CN111310129A - Method, device and storage medium for maintaining right of image - Google Patents

Method, device and storage medium for maintaining right of image Download PDF

Info

Publication number
CN111310129A
CN111310129A CN202010104345.7A CN202010104345A CN111310129A CN 111310129 A CN111310129 A CN 111310129A CN 202010104345 A CN202010104345 A CN 202010104345A CN 111310129 A CN111310129 A CN 111310129A
Authority
CN
China
Prior art keywords
image
user
information
library
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010104345.7A
Other languages
Chinese (zh)
Inventor
李宏旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JD Digital Technology Holdings Co Ltd
Beijing Haiyi Tongzhan Information Technology Co Ltd
Original Assignee
JD Digital Technology Holdings Co Ltd
Beijing Haiyi Tongzhan Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JD Digital Technology Holdings Co Ltd, Beijing Haiyi Tongzhan Information Technology Co Ltd filed Critical JD Digital Technology Holdings Co Ltd
Priority to CN202010104345.7A priority Critical patent/CN111310129A/en
Publication of CN111310129A publication Critical patent/CN111310129A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/51Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/58Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/583Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Library & Information Science (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Computing Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The disclosure provides a method, a device and a storage medium for maintaining right of an image, and relates to the technical field of computers. According to the method and the device, the matching degree between the image to be maintained of the user and the image in the image library to be verified is calculated, whether the image in the image library to be verified is suspected to be authorized or not is automatically judged according to the matching degree, the searching efficiency of the image suspected to be authorized is improved, manpower is saved, and under the condition of suspected to be authorized, the image to be maintained of the user and the evidence information thereof, the image suspected to be authorized and the source information thereof are output, so that the user can more simply and quickly maintain the right.

Description

Method, device and storage medium for maintaining right of image
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a method, an apparatus, and a storage medium for maintaining rights of an image.
Background
With the development of internet technology, various images are more and more convenient to acquire, and without the permission of copyright holders, the unauthorized use of images created or held by the copyright holders constitutes infringement.
In some related arts, when a copyright holder needs to maintain the rights of an infringed image, it is necessary to artificially collect evidence of the infringement, for example, to acquire information of the infringement image and its source.
Disclosure of Invention
The inventor finds that in the related image right maintaining technology, the problem of low searching efficiency caused by artificial collection of infringement evidence is solved, and the searching is time-consuming and labor-consuming.
According to the method and the device, the matching degree between the image to be maintained of the user and the image in the image library to be verified is calculated, whether the image in the image library to be verified is suspected to be authorized or not is automatically judged according to the matching degree, the searching efficiency of the image suspected to be authorized is improved, manpower is saved, and under the condition of suspected to be authorized, the image to be maintained of the user and the evidence information thereof, the image suspected to be authorized and the source information thereof are output, so that the user can more simply and quickly maintain the right.
According to some embodiments of the present disclosure, a method of maintaining rights to an image is proposed, comprising:
calculating the matching degree between the first image of the user and each second image in the image library to be verified;
determining a target second image matched with the first image from the image library to be verified according to the matching degree;
outputting the target second image and the recorded source information of the target second image;
and outputting the first image and the recorded evidence storing information of the first image, so that the user can utilize the target second image and the source information thereof and the first image and the evidence storing information thereof to maintain the right of the first image.
In some embodiments, further comprising: obtaining the recorded evidence information of the first image from at least one of an evidence system and a user image repository.
In some embodiments, the depository system comprises at least one of a blockchain depository system and an internet forensic depository system.
In some embodiments, the calculating the degree of matching between the first image of the user and each second image in the image library to be verified comprises: and calculating the distance between the hash value of the first image of the user and the hash value of each second image in the image library to be verified, and determining the matching degree according to the distance.
In some embodiments, the hash value is a first hash value obtained by processing an image with a secure hash algorithm, or a second hash value obtained by processing an image with a mean hash algorithm, a perceptual hash algorithm, or a difference hash algorithm.
In some embodiments, the distance is a hamming distance, a cosine distance, or a euclidean distance.
In some embodiments, each second image in the image library to be verified is captured using web crawler technology.
In some embodiments, further comprising: and judging whether the first image meets a preset condition, and if the first image meets the preset condition, storing the certificate storage information of the first image into at least one of a user image library and a certificate storage system.
In some embodiments, the first image of the user is specified according to a right-maintaining request of the user or is selected from a user image library.
In some embodiments, the evidence information of the first image comprises: the uploading author and uploading time of the first image, and the storage address and the hash value of the first image.
According to other embodiments of the present disclosure, an apparatus for maintaining rights of an image is provided, including: a memory; and a processor coupled to the memory, the processor configured to perform the method of maintaining rights to an image of any embodiment based on instructions stored in the memory.
According to still other embodiments of the present disclosure, an apparatus for maintaining rights of an image is provided, including: the computing module is configured to compute the matching degree between the first image of the user and each second image in the image library to be verified; the determining module is configured to determine a target second image matched with the first image from the image library to be verified according to the matching degree; a first output module configured to output the target second image and recorded source information of the target second image; and the second output module is configured to output the first image and the recorded evidence information of the first image, so that the user can maintain the right of the first image by using the target second image and the source information thereof output by the first output module and the first image and the evidence information thereof output by the second output module.
According to further embodiments of the present disclosure, a non-transitory computer-readable storage medium is proposed, on which a computer program is stored, which when executed by a processor implements the method of maintaining rights to an image according to any of the embodiments.
Drawings
The drawings that will be used in the description of the embodiments or the related art will be briefly described below. The present disclosure can be understood more clearly from the following detailed description, which proceeds with reference to the accompanying drawings.
It is to be understood that the drawings in the following description are merely exemplary of the disclosure, and that other drawings may be derived from those drawings by one of ordinary skill in the art without undue inventive faculty.
Fig. 1 illustrates a flow diagram of a method of maintaining rights to an image in accordance with some embodiments of the present disclosure.
Fig. 2 illustrates a flow diagram for credentialing a first image and information thereof to be credited by a user according to some embodiments of the present disclosure.
FIG. 3 illustrates a flow diagram of a method of maintaining rights to an image according to further embodiments of the present disclosure.
Fig. 4 illustrates a schematic diagram of an apparatus to right an image according to some embodiments of the present disclosure.
FIG. 5 shows a schematic diagram of an apparatus for validating an image according to further embodiments of the present disclosure.
Detailed Description
The technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the drawings in the embodiments of the present disclosure.
Fig. 1 illustrates a flow diagram of a method of maintaining rights to an image in accordance with some embodiments of the present disclosure. This method can be executed, for example, by an apparatus for maintaining rights to an image, which is referred to as a right maintaining apparatus.
As shown in FIG. 1, the method of this embodiment comprises steps 101-105.
In step 101, a first image and information thereof to be protected by a user are stored in advance, so that a subsequent user can protect the image owned by the user. The information of the first image to be stored is also referred to as the storage information of the first image.
For example, the right-maintaining device stores the first image in a storage space such as a cloud or a disk, and stores information such as an upload author, upload time, storage address, hash value, and the like of the first image in at least one of the user image repository and the deposit system. Wherein the upload author represents a user holding the first image; the upload time represents a time at which the user can be certified to hold the first image earliest; the storage address represents a position where the first image is stored by the right maintaining means; the hash value represents a feature of the first image. The Hash value includes a first Hash value obtained by processing an image using a Secure Hash Algorithm (SHA), and a second Hash value obtained by processing an image using a mean Hash Algorithm, a perceptual Hash Algorithm, or a difference Hash Algorithm. The aforementioned SHA algorithm is, for example, SHA256 algorithm. The first hash value can uniquely identify one image, and therefore can be used as an image identifier, although the first hash value is relatively large, if the computing resources are sufficient, the first hash value can also be used for judging the similarity of the images. The second hash value can represent the characteristics of the image and can be used for judging the similarity of the image, and the similarity judgment efficiency is higher because the second hash value is smaller.
The deposit certificate system comprises at least one of a block chain deposit certificate system and an internet judicial deposit certificate system. The block chain evidence storing system stores the evidence storing information of the image to be protected in the block chain by using a block chain technology, and the evidence storing information of the image to be protected is not easy to be distorted due to a data security mechanism of the block chain, so that the credibility of the evidence storing information of the image to be protected provided during the protection of the right is improved. The internet judicial evidence storage system can be an internet court evidence storage system, for example, and provides a judicial endorsement for the uploaded image to be maintained and a guarantee with legal effectiveness. The evidence storing method based on the evidence storing system improves the credibility of the evidence storing information of the image to be protected, and provides convenience and support for the user to protect the image.
In some embodiments, before storing the information of the first image, for example, it may be further determined whether the first image meets a preset condition, if the first image meets the preset condition, the storing is performed, and if the first image does not meet the preset condition, the storing is not allowed. The method for determining whether the first image meets the preset condition includes: and comparing the distance between the hash value (such as the second hash value) of the first image and the hash value (such as the second hash value) of the sensitive image according to the sensitive image sample library, judging whether the first image belongs to the sensitive image according to the distance, if not, considering that the first image meets the preset condition, and if so, considering that the first image does not meet the preset condition. The sensitive image sample library can contain information such as images and hash values of harmful contents related to yellow, terrorism, politics, viruses and the like.
In step 102, a matching degree between the first image of the user and each second image in the image library to be verified is calculated.
The calculation of the matching degree of the images may be realized by calculating the distance between the hash values of the images (also referred to as a hash value matching implementation), in addition to the matching degree between the images themselves (also referred to as an image matching implementation).
The image matching implementation mode comprises the following steps: the right maintaining device can acquire the first image through the storage address of the first image stored in the user image library, then calculate the distance between the first image of the user and each second image in the image library to be verified, and determine the matching degree according to the distance, wherein the smaller the distance, the higher the matching degree, and the more similar the images.
The hash value matching implementation mode is as follows: the right maintaining device can directly obtain the hash value of the first image from the user image library, also can obtain the storage address of the first image from the user image library, obtain the first image by using the storage address, calculate to obtain the hash value of the first image, then calculate the distance between the hash value of the first image of the user and the hash value of each second image in the image library to be verified, and determine the matching degree according to the distance, wherein the smaller the distance is, the higher the matching degree is, and the more similar the images are. The hash value may be, for example, a first hash value or a second hash value, but the efficiency of determining the matching degree of the image by using the second hash value is higher than that of determining the matching degree of the image by using the first hash value, and the occupied processing resources are less. The distance may be, for example, a hamming distance, a cosine distance, or a euclidean distance.
And acquiring each second image in the image library to be verified by utilizing a web crawler technology. The massive images on the network are rapidly collected by utilizing the web crawler technology, so that the search range of the infringing image is more comprehensive. The image library to be verified can also store hash values of the second images so as to carry out matching degree calculation, and can also store source information such as uploading authors, uploading time, uploading places and the like of the second images.
In step 103, a target second image matched with the first image is determined from the image library to be verified according to the matching degree.
As mentioned above, the smaller the distance between different images, the higher the matching degree, and the more similar these images are, i.e. the more likely they are to be infringing images. For example, if the hamming distance between the first image and the second image is less than 5, the second image is considered to be the target second image that matches the first image. The distance threshold for distinguishing the matching degree may be set as required, and is not limited to the specific numerical value adopted in this embodiment.
In step 104, the target second image and the recorded source information are output.
The source information of the target second image may include, for example, information of an upload author, an upload time, an upload location, and the like of the second image, but is not limited to the illustrated example.
The target second image and the source information thereof are output, so that the user can master the infringement fact about the infringement image, and the method plays an important supporting role in the negotiation stage or litigation stage of the copyright.
In step 105, the first image and the recorded evidence information are output, so that the user can use the target second image and the source information thereof and the first image and the evidence information thereof to maintain the right of the first image.
The deposit information for the first image may be obtained from at least one of a user image repository and a deposit system. The block chain evidence storing system, the internet judicial evidence storing system and other evidence storing systems can provide image evidence storing information with higher credibility than the image library of the user.
According to the embodiment, the matching degree between the image to be maintained of the user and the image in the image library to be verified is calculated, whether the image in the image library to be verified is suspected to be authorized or not is automatically judged according to the matching degree, the searching efficiency of the image suspected to be authorized is improved, manpower is saved, and under the condition of suspected authorization, the image to be maintained of the user and the evidence information thereof, the image suspected to be authorized and the source information thereof are output, so that the user can more simply and quickly maintain the right according to the information, and the credibility degree of the image right maintaining information is higher.
One implementation of step 101 is described in detail below in conjunction with fig. 2.
Fig. 2 illustrates a flow diagram for credentialing a first image and information thereof to be credited by a user according to some embodiments of the present disclosure.
As shown in FIG. 2, the method of this embodiment includes steps 201 and 204.
In step 201, a user submits a first image to a right maintaining device, applies for a certificate for the first image to be maintained, and the right maintaining device receives a certificate storing request initiated by the user for the first image to be maintained.
The first image to be protected may be, for example, an image of which the user has the copyright of his own.
In step 202, the right-maintaining device determines whether the first image meets a predetermined condition, and the determination method refers to the above. If the first image applied for evidence storage meets the preset condition, go to step 203.
In step 203, the right-maintaining device stores the first image in a storage space such as a cloud or a disk, and uploads the evidence storing information such as an uploading author, uploading time, a storage address, a hash value and the like of the first image to the evidence storing system for storing the evidence.
As previously indicated, the depository system includes, for example, at least one of a blockchain depository system and an internet forensic depository system. If the evidence storing system comprises a block chain evidence storing system, the information of the image to be authenticated is stored in the block chain evidence storing system for block chain evidence storing. If the license storage system comprises an internet judicial license storage system, the information of the image to be safeguarded is stored in the internet judicial license storage system for judicial license storage.
In step 204, the verification system provides the user with a verification certificate, see in particular step 204a and step 204 b.
In step 204a, if the certificate storage system includes a blockchain certificate storage system, the blockchain certificate storage system provides a blockchain certificate storage certificate for the user, and the certificate storage information of the image and the information of the blockchain certificate storage system can be recorded on the certificate.
In step 204b, if the certificate storing system comprises an internet judicial certificate storing system, the internet judicial certificate storing system provides an internet judicial certificate storing certificate for the user, and the certificate storing information of the image and the information of the internet judicial certificate storing system can be recorded on the certificate.
In the embodiment, the first image and the information of the first image to be authenticated of the user are stored in the certificate storage system in advance for certificate storage, so that the user can perform the authentication based on the certificate storage information.
FIG. 3 illustrates a flow diagram of a method of maintaining rights to an image according to further embodiments of the present disclosure.
As shown in FIG. 3, the method of this embodiment comprises steps 301-305.
In step 301, the right-maintaining device determines one or more first images to be maintained, and obtains second hash values of the first images from the user image library.
The first image to be subjected to right maintenance is designated according to a right maintenance request of a user or is selected from a user image library by a right maintenance device, namely, the user logs in the user image library, inquires own images and designates one or more images needing right maintenance from the images, or the right maintenance device selects one, one batch or all images from the user image library for right maintenance.
In step 302, the right-maintaining device obtains the second hash value of each second image from the image library to be verified.
In step 303, the weight-preserving device calculates a hamming distance between the second hash value of the first image and the second hash value of the second image, the distance reflecting a matching degree between the second image and the first image, and determines a target second image matched with the first image according to the distance.
As described above, since the smaller the distance between different images, the higher the matching degree, and the more similar these images, for example, two images corresponding to a hamming distance of less than 5 are regarded as the same image, two images corresponding to a hamming distance of more than 5 and less than 8 are regarded as similar images, and when the hamming distance is more than 8 and less than 10, they are regarded as pseudo-similar images, and whether or not they are similar images can be determined by manual review. For example, the right-maintaining means may determine a second image belonging to a similar image or the same image as a target second image matching the first image.
In step 304, if a target second image matching the first image is found, the authentication device obtains the evidence information of the first image from the evidence system for evidence collection.
And if the evidence storing system comprises an internet judicial evidence storing system, acquiring the evidence storing information of the first image from the internet judicial evidence storing system so as to finish the judicial evidence obtaining.
In step 305, the right-maintaining device outputs the first image and its evidence information to the user.
In step 306, the right-maintaining device obtains the source information of the target second image from the image library to be verified, and outputs the target second image and the source information thereof to the user.
In step 307, the user uses the obtained first image to be subjected to right maintenance and the evidence information thereof, and the suspected target second image and the source information thereof to perform right maintenance, so that the difficulty of providing the evidence of the right of the user is reduced, the user can simply and quickly perform the right maintenance, and the credibility degree of the image right maintenance information is higher.
Fig. 4 illustrates a schematic diagram of an apparatus to right an image according to some embodiments of the present disclosure.
As shown in fig. 4, the apparatus 400 for performing right-keeping on an image according to this embodiment includes a calculation module 401, a determination module 402, a first output module 403, and a second output module 404.
The calculating module 401 is configured to calculate a matching degree between the first image of the user and each second image in the image library to be verified.
For example, the distance between the hash value of the first image of the user and the hash value of each second image in the image library to be verified is calculated, and the matching degree is determined according to the distance. The hash value is a first hash value obtained by processing an image by using a secure hash algorithm, or a second hash value obtained by processing an image by using a mean hash algorithm, a perceptual hash algorithm or a difference hash algorithm. The distance is a hamming distance, a cosine distance or a euclidean distance.
And the determining module 402 is configured to determine a target second image matched with the first image from the image library to be verified according to the matching degree.
A first output module 403 configured to output the target second image and the source information of the recorded target second image.
And a second output module 404 configured to output the first image and the recorded evidence information of the first image, so that the user can use the target second image and the source information thereof output by the first output module and the first image and the evidence information thereof output by the second output module to perform right maintenance on the first image.
FIG. 5 shows a schematic diagram of an apparatus for validating an image according to further embodiments of the present disclosure.
As shown in fig. 5, the apparatus 500 for maintaining rights to an image of this embodiment includes: a memory 501 and a processor 502 coupled to the memory 501, the processor 502 being configured to perform a method of maintaining an image according to any of the embodiments of the present disclosure based on instructions stored in the memory 501.
The memory 501 may include, for example, a system memory, a fixed nonvolatile storage medium, and the like. The system memory stores, for example, an operating system, an application program, a Boot Loader (Boot Loader), and other programs.
The apparatus 500 for maintaining rights to an image may further include an input/output interface 503, a network interface 504, a storage interface 505, and the like. These interfaces 503, 504, 505 and the connection between the memory 501 and the processor 502 may be, for example, via a bus 506. The input/output interface 503 provides a connection interface for input/output devices such as a display, a mouse, a keyboard, and a touch screen. The network interface 504 provides a connection interface for various networking devices. The storage interface 505 provides a connection interface for external storage devices such as an SD card and a usb disk.
As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-non-transitory readable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer program code embodied therein.
The present disclosure is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the disclosure. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only exemplary of the present disclosure and is not intended to limit the present disclosure, so that any modification, equivalent replacement, or improvement made within the spirit and principle of the present disclosure should be included in the scope of the present disclosure.

Claims (13)

1. A method for maintaining rights to an image, comprising:
calculating the matching degree between the first image of the user and each second image in the image library to be verified;
determining a target second image matched with the first image from the image library to be verified according to the matching degree;
outputting the target second image and the recorded source information of the target second image;
and outputting the first image and the recorded evidence storing information of the first image, so that the user can utilize the target second image and the source information thereof and the first image and the evidence storing information thereof to maintain the right of the first image.
2. The method for maintaining rights to an image according to claim 1, further comprising:
obtaining the recorded evidence information of the first image from at least one of an evidence system and a user image repository.
3. The method of claim 2, wherein,
the deposit certificate system comprises at least one of a block chain deposit certificate system and an internet judicial deposit certificate system.
4. The method for maintaining the right of the image according to claim 1, wherein the calculating the matching degree between the first image of the user and each second image in the image library to be verified comprises:
and calculating the distance between the hash value of the first image of the user and the hash value of each second image in the image library to be verified, and determining the matching degree according to the distance.
5. The method of claim 4, wherein,
the hash value is a first hash value obtained by processing the image by using a secure hash algorithm, or a second hash value obtained by processing the image by using a mean hash algorithm, a perceptual hash algorithm or a difference hash algorithm.
6. The method of claim 4, wherein,
the distance is a hamming distance, a cosine distance or a euclidean distance.
7. The method of claim 1, wherein,
and each second image in the image library to be verified is acquired by utilizing a web crawler technology.
8. The method for maintaining rights to an image according to claim 1, further comprising:
and judging whether the first image meets a preset condition, and if the first image meets the preset condition, storing the certificate storage information of the first image into at least one of a user image library and a certificate storage system.
9. The method of claim 1, wherein,
the first image of the user is designated or selected from a user image library according to the right-maintaining request of the user.
10. The method of preserving images according to any of claims 1 to 9,
the evidence information of the first image comprises: the uploading author and uploading time of the first image, and the storage address and the hash value of the first image.
11. An apparatus for maintaining rights to an image, comprising:
a memory; and
a processor coupled to the memory, the processor configured to perform the method of preserving images of any of claims 1-10 based on instructions stored in the memory.
12. An apparatus for maintaining rights to an image, comprising:
the computing module is configured to compute the matching degree between the first image of the user and each second image in the image library to be verified;
the determining module is configured to determine a target second image matched with the first image from the image library to be verified according to the matching degree;
a first output module configured to output the target second image and recorded source information of the target second image;
and the second output module is configured to output the first image and the recorded evidence information of the first image, so that the user can maintain the right of the first image by using the target second image and the source information thereof output by the first output module and the first image and the evidence information thereof output by the second output module.
13. A non-transitory computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the method of maintaining rights to an image of any of claims 1-10.
CN202010104345.7A 2020-02-20 2020-02-20 Method, device and storage medium for maintaining right of image Pending CN111310129A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010104345.7A CN111310129A (en) 2020-02-20 2020-02-20 Method, device and storage medium for maintaining right of image

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010104345.7A CN111310129A (en) 2020-02-20 2020-02-20 Method, device and storage medium for maintaining right of image

Publications (1)

Publication Number Publication Date
CN111310129A true CN111310129A (en) 2020-06-19

Family

ID=71145073

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010104345.7A Pending CN111310129A (en) 2020-02-20 2020-02-20 Method, device and storage medium for maintaining right of image

Country Status (1)

Country Link
CN (1) CN111310129A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112417381A (en) * 2020-12-11 2021-02-26 中国搜索信息科技股份有限公司 Method and device for rapidly positioning infringement image applied to image copyright protection
CN112579986A (en) * 2020-12-25 2021-03-30 特赞(上海)信息科技有限公司 Image infringement detection method, device and system
CN113568571A (en) * 2021-06-28 2021-10-29 西安电子科技大学 Image de-duplication method based on residual error neural network
CN114359590A (en) * 2021-12-06 2022-04-15 支付宝(杭州)信息技术有限公司 NFT image work infringement detection method and device and computer storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180068091A1 (en) * 2016-09-06 2018-03-08 Intel Corporation Blockchain-Based Shadow Images to Facilitate Copyright Protection of Digital Content
CN108171264A (en) * 2017-12-26 2018-06-15 北京非斗数据科技发展有限公司 A kind of extraction identification technology encoded using deep learning combination Hash to picture infringing content
CN109635521A (en) * 2018-12-06 2019-04-16 中链科技有限公司 A kind of copyright protection based on block chain, verification method and device
CN109753766A (en) * 2018-12-29 2019-05-14 中链科技有限公司 Image artifacts verification information processing method and verification method based on block chain
CN110008655A (en) * 2019-03-01 2019-07-12 北京数字融通科技有限公司 A kind of infringing information identification people's mark system and method based on distributed network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180068091A1 (en) * 2016-09-06 2018-03-08 Intel Corporation Blockchain-Based Shadow Images to Facilitate Copyright Protection of Digital Content
CN108171264A (en) * 2017-12-26 2018-06-15 北京非斗数据科技发展有限公司 A kind of extraction identification technology encoded using deep learning combination Hash to picture infringing content
CN109635521A (en) * 2018-12-06 2019-04-16 中链科技有限公司 A kind of copyright protection based on block chain, verification method and device
CN109753766A (en) * 2018-12-29 2019-05-14 中链科技有限公司 Image artifacts verification information processing method and verification method based on block chain
CN110008655A (en) * 2019-03-01 2019-07-12 北京数字融通科技有限公司 A kind of infringing information identification people's mark system and method based on distributed network

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112417381A (en) * 2020-12-11 2021-02-26 中国搜索信息科技股份有限公司 Method and device for rapidly positioning infringement image applied to image copyright protection
CN112579986A (en) * 2020-12-25 2021-03-30 特赞(上海)信息科技有限公司 Image infringement detection method, device and system
CN113568571A (en) * 2021-06-28 2021-10-29 西安电子科技大学 Image de-duplication method based on residual error neural network
CN113568571B (en) * 2021-06-28 2024-06-04 西安电子科技大学 Image de-duplication method based on residual neural network
CN114359590A (en) * 2021-12-06 2022-04-15 支付宝(杭州)信息技术有限公司 NFT image work infringement detection method and device and computer storage medium

Similar Documents

Publication Publication Date Title
US11100546B2 (en) Method and system for provenance tracking in software ecosystems
CN111310129A (en) Method, device and storage medium for maintaining right of image
CN110598376A (en) Copyright authentication method, device and equipment based on block chain and storage medium
US9111094B2 (en) Malware detection
EP2807598B1 (en) Identifying trojanized applications for mobile environments
EP2693356B1 (en) Detecting pirated applications
JP6640836B2 (en) Genome Information Science Services
EP2273411A2 (en) Systems and methods for determining authorization to operate licensed software based on a client device fingerprint
US20150154398A1 (en) Optimizing virus scanning of files using file fingerprints
US20150326618A1 (en) Method of providing evidence collection tool, and apparatus and method for collecting digital evidence in domain separation-based mobile device
US7353386B2 (en) Method and device for authenticating digital data by means of an authentication extension module
CN113904861B (en) Encryption traffic safety detection method and device
CN112069465A (en) Manuscript intellectual property protection method and system based on block chain
CN112395560A (en) Copyright data processing method and device
CN113395271A (en) Data security access method in cloud computing platform and cloud computing platform
CN103559438A (en) Progress identification method and progress identification system
US9860230B1 (en) Systems and methods for digitally signing executables with reputation information
WO2016173267A1 (en) Completeness checking method and apparatus
US8844024B1 (en) Systems and methods for using tiered signing certificates to manage the behavior of executables
US20220027342A1 (en) Methods for providing and checking data provenance
CN116226865A (en) Security detection method, device, server, medium and product of cloud native application
CN111639353B (en) Data management method and device, embedded equipment and storage medium
KR102066439B1 (en) Digital data management system and method for managing the same
CN105427143B (en) Method and device for carrying out system security control
CN106911678B (en) Virus detection method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 601, 6 / F, building 2, No. 18, Kechuang 11th Street, Daxing District, Beijing, 100176

Applicant after: Jingdong Technology Information Technology Co.,Ltd.

Applicant after: Jingdong Technology Holding Co.,Ltd.

Address before: 601, 6 / F, building 2, No. 18, Kechuang 11th Street, Daxing District, Beijing, 100176

Applicant before: Jingdong Shuke Haiyi Information Technology Co.,Ltd.

Applicant before: Jingdong Digital Technology Holding Co.,Ltd.

Address after: 601, 6 / F, building 2, No. 18, Kechuang 11th Street, Daxing District, Beijing, 100176

Applicant after: Jingdong Shuke Haiyi Information Technology Co.,Ltd.

Applicant after: Jingdong Digital Technology Holding Co.,Ltd.

Address before: 601, 6 / F, building 2, No. 18, Kechuang 11th Street, Daxing District, Beijing, 100176

Applicant before: BEIJING HAIYI TONGZHAN INFORMATION TECHNOLOGY Co.,Ltd.

Applicant before: JINGDONG DIGITAL TECHNOLOGY HOLDINGS Co.,Ltd.