by using a preset encryption rule; decrypting the watermark image data packet by using a decryption rule to obtain a watermark image; the decryption rule corresponds to the encryption rule; the encryption rule or the decryption rule is determined according to the collected user information of the user, wherein the user information comprises at least one of a user account, an identity and a password corresponding to the user account; the processor decrypts the watermark image data packet by using a decryption rule to obtain a watermark image, and is specifically configured to: decrypting the watermark image data packet by using the user information of the user to obtain a watermark image;
and superposing the watermark image to the shot image to obtain a composite image.
9. The control terminal of claim 8, wherein the processor is further configured to: when the decryption rule is utilized to decrypt the watermark image data packet, prompt information is output; and the prompt information is used for prompting that the watermark image acquisition fails.
10. The control terminal according to claim 8 or 9, wherein the processor is further configured to:
adjusting at least one of resolution, definition, specification, size and transparency of the watermark image to obtain an adjusted watermark image;
the processor superimposes the watermark image onto the captured image to obtain a composite image, and is specifically configured to:
and superposing the adjusted watermark image to the shot image to obtain a composite image.
11. The control terminal according to claim 8, wherein the processor superimposes the watermark image onto the captured image to obtain a composite image, in particular for:
determining a target position of the watermark image superposed in the shot image according to the size and/or color information of the shot image;
and overlaying the watermark image to a target position in the shot image to obtain a composite image.
12. The control terminal according to claim 8, wherein the processor is further configured to invoke an application program to perform a sharing operation on the composite image; or sending the composite image to a live broadcast or relay broadcast device.
13. A server, comprising a processor and a memory;
the memory for storing a computer program comprising program instructions;
the processor is used for executing the following steps when calling the program instruction:
acquiring an initial watermark image corresponding to a user uploaded by the user of a control terminal of an unmanned aerial vehicle, wherein the initial watermark image is an image selected by the user;
encrypting the initial watermark image according to a preset encryption rule to obtain a watermark image data packet; the processor encrypts the initial watermark image according to a preset encryption rule to obtain a watermark image data packet, and is specifically configured to: encrypting the initial watermark image according to the user information of the user to obtain a watermark image data packet;
sending the watermark image data packet to a control terminal of the unmanned aerial vehicle, so that the control terminal decrypts the watermark image data packet by using a decryption rule corresponding to the encryption rule to obtain a watermark image, and superimposes the watermark image on a shot image, wherein the shot image is obtained from the unmanned aerial vehicle and is output by a shooting device configured by the unmanned aerial vehicle; the encryption rule or the decryption rule is determined according to the collected user information of the user, and the user information comprises at least one of a user account, an identity and a password corresponding to the user account.
14. The server according to claim 13, wherein the processor is further configured to adjust at least one of resolution, sharpness, size, dimension, and transparency of the initial watermark image before encrypting the watermark image according to a preset encryption rule to obtain the watermark image data packet.
15. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program comprising program instructions that, when executed by a processor, cause the processor to execute the captured image processing method according to any one of claims 1 to 5.
16. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program comprising program instructions that, when executed by a processor, cause the processor to execute the method of processing a watermark image according to any one of claims 6 to 7.
CN201880066491.6A 2018-11-30 2018-11-30 Shot image processing method and related equipment Expired - Fee Related CN111247785B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/118563 WO2020107406A1 (en) 2018-11-30 2018-11-30 Photographed image processing method and related device

Publications (2)

Publication Number Publication Date
CN111247785A CN111247785A (en) 2020-06-05
CN111247785B true CN111247785B (en) 2022-04-29

Family

ID=70852599

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201880066491.6A Expired - Fee Related CN111247785B (en) 2018-11-30 2018-11-30 Shot image processing method and related equipment

Country Status (2)

Country Link
CN (1) CN111247785B (en)
WO (1) WO2020107406A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113747061A (en) * 2021-08-25 2021-12-03 国网河北省电力有限公司衡水供电分公司 Image acquisition method, device, terminal and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101166260A (en) * 2007-09-12 2008-04-23 华为技术有限公司 Method and device for image coding and watermark removal
CN101442657A (en) * 2008-12-23 2009-05-27 西安交通大学 Design method for stream medium distributed digital watermarking architecture
CN101572805A (en) * 2009-06-05 2009-11-04 中山大学 Safe video transmission system and application method thereof
US10007964B1 (en) * 2015-05-20 2018-06-26 Digimarc Corporation Image processing methods and arrangements
CN108475410A (en) * 2017-04-28 2018-08-31 深圳市大疆创新科技有限公司 3 D stereo watermark adding method, device and terminal

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8000493B2 (en) * 2007-03-08 2011-08-16 Broadcom Corporation Method and system for watermark embedding in a multimedia system-on-chip
CN101198045B (en) * 2007-12-20 2012-07-25 清华大学 Stream media digital watermarking system
CN102760221B (en) * 2011-04-27 2014-10-22 航天信息股份有限公司 IPTV (Internet Protocol Television) digital rights management (DRM) method and device based on digital watermarking and encryption
CN105045279A (en) * 2015-08-03 2015-11-11 余江 System and method for automatically generating panorama photographs through aerial photography of unmanned aerial aircraft
CN105528707A (en) * 2015-11-26 2016-04-27 南京林业大学 Digital watermarking based anti-counterfeiting identification system of mobile phone
CN107111929B (en) * 2016-09-14 2019-04-09 深圳市大疆创新科技有限公司 Remote terminal
CN106453056A (en) * 2016-10-28 2017-02-22 努比亚技术有限公司 Mobile terminal and method for safely sharing picture
CN106506169A (en) * 2016-12-08 2017-03-15 芜湖市振华戎科智能科技有限公司 A kind of CD-enciphering system based on watermark and certificate server
CN108665403B (en) * 2017-03-29 2022-06-24 腾讯科技(深圳)有限公司 Digital watermark embedding method, digital watermark extracting method, digital watermark embedding device, digital watermark extracting device and digital watermark system
CN107027055A (en) * 2017-04-28 2017-08-08 安徽四创电子股份有限公司 A kind of video based on digital watermark is traced to the source and encryption method
CN107273753A (en) * 2017-05-11 2017-10-20 北京明朝万达科技股份有限公司 A kind of screenshotss leakage prevention method and device
CN107370993B (en) * 2017-08-14 2019-10-08 哈尔滨市一舍科技有限公司 A kind of virtual shooting system and method based on two-dimentional code watermark

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101166260A (en) * 2007-09-12 2008-04-23 华为技术有限公司 Method and device for image coding and watermark removal
CN101442657A (en) * 2008-12-23 2009-05-27 西安交通大学 Design method for stream medium distributed digital watermarking architecture
CN101572805A (en) * 2009-06-05 2009-11-04 中山大学 Safe video transmission system and application method thereof
US10007964B1 (en) * 2015-05-20 2018-06-26 Digimarc Corporation Image processing methods and arrangements
CN108475410A (en) * 2017-04-28 2018-08-31 深圳市大疆创新科技有限公司 3 D stereo watermark adding method, device and terminal

Also Published As

Publication number Publication date
CN111247785A (en) 2020-06-05
WO2020107406A1 (en) 2020-06-04

Similar Documents

Publication Publication Date Title
US11734456B2 (en) Systems and methods for authenticating photographic image data
KR101650002B1 (en) Context based management for secure augmented reality applications
US11163897B2 (en) Method and apparatus for image display using privacy masking
US9530017B2 (en) Secure printing between printer and print client device
US20210224407A1 (en) Information processing device, information processing method, and distributed component
CN109525989B (en) Data processing and identity authentication method and system, and terminal
CN104040934A (en) Preserving image privacy when manipulated by cloud services
CN108927808B (en) ROS node communication method, authentication method and device
US10339283B2 (en) System and method for creating, processing, and distributing images that serve as portals enabling communication with persons who have interacted with the images
WO2017026356A1 (en) Image processing device, image restoring device, image processing method, and image restoring method
EP3354034B1 (en) Secure distribution of an image
CN104156654A (en) Decryption method and device
JP6002913B2 (en) Server device, content sharing system, program, and application software
CN111247785B (en) Shot image processing method and related equipment
US20160080155A1 (en) Systems and Methods for Controlling the Distribution, Processing, and Revealing of Hidden Portions of Images
CN109600631B (en) Video file encryption and publishing method and device
KR101846163B1 (en) Method and system for protecting shared information
US11057644B2 (en) Distribution system, client terminal, and method of controlling display
CN110063089A (en) Content transmission network including mobile device
US20230214481A1 (en) Secure Display of Sensitive Content
CN110996088B (en) Video processing method and related device
CN114760091A (en) Data transmission method and system
WO2016195060A1 (en) Image processing system, server device, method for controlling server device, and program
JP2008042631A (en) Digital camera, and camera system
TW201918902A (en) Method for securing files uploaded to cloud service system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20220429

CF01 Termination of patent right due to non-payment of annual fee