Detailed Description
In order to achieve the illegal purpose, the image data provider usually counterfeits the image data, and intends to deceive the image data user, so that the data user can obtain an error conclusion according to the counterfeit image data.
For example, in an application scenario of financing using a warehouse slip, a financing party (data provider) may provide image data after counterfeiting to an investor (data user) for illegal financing, so that the investor may draw a conclusion that goods listed in the warehouse slip really exist according to the image data after counterfeiting and provide funds to the financing party.
The storage bill is a certificate for taking the storage after the custodian receives the storage and pays to the stockman. The list of the warehouse is usually listed with information about the warehouse, the storage location of the warehouse, and the time period during which the warehouse is stored in the storage location.
In general, when financing using a manifest, the financing party needs to prove to the investor that the goods listed in the manifest are actually present.
In proving the actual presence of the goods listed in the manifest, the financer will typically provide image data (e.g., video of images stored on-site) to the sponsor that can prove that the stores listed in the manifest are indeed stored at the storage locations listed in the manifest within the time period listed in the manifest.
When receiving the image data, the supplier can compare the storage place, the storage and the time period of the storage in the storage place shown in the image data with the information listed on the warehouse list provided by the financing party; if the comparison result is consistent, the conclusion that the goods listed in the warehouse bill really exist can be obtained, and funds are provided for financing parties; if the comparison is inconsistent, a conclusion may be drawn that the goods listed in the manifest may not be present and the financer may be denied funds.
In reality, many illegal financers may build false storage places according to information listed in a warehouse list and shoot false image videos to be provided to the investor so that the investor suffers deception and provides funds in order to cheat the investor. Therefore, a method for acquiring image data and verifying authenticity is needed at present, so that a data user can verify authenticity of the image data provided by a data provider, and fraud is avoided.
In the related art, in order to verify the authenticity of image data, a data provider may generally add a digital watermark to the image data; and notifies the content of the digital watermark to the data user. When a data user receives the image data added with the digital watermark, the digital watermark carried by the image data can be analyzed, the analyzed digital watermark is compared with the digital watermark provided by a data provider, if the analyzed digital watermark is consistent with the digital watermark provided by the data provider, the image data can be determined to be not tampered, and the authenticity of the image data is determined.
For example, after the data provider collects the original image data, a digital watermark (e.g., a digital signature) may be added to the original image data through a specific algorithm (e.g., a spatial domain algorithm or a frequency domain algorithm) to obtain the image data to be verified. After receiving the image data to be verified, a data user can analyze the image data to be verified to obtain digital watermark information carried by the image data to be verified, and the obtained digital watermark is compared with a digital watermark provided by a data provider; if the two are consistent, it can be determined that the image data is not tampered and is authentic.
However, in the above method, since the digital watermark is added after the image data is acquired, it is only possible to prove that the image data obtained after the digital watermark is added is not falsified and has authenticity by using the above method, and it is not possible to prove whether the image data before the digital watermark is added is falsified and whether the image data is acquired in an authentic image acquisition environment.
For example, when a data provider adds a digital watermark to image data collected in a false collection environment and provides the image data to a data consumer for verification, the data consumer can only confirm that the image data added with the digital watermark is not tampered, but cannot recognize that the image data is collected in the false collection environment.
Based on the above, the application provides an authenticity verification method for image data, which is applied to an image data provider.
Specifically, the optical signal may be collected from the image collection environment in response to an image collection instruction; wherein the optical signal comprises an optical signal emitted by a light generating device deployed in the image acquisition environment; the light signal sent by the light generating equipment carries environment information corresponding to the image acquisition environment;
and generating image data corresponding to the image acquisition environment based on the acquired optical signal, so that a user of the image data analyzes the optical signal transmitted by the light generation equipment from the image data, and matching environment information carried by the optical signal with information provided by a data provider of the image data to finish authenticity verification.
The application also provides an authenticity verification method of the image data, which is applied to an image data user. The method ensures that a data user can analyze environmental information corresponding to an image acquisition environment when the authenticity of the image data is verified, and matches the environmental information with information provided by a data provider to finish the authenticity verification of the image data, and on one hand, whether the image data is tampered from the beginning of an acquisition process to the current moment or not and whether the image data has authenticity or not is determined; on the other hand, it is determined whether the image data is acquired in a real image acquisition environment.
Specifically, analyzing the acquired image data to obtain an optical signal; wherein the optical signal includes environmental information corresponding to the image acquisition environment;
and matching the environmental information carried by the optical signal with the information provided by the data provider of the image data to finish authenticity verification.
The following description will be given with reference to specific examples.
Example one
Referring to fig. 1, fig. 1 is a flowchart illustrating an authenticity verification method for image data according to the present application. As shown in fig. 1, the method may be applied to a data acquisition device, and specifically includes:
s101, collecting optical signals from an image collection environment in response to an image collection instruction; wherein the optical signal comprises an optical signal emitted by a light generating device deployed in the image acquisition environment; the light signal sent by the light generating equipment carries environment information corresponding to the image acquisition environment;
and S102, generating image data corresponding to the image acquisition environment based on the acquired optical signal, so that a user of the image data analyzes the optical signal transmitted by the light generating device from the image data, and matching environment information carried by the optical signal with information provided by a data provider of the image data to complete authenticity verification.
The image data may be video data or pictures collected by a data provider through a collection device. The collecting device may be a camera, a monitor or a mobile terminal having a function of taking a picture or taking a picture (which can collect the optical signals).
The environment information corresponding to the image acquisition environment may refer to a spatial environment and a temporal environment corresponding to the image data acquired; wherein the spatial environment is a storage environment in which an object related to the image data is located; the time environment is time stamp data corresponding to the time when the light generating device transmits the light signal when the image data is collected. The environment information may be matched with information provided by a data provider of the image data to perform authenticity verification.
In practical applications, the environment information may include address information when the image data is collected and timestamp data corresponding to when the light generating device transmits the light signal when the image data is collected.
In the above situation, when it is determined whether the image data is captured in a real image capturing environment, the environmental information carried by the optical signal may be matched with information provided by a data provider of the image data; if the environment information carried by the optical signal is correspondingly consistent with the information provided by the data provider of the image data, the authenticity of the image data can be confirmed; otherwise, determining that the image data is not real.
For example, in a scenario where financing is conducted using a manifest, a data provider may provide a data consumer with a storage location for a store, and time period information for the store to be stored at that location. When a data user acquires image data provided by a data provider, an optical signal carried by the image data can be analyzed, and timestamp information carried by an optical signal sent by the light generating device when the image data is acquired from the optical signal; after the timestamp information is acquired, the data user can judge whether the time period information indicated by the timestamp is matched with a time end provided by the data provider; if the image data is matched with the data provider, judging whether the address information carried by the image data is matched with the address information provided by the data provider; if the agreement also exists, it can be concluded that the storage items involved in the image data are indeed stored at the above-mentioned time provided by the data provider at the storage place provided by the data provider.
The optical generating device is specifically a device that can encode information into an optical signal. In practical applications, the light generating device may be deployed independently in an image acquisition environment. For example, a light generating device may be placed at a storage location where the target object is located, and when the light generating device encodes the information, the location where the light generating device is located (in this case, the storage location where the target object is located) may be used as address information, and timestamp information when the image data is acquired may be used as time information to be encoded into the light signal emitted by the light generating device for the acquisition device to acquire.
In another application, the light generating device may be integrated as a module in the collecting device. For example, if the collecting device is a mobile phone terminal, the light generating device may be an infrared emitting module in the mobile phone terminal, when the data provider collects image data, the infrared emitting module may use a location where the infrared emitting module is located as address information, and when the image data is collected, timestamp information carried by an optical signal sent by the light generating device is encoded into the optical signal sent by the device as time information for the mobile phone terminal to collect.
The light generating device can also encrypt the light signal in consideration of the safety of the coded information in the process of coding the light signal. In practical applications, the light generating device may encrypt the encoded light signal by using a preset encryption algorithm. After the encrypted optical signal is obtained, the data user can decrypt the optical signal through a preset decryption algorithm to obtain the information carried by the optical signal.
For example, the preset encryption and decryption algorithm may refer to an algorithm for performing encryption and decryption using a public and private key, the light generating device may be an invisible light generating device (e.g., an infrared light generating device), and the device is pre-assigned with a public and private key pair. When collecting image data, the invisible light generating device may encrypt the encoded invisible light by using a public key in the public and private key pair, and then encode the encrypted invisible light into invisible light (e.g., infrared light). When the encrypted environment information is obtained by analyzing the image data, the data user can decrypt the environment through the private key in the public and private key pair, so as to obtain the unencrypted environment information carried in the invisible light.
In the process of encoding the optical signal, the light generation device can encode information into the optical signal with a specific frequency by considering the influence of ambient natural light on the optical signal. In practical applications, the light generating device may encode the environment information corresponding to the image data into a frequency band with a minimum influence of natural light, so as to minimize the influence of natural light. For example, assuming that the light generating device is an invisible light generating device (e.g., an infrared light generating device), the device may emit invisible light having a frequency significantly different from that of natural light, so that the capturing device may minimize the influence of the natural light when capturing the invisible light. It will be appreciated by those skilled in the art that the use of optical signals at specific frequencies may also increase the security of the optical signal transmission. For example, when analyzing the acquired image data, if the data analyzer does not know the frequency of the optical signal, the optical signal cannot be analyzed from the image data, that is, the information carried by the optical signal cannot be obtained, so that the security of optical signal transmission is improved.
The optical signal may specifically be any kind of optical signal or any combination of kinds of optical signals that carry data environment information. In practical applications, the optical signal may be various visible light or invisible light, etc. For example, the light generating device may be an infrared light generating device, and the device may encode environmental information into infrared light and emit the infrared light outward for collection by a collection device. It will be appreciated by those skilled in the art that the above-mentioned invisible light may be any one or a combination of several of the following: infrared rays; ultraviolet rays; a far infrared ray; radio waves; the microwave is not limited herein.
By the method, when the image data is collected, the environment information corresponding to the image collection environment can be stored in the image data by collecting the optical signal at the same time, so that the authenticity of the image data can be verified.
After the image data is acquired by the method illustrated in fig. 1, the data user can verify the authenticity of the image data by the following method. Referring to fig. 2, fig. 2 is a flowchart illustrating a method for verifying authenticity of image data according to the present application. As shown in fig. 2, the method includes:
s201, analyzing the acquired image data to obtain an optical signal; wherein the optical signal includes environmental information corresponding to the image acquisition environment;
and S202, matching the environment information carried by the optical signal with the information provided by the data provider of the image data to finish authenticity verification.
The authenticity of the image data can be understood from two aspects, namely, the first aspect means that the image data is not tampered and is real and reliable; in a second aspect, the image data is acquired in a real image acquisition environment.
The optical signal may be an invisible light signal or a visible light signal, and the following description will take the optical signal as an example of an invisible light signal.
When analyzing the collected image data, the image data may be filtered to obtain the light of the invisible light part, and the light is converted into a light intensity curve; and carrying out spectrum analysis on the light intensity curve to obtain the invisible light signal.
In practical application, the image data may be filtered according to a preset filtering rule to obtain light of the invisible light part, and the obtained light is converted into a light intensity curve; then, the invisible light signal is obtained by performing spectrum analysis on the light intensity curve and removing noise in the light intensity curve.
For example, the filtering rule may be kalman filtering, and the spectral analysis means may be wavelet transformation. Under the condition, after the acquired image data is acquired, filtering light data of the invisible light part in the image data through Kalman filtering, and converting the filtered light data into a light intensity curve with the abscissa as time and the ordinate as light intensity; after being converted into a light intensity curve, the curve can be subjected to wavelet transformation and noise in the curve is removed, so that an invisible light signal is obtained.
After obtaining the invisible light signal, the data user may analyze the invisible light signal to obtain environment information carried by invisible light, and then may match the environment information with information provided by the data provider of the image data to complete authenticity verification.
In practical applications, assuming that the environment information may include address information when the image data is collected and timestamp data corresponding to when the light generating device transmits a light signal when the image data is collected, when the authenticity of the image data is determined based on the environment information included in the light signal, if the environment information is the same as information provided by the image data provider, on one hand, it may be determined whether the image data is collected in an actual image collection environment; on the other hand, it can be confirmed that the image data is not falsified from the captured time to the current time, and is real.
For example, in a scenario where financing is conducted using a manifest, a data provider may provide a data consumer with a storage location for a store, and time period information for the store to be stored at that location. When a data user acquires image data provided by a data provider, an optical signal carried by the image data can be analyzed, and timestamp information carried by an optical signal sent by the light generating device when the image data is acquired from the optical signal; after the timestamp information is acquired, the data user can judge whether the time period information indicated by the timestamp is matched with a time end provided by the data provider; if the image data is matched with the data provider, judging whether the address information carried by the image data is matched with the address information provided by the data provider; if the agreement also exists, it can be concluded that the storage items involved in the image data are indeed stored at the above-mentioned time provided by the data provider at the storage place provided by the data provider.
When analyzing the invisible light, if the environment information carried by the invisible light signal is an optical signal encrypted by a public key, in this step, the private key corresponding to the public key (usually, a private key pre-assigned to the light generating device) may be used to decrypt the environment information, so as to obtain corresponding unencrypted environment information.
According to the method, when the authenticity of the image data is verified, because the environment information corresponding to the image acquisition environment can be obtained by analyzing the optical signal in the image data, and then the environment information carried by the optical signal is matched with the information provided by the data provider of the image data to complete the authenticity verification, on one hand, the authenticity of the image data which is not tampered from the beginning of the acquisition process to the current moment can be determined; on the other hand, it can be determined that the image data is acquired in a real image acquisition environment.
Example two
In this embodiment, the light generating device may be integrated as a module in the collecting device. In the above situation, when verifying whether the image data is acquired by the acquisition device agreed by the data provider and the data user, the data user may determine whether the related information of the light generation module carried in the image data is the same as the related information of the light generation module in the agreed acquisition device, and if the related information is the same as the related information of the light generation module in the agreed acquisition device, may determine that the image data is acquired by the agreed acquisition device.
In one implementation, when acquiring image data, the light generating device (module) may encode ID information of the light generating device into an optical signal for acquisition by an acquisition device;
when verifying whether the image data is collected by the appointed collection equipment, the equipment ID information carried by the analyzed optical signal can be compared with the ID information of the light generation module carried by the appointed collection equipment; if the two are consistent, it can be determined that the image data is acquired by the appointed acquisition device.
In another implementation method, in a scenario where an optical signal is encrypted by using a public and private key, when image data is collected, the optical generator (module) may encode private key information of the optical generator into the optical signal for collection by a collection device;
when verifying whether the image data is collected by the appointed collection equipment, comparing the private key information carried by the analyzed optical signal with the private key information of the light generation module carried by the appointed collection equipment; if the two are consistent, it can be determined that the image data is acquired by the appointed acquisition device.
Here, it should be noted that the two implementation methods shown in the second embodiment may be used in combination in one scheme or in two schemes separately, and are not limited herein.
EXAMPLE III
When the above-mentioned image data is video data, since the video data is generally composed of several frames of images, time stamp information at the time when each frame of image is captured can be recorded in the corresponding optical signal.
In the above situation, when determining the authenticity of the image data based on the environment information included in the optical signal, the optical signal carried by the image data may be analyzed, and the timestamp information corresponding to the first frame image and the last frame image of the image data may be obtained from the optical signal; after the timestamp information is acquired, judging whether a time period formed by the timestamp is matched with a time period provided by a data provider or not; if the image data is matched with the data provider, judging whether the address information carried by the image data is matched with the address information provided by the data provider; if the image data are matched with the image data, on one hand, whether the image data are acquired in a real image acquisition environment can be confirmed; on the other hand, it can be confirmed that the image data is not falsified from the captured time to the current time, and is real.
In this embodiment, when verifying whether an individual frame image of the image data is modified or deleted, the optical signal carried by each frame image included in the video data may be analyzed to obtain timestamp data corresponding to each frame image; then, determining whether the corresponding time stamp data of each frame of image is continuous and uninterrupted; if yes, determining that the individual frame image of the image data is not modified or deleted; otherwise, it is determined that the individual frame image of the image data has been modified or deleted.
Example four
In this embodiment, other encoding methods may be used in addition to encoding the environment information by the encoding method described in the above embodiment. For example, the coding may be performed using a vibration signal. In the above situation, a vibration motor may be deployed at the acquisition location of the image data, and a vibration signal receiving module (e.g., an accelerometer) may be deployed on the acquisition device, and when the image data is acquired, the environment information acquired corresponding to the image acquisition environment may be encoded into a vibration signal according to a certain encoding rule, and the vibration signal may be received by the vibration signal receiving module in the acquisition device, and then the received vibration signal may be added to the image signal as a basis for verifying the authenticity of the image data.
In this embodiment, several encoding methods may be used for encoding. In practical application, a light intensity sensing module can be deployed in an image acquisition environment, and when the light intensity sensing module determines that the light intensity of the current ambient light is lower than a preset threshold value, an optical signal coding mode can be started to code the environmental information; if the light intensity sensing module determines that the light intensity of the current ambient light is greater than or equal to the preset threshold, the ambient information can be encoded in a vibration signal encoding mode.
By adopting the mode, adverse effects on the light signal coding due to too strong intensity of the environment light can be effectively avoided, and the coding effect on the environment information is improved.
The present application is described below in conjunction with a scenario in which financing is performed using a manifest.
EXAMPLE five
Referring to fig. 3, fig. 3 is a view of an image data acquisition scene shown in the present application. As shown in fig. 3, a warehouse environment is provided in which a warehouse (target object) is placed, at least one infrared light generating device and a video data collecting device are disposed.
Wherein the warehouse goods are the target objects listed on the warehouse bill provided by the financing party; the storage environment is a storage place listed on the bill of the warehouse.
Above-mentioned infrared light generating equipment can be when the open mode, acquires the timestamp information in real time to the timestamp information that will acquire, and the storage place information code of storage environment in the infrared light that self sent, and above-mentioned infrared light generating equipment can also use the public and private key of pre-allocation to encrypt the infrared light signal of launching.
The acquisition equipment can simultaneously acquire video data and infrared light signals sent by the infrared light generation equipment, and can also fuse the infrared light signals in the video data.
Referring to fig. 4, fig. 4 is a flow chart of financing from a financing party to a investor by using a warehouse slip. The financer, shown in FIG. 4, typically the owner of the invoice, may provide the invoice to the sponsor for funds; the sponsor, typically a financial loan institution, shown in figure 4 may deliver funds to the financer based on a policy provided by the financer.
When the financing party needs to carry out financing to the investor, a financing request can be initiated and the warehouse bill is provided to the investor. After the investor receives the financing request, the financing party may be required to provide a certification document (not shown in fig. 4) that can certify the authenticity of the information of the warehouse slip. The financer, upon receiving the request to provide the documentation, may provide the sponsor with video data that the stores listed in the manifest are indeed stored at the storage locations listed in the manifest.
When the financer collects the video data, the collection device (e.g., a field monitoring device or a mobile phone terminal, etc.) shown in fig. 3 may be used to record the video of the warehouse and the infrared light signal in the warehousing environment. After the video data is recorded, the financer can provide the video to the investor. It should be noted that, in the process of providing the video, in order to ensure the safety and reliability of the video data and prevent the video data from being tampered, the financer may upload the video data to the block chain. Under the condition, when the investor acquires the video, the investor can acquire the video data from the block chain, so that the video data is prevented from being tampered, and the safety and the reliability of the video data are ensured.
After the investor acquires the video data provided by the financing party, the video data can be analyzed, and the infrared light signal carried in the video data is acquired. After the infrared light signal is obtained, the investor can decrypt the infrared light signal through a private key corresponding to the invisible light equipment to obtain address information and time information carried by the infrared light signal. After the address information and the time information are obtained, the information can be compared with the related information listed in the warehouse bill, if the information is consistent with the related information listed in the warehouse bill, the investor can draw a conclusion that the warehouse bill information is real, and fund is released to the financing party.
Under the above situation, if the address information and the time information carried in the video data provided by the financing party are inconsistent with the listed warehouse bill, it indicates that the warehouse bill provided by the financing party is not authentic, and the investor can accordingly provide no fund for the financing party.
By the method, the infrared light signals are coded with the storage place information of the current storage environment and the timestamp information during video recording, and if the financing party tampers the videos or creates false storage environment counterfeiting, the video data provided by the financing party cannot carry serial information consistent with the information listed in the warehouse bill, so that the financing party cannot counterfeit.
The present application also provides an authenticity verifying apparatus for image data, please refer to fig. 5, and fig. 5 is a structural diagram of an authenticity verifying apparatus for image data shown in the present application. As shown, the apparatus 500 includes:
an acquisition module 510, responsive to an image acquisition instruction, for acquiring an optical signal from an image acquisition environment; wherein the optical signal comprises an optical signal emitted by a light generating device deployed in the image acquisition environment; the light signal sent by the light generating equipment carries environment information corresponding to the image acquisition environment;
the generating module 520 generates image data corresponding to the image capturing environment based on the captured optical signal, so that a user of the image data can analyze the optical signal transmitted by the light generating device from the image data, and match the environment information carried by the optical signal with the information provided by the data provider of the image data to complete authenticity verification.
In an embodiment, the apparatus 500 further includes:
the analysis module is used for analyzing the optical signal sent by the optical generating equipment from the generated image data;
and the matching module is used for matching the environmental information carried by the optical signal with the information provided by the data provider of the image data so as to finish authenticity verification.
In an embodiment, the light generating device includes a light generating hardware built in the image capturing device; or, a light generating device deployed in the image capturing environment and used in cooperation with the image capturing device.
In an embodiment, the optical signal is an invisible light signal; the light generating device is an invisible light generating device.
In an embodiment, the environment information corresponding to the image capturing environment includes address information corresponding to the image capturing environment;
the matching of the environmental information carried by the optical signal and the information provided by the data provider of the image data to complete authenticity verification includes:
analyzing the invisible light signal to obtain address information when the image data is collected;
determining whether the address information is the same as address information provided by a data provider of the image data;
if yes, the field data is determined to be real data.
In an embodiment shown in the foregoing description, the optical signal further carries timestamp data corresponding to a time when the optical signal is sent by the optical generation device;
the matching of the environmental information carried by the optical signal and the information provided by the data provider of the image data to complete the authenticity verification further includes:
analyzing the invisible light signal to obtain the timestamp data;
determining whether a time period indicated by the time stamp data is the same as a time period provided by a data provider of the image data;
if yes, the field data is determined to be real data.
In an illustrated embodiment, the light generating device performs encryption processing on the environment information carried by the emitted light signal in advance based on a public key corresponding to a private key held by the device;
the analyzing the invisible light signal includes:
and decrypting the environment information carried by the invisible light signal through a private key held by the invisible light generating equipment, and restoring the environment information.
In an embodiment, the invisible light includes any one or a combination of several of the following:
infrared rays; ultraviolet rays; a far infrared ray; radio waves; and (4) microwave.
In an embodiment, the image data includes:
video data or picture data.
In an embodiment, the apparatus 500 further includes:
determining whether the light intensity of the image acquisition environment is lower than a preset intensity threshold value;
and if so, instructing the invisible light generating equipment to send out the invisible light signal.
In an embodiment, the image data is video data; the apparatus 500 further comprises:
analyzing an optical signal carried by each frame of image included in the video data to obtain timestamp data corresponding to each frame of image;
determining whether the timestamp data corresponding to each frame of image is continuous and uninterrupted;
if yes, determining that the individual frame image of the image data is not modified or deleted; otherwise, it is determined that the individual frame image of the image data has been modified or deleted.
The application also provides an authenticity verification device of the image data. Referring to fig. 6, fig. 6 is a structural diagram of an authenticity verifying apparatus for image data according to the present application.
As shown in fig. 6, the apparatus 600 includes,
the analysis module 610 analyzes the acquired image data to obtain an optical signal; wherein the optical signal includes environmental information corresponding to the image acquisition environment;
and the matching module 620 matches the environmental information carried by the optical signal with information provided by a data provider of the image data to complete authenticity verification.
In an embodiment, the apparatus 600 further includes:
the acquisition module is used for acquiring optical signals sent by light generation equipment deployed in an image acquisition environment corresponding to image data when the image data is acquired; wherein the optical signal includes environmental information corresponding to the image capturing environment.
In an embodiment, the light generating device includes a light generating hardware built in the image capturing device; or, a light generating device deployed in the image capturing environment and used in cooperation with the image capturing device
In an embodiment, the optical signal is an invisible light signal; the light generating device is an invisible light generating device.
In an embodiment, the environment information corresponding to the image capturing environment includes address information corresponding to the image capturing environment;
the matching of the environmental information carried by the optical signal and the information provided by the data provider of the image data to complete authenticity verification includes:
analyzing the invisible light signal to obtain address information when the image data is collected;
determining whether the address information is the same as address information provided by a data provider of the image data;
if yes, the field data is determined to be real data.
In an embodiment shown in the foregoing description, the optical signal further carries timestamp data corresponding to a time when the optical signal is sent by the optical generation device;
the matching of the environmental information carried by the optical signal and the information provided by the data provider of the image data to complete the authenticity verification further includes:
analyzing the invisible light signal to obtain the timestamp data;
determining whether a time period indicated by the time stamp data is the same as a time period provided by a data provider of the image data;
if yes, the field data is determined to be real data.
In an illustrated embodiment, the light generating device performs encryption processing on the environment information carried by the emitted light signal in advance based on a public key corresponding to a private key held by the device;
the analyzing the invisible light signal includes:
and decrypting the environment information carried by the invisible light signal through a private key held by the invisible light generating equipment, and restoring the environment information.
In an embodiment, the invisible light includes any one or a combination of several of the following:
infrared rays; ultraviolet rays; a far infrared ray; radio waves; and (4) microwave.
In an embodiment, the image data includes:
video data or picture data.
In an embodiment, the apparatus 600 further includes:
determining whether the light intensity of the image acquisition environment is lower than a preset intensity threshold value;
and if so, instructing the invisible light generating equipment to send out the invisible light signal.
In an embodiment, the image data is video data; the apparatus 600 further comprises:
analyzing an optical signal carried by each frame of image included in the video data to obtain timestamp data corresponding to each frame of image;
determining whether the timestamp data corresponding to each frame of image is continuous and uninterrupted;
if yes, determining that the individual frame image of the image data is not modified or deleted; otherwise, it is determined that the individual frame image of the image data has been modified or deleted.
The embodiment of the image data acquisition device shown in the application can be applied to authenticity verification equipment of image data. The device embodiments may be implemented by software, or by hardware, or by a combination of hardware and software. Taking a software implementation as an example, as a logical device, the device is formed by reading, by a processor of the electronic device where the device is located, a corresponding computer program instruction in the nonvolatile memory into the memory for operation. From a hardware aspect, as shown in fig. 7, the hardware structure diagram of the image data authenticity verification apparatus shown in this application is a diagram, except for the processor, the memory, the network interface, and the nonvolatile memory shown in fig. 7, the electronic device where the apparatus is located in the embodiment may also include other hardware according to an actual function of the electronic device, which is not described again.
Referring to fig. 7, an authenticity verifying apparatus for image data, the apparatus comprising: a processor;
a memory for storing processor-executable instructions;
wherein, the processor executes the executable instructions to realize the method as shown in any one of the previous embodiments.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It will be understood that the present application is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the application is limited only by the appended claims.
The above description is only exemplary of the present application and should not be taken as limiting the present application, and any modifications, equivalents, improvements, etc. made within the spirit and principle of the present application should be included in the scope of the present application.