CN112104870B - Method and system for improving security of ultra-low time delay encoder - Google Patents

Method and system for improving security of ultra-low time delay encoder Download PDF

Info

Publication number
CN112104870B
CN112104870B CN202011281647.8A CN202011281647A CN112104870B CN 112104870 B CN112104870 B CN 112104870B CN 202011281647 A CN202011281647 A CN 202011281647A CN 112104870 B CN112104870 B CN 112104870B
Authority
CN
China
Prior art keywords
scanning
matrix
scanning matrix
nth
obtaining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011281647.8A
Other languages
Chinese (zh)
Other versions
CN112104870A (en
Inventor
王修颖
张彪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Shize Technology Co ltd
Original Assignee
Nanjing Shize Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Shize Technology Co ltd filed Critical Nanjing Shize Technology Co ltd
Priority to CN202011281647.8A priority Critical patent/CN112104870B/en
Publication of CN112104870A publication Critical patent/CN112104870A/en
Application granted granted Critical
Publication of CN112104870B publication Critical patent/CN112104870B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/10Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
    • H04N19/102Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the element, parameter or selection affected or controlled by the adaptive coding
    • H04N19/129Scanning of coding units, e.g. zig-zag scan of transform coefficients or flexible macroblock ordering [FMO]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/4406Restricting access, e.g. according to user identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/10Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
    • H04N19/134Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the element, parameter or criterion affecting or controlling the adaptive coding
    • H04N19/136Incoming video signal characteristics or properties
    • H04N19/137Motion inside a coding unit, e.g. average field, frame or block difference
    • H04N19/139Analysis of motion vectors, e.g. their magnitude, direction, variance or reliability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/10Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding
    • H04N19/134Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using adaptive coding characterised by the element, parameter or criterion affecting or controlling the adaptive coding
    • H04N19/157Assigned coding mode, i.e. the coding mode being predefined or preselected to be further used for selection of another element or parameter
    • H04N19/159Prediction type, e.g. intra-frame, inter-frame or bidirectional frame prediction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/42Methods or arrangements for coding, decoding, compressing or decompressing digital video signals characterised by implementation details or hardware specially adapted for video compression or decompression, e.g. dedicated software implementation
    • H04N19/423Methods or arrangements for coding, decoding, compressing or decompressing digital video signals characterised by implementation details or hardware specially adapted for video compression or decompression, e.g. dedicated software implementation characterised by memory arrangements

Abstract

The invention discloses a method and a system for improving the confidentiality of an ultra-low time delay encoder, which are characterized by comprising the steps of obtaining first image information, carrying out full search matching point scanning on a first scanning matrix, carrying out full search matching point scanning on a second scanning matrix after the first scanning matrix is searched, generating a first identification code according to the first scanning matrix information, and generating a second identification code according to the second scanning matrix information and the first identification code; respectively copying and storing all the scanning matrixes and the identification codes on M pieces of equipment to obtain a first preset matching criterion; and obtaining a first matching scanning matrix according to the first scanning matrix and the first preset matching criterion, and obtaining a first motion vector according to the first scanning matrix and the first matching scanning matrix. The technical problem that the confidentiality of the ultra-low time delay encoder cannot be ensured due to the lack of a mode for carrying out encryption protection on the time delay encoder in the prior art is solved.

Description

Method and system for improving security of ultra-low time delay encoder
Technical Field
The invention relates to the field of ultra-low time delay encoders, in particular to a method and a system for improving the confidentiality of an ultra-low time delay encoder.
Background
When the robot is controlled according to the actual image, the design of the ultra-low time delay encoder is carried out as much algorithm and workload are involved in the whole operating system.
However, in the process of implementing the technical solution of the invention in the embodiments of the present application, the inventors of the present application find that the above-mentioned technology has at least the following technical problems:
the technical problem that the confidentiality of the ultra-low time delay encoder cannot be ensured due to the lack of a mode for carrying out encryption protection on the time delay encoder in the prior art exists.
Disclosure of Invention
The embodiment of the application provides a method and a system for improving the confidentiality of an ultra-low time delay encoder, solves the technical problem that the confidentiality of the ultra-low time delay encoder cannot be ensured due to the lack of a mode for carrying out encryption protection on the time delay encoder in the prior art, and achieves the technical effect of ensuring the confidentiality of the ultra-low time delay encoder.
In view of the foregoing, embodiments of the present application provide a method and system for improving security of an ultra-low latency encoder.
In a first aspect, an embodiment of the present application provides a method for improving security of an ultra-low latency encoder, where the method includes: obtaining first image information, wherein the first image information comprises a first scanning matrix and a second scanning matrix till an Nth scanning matrix; performing full search matching point scanning on the first scanning matrix, and after the first scanning matrix is searched, performing full search matching point scanning on the second scanning matrix until the first image information is scanned; generating a first identification code according to the first scanning matrix information, wherein the first identification code is in one-to-one correspondence with the first scanning matrix information; generating a second identification code according to the second scanning matrix information and the first identification code; by analogy, generating an Nth identification code according to the Nth scanning matrix information and the Nth-1 identification code, wherein N is a natural number greater than 1; respectively copying and storing all scanning matrixes and identification codes on M devices, wherein M is a natural number greater than 1; obtaining a first predetermined matching criterion; obtaining a first matching scanning matrix according to the first scanning matrix and the first preset matching criterion, wherein the first matching scanning matrix is in N scanning matrices; and obtaining a first motion vector according to the first scanning matrix and the first matching scanning matrix.
In another aspect, the present application further provides a system for improving security of an ultra-low latency encoder, where the system includes: a first obtaining unit, configured to obtain first image information, where the first image information includes a first scanning matrix, a second scanning matrix, and up to an nth scanning matrix; the first scanning unit is used for carrying out full search matching point scanning on the first scanning matrix, and after the first scanning matrix is searched, the second scanning matrix is carried out with full search matching point scanning until the first image information is scanned; a second obtaining unit, configured to generate a first identification code according to the first scanning matrix information, where the first identification code corresponds to the first scanning matrix information one to one; a third obtaining unit, configured to generate a second identification code according to the second scanning matrix information and the first identification code; by analogy, generating an Nth identification code according to the Nth scanning matrix information and the Nth-1 identification code, wherein N is a natural number greater than 1; the first storage unit is used for respectively copying and storing all the scanning matrixes and the identification codes on M devices, wherein M is a natural number greater than 1; a fourth obtaining unit for obtaining a first predetermined matching criterion; a fifth obtaining unit, configured to obtain a first matching scanning matrix according to the first scanning matrix and the first predetermined matching criterion, where the first matching scanning matrix is in N scanning matrices; a sixth obtaining unit, configured to obtain a first motion vector according to the first scanning matrix and the first matching scanning matrix.
In a third aspect, the present invention provides a system for improving the security of an ultra-low latency encoder, comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the method according to any one of the first aspect when executing the program.
One or more technical solutions provided in the embodiments of the present application have at least the following technical effects or advantages:
because the first identification code is generated according to the first scanning matrix, the first identification code corresponds to the first scanning matrix one by one, the second identification code is generated according to the second scanning matrix and the first identification code, and by analogy, the logic of the scanning matrix based on the block chain is encrypted according to the Nth scanning matrix information and the mode of generating the Nth identification code according to the Nth scanning matrix information and the Nth-1 identification code, so that the scanning matrix cannot be falsified and damaged, and the technical effect of ensuring the confidentiality of the ultra-low time delay encoder is achieved.
The foregoing description is only an overview of the technical solutions of the present application, and the present application can be implemented according to the content of the description in order to make the technical means of the present application more clearly understood, and the following detailed description of the present application is given in order to make the above and other objects, features, and advantages of the present application more clearly understandable.
Drawings
FIG. 1 is a flow chart illustrating a method for improving security of an ultra-low latency encoder according to an embodiment of the present application;
FIG. 2 is a schematic diagram of a variation of a scan matrix according to an embodiment of the present application;
FIG. 3 is a block diagram illustrating a system for improving security of an ultra-low latency encoder according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an exemplary electronic device according to an embodiment of the present application.
Description of reference numerals: a first obtaining unit 11, a first scanning unit 12, a second obtaining unit 13, a third obtaining unit 14, a first saving unit 15, a fourth obtaining unit 16, a fifth obtaining unit 17, a sixth obtaining unit 18, a bus 300, a receiver 301, a processor 302, a transmitter 303, a memory 304, and a bus interface 306.
Detailed Description
The embodiment of the application provides a method and a system for improving the confidentiality of an ultra-low time delay encoder, solves the technical problem that the confidentiality of the ultra-low time delay encoder cannot be ensured due to the lack of a mode for carrying out encryption protection on the time delay encoder in the prior art, and achieves the technical effect of ensuring the confidentiality of the ultra-low time delay encoder. Hereinafter, example embodiments according to the present application will be described in detail with reference to the accompanying drawings. It should be apparent that the described embodiments are merely some embodiments of the present application and not all embodiments of the present application, and it should be understood that the present application is not limited to the example embodiments described herein.
Summary of the application
When the robot is controlled according to the actual image, the design of the ultra-low time delay encoder is carried out as much algorithm and workload are involved in the whole operating system. However, the technical problem that the confidentiality of the ultra-low delay encoder cannot be ensured due to the lack of a mode for carrying out encryption protection on the delay encoder exists in the prior art.
In view of the above technical problems, the technical solution provided by the present application has the following general idea:
the embodiment of the application provides a method for improving the confidentiality of an ultra-low time delay encoder, which comprises the following steps: obtaining first image information, wherein the first image information comprises a first scanning matrix and a second scanning matrix till an Nth scanning matrix; performing full search matching point scanning on the first scanning matrix, and after the first scanning matrix is searched, performing full search matching point scanning on the second scanning matrix until the first image information is scanned; generating a first identification code according to the first scanning matrix information, wherein the first identification code is in one-to-one correspondence with the first scanning matrix information; generating a second identification code according to the second scanning matrix information and the first identification code; by analogy, generating an Nth identification code according to the Nth scanning matrix information and the Nth-1 identification code, wherein N is a natural number greater than 1; respectively copying and storing all scanning matrixes and identification codes on M devices, wherein M is a natural number greater than 1; obtaining a first predetermined matching criterion; obtaining a first matching scanning matrix according to the first scanning matrix and the first preset matching criterion, wherein the first matching scanning matrix is in N scanning matrices; and obtaining a first motion vector according to the first scanning matrix and the first matching scanning matrix.
Having thus described the general principles of the present application, various non-limiting embodiments thereof will now be described in detail with reference to the accompanying drawings.
Example one
As shown in fig. 1, an embodiment of the present application provides a method for improving security of an ultra-low latency encoder, where the method includes:
step S100: obtaining first image information, wherein the first image information comprises a first scanning matrix and a second scanning matrix till an Nth scanning matrix;
specifically, the first image is a target image to be searched by a full search algorithm, the first image information is divided into N scanning matrix areas, and the scanning matrix area is a scanning matrix area covering the first image obtained by performing adjacent point translation according to the size of each scanning matrix. And obtaining a first scanning matrix and a second scanning matrix according to the scanning matrix region in a certain sequence until the Nth scanning matrix.
Step S200: performing full search matching point scanning on the first scanning matrix, and after the first scanning matrix is searched, performing full search matching point scanning on the second scanning matrix until the first image information is scanned;
specifically, scanning is started from a horizontal adjacent matching point at the upper left corner of the first image, the horizontal adjacent matching point is a first scanning matrix, and when the matching point searching is completed, namely the first scanning matrix searching is completed, full-search matching point scanning is performed on a second scanning matrix until the whole first image is completely scanned.
Step S300: generating a first identification code according to the first scanning matrix information, wherein the first identification code is in one-to-one correspondence with the first scanning matrix information;
specifically, the first identification code is an identification code corresponding to the first scanning matrix one to one, and further, the first scanning matrix is subjected to hash function encryption calculation to obtain a non-modifiable first identification code uniquely corresponding to the first scanning matrix, and the first identification code can be regarded as the uniquely corresponding identity information of the first scanning matrix.
Step S400: generating a second identification code according to the second scanning matrix information and the first identification code; by analogy, generating an Nth identification code according to the Nth scanning matrix information and the Nth-1 identification code, wherein N is a natural number greater than 1;
specifically, the second scanning matrix is associated with the first identification code, the second scanning matrix and the first identification code are used as a whole to be subjected to hash function encryption processing to obtain a second identification code, the second identification code corresponds to the second scanning matrix in a one-to-one mode, and by analogy, an Nth identification code is generated according to the Nth scanning matrix and the Nth-1 identification code, and the scanning matrix information is encrypted through a logic based on block chain encryption to ensure the safety of the scanning matrix, so that the technical effect of improving the confidentiality of the ultra-low delay encoder is achieved.
Step S500: respectively copying and storing all scanning matrixes and identification codes on M devices, wherein M is a natural number greater than 1;
specifically, the scanning matrix and the verification code information are copied and stored on M pieces of electronic equipment, wherein the electronic equipment has storage capacity and can quickly and accurately record the information, and the data are stored on the M pieces of electronic equipment.
Step S600: obtaining a first predetermined matching criterion;
specifically, the first matching criterion is a preset first predetermined matching criterion for obtaining a motion vector value according to an image difference between adjacent frames calculated and obtained from the adjacent frames of the moving image.
Step S700: obtaining a first matching scanning matrix according to the first scanning matrix and the first preset matching criterion, wherein the first matching scanning matrix is in N scanning matrices;
step S800: and obtaining a first motion vector according to the first scanning matrix and the first matching scanning matrix.
Specifically, scanning and matching are carried out on all scanning matrixes according to a preset first preset matching criterion to obtain a first matching scanning matrix, and a first motion vector is obtained according to the first scanning matrix and the first matching scanning matrix. Further, in the inter-frame prediction coding, there is a certain correlation between scenes in adjacent frames due to moving images. Therefore, the moving image can be divided into scanning matrixes, the position of each scanning matrix in the adjacent frame image is searched, the relative offset of the space position between the scanning matrixes and the adjacent frame image is obtained, and the obtained relative offset is the first motion vector. By encrypting the scanning matrix, the security of the first motion vector obtained by the scanning matrix is ensured, and the technical effect of ensuring the confidentiality of the ultra-low time delay encoder is further achieved.
As shown in fig. 2, in obtaining first image information, where the first image information includes a first scanning matrix, a second scanning matrix, and up to an nth scanning matrix, an embodiment S100 of the present application further includes:
step S110: obtaining a first scanning matrix, wherein the first scanning matrix is an initial matrix of the first image information;
step S120: obtaining a first arrangement mode;
step S130: and obtaining a second scanning matrix till an Nth scanning matrix according to the first scanning matrix and the first arrangement mode, wherein the Nth scanning matrix is a scanning matrix adjacent to the N-1 th scanning matrix.
Specifically, the first arrangement mode is to translate a pixel downwards, when the pixel cannot be translated downwards continuously, a pixel rightward translation instruction is obtained, a pixel is translated rightwards according to the instruction, then upward translation is started, until the pixel cannot be translated upwards, a pixel rightward translation instruction is obtained, next translation is triggered to be changed into downward translation of a pixel according to the instruction again, and by analogy, N scanning matrixes are obtained, and the N scanning matrixes can cover the first image.
Further, the obtaining of the first image information includes a first scanning matrix and a second scanning matrix, and until after the nth scanning matrix, the step S100 in the embodiment of the present application further includes:
step S140: according to the first image information, obtaining a matching point set in the first image information, wherein matching points in the matching point set are uniformly distributed in the first image information;
step S150: obtaining a predetermined matrix model;
step S160: and obtaining the matching points of the Nth scanning matrix according to the matching point set and the preset matrix model.
Specifically, the predetermined matrix model is the predetermined size information of the N matrix models, the first image is formed by collecting a plurality of pixel points, information serving as matching points among the plurality of pixel points is obtained, and the matching points are uniformly distributed among the plurality of pixel points of the first image, so that the information of the matching points in each matrix model is obtained.
Further, in the embodiment S160 of the present application, the obtaining a matching point of an nth scanning matrix according to the matching point set and the predetermined matrix model further includes:
step S161: and inputting the matching point set as first input information and the predetermined matrix model as second input information into a training model, wherein the training model is obtained by training a plurality of groups of training data, and each group of training data in the plurality of groups comprises: the matching point set, the predetermined matrix model and identification information used for identifying whether the matching point is an Nth scanning matrix matching point;
step S162: and obtaining output information of the training model, wherein the output information comprises a first output result and a second output result, the first output result is a result of a matching point of the Nth scanning matrix, and the second output result is a result of a matching point which is not the Nth scanning matrix.
Specifically, the training model is a model capable of performing continuous self-training learning according to different actual conditions, and further, the training model is a Neural network model, which is a Neural network model in machine learning, and a Neural Network (NN) is a complex Neural network system formed by widely interconnecting a large number of simple processing units (called neurons), reflects many basic features of human brain functions, and is a highly complex nonlinear dynamical learning system. Neural network models are described based on mathematical models of neurons. Artificial Neural Networks (Artificial Neural Networks) are a description of the first-order properties of the human brain system. Briefly, it is a mathematical model. Training based on a large amount of training data, wherein each set of training data in the training data comprises the matching point set, the predetermined matrix model and identification information for identifying whether the matching point is an Nth scanning matrix matching point; the neural network model is continuously self-corrected, and when the output information of the neural network model reaches a preset accuracy rate/reaches a convergence state, the supervised learning process is ended. Through data training of the neural network model, the neural network model can process the input data more accurately, and whether the output judgment of the scanning matrix is the matching point of the Nth scanning matrix is more accurate. Based on the characteristic that the data processing is more accurate after the training model is trained, the matching point set is used as first input information, the preset matrix model is used as second input information and is input into the training model, and whether the scanning matrix is the matching point of the Nth scanning matrix or not is judged through the output information of the training model, so that the judgment result is more accurate, and the technical effect of accurately judging whether the scanning matrix is the matching point of the Nth scanning matrix or not is achieved.
Further, in the obtaining of the output information of the training model, step S162 in the embodiment of the present application further includes:
step S1621: taking the matching point set as an abscissa;
step S1622: taking the predetermined matrix model as a vertical coordinate;
step S1623: obtaining a logistic regression line according to the abscissa and the ordinate by adopting a logistic regression model, wherein the logistic regression line comprises a first position and a first angle, and the first position and the first angle are located in a coordinate system constructed by the abscissa and the ordinate; wherein one side of the logistic regression line represents a first output result and the other side of the logistic regression line represents a second output result, wherein the first output result and the second output result are different.
Specifically, the matching point sets are respectively used as horizontal and vertical coordinates, a coordinate system is established, a logistic regression line is obtained according to the coordinate system and a logistic regression model, the result of the matching point of the nth scanning matrix is further judged through the logistic regression line, one side of the logistic regression line represents a first output result, the first output result is the result of the matching point of the nth scanning matrix, and the second output result is the result of the matching point of the nth scanning matrix. And processing the output result of the training model based on the logic of the logistic regression line, thereby achieving the technical effect of more accurate judgment on the output result.
Further, the embodiment of the present application further includes:
step S910: taking the Nth scanning matrix and the Nth-1 verification code as an Nth block;
step S920: obtaining the recording time of the Nth block, wherein the recording time of the Nth block represents the time required to be recorded by the Nth block;
step S930: obtaining the first equipment with the fastest transport capacity in the M pieces of equipment according to the recording time of the Nth block;
step S940: and sending the recording right of the Nth block to the first equipment.
In particular, the blockchain technique, also referred to as a distributed ledger technique, is an emerging technique in which several computing devices participate in "accounting" together, and maintain a complete distributed database together. The blockchain technology has been widely used in many fields due to its characteristics of decentralization, transparency, participation of each computing device in database records, and rapid data synchronization between computing devices. And taking the Nth scanning matrix and the (N-1) th verification code as an Nth block, removing equipment which cannot finish recording the Nth block within preset time, obtaining equipment which records the Nth block in M sets and has the fastest transport capacity, and giving the equipment the record of the Nth block, so that the safe, effective and stable operation of a decentralized block chain system is ensured, the block can be rapidly and accurately recorded in the equipment, the safety of the scanning matrix is ensured, the accuracy of a training model obtained by the training of the scanning matrix is ensured, and the technical effect of improving the confidentiality of the ultra-low delay encoder is achieved.
Further, the embodiment of the present application further includes:
step S950: obtaining a first reference pixel;
step S960: performing intra-frame prediction on the first scanning matrix according to the first reference pixel to obtain a first reconstructed pixel;
step S970: taking the first reconstructed pixel as a second reference pixel of the second scanning matrix;
step S980: until the N-1 scanning matrix is subjected to intra-frame prediction according to the N-1 reference pixel, and an N-1 reconstruction pixel is obtained;
step S990: and taking the N-1 th reconstructed pixel as an N reference pixel of the N scanning matrix.
Specifically, a first reference pixel is obtained, a first reconstructed pixel is obtained after a first scanning line intra-frame prediction is performed according to the first pixel, the first reconstructed pixel is used as a reference pixel of a second scanning matrix, and in the same way, after the N-1 scanning matrix is intra-frame predicted according to the N-1 reference pixel, the N-1 reconstructed pixel is obtained, and the N-1 reference pixel is used as an nth reference pixel of the N scanning matrix. Based on the logic of the association of the former reconstructed pixel and the latter reference pixel, the technical effect of ensuring the confidentiality of the ultra-low time delay encoder is achieved.
To sum up, the method and system for improving the security of the ultra-low delay encoder provided by the embodiment of the present application have the following technical effects:
1. because the first identification code is generated according to the first scanning matrix, the first identification code corresponds to the first scanning matrix one by one, the second identification code is generated according to the second scanning matrix and the first identification code, and by analogy, the logic of the scanning matrix based on the block chain is encrypted according to the Nth scanning matrix information and the mode of generating the Nth identification code according to the Nth scanning matrix information and the Nth-1 identification code, so that the scanning matrix cannot be falsified and damaged, and the technical effect of ensuring the confidentiality of the ultra-low time delay encoder is achieved.
2. The method for judging whether the scanning matrix is the matching point of the Nth scanning matrix or not through the output information of the training model is adopted, so that the judgment result is more accurate, and the technical effect of accurately judging whether the scanning matrix is the matching point of the Nth scanning matrix or not is achieved.
3. Because the output result of the training model is processed by adopting the logic based on the logistic regression line, the technical effect of more accurate judgment of the output result is achieved.
Example two
Based on the same inventive concept as the method for improving the security of the ultra-low delay encoder in the foregoing embodiment, the present invention further provides a system for improving the security of the ultra-low delay encoder, as shown in fig. 3, the system includes:
a first obtaining unit 11, where the first obtaining unit 11 is configured to obtain first image information, where the first image information includes a first scanning matrix, a second scanning matrix, and up to an nth scanning matrix;
a first scanning unit 12, where the first scanning unit 12 is configured to perform full search matching point scanning on the first scanning matrix, and when the first scanning matrix is searched, perform full search matching point scanning on the second scanning matrix until the first image information is scanned;
a second obtaining unit 13, where the second obtaining unit 13 is configured to generate a first identification code according to the first scanning matrix information, where the first identification code corresponds to the first scanning matrix information one to one;
a third obtaining unit 14, where the third obtaining unit 14 is configured to generate a second identification code according to the second scanning matrix information and the first identification code; by analogy, generating an Nth identification code according to the Nth scanning matrix information and the Nth-1 identification code, wherein N is a natural number greater than 1;
a first saving unit 15, where the first saving unit 15 is configured to copy and save all the scanning matrices and the identification codes on M devices, where M is a natural number greater than 1;
a fourth obtaining unit 16, the fourth obtaining unit 16 being configured to obtain a first predetermined matching criterion;
a fifth obtaining unit 17, where the fifth obtaining unit 17 is configured to obtain a first matching scanning matrix according to the first scanning matrix and the first predetermined matching criterion, where the first matching scanning matrix is in N scanning matrices;
a sixth obtaining unit 18, where the sixth obtaining unit 18 is configured to obtain a first motion vector according to the first scan matrix and the first matching scan matrix.
Further, the system further comprises:
a seventh obtaining unit, configured to obtain a first scanning matrix, where the first scanning matrix is an initial matrix of the first image information;
an eighth obtaining unit configured to obtain a first arrangement pattern;
a ninth obtaining unit, configured to obtain a second scanning matrix up to an nth scanning matrix according to the first scanning matrix and the first arrangement manner, where the nth scanning matrix is a scanning matrix adjacent to the nth-1 scanning matrix.
Further, the system further comprises:
a tenth obtaining unit, configured to obtain, according to the first image information, a set of matching points in the first image information, where the matching points in the set of matching points are uniformly distributed in the first image information;
an eleventh obtaining unit configured to obtain a predetermined matrix model;
a twelfth obtaining unit, configured to obtain a matching point of an nth scanning matrix according to the matching point set and the predetermined matrix model.
Further, the system further comprises:
a thirteenth obtaining unit, configured to control the heat release system to perform temperature increase processing on the current sensor according to the first temperature increase instruction.
Further, the system further comprises:
a first input unit, configured to input a training model using the matching point set as first input information and the predetermined matrix model as second input information, where the training model is obtained by training multiple sets of training data, and each set of training data in the multiple sets includes: the matching point set, the predetermined matrix model and identification information used for identifying whether the matching point is an Nth scanning matrix matching point;
a fourteenth obtaining unit, configured to obtain output information of the training model, where the output information includes a first output result and a second output result, the first output result is a result of a matching point of an nth scanning matrix, and the second output result is a result of a matching point of a non-nth scanning matrix.
Further, the system further comprises:
a fifteenth obtaining unit configured to take the set of matching points as an abscissa;
a sixteenth obtaining unit configured to take the predetermined matrix model as a vertical coordinate;
a seventeenth obtaining unit, configured to obtain a logistic regression line according to the abscissa and the ordinate by using a logistic regression model, where the logistic regression line includes a first position and a first angle, and the first position and the first angle are located in a coordinate system constructed by the abscissa and the ordinate; wherein one side of the logistic regression line represents a first output result and the other side of the logistic regression line represents a second output result, wherein the first output result and the second output result are different.
Further, the system further comprises:
an eighteenth obtaining unit, configured to use the nth scan matrix and the nth-1 verification code as an nth block;
a nineteenth obtaining unit, configured to obtain the nth block recording time, where the nth block recording time represents a time that needs to be recorded by the nth block;
a twentieth obtaining unit, configured to obtain, according to the nth block recording time, a first device with the fastest transport capacity from among the M devices;
a first sending unit, configured to send the recording right of the nth block to the first device.
Further, the system further comprises:
a twenty-first obtaining unit configured to obtain a first reference pixel;
a twenty-second obtaining unit, configured to perform intra-frame prediction on the first scan matrix according to the first reference pixel, and obtain a first reconstructed pixel;
a twenty-third obtaining unit for regarding the first reconstructed pixel as a second reference pixel of the second scan matrix;
a twenty-fourth obtaining unit configured to obtain an N-1 th reconstructed pixel until the N-1 th scan matrix is intra-predicted from the N-1 th reference pixel;
a twenty-fifth obtaining unit to take the N-1 th reconstructed pixel as an Nth reference pixel of the Nth scan matrix.
Various changes and specific examples of the method for improving the security of the ultra-low delay encoder in the first embodiment of fig. 1 are also applicable to the system for improving the security of the ultra-low delay encoder in the present embodiment, and through the foregoing detailed description of the method for improving the security of the ultra-low delay encoder, the implementation method of the system for improving the security of the ultra-low delay encoder in the present embodiment is clear to those skilled in the art, so for the sake of brevity of description, detailed description is not repeated here.
Exemplary electronic device
The electronic device of the embodiment of the present application is described below with reference to fig. 4.
Fig. 4 illustrates a schematic structural diagram of an electronic device according to an embodiment of the present application.
Based on the inventive concept of a method for improving the security of an ultra-low delay encoder as in the previous embodiments, the present invention further provides a system for improving the security of an ultra-low delay encoder, wherein a computer program is stored thereon, which when executed by a processor, performs the steps of any one of the methods for improving the security of an ultra-low delay encoder as described above.
Where in fig. 4 a bus architecture (represented by bus 300), bus 300 may include any number of interconnected buses and bridges, bus 300 linking together various circuits including one or more processors, represented by processor 302, and memory, represented by memory 304. The bus 300 may also link together various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. A bus interface 306 provides an interface between the bus 300 and the receiver 301 and transmitter 303. The receiver 301 and the transmitter 303 may be the same element, i.e., a transceiver, providing a means for communicating with various other systems over a transmission medium.
The processor 302 is responsible for managing the bus 300 and general processing, and the memory 304 may be used for storing data used by the processor 302 in performing operations.
The embodiment of the invention provides a method for improving the confidentiality of an ultra-low time delay encoder, which comprises the following steps: obtaining first image information, wherein the first image information comprises a first scanning matrix and a second scanning matrix till an Nth scanning matrix; performing full search matching point scanning on the first scanning matrix, and after the first scanning matrix is searched, performing full search matching point scanning on the second scanning matrix until the first image information is scanned; generating a first identification code according to the first scanning matrix information, wherein the first identification code is in one-to-one correspondence with the first scanning matrix information; generating a second identification code according to the second scanning matrix information and the first identification code; by analogy, generating an Nth identification code according to the Nth scanning matrix information and the Nth-1 identification code, wherein N is a natural number greater than 1; respectively copying and storing all scanning matrixes and identification codes on M devices, wherein M is a natural number greater than 1; obtaining a first predetermined matching criterion; obtaining a first matching scanning matrix according to the first scanning matrix and the first preset matching criterion, wherein the first matching scanning matrix is in N scanning matrices; and obtaining a first motion vector according to the first scanning matrix and the first matching scanning matrix. The technical problem that the confidentiality of the ultra-low delay encoder cannot be guaranteed due to the lack of a mode for carrying out encryption protection on the delay encoder in the prior art is solved, and the technical effect of guaranteeing the confidentiality of the ultra-low delay encoder is achieved.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create a system for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including an instruction system which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks. While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (9)

1. A method of improving the privacy of an ultra-low latency encoder, wherein the method comprises:
obtaining first image information, wherein the first image information comprises a first scanning matrix and a second scanning matrix till an Nth scanning matrix;
performing full search matching point scanning on the first scanning matrix, and after the first scanning matrix is searched, performing full search matching point scanning on the second scanning matrix until the first image information is scanned;
generating a first identification code according to the first scanning matrix information, wherein the first identification code is in one-to-one correspondence with the first scanning matrix information;
generating a second identification code according to the second scanning matrix information and the first identification code; by analogy, generating an Nth identification code according to the Nth scanning matrix information and the Nth-1 identification code, wherein N is a natural number greater than 1;
respectively copying and storing all scanning matrixes and identification codes on M devices, wherein M is a natural number greater than 1;
obtaining a first predetermined matching criterion;
obtaining a first matching scanning matrix according to the first scanning matrix and the first preset matching criterion, wherein the first matching scanning matrix is in N scanning matrices;
and obtaining a first motion vector according to the first scanning matrix and the first matching scanning matrix.
2. The method of claim 1, wherein the obtaining first image information including a first scan matrix, a second scan matrix, and up to an nth scan matrix comprises:
obtaining a first scanning matrix, wherein the first scanning matrix is an initial matrix of the first image information;
obtaining a first arrangement mode;
and obtaining a second scanning matrix till an Nth scanning matrix according to the first scanning matrix and the first arrangement mode, wherein the Nth scanning matrix is a scanning matrix adjacent to the Nth-1 scanning matrix.
3. The method of claim 2, wherein the obtaining the first image information, the first image information comprising the first scan matrix, the second scan matrix, and up to after the nth scan matrix comprises:
according to the first image information, obtaining a matching point set in the first image information, wherein matching points in the matching point set are uniformly distributed in the first image information;
obtaining a predetermined matrix model;
and obtaining the matching points of the Nth scanning matrix according to the matching point set and the preset matrix model.
4. The method of claim 3, wherein the method comprises:
and inputting the matching point set as first input information and the predetermined matrix model as second input information into a training model, wherein the training model is obtained by training a plurality of groups of training data, and each group of training data in the plurality of groups of training data comprises: the matching point set, the predetermined matrix model and identification information used for identifying whether the matching point is an Nth scanning matrix matching point;
and obtaining output information of the training model, wherein the output information comprises a first output result and a second output result, the first output result is a result of a matching point of the Nth scanning matrix, and the second output result is a result of a matching point which is not the Nth scanning matrix.
5. The method of claim 4, wherein the method comprises:
taking the matching point set as an abscissa;
taking the predetermined matrix model as a vertical coordinate;
obtaining a logistic regression line according to the abscissa and the ordinate by adopting a logistic regression model, wherein the logistic regression line comprises a first position and a first angle, and the first position and the first angle are located in a coordinate system constructed by the abscissa and the ordinate; wherein one side of the logistic regression line represents a first output result and the other side of the logistic regression line represents a second output result, wherein the first output result and the second output result are different.
6. The method of claim 1, wherein the method comprises:
taking the Nth scanning matrix and the Nth-1 verification code as an Nth block;
obtaining the recording time of the Nth block, wherein the recording time of the Nth block represents the time required to be recorded by the Nth block;
obtaining the first equipment with the fastest operational capability in the M pieces of equipment according to the recording time of the Nth block;
and sending the recording right of the Nth block to the first equipment.
7. The method of claim 1, wherein the method comprises:
obtaining a first reference pixel;
performing intra-frame prediction on the first scanning matrix according to the first reference pixel to obtain a first reconstructed pixel;
taking the first reconstructed pixel as a second reference pixel of the second scanning matrix;
until the N-1 scanning matrix is subjected to intra-frame prediction according to the N-1 reference pixel, and an N-1 reconstruction pixel is obtained;
and taking the N-1 th reconstructed pixel as an N reference pixel of the N scanning matrix.
8. A system for improving the security of an ultra-low latency encoder, wherein the system comprises:
a first obtaining unit, configured to obtain first image information, where the first image information includes a first scanning matrix, a second scanning matrix, and up to an nth scanning matrix;
the first scanning unit is used for carrying out full search matching point scanning on the first scanning matrix, and after the first scanning matrix is searched, the second scanning matrix is carried out with full search matching point scanning until the first image information is scanned;
a second obtaining unit, configured to generate a first identification code according to the first scanning matrix information, where the first identification code corresponds to the first scanning matrix information one to one;
a third obtaining unit, configured to generate a second identification code according to the second scanning matrix information and the first identification code; by analogy, generating an Nth identification code according to the Nth scanning matrix information and the Nth-1 identification code, wherein N is a natural number greater than 1;
the first storage unit is used for respectively copying and storing all the scanning matrixes and the identification codes on M devices, wherein M is a natural number greater than 1;
a fourth obtaining unit for obtaining a first predetermined matching criterion;
a fifth obtaining unit, configured to obtain a first matching scanning matrix according to the first scanning matrix and the first predetermined matching criterion, where the first matching scanning matrix is in N scanning matrices;
a sixth obtaining unit, configured to obtain a first motion vector according to the first scanning matrix and the first matching scanning matrix.
9. A system for improving the security of an ultra-low latency encoder comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the method of any one of claims 1 to 7 when executing the program.
CN202011281647.8A 2020-11-17 2020-11-17 Method and system for improving security of ultra-low time delay encoder Active CN112104870B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011281647.8A CN112104870B (en) 2020-11-17 2020-11-17 Method and system for improving security of ultra-low time delay encoder

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011281647.8A CN112104870B (en) 2020-11-17 2020-11-17 Method and system for improving security of ultra-low time delay encoder

Publications (2)

Publication Number Publication Date
CN112104870A CN112104870A (en) 2020-12-18
CN112104870B true CN112104870B (en) 2021-04-06

Family

ID=73784591

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011281647.8A Active CN112104870B (en) 2020-11-17 2020-11-17 Method and system for improving security of ultra-low time delay encoder

Country Status (1)

Country Link
CN (1) CN112104870B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1450495A (en) * 2002-03-29 2003-10-22 佳能株式会社 Image process device and method
CN106231356A (en) * 2016-08-17 2016-12-14 腾讯科技(深圳)有限公司 The treating method and apparatus of video
WO2017138417A1 (en) * 2016-02-08 2017-08-17 シャープ株式会社 Motion vector generation device, prediction image generation device, moving image decoding device, and moving image coding device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1450495A (en) * 2002-03-29 2003-10-22 佳能株式会社 Image process device and method
WO2017138417A1 (en) * 2016-02-08 2017-08-17 シャープ株式会社 Motion vector generation device, prediction image generation device, moving image decoding device, and moving image coding device
CN106231356A (en) * 2016-08-17 2016-12-14 腾讯科技(深圳)有限公司 The treating method and apparatus of video

Also Published As

Publication number Publication date
CN112104870A (en) 2020-12-18

Similar Documents

Publication Publication Date Title
Shang et al. Bilinear factor matrix norm minimization for robust PCA: Algorithms and applications
CN110929886B (en) Model training and predicting method and system
Wen et al. Lag synchronization of switched neural networks via neural activation function and applications in image encryption
Bulat et al. Two-stage convolutional part heatmap regression for the 1st 3d face alignment in the wild (3dfaw) challenge
Suykens et al. Recurrent least squares support vector machines
CN110704850B (en) Artificial intelligence AI model operation method and device
Kalm et al. Visual recency bias is explained by a mixture model of internal representations
CN109949219B (en) Reconstruction method, device and equipment of super-resolution image
Shang et al. Robust principal component analysis with missing data
US10776662B2 (en) Weakly-supervised spatial context networks to recognize features within an image
CN110288614B (en) Image processing method, device, equipment and storage medium
WO2015125714A1 (en) Method for solving convex quadratic program for convex set
CN115174191B (en) Local predicted value safe transmission method, computer equipment and storage medium
CN112232426A (en) Training method, device and equipment of target detection model and readable storage medium
CN111784818B (en) Method, apparatus and computer readable storage medium for generating three-dimensional mannequin
CN112115811A (en) Image processing method and device based on privacy protection and electronic equipment
CN112104870B (en) Method and system for improving security of ultra-low time delay encoder
Bakkouri et al. Machine learning-based fast CU size decision algorithm for 3D-HEVC inter-coding
CN114510867A (en) 3D simulation power distribution cabinet circuit wiring method and system
US11829468B2 (en) Neural network confidentiality
CN116781369B (en) Image encryption method and system based on parameter uncertainty inertial neural network
US20230342626A1 (en) Model processing method and related apparatus
Guo et al. Fuzzy symmetric solutions of fuzzy matrix equations
CN117034307A (en) Data encryption method, device, computer equipment and storage medium
CN116306905A (en) Semi-supervised non-independent co-distributed federal learning distillation method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant