CN111831975B - Network novel display method for preventing piracy, computer equipment and storage medium - Google Patents

Network novel display method for preventing piracy, computer equipment and storage medium Download PDF

Info

Publication number
CN111831975B
CN111831975B CN202010676689.5A CN202010676689A CN111831975B CN 111831975 B CN111831975 B CN 111831975B CN 202010676689 A CN202010676689 A CN 202010676689A CN 111831975 B CN111831975 B CN 111831975B
Authority
CN
China
Prior art keywords
user terminal
picture
screen
preset
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010676689.5A
Other languages
Chinese (zh)
Other versions
CN111831975A (en
Inventor
郑凯璇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gansu xiegu Yunzhi culture media Co.,Ltd.
Original Assignee
Gansu Xiegu Yunzhi Culture Media Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gansu Xiegu Yunzhi Culture Media Co ltd filed Critical Gansu Xiegu Yunzhi Culture Media Co ltd
Priority to CN202010676689.5A priority Critical patent/CN111831975B/en
Publication of CN111831975A publication Critical patent/CN111831975A/en
Application granted granted Critical
Publication of CN111831975B publication Critical patent/CN111831975B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/18Eye characteristics, e.g. of the iris
    • G06V40/19Sensors therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/40Spoof detection, e.g. liveness detection
    • G06V40/45Detection of the body part being alive

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Ophthalmology & Optometry (AREA)
  • Technology Law (AREA)
  • Processing Or Creating Images (AREA)

Abstract

The application discloses a network novel display method, computer equipment and a storage medium for preventing piracy, and relates to a server and a user side, so that the prevention of the network novel piracy is realized together in a double-end cooperative mode; at a server end, only a part of novel pictures which are currently needed are sent once, and the encryption keys are different during each sending; at a user side, the blurring setting is adopted to enable only part of clear novel contents to be displayed on a screen, and the blurring setting adopts the steps of area blurring, edge irregular processing, area size setting and wrong character generation, so that picture synthesis of pirated novel is almost difficult to realize, and prevention of the pirated novel is realized.

Description

Network novel display method for preventing piracy, computer equipment and storage medium
Technical Field
The present application relates to the field of computers, and in particular, to a method for displaying a network novel, a computer device, and a storage medium for preventing piracy.
Background
Viewing network novels over a network has been a popular way of reading. But pirated network novels are difficult to deter from corresponding to genuine network novels. In a conventional scheme, in order to prevent piracy of the network novel, a non-text display manner is generally adopted (if the text display manner is adopted, other people can copy the text to steal the novel and then reproduce the novel to piracy), for example, the novel is displayed in the form of pictures. However, the traditional scheme of displaying pictures is difficult to effectively solve the problem of piracy, and the reason is that other people can intercept the novel pictures and then perform character recognition processing, so that novel characters are recognized from the novel pictures and then are pirated. Therefore, the existing scheme cannot effectively prevent the pirated network novel from proceeding.
Disclosure of Invention
In order to achieve the above object, the present application provides a method for displaying a network novel to prevent piracy, which includes the following steps:
s11, the server acquires a request for reading the novel sent by the first user terminal;
s12, the server acquires a video by using a front camera of the first user terminal to obtain a first video, performs living body detection on the first video according to a preset living body detection method, and judges whether a living body detection result passes or not;
s13, if the live body detection result passes, the server acquires the size of the screen of the first user terminal, and the preset novel chapters are made into novel pictures; wherein the novel picture matches a size of a screen of the first user terminal;
s14, the server intercepts a first picture from the novel picture according to the size of the screen of the first user terminal, wherein the first picture just can fill the screen of the first user terminal, and the top of the first picture is the same as that of the novel picture;
s15, the server encrypts the first picture by adopting a preset first public key according to a preset asymmetric encryption algorithm to obtain a first encrypted picture, and sends the first encrypted picture to the first user terminal;
s21, the first user terminal decrypts the first encrypted picture by using a first private key corresponding to the first public key to obtain a first picture, and the first picture is displayed on a screen of the first user terminal; wherein the first private key is pre-stored in the first user terminal;
s22, the first user terminal calculates eyeball gathering positions by using the front camera to obtain a first focusing position of the sight of a user corresponding to the first user terminal on the screen of the first user terminal;
s23, the first user terminal performs blurring processing on the first focusing position according to a preset region blurring method so as to form a state that a first initial clear region and a blurring region coexist on a screen of the first user terminal; wherein the first focus position is centered in the first initial clearing zone;
s24, the first user terminal processes the edge of the first initial clear area according to a preset edge irregularity processing method, so that the edge contour of the first initial clear area is in an irregular state;
s25, the first user terminal acquires first average stay time data crawled by a preset crawler tool, wherein the first average stay time data refer to first average stay time of other users except the user corresponding to the first user terminal in the first initial clear area;
s26, the first user terminal obtains a first designated area size corresponding to the first average time according to a mapping relation between preset time and the area size;
s27, the first user terminal performs scaling processing on the first initial clear region to make the size of the first initial clear region equal to the size of the first designated region, so as to obtain a first final clear region;
s28, the first user terminal obtains a first marginal character in the first final clear area, wherein the distance between the first marginal character and the edge of the first final clear area is smaller than a preset distance value;
s29, the first user terminal carries out character transformation processing on the first marginal characters according to a preset wrong character generating method, so that the first marginal characters displayed on a screen are changed into wrong characters;
s210, the first user terminal judges whether a screen-sliding instruction from a user corresponding to the first user terminal is received, wherein the screen-sliding instruction records the screen-sliding length;
s211, if a screen-sliding instruction from a user corresponding to the first user terminal is received, the first user terminal sends a new picture acquisition requirement to the server; wherein the new picture acquisition requirement is recorded with the screen length;
s31, the server intercepts a second picture from the novel picture, and the distance between the second picture and the first picture is equal to the screen-sliding length; wherein the second picture happens to fill the screen of the first user terminal;
s32, the server encrypts the second picture by adopting a preset second public key according to a preset asymmetric encryption algorithm to obtain a second encrypted picture, sends the second encrypted picture to the first user terminal, and simultaneously requires the first user terminal to use the second encrypted picture to cover the first encrypted picture and the first picture;
s33, after receiving the confirmation information which is returned by the first user terminal and covers the first encrypted picture and the first picture, the server sends a second private key corresponding to the second public key to the first user terminal;
s41, the first user terminal decrypts the second encrypted picture by using a second private key corresponding to the second public key to obtain a second picture, and the second picture is displayed on the screen of the first user terminal;
s42, the first user terminal calculates eyeball focusing positions by using the front camera to obtain second focusing positions of the sight lines of the users corresponding to the first user terminal on the screen of the first user terminal;
s43, the first user terminal performs blurring processing on the second focusing position according to a preset region blurring method so as to form a state that a second initial clear region and a blurring region coexist on the screen of the first user terminal; wherein the second focus position is centered on the second initial clearing region;
s44, the first user terminal processes the edge of the second initial clear area according to a preset edge irregularity processing method, so that the edge contour of the second initial clear area is in an irregular state;
s45, the first user terminal acquires second average stay time data crawled by a preset crawler tool, wherein the second average stay time data refer to second average stay time of other users except the user corresponding to the first user terminal in the second initial clear area;
s46, the first user terminal obtains a first designated area size corresponding to the second average time according to a mapping relation between preset time and the area size;
s47, the first user terminal performs scaling processing on the first initial clear area to make the size of the first initial clear area equal to the size of the second specified area, so as to obtain a second final clear area;
s48, the first user terminal obtains a second marginal text in the second final clear area, wherein the distance between the second marginal text and the edge of the second final clear area is smaller than a preset distance value;
s49, the first user terminal carries out character transformation processing on the second marginal characters according to a preset wrong character generating method so that the second marginal characters displayed on the screen become wrong characters;
s410, the first user terminal judges whether to acquire a reading stopping instruction from a user corresponding to the first user terminal;
s411, if the reading stopping instruction from the user corresponding to the first user terminal is obtained, the first user terminal stops communication with the server, and deletes the second encrypted picture and the second picture, so that the displaying process of the network novel is completed.
Further, the step S12 of performing the live body detection on the first video according to a preset live body detection method and determining whether a live body detection result passes includes:
s1201, a server extracts a plurality of frame pictures from the first video, wherein each frame picture is provided with a user image corresponding to the first user terminal;
s1202, the server determines a plurality of feature point positions in each frame picture, wherein the feature points at least comprise eyeball center points and mouth angles;
s1203, the server calculates relative distances between every two feature point positions in each frame picture respectively, and normalization processing is carried out on all the relative distances to obtain a normalized relative distance sequence of each frame picture;
s1204, the server sequentially connects the normalized relative distance sequences of all the frame pictures to obtain a distance vector, and divides members in the distance vector into a first member and a second member; obtaining a numerical value of-1 | of the first member, wherein | the numerical value of-1 | of the first member is smaller than a preset numerical threshold value, | the numerical value of-1 | of the second member is larger than the preset numerical threshold value;
s1205, the server counts the number of first members and the number of second members, calculates the ratio of the number of the second members to the number of the first members, and judges whether the ratio is larger than a preset ratio threshold value;
and S1206, if the ratio is larger than a preset ratio threshold, determining that the living body detection result passes.
Further, step S22, in which the first user terminal performs eyeball focus position calculation by using the front camera to obtain a first focus position of the line of sight of the user corresponding to the first user terminal on the screen of the first user terminal, includes:
s2201, the first user terminal sets a screen of the first user terminal as a black screen, displays a single light spot on the black screen, and acquires a first position of the light spot;
s2202, a first user terminal shoots a first pupil picture of a user corresponding to the first user terminal by using a front camera of the first user terminal;
s2203, the first user terminal moves the light spot to a second position and then shoots a second pupil picture of the user corresponding to the first user terminal;
s2204, the first user terminal establishes a corresponding relation table of the relative distance of the movement of the pupil in the pupil and the eyeball focusing position of the sight line of the user on the screen according to the first position, the second position, the first pupil picture and the second pupil picture in an equal proportion relation;
s2205, the first user terminal restores the screen of the first user terminal to the state before the screen is blacked, and a front camera is used for shooting a third pupil picture of a user corresponding to the first user terminal;
s2206, the first user terminal obtains a first focusing position of the line of sight of the user corresponding to the first user terminal on the screen of the first user terminal based on the correspondence table and the third pupil picture.
Further, the first user terminal performs blurring processing on the first focusing position according to a preset region blurring method to form a state that a first initial clear region and a blurring region coexist on a screen of the first user terminal; step S23, in which the first focus position is at the center of the first initial clear region, includes:
s2301, a first user terminal randomly calls a temporary mask layer from a preset mask layer library, wherein the temporary mask layer is composed of an unmasked region and a mosaic region, and the unmasked region at least comprises the center of the temporary mask layer;
s2302, the first user terminal superimposes the temporary mask layer on a screen of the first user terminal in a top-layer display manner, so that a state where a first initial clear region and a blurring region coexist is formed on the screen of the first user terminal; wherein the first focus position is centered in the first initial clear region.
Further, step S29, where the first user terminal performs a text transformation process on the first marginal text according to a preset wrongly-written character generating method, so that the first marginal text displayed on the screen becomes a wrongly-written character, includes:
s2901, calling a pre-collected stroke adding wrong character library and a correct character library corresponding to the stroke adding wrong character library, wherein the stroke adding wrong character library is obtained by adding strokes less than or equal to two strokes to correct Chinese characters in the correct character library;
s2902, according to the mode of comparing the stroke adding wrong character library with the correct character library one by one, obtaining the shape of the designated area where the added strokes of the stroke adding wrong characters are located;
s2903, identifying the area shape of the first marginal character to judge whether the first marginal character has the specified area shape;
s2904, if the first marginal character has the shape of the designated area, generating a stroke adding layer displayed on the top layer, so that the stroke adding layer is superposed on the screen of the first user terminal, and the first marginal character displayed on the screen is changed into a wrong character; wherein the stroke adding layer adds strokes corresponding to the specified region shape at the specified region shape position.
Further, the step S410 of the first user terminal determining whether to acquire an instruction for stopping reading from a user corresponding to the first user terminal includes:
s4101, calculating eyeball gathering positions by the first user terminal through a front camera, and judging whether the focusing positions of the sight lines of the users corresponding to the first user terminal on the screen of the first user terminal are calculated;
s4102, if the focusing position of the sight line of the user corresponding to the first user terminal on the screen of the first user terminal is not calculated, judging to acquire a reading stopping instruction from the user corresponding to the first user terminal.
The present application provides a computer device comprising a memory storing a computer program and a processor implementing the steps of any of the above methods when the processor executes the computer program.
The present application provides a computer-readable storage medium having stored thereon a computer program which, when being executed by a processor, carries out the steps of the method of any of the above.
The network novel showing method for preventing piracy, the computer equipment and the storage medium relate to a plurality of special settings, so that the network novel can be prevented from being pirated integrally. Some of the specific arrangements will be described first, while the remainder will be described in more detail below:
1. the application relates to a server and a user side at the same time, so that the prevention of the pirated network novels is realized together in a double-end cooperative mode.
2. At the server side, the server can not completely send the whole novel chapters to the user side in a text or picture mode, only sends the required part of novel pictures at a time, and the encrypted keys are different when the pictures are sent each time, so that the difficulty of stealing the novel is improved;
3. at the user end, special blurring arrangements are used so that only partially clear novel content is shown on the screen. At this time, it is to be noted that, due to the natural properties of human eyes: the human eyes can accurately identify the details of the scenery at the focusing position, and selectively ignore the details of the scenery far away from the focusing position, so that the reading of a user is not influenced or the influence is small by adopting the virtual setting (namely the clear area and the virtual area coexist on the screen), but the piracy can be effectively prevented. The reason is that on the premise of showing the novel pictures, the screen needs to be photographed for piracy, and due to the virtual setting of the screen, the pictures shot by pirates are difficult to combine, and only a plurality of useless pictures separated from each other can be obtained, so that the network novel for piracy can not be made, and the effective prevention of the novel for piracy is realized;
4. at a user side, the blurring setting is realized by adopting a plurality of associated steps, so that the difficulty of the pirate novel, namely the steps of area blurring, edge irregular processing, area size setting and wrong character generation, is further improved, the picture synthesis of the pirate novel is almost difficult to realize, and the prevention of the pirate novel is more effectively realized.
Drawings
Fig. 1 is a schematic screen diagram of a first user terminal according to an embodiment of the present application;
fig. 2 is a block diagram illustrating a structure of a computer device according to an embodiment of the present application.
The reference numbers are as follows:
1 is a screen of a first user terminal, 2 is a first final clear area, and 3 is a blurring area;
the implementation, functional features and advantages of the objectives of the present application will be further explained with reference to the accompanying drawings.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The application realizes effective prevention of network novel piracy through special design, wherein a plurality of special settings are involved, thereby realizing the prevention of network novel piracy integrally. Some of the specific arrangements will be described first, while the remainder will be described in more detail below:
1. the application relates to a server and a user side at the same time, so that the prevention of the pirated network novels is realized together in a double-end cooperative mode.
2. At the server side, the server can not completely send the whole novel chapters to the user side in a text or picture mode, only sends the required part of novel pictures at a time, and the encrypted keys are different when the pictures are sent each time, so that the difficulty of stealing the novel is improved;
3. at the user end, special blurring arrangements are used so that only partially clear novel content is shown on the screen. At this time, it is to be noted that, due to the natural properties of human eyes: the human eyes can accurately identify the details of the scenery at the focusing position, and selectively ignore the details of the scenery far away from the focusing position, so that the reading of a user is not influenced or the influence is small by adopting the virtual setting (namely the clear area and the virtual area coexist on the screen), but the piracy can be effectively prevented. The reason is that on the premise of showing the novel pictures, the screen needs to be photographed for piracy, and due to the virtual setting of the screen, the pictures shot by pirates are difficult to combine, and only a plurality of useless pictures separated from each other can be obtained, so that the network novel for piracy can not be made, and the effective prevention of the novel for piracy is realized;
4. at a user side, the blurring setting is realized by adopting a plurality of associated steps, so that the difficulty of the pirate novel, namely the steps of area blurring, edge irregular processing, area size setting and wrong character generation, is further improved, the picture synthesis of the pirate novel is almost difficult to realize, and the prevention of the pirate novel is more effectively realized.
The embodiment of the application provides a network novel display method for preventing piracy, which comprises the following steps:
s11, the server acquires a request for reading the novel sent by the first user terminal;
s12, the server acquires a video by using a front camera of the first user terminal to obtain a first video, performs living body detection on the first video according to a preset living body detection method, and judges whether a living body detection result passes or not;
s13, if the live body detection result passes, the server acquires the size of the screen of the first user terminal, and the preset novel chapters are made into novel pictures; wherein the novel picture matches a size of a screen of the first user terminal;
s14, the server intercepts a first picture from the novel picture according to the size of the screen of the first user terminal, wherein the first picture just can fill the screen of the first user terminal, and the top of the first picture is the same as that of the novel picture;
s15, the server encrypts the first picture by adopting a preset first public key according to a preset asymmetric encryption algorithm to obtain a first encrypted picture, and sends the first encrypted picture to the first user terminal;
s21, the first user terminal decrypts the first encrypted picture by using a first private key corresponding to the first public key to obtain a first picture, and the first picture is displayed on a screen of the first user terminal; wherein the first private key is pre-stored in the first user terminal;
s22, the first user terminal calculates eyeball gathering positions by using the front camera to obtain a first focusing position of the sight of a user corresponding to the first user terminal on the screen of the first user terminal;
s23, the first user terminal performs blurring processing on the first focusing position according to a preset region blurring method so as to form a state that a first initial clear region and a blurring region coexist on a screen of the first user terminal; wherein the first focus position is centered in the first initial clearing zone;
s24, the first user terminal processes the edge of the first initial clear area according to a preset edge irregularity processing method, so that the edge contour of the first initial clear area is in an irregular state;
s25, the first user terminal acquires first average stay time data crawled by a preset crawler tool, wherein the first average stay time data refer to first average stay time of other users except the user corresponding to the first user terminal in the first initial clear area;
s26, the first user terminal obtains a first designated area size corresponding to the first average time according to a mapping relation between preset time and the area size;
s27, the first user terminal performs scaling processing on the first initial clear region to make the size of the first initial clear region equal to the size of the first designated region, so as to obtain a first final clear region;
s28, the first user terminal obtains a first marginal character in the first final clear area, wherein the distance between the first marginal character and the edge of the first final clear area is smaller than a preset distance value;
s29, the first user terminal carries out character transformation processing on the first marginal characters according to a preset wrong character generating method, so that the first marginal characters displayed on a screen are changed into wrong characters;
s210, the first user terminal judges whether a screen-sliding instruction from a user corresponding to the first user terminal is received, wherein the screen-sliding instruction records the screen-sliding length;
s211, if a screen-sliding instruction from a user corresponding to the first user terminal is received, the first user terminal sends a new picture acquisition requirement to the server; wherein the new picture acquisition requirement is recorded with the screen length;
s31, the server intercepts a second picture from the novel picture, and the distance between the second picture and the first picture is equal to the screen-sliding length; wherein the second picture happens to fill the screen of the first user terminal;
s32, the server encrypts the second picture by adopting a preset second public key according to a preset asymmetric encryption algorithm to obtain a second encrypted picture, sends the second encrypted picture to the first user terminal, and simultaneously requires the first user terminal to use the second encrypted picture to cover the first encrypted picture and the first picture;
s33, after receiving the confirmation information which is returned by the first user terminal and covers the first encrypted picture and the first picture, the server sends a second private key corresponding to the second public key to the first user terminal;
s41, the first user terminal decrypts the second encrypted picture by using a second private key corresponding to the second public key to obtain a second picture, and the second picture is displayed on the screen of the first user terminal;
s42, the first user terminal calculates eyeball focusing positions by using the front camera to obtain second focusing positions of the sight lines of the users corresponding to the first user terminal on the screen of the first user terminal;
s43, the first user terminal performs blurring processing on the second focusing position according to a preset region blurring method so as to form a state that a second initial clear region and a blurring region coexist on the screen of the first user terminal; wherein the second focus position is centered on the second initial clearing region;
s44, the first user terminal processes the edge of the second initial clear area according to a preset edge irregularity processing method, so that the edge contour of the second initial clear area is in an irregular state;
s45, the first user terminal acquires second average stay time data crawled by a preset crawler tool, wherein the second average stay time data refer to second average stay time of other users except the user corresponding to the first user terminal in the second initial clear area;
s46, the first user terminal obtains a first designated area size corresponding to the second average time according to a mapping relation between preset time and the area size;
s47, the first user terminal performs scaling processing on the first initial clear area to make the size of the first initial clear area equal to the size of the second specified area, so as to obtain a second final clear area;
s48, the first user terminal obtains a second marginal text in the second final clear area, wherein the distance between the second marginal text and the edge of the second final clear area is smaller than a preset distance value;
s49, the first user terminal carries out character transformation processing on the second marginal characters according to a preset wrong character generating method so that the second marginal characters displayed on the screen become wrong characters;
s410, the first user terminal judges whether to acquire a reading stopping instruction from a user corresponding to the first user terminal;
s411, if the reading stopping instruction from the user corresponding to the first user terminal is obtained, the first user terminal stops communication with the server, and deletes the second encrypted picture and the second picture, so that the displaying process of the network novel is completed.
The method adopts a double-end writing mode, different steps are realized by corresponding execution main bodies, and the specific execution main bodies are the server and the first user terminal respectively.
As described in the above steps S11-S15, the server obtains the request for reading novel sent by the first user terminal; the server acquires a video by using a front-facing camera of the first user terminal to obtain a first video, performs living body detection on the first video according to a preset living body detection method, and judges whether a living body detection result passes or not; if the living body detection result passes, the server acquires the size of a screen of the first user terminal, and makes preset novel chapters into novel pictures; wherein the novel picture matches a size of a screen of the first user terminal; the server intercepts a first picture from the novel picture according to the size of a screen of a first user terminal, wherein the first picture just can fill the screen of the first user terminal, and the top of the first picture is the same as that of the novel picture; and the server encrypts the first picture by adopting a preset first public key according to a preset asymmetric encryption algorithm to obtain a first encrypted picture and sends the first encrypted picture to the first user terminal. Wherein the first video is used to test whether the user is a living body. For pirated molecules, it is less costly if the pirated product can be produced using a dummy, for example, using a still picture. And this application has adopted the mode of live body detection, has improved the degree of difficulty of pirating. The matching of the size of the novel picture and the size of the screen of the first user terminal means that the novel picture can correspond to the screen if the novel picture is displayed on the screen of the first user terminal, for example, the width of the novel picture is the same as the width of the screen when the novel picture is displayed. The top of the first picture is the same as the top of the novel picture, which means that the beginning of the first picture is the same as the beginning of the novel picture.
Further, the step S12 of performing the live body detection on the first video according to a preset live body detection method and determining whether a live body detection result passes includes:
s1201, a server extracts a plurality of frame pictures from the first video, wherein each frame picture is provided with a user image corresponding to the first user terminal;
s1202, the server determines a plurality of feature point positions in each frame picture, wherein the feature points at least comprise eyeball center points and mouth angles;
s1203, the server calculates relative distances between every two feature point positions in each frame picture respectively, and normalization processing is carried out on all the relative distances to obtain a normalized relative distance sequence of each frame picture;
s1204, the server sequentially connects the normalized relative distance sequences of all the frame pictures to obtain a distance vector, and divides members in the distance vector into a first member and a second member; obtaining a numerical value of-1 | of the first member, wherein | the numerical value of-1 | of the first member is smaller than a preset numerical threshold value, | the numerical value of-1 | of the second member is larger than the preset numerical threshold value;
s1205, the server counts the number of first members and the number of second members, calculates the ratio of the number of the second members to the number of the first members, and judges whether the ratio is larger than a preset ratio threshold value;
and S1206, if the ratio is larger than a preset ratio threshold, determining that the living body detection result passes.
Wherein the more the number of the plurality of frame pictures is, the higher the accuracy of the living body detection is. The number of the plurality of frame pictures is, for example, 100. The feature points are preferably points where the positions of the face muscles can be changed, such as eyeball center points, mouth corners, eyebrow tips and/or moles beside the mouth (if any). The normalization process is to divide the relative distance by a corresponding standard distance, for example, for the eyeball center point and the mouth corner, when the face is serious and looks at the screen, the distance between the eyeball center point and the mouth corner is the standard distance, and the actually obtained relative distance (at this time, the eyeball center point and the mouth corner are two feature points) is divided by the standard distance, so as to obtain the normalized relative distance. Generally speaking, if the normalized relative distance is 1 or close to 1, it indicates that the probability of being a non-living body is high, and accordingly, the number of the first members and the number of the second members are counted, a ratio of the number of the second members divided by the number of the first members is calculated, and whether the ratio is greater than a preset ratio threshold value is judged; and if the ratio is larger than a preset ratio threshold, judging that the living body detection result passes.
As described in the above steps S21-211, the first user terminal decrypts the first encrypted picture by using the first private key corresponding to the first public key to obtain a first picture, and displays the first picture on the screen of the first user terminal; wherein the first private key is pre-stored in the first user terminal; the method comprises the steps that a first user terminal calculates eyeball gathering positions by means of a front camera to obtain a first focusing position of a sight line of a user corresponding to the first user terminal on a screen of the first user terminal; the first user terminal performs blurring processing on the first focusing position according to a preset region blurring method so as to form a state that a first initial clear region and a blurring region coexist on a screen of the first user terminal; wherein the first focus position is centered in the first initial clearing zone; the first user terminal processes the edge of the first initial clear area according to a preset edge irregularity processing method, so that the edge contour of the first initial clear area is in an irregular state; a first user terminal acquires first average residence time data crawled by a preset crawler tool, wherein the first average residence time data refer to first average residence time of other users except a user corresponding to the first user terminal in the first initial clear area; the first user terminal obtains a first designated area size corresponding to the first average time according to a mapping relation between preset time and the area size; the first user terminal performs scaling processing on the first initial clear region to enable the size of the first initial clear region to be equal to the size of the first designated region, so as to obtain a first final clear region; a first user terminal acquires a first marginal character in the first final clear area, wherein the distance between the first marginal character and the edge of the first final clear area is smaller than a preset distance numerical value; the first user terminal carries out character transformation processing on the first marginal characters according to a preset wrong character generating method so as to enable the first marginal characters displayed on a screen to be changed into wrong characters; the method comprises the steps that a first user terminal judges whether a screen scratching instruction from a user corresponding to the first user terminal is received or not, wherein the screen scratching instruction records screen scratching length; if a screen-sliding instruction from a user corresponding to the first user terminal is received, the first user terminal sends a new picture acquisition requirement to the server; wherein the new picture taking requirement is recorded with the screen length.
If the first picture is directly displayed, the pirate still can realize pirate production by shooting and resynthesizing the picture. In order to prevent this, the present application adopts a virtualized setting. Any feasible method can be adopted for calculating the eyeball gathering position. The area blurring method is used for changing a screen into a clear area and a blurring area, so that a pirate is difficult to splice pictures, but reading experience is not greatly influenced. Further, edge irregularity processing is performed to make the edge contour of the first initial clear region in an irregular state, wherein the irregular state means that the edge contour does not take a regular shape such as a rectangle, a circle, an ellipse, and the like; at this time, since the edge is in an irregular state, the pirate has a greater difficulty in picture synthesis. The crawler tool may be any feasible tool, and is not described herein again, and further, the acquisition of the first average dwell-time data (e.g., acquiring background data) may be implemented by any other feasible method, and is not described herein again. Since the person stays longer for the interested area when reading the novel, the reading range is wider accordingly (i.e. more characters are read at the position and around the position), the application is based on the fact that the first initial clear area is scaled so that the size of the first initial clear area is equal to the size of the first designated area, thereby further reducing the negative impact of the reading experience. It should be noted that another special feature of the present application is that the first border text is subjected to a text alteration process so that the first border text presented on the screen becomes a wrong text. Characters, especially Chinese characters, have special natural attributes, namely, part of wrong characters, especially part of wrong characters at the edge of visual angle do not affect normal reading understanding, for example, for a Chinese character, no matter three horizontal lines or four horizontal lines, normal reading is not affected, further, for a combined character, if the mouth part of the combined character is added with one horizontal line or one point, the combined character can be corrected and understood by human brain, but for picture synthesis of a pirate, the method is difficult to realize, so that pirate is further prevented from occurring, and a final screen is shown in fig. 1.
Further, step S22, in which the first user terminal performs eyeball focus position calculation by using the front camera to obtain a first focus position of the line of sight of the user corresponding to the first user terminal on the screen of the first user terminal, includes:
s2201, the first user terminal sets a screen of the first user terminal as a black screen, displays a single light spot on the black screen, and acquires a first position of the light spot;
s2202, a first user terminal shoots a first pupil picture of a user corresponding to the first user terminal by using a front camera of the first user terminal;
s2203, the first user terminal moves the light spot to a second position and then shoots a second pupil picture of the user corresponding to the first user terminal;
s2204, the first user terminal establishes a corresponding relation table of the relative distance of the movement of the pupil in the pupil and the eyeball focusing position of the sight line of the user on the screen according to the first position, the second position, the first pupil picture and the second pupil picture in an equal proportion relation;
s2205, the first user terminal restores the screen of the first user terminal to the state before the screen is blacked, and a front camera is used for shooting a third pupil picture of a user corresponding to the first user terminal;
s2206, the first user terminal obtains a first focusing position of the line of sight of the user corresponding to the first user terminal on the screen of the first user terminal based on the correspondence table and the third pupil picture.
Thereby achieving accurate focus position acquisition. And, in this way, the problem of the squint user can be solved. The common solution is to set the geometric position right in front of the pupil as the focus position, and for oblique users, the focus position is deviated from the position, and the solution of the present application can be applied to the oblique users.
Further, the first user terminal performs blurring processing on the first focusing position according to a preset region blurring method to form a state that a first initial clear region and a blurring region coexist on a screen of the first user terminal; step S23, in which the first focus position is at the center of the first initial clear region, includes:
s2301, a first user terminal randomly calls a temporary mask layer from a preset mask layer library, wherein the temporary mask layer is composed of an unmasked region and a mosaic region, and the unmasked region at least comprises the center of the temporary mask layer;
s2302, the first user terminal superimposes the temporary mask layer on a screen of the first user terminal in a top-layer display manner, so that a state where a first initial clear region and a blurring region coexist is formed on the screen of the first user terminal; wherein the first focus position is centered in the first initial clear region.
Therefore, the mode of stacking frames is realized, the regional blurring is completed, the novel pictures do not need to be processed, and the overall display efficiency is improved.
Further, step S29, where the first user terminal performs a text transformation process on the first marginal text according to a preset wrongly-written character generating method, so that the first marginal text displayed on the screen becomes a wrongly-written character, includes:
s2901, calling a pre-collected stroke adding wrong character library and a correct character library corresponding to the stroke adding wrong character library, wherein the stroke adding wrong character library is obtained by adding strokes less than or equal to two strokes to correct Chinese characters in the correct character library;
s2902, according to the mode of comparing the stroke adding wrong character library with the correct character library one by one, obtaining the shape of the designated area where the added strokes of the stroke adding wrong characters are located;
s2903, identifying the area shape of the first marginal character to judge whether the first marginal character has the specified area shape;
s2904, if the first marginal character has the shape of the designated area, generating a stroke adding layer displayed on the top layer, so that the stroke adding layer is superposed on the screen of the first user terminal, and the first marginal character displayed on the screen is changed into a wrong character; wherein the stroke adding layer adds strokes corresponding to the specified region shape at the specified region shape position.
Therefore, the method for realizing wrong characters by adding pens is realized. Through the implementation mode of adding the stroke layer of the Chinese character with wrong strokes, the realization is easy, the negative influence on reading is small, and the piracy difficulty is high.
As described in the above steps S31-S33, the server captures a second picture from the novel picture, wherein the distance between the second picture and the first picture is equal to the screen-sliding length; wherein the second picture happens to fill the screen of the first user terminal; the server encrypts the second picture by adopting a preset second public key according to a preset asymmetric encryption algorithm to obtain a second encrypted picture, sends the second encrypted picture to the first user terminal, and simultaneously requires the first user terminal to cover the first encrypted picture and the first picture by using the second encrypted picture; and after receiving the confirmation information which is returned by the first user terminal and covers the first encrypted picture and the first picture, the server sends a second private key corresponding to the second public key to the first user terminal.
It should be noted that the second picture is the first picture in which there may be repeated regions, the user's screen stroke length is only three lines, for example, and the first picture shows the first to tenth lines, then the second picture should be the contents of the fourth to tenth lines. In addition, the second private key is different from the first private key, and the second private key corresponding to the second public key is sent to the first user terminal only after the confirmation information which is returned by the first user terminal and covers the first encrypted picture and the first picture is received, so that a pirate is prevented from finishing the production of the pirated novel in a mode of stealing and synthesizing the pictures.
As described in the above steps S41-S411, the first user terminal decrypts the second encrypted picture by using the second private key corresponding to the second public key to obtain a second picture, and displays the second picture on the screen of the first user terminal; the first user terminal calculates eyeball focusing positions by using the front camera to obtain second focusing positions of the sight lines of the users corresponding to the first user terminal on the screen of the first user terminal; the first user terminal performs blurring processing on the second focusing position according to a preset region blurring method so as to form a state that a second initial clear region and a blurring region coexist on a screen of the first user terminal; wherein the second focus position is centered on the second initial clearing region; the first user terminal processes the edge of the second initial clear area according to a preset edge irregularity processing method, so that the edge contour of the second initial clear area is in an irregular state; the first user terminal acquires second average residence time data crawled by a preset crawler tool, wherein the second average residence time data refer to second average residence time of other users except the user corresponding to the first user terminal in the second initial clear area; the first user terminal obtains a first designated area size corresponding to the second average time according to a mapping relation between preset time and the area size; the first user terminal performs scaling processing on the first initial clear area so that the size of the first initial clear area is equal to the size of the second specified area to obtain a second final clear area; a first user terminal acquires a second marginal text in the second final clear area, wherein the distance between the second marginal text and the edge of the second final clear area is smaller than a preset distance numerical value; the first user terminal carries out character transformation processing on the second marginal characters according to a preset wrong character generating method so that the second marginal characters displayed on the screen are changed into wrong characters; the first user terminal judges whether to acquire a reading stopping instruction from a user corresponding to the first user terminal; and if the reading stopping instruction from the user corresponding to the first user terminal is obtained, the first user terminal stops the communication with the server and deletes the second encrypted picture and the second picture, so that the display process of the network novel is completed.
In the above process, similar to the process of displaying the first picture in the blurring manner, the description is omitted here. And when the reading stopping instruction of the user corresponding to the first user terminal is obtained, the first user terminal stops the communication with the server, and deletes the second encrypted picture and the second picture, thereby completing the display process of the network novel. Further, before the first user terminal determines whether to obtain the instruction for stopping reading from the user corresponding to the first user terminal, the method further includes a step of making and sending the mth picture m times (step of the server side) and performing multiple times of blurring setting and displaying of the mth picture (step of the first user terminal), where m is an integer greater than 2.
Further, the step S410 of the first user terminal determining whether to acquire an instruction for stopping reading from a user corresponding to the first user terminal includes:
s4101, calculating eyeball gathering positions by the first user terminal through a front camera, and judging whether the focusing positions of the sight lines of the users corresponding to the first user terminal on the screen of the first user terminal are calculated;
s4102, if the focusing position of the sight line of the user corresponding to the first user terminal on the screen of the first user terminal is not calculated, judging to acquire a reading stopping instruction from the user corresponding to the first user terminal.
Therefore, by the mode, a user does not need to input an instruction for stopping reading, but only needs to do a posture for normal reading, for example, the user closes the eyes for a period of time, or leaves the head from a shooting area of the front camera, so that the whole operation efficiency is improved.
Referring to fig. 2, an embodiment of the present invention further provides a computer device, where the computer device may be a server, and an internal structure of the computer device may be as shown in the figure. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the computer designed processor is used to provide computational and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The memory provides an environment for the operation of the operating system and the computer program in the non-volatile storage medium. The database of the computer device is used for storing data used by the network novel showing method for preventing piracy. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a method of network novel presentation that prevents piracy.
The processor executes the method for displaying the network novel against piracy, wherein the steps of the method are respectively in one-to-one correspondence with the steps of executing the method for displaying the network novel against piracy of the embodiment, and are not described herein again.
It will be understood by those skilled in the art that the structures shown in the drawings are only block diagrams of some of the structures associated with the embodiments of the present application and do not constitute a limitation on the computer apparatus to which the embodiments of the present application may be applied.
An embodiment of the present application further provides a computer-readable storage medium, in which a computer program is stored, and when the computer program is executed by a processor, the method for displaying the network novel against piracy is implemented, where steps included in the method correspond to steps of executing the method for displaying the network novel against piracy of the foregoing embodiment one to one, and are not described herein again.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware associated with a computer program or instructions, the computer program can be stored in a non-volatile computer-readable storage medium, and the computer program can include the processes of the embodiments of the methods described above when executed. Any reference to memory, storage, database, or other medium provided herein and used in the examples may include non-volatile and/or volatile memory. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), double-rate SDRAM (SSRSDRAM), Enhanced SDRAM (ESDRAM), synchronous link (Synchlink) DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and bus dynamic RAM (RDRAM).
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, apparatus, article, or method that includes the element.
The above description is only a preferred embodiment of the present application, and not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application, or which are directly or indirectly applied to other related technical fields, are also included in the scope of the present application.

Claims (8)

1. A network novel display method for preventing piracy is characterized by comprising the following steps:
s11, the server acquires a request for reading the novel sent by the first user terminal;
s12, the server acquires a video by using a front camera of the first user terminal to obtain a first video, performs living body detection on the first video according to a preset living body detection method, and judges whether a living body detection result passes or not;
s13, if the live body detection result passes, the server acquires the size of the screen of the first user terminal, and the preset novel chapters are made into novel pictures; wherein the novel picture matches a size of a screen of the first user terminal;
s14, the server intercepts a first picture from the novel picture according to the size of the screen of the first user terminal, wherein the first picture just can fill the screen of the first user terminal, and the top of the first picture is the same as that of the novel picture;
s15, the server encrypts the first picture by adopting a preset first public key according to a preset asymmetric encryption algorithm to obtain a first encrypted picture, and sends the first encrypted picture to the first user terminal;
s21, the first user terminal decrypts the first encrypted picture by using a first private key corresponding to the first public key to obtain a first picture, and the first picture is displayed on a screen of the first user terminal; wherein the first private key is pre-stored in the first user terminal;
s22, the first user terminal calculates eyeball gathering positions by using the front camera to obtain a first focusing position of the sight of a user corresponding to the first user terminal on the screen of the first user terminal;
s23, the first user terminal performs blurring processing on the first focusing position according to a preset region blurring method so as to form a state that a first initial clear region and a blurring region coexist on a screen of the first user terminal; wherein the first focus position is centered in the first initial clearing zone;
s24, the first user terminal processes the edge of the first initial clear area according to a preset edge irregularity processing method, so that the edge contour of the first initial clear area is in an irregular state;
s25, the first user terminal acquires first average stay time data crawled by a preset crawler tool, wherein the first average stay time data refer to first average stay time of other users except the user corresponding to the first user terminal in the first initial clear area;
s26, the first user terminal obtains a first designated area size corresponding to the first average time according to a mapping relation between preset time and the area size;
s27, the first user terminal performs scaling processing on the first initial clear region to make the size of the first initial clear region equal to the size of the first designated region, so as to obtain a first final clear region;
s28, the first user terminal obtains a first marginal character in the first final clear area, wherein the distance between the first marginal character and the edge of the first final clear area is smaller than a preset distance value;
s29, the first user terminal carries out character transformation processing on the first marginal characters according to a preset wrong character generating method, so that the first marginal characters displayed on a screen are changed into wrong characters;
s210, the first user terminal judges whether a screen-sliding instruction from a user corresponding to the first user terminal is received, wherein the screen-sliding instruction records the screen-sliding length;
s211, if a screen-sliding instruction from a user corresponding to the first user terminal is received, the first user terminal sends a new picture acquisition requirement to the server; wherein the new picture acquisition requirement is recorded with the screen length;
s31, the server intercepts a second picture from the novel picture, and the distance between the second picture and the first picture is equal to the screen-sliding length; wherein the second picture happens to fill the screen of the first user terminal;
s32, the server encrypts the second picture by adopting a preset second public key according to a preset asymmetric encryption algorithm to obtain a second encrypted picture, sends the second encrypted picture to the first user terminal, and simultaneously requires the first user terminal to use the second encrypted picture to cover the first encrypted picture and the first picture;
s33, after receiving the confirmation information which is returned by the first user terminal and covers the first encrypted picture and the first picture, the server sends a second private key corresponding to the second public key to the first user terminal;
s41, the first user terminal decrypts the second encrypted picture by using a second private key corresponding to the second public key to obtain a second picture, and the second picture is displayed on the screen of the first user terminal;
s42, the first user terminal calculates eyeball focusing positions by using the front camera to obtain second focusing positions of the sight lines of the users corresponding to the first user terminal on the screen of the first user terminal;
s43, the first user terminal performs blurring processing on the second focusing position according to a preset region blurring method so as to form a state that a second initial clear region and a blurring region coexist on the screen of the first user terminal; wherein the second focus position is centered on the second initial clearing region;
s44, the first user terminal processes the edge of the second initial clear area according to a preset edge irregularity processing method, so that the edge contour of the second initial clear area is in an irregular state;
s45, the first user terminal acquires second average stay time data crawled by a preset crawler tool, wherein the second average stay time data refer to second average stay time of other users except the user corresponding to the first user terminal in the second initial clear area;
s46, the first user terminal obtains a second specified area size corresponding to the second average time according to a mapping relation between preset time and the area size;
s47, the first user terminal performs scaling processing on the second initial clear area so that the size of the second initial clear area is equal to the size of the second specified area to obtain a second final clear area;
s48, the first user terminal obtains a second marginal text in the second final clear area, wherein the distance between the second marginal text and the edge of the second final clear area is smaller than a preset distance value;
s49, the first user terminal carries out character transformation processing on the second marginal characters according to a preset wrong character generating method so that the second marginal characters displayed on the screen become wrong characters;
s410, the first user terminal judges whether to acquire a reading stopping instruction from a user corresponding to the first user terminal;
s411, if the reading stopping instruction from the user corresponding to the first user terminal is obtained, the first user terminal stops communication with the server, and deletes the second encrypted picture and the second picture, so that the displaying process of the network novel is completed.
2. The method for displaying a pirated prevention network novel according to claim 1, wherein the step S12 of performing live body detection on the first video according to a preset live body detection method and determining whether a live body detection result passes includes:
s1201, a server extracts a plurality of frame pictures from the first video, wherein each frame picture is provided with a user image corresponding to the first user terminal;
s1202, the server determines a plurality of feature point positions in each frame picture, wherein the feature points at least comprise eyeball center points and mouth angles;
s1203, the server calculates relative distances between every two feature point positions in each frame picture respectively, and normalization processing is carried out on all the relative distances to obtain a normalized relative distance sequence of each frame picture;
s1204, the server sequentially connects the normalized relative distance sequences of all the frame pictures to obtain a distance vector, and divides members in the distance vector into a first member and a second member; obtaining a numerical value of-1 | of the first member, wherein | the numerical value of-1 | of the first member is smaller than a preset numerical threshold value, | the numerical value of-1 | of the second member is larger than the preset numerical threshold value;
s1205, the server counts the number of first members and the number of second members, calculates the ratio of the number of the second members to the number of the first members, and judges whether the ratio is larger than a preset ratio threshold value;
and S1206, if the ratio is larger than a preset ratio threshold, determining that the living body detection result passes.
3. The method for displaying a network novel to prevent piracy according to claim 1, wherein the step S22 of the first user terminal performing eyeball focus position calculation by using a front camera to obtain a first focus position of the line of sight of the user corresponding to the first user terminal on the screen of the first user terminal includes:
s2201, the first user terminal sets a screen of the first user terminal as a black screen, displays a single light spot on the black screen, and acquires a first position of the light spot;
s2202, a first user terminal shoots a first pupil picture of a user corresponding to the first user terminal by using a front camera of the first user terminal;
s2203, the first user terminal moves the light spot to a second position and then shoots a second pupil picture of the user corresponding to the first user terminal;
s2204, the first user terminal establishes a corresponding relation table of the relative distance of the movement of the pupil in the pupil and the eyeball focusing position of the sight line of the user on the screen according to the first position, the second position, the first pupil picture and the second pupil picture in an equal proportion relation;
s2205, the first user terminal restores the screen of the first user terminal to the state before the screen is blacked, and a front camera is used for shooting a third pupil picture of a user corresponding to the first user terminal;
s2206, the first user terminal obtains a first focusing position of the line of sight of the user corresponding to the first user terminal on the screen of the first user terminal based on the correspondence table and the third pupil picture.
4. The method as claimed in claim 1, wherein the first user terminal performs a blurring process on the first focus position according to a predetermined area blurring method to form a coexisting state of a first initial clear area and a blurring area on the screen of the first user terminal; step S23, in which the first focus position is at the center of the first initial clear region, includes:
s2301, a first user terminal randomly calls a temporary mask layer from a preset mask layer library, wherein the temporary mask layer is composed of an unmasked region and a mosaic region, and the unmasked region at least comprises the center of the temporary mask layer;
s2302, the first user terminal superimposes the temporary mask layer on a screen of the first user terminal in a top-layer display manner, so that a state where a first initial clear region and a blurring region coexist is formed on the screen of the first user terminal; wherein the first focus position is centered in the first initial clear region.
5. The method for displaying a network novel to prevent piracy according to claim 1, wherein the step S29 of the first user terminal performing a text transformation process on the first borderline text according to a preset wrongly written character generating method so that the first borderline text presented on the screen becomes wrongly written characters includes:
s2901, calling a pre-collected stroke adding wrong character library and a correct character library corresponding to the stroke adding wrong character library, wherein the stroke adding wrong character library is obtained by adding strokes less than or equal to two strokes to correct Chinese characters in the correct character library;
s2902, according to the mode of comparing the stroke adding wrong character library with the correct character library one by one, obtaining the shape of the designated area where the added strokes of the stroke adding wrong characters are located;
s2903, identifying the area shape of the first marginal character to judge whether the first marginal character has the specified area shape;
s2904, if the first marginal character has the shape of the designated area, generating a stroke adding layer displayed on the top layer, so that the stroke adding layer is superposed on the screen of the first user terminal, and the first marginal character displayed on the screen is changed into a wrong character; wherein the stroke adding layer adds strokes corresponding to the specified region shape at the specified region shape position.
6. The method for displaying a network novel to prevent piracy according to claim 1, wherein the step S410 of the first user terminal determining whether to obtain the instruction to stop reading from the user corresponding to the first user terminal includes:
s4101, calculating eyeball gathering positions by the first user terminal through a front camera, and judging whether the focusing positions of the sight lines of the users corresponding to the first user terminal on the screen of the first user terminal are calculated;
s4102, if the focusing position of the sight line of the user corresponding to the first user terminal on the screen of the first user terminal is not calculated, judging to acquire a reading stopping instruction from the user corresponding to the first user terminal.
7. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of the method of any one of claims 1 to 6 when executing the computer program.
8. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 6.
CN202010676689.5A 2020-07-14 2020-07-14 Network novel display method for preventing piracy, computer equipment and storage medium Active CN111831975B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010676689.5A CN111831975B (en) 2020-07-14 2020-07-14 Network novel display method for preventing piracy, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010676689.5A CN111831975B (en) 2020-07-14 2020-07-14 Network novel display method for preventing piracy, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111831975A CN111831975A (en) 2020-10-27
CN111831975B true CN111831975B (en) 2021-02-23

Family

ID=72923245

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010676689.5A Active CN111831975B (en) 2020-07-14 2020-07-14 Network novel display method for preventing piracy, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111831975B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1786867A (en) * 2005-09-22 2006-06-14 深圳市江波龙电子有限公司 Method for ciphering and diciphering of file, safety managing storage apparatus and system method thereof
CN102110114A (en) * 2009-12-28 2011-06-29 北京安码科技有限公司 Copy-prevention method and device of web page word content
CN105681309A (en) * 2016-01-26 2016-06-15 腾讯科技(深圳)有限公司 Information processing method, first terminal, second terminal and server

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004078699A (en) * 2002-08-20 2004-03-11 Univ Waseda Contents distributing method and contents distributing device
CN101814118A (en) * 2009-07-02 2010-08-25 西安电子科技大学 Method for protecting web texts based on pictures
US20110261030A1 (en) * 2010-04-26 2011-10-27 Bullock Roddy Mckee Enhanced Ebook and Enhanced Ebook Reader
CN102479534A (en) * 2010-11-30 2012-05-30 方正国际软件(北京)有限公司 Picture playing method and system thereof
CN102542183B (en) * 2010-12-17 2016-05-18 盛霆信息技术(上海)有限公司 Copyright of network literature detection method and system
CN103678957A (en) * 2012-09-12 2014-03-26 上海聚力传媒技术有限公司 Method, device and equipment for generating picture information and obtaining identity coded information
CN105897885B (en) * 2016-04-07 2019-04-02 深圳市永兴元科技股份有限公司 Across a network data transmission method and device
KR20190033365A (en) * 2017-09-21 2019-03-29 (주)비콘 Social electronic book service system to provide a user with chatting function in smart device
CN107943280A (en) * 2017-10-30 2018-04-20 深圳市华阅文化传媒有限公司 The control method and device of e-book reading
CN107995219A (en) * 2017-12-22 2018-05-04 掌阅科技股份有限公司 File accelerates to show method, computing device and computer-readable storage medium
CN108717435B (en) * 2018-05-16 2023-05-23 腾讯科技(深圳)有限公司 Webpage loading method, information processing method, computer equipment and storage medium
CN109782913A (en) * 2019-01-10 2019-05-21 中科创达软件股份有限公司 A kind of method and device that control screen content is shown

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1786867A (en) * 2005-09-22 2006-06-14 深圳市江波龙电子有限公司 Method for ciphering and diciphering of file, safety managing storage apparatus and system method thereof
CN102110114A (en) * 2009-12-28 2011-06-29 北京安码科技有限公司 Copy-prevention method and device of web page word content
CN105681309A (en) * 2016-01-26 2016-06-15 腾讯科技(深圳)有限公司 Information processing method, first terminal, second terminal and server

Also Published As

Publication number Publication date
CN111831975A (en) 2020-10-27

Similar Documents

Publication Publication Date Title
US20240214376A1 (en) Identity verification method and apparatus, storage medium, and computer device
JP6878572B2 (en) Authentication based on face recognition
EP3332403B1 (en) Liveness detection
CN108463787B (en) Gaze correction of multi-perspective images
US20180239955A1 (en) Liveness detection
CN111626925B (en) Method and device for generating counterwork patch
US9025830B2 (en) Liveness detection system based on face behavior
Arcoverde Neto et al. Enhanced real-time head pose estimation system for mobile device
WO2003081532A1 (en) Method and apparatus for the automatic detection of facial features
CN112214773B (en) Image processing method and device based on privacy protection and electronic equipment
KR101954763B1 (en) Face recognition access control apparatus and operation method thereof
CN111353404A (en) Face recognition method, device and equipment
JP2021534497A (en) Personal identification methods, computer-readable storage media, terminal devices and devices
Hao et al. Robustness analysis of face obscuration
CN111831975B (en) Network novel display method for preventing piracy, computer equipment and storage medium
Dhruva et al. Novel algorithm for image processing based hand gesture recognition and its application in security
KR20220062595A (en) A method for obtaining data from an image of an object of a user that has a biometric characteristic of the user
CN113837018B (en) Cosmetic progress detection method, device, equipment and storage medium
Wei et al. Robust face recognition with occlusions in both reference and query images
WO2018133584A1 (en) Identity authentication method and device
Maity et al. Preserving Privacy in Video Analytics: A Comprehensive Review of Face De-Identification and Background Blurring Techniques
CN114612991A (en) Conversion method and device for attacking face picture, electronic equipment and storage medium
Dameron Real vs Fake Faces: DeepFakes and Face Morphing
KR20200034018A (en) Face recognition method based on infrared image and learning method for the same
CN117765592A (en) Face authenticity identification detection method, system, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TA01 Transfer of patent application right

Effective date of registration: 20210204

Address after: 730900 yunchuang space 3-003, 3rd floor, Zhongchuang Boli building, 155 Lanzhou Road, Baiyin District, Baiyin City, Gansu Province

Applicant after: Gansu xiegu Yunzhi culture media Co.,Ltd.

Address before: 511458 3a201, No.13, East jiaotongyong street, Caixin Road, Lanhe Town, Nansha District, Guangzhou City, Guangdong Province

Applicant before: Zheng Kaixuan

TA01 Transfer of patent application right