CN112686199A - Method and system for carrying out safety alarm through encrypted image - Google Patents

Method and system for carrying out safety alarm through encrypted image Download PDF

Info

Publication number
CN112686199A
CN112686199A CN202110022220.4A CN202110022220A CN112686199A CN 112686199 A CN112686199 A CN 112686199A CN 202110022220 A CN202110022220 A CN 202110022220A CN 112686199 A CN112686199 A CN 112686199A
Authority
CN
China
Prior art keywords
image information
cloud
camera
information
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110022220.4A
Other languages
Chinese (zh)
Inventor
余承富
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Haique Technology Co ltd
Original Assignee
Shenzhen Haique Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Haique Technology Co ltd filed Critical Shenzhen Haique Technology Co ltd
Priority to CN202110022220.4A priority Critical patent/CN112686199A/en
Publication of CN112686199A publication Critical patent/CN112686199A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Alarm Systems (AREA)

Abstract

The application provides a method and a system for carrying out safety alarm through an encrypted image, wherein the method comprises the following steps: the method comprises the steps that image information is sent to a cloud end by a camera device, wherein the image information is encrypted three-dimensional image information; the cloud end inputs the image information into a special event recognition model to obtain an event type corresponding to the image information; under the condition that the event type is a special event, the cloud end sends an alarm prompt to the terminal equipment; and the terminal equipment receives the alarm prompt sent by the cloud.

Description

Method and system for carrying out safety alarm through encrypted image
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and a system for performing security alarm through an encrypted image.
Background
With the rapid development of machine vision technology, surveillance cameras are widely applied to various fields such as industry, security and the like, so that detection and judgment by using machines instead of human eyes become possible. For example, crime can be prevented by installing a monitoring camera in some public places, the property and the safety of people can be effectively guaranteed, enterprise managers can conveniently know the working progress and condition in time, and the working efficiency is improved. However, the privacy security of an enterprise or an individual may be affected while monitoring is performed, and therefore how to realize monitoring of a target object is still a problem that needs to be solved under the condition that the privacy of the enterprise and the individual is ensured.
Disclosure of Invention
The embodiment of the application discloses a method and a system for carrying out safety alarm through an encrypted image.
In a first aspect, the present application provides a method for performing security alarm through an encrypted image, including:
the method comprises the steps that image information is sent to a cloud end by a camera device, wherein the image information is encrypted three-dimensional image information;
the cloud end inputs the image information into a special event recognition model to obtain an event type corresponding to the image information;
under the condition that the event type is a special event, the cloud end sends an alarm prompt to the terminal equipment;
and the terminal equipment receives the alarm prompt sent by the cloud.
In the method, the cloud end utilizes the special event identification model to identify and judge the encrypted three-dimensional image information so as to determine whether the event type corresponding to the encrypted three-dimensional image information is a special event or not, and when the event type corresponding to the encrypted three-dimensional image information is the special event, the cloud end sends an alarm prompt to the terminal equipment, so that a worker can know the position of the special event in time, and the worker can conveniently make corresponding measures according to the type of the special event. Therefore, the method for carrying out safety alarm through the encrypted image can realize the monitoring of the user on the premise of protecting the privacy of the user so as to ensure the personal safety of the user.
In this embodiment of the application, before the image capturing apparatus sends the image information to the cloud, the method further includes: the camera shooting equipment shoots a target area to obtain plane image information; the image pickup equipment carries out three-dimensional reconstruction on the plane image information to obtain three-dimensional image information; the image pickup apparatus encrypts the three-dimensional image information with a preset key to obtain the image information.
The image pickup device can acquire the encrypted three-dimensional image information by performing three-dimensional reconstruction and image encryption processing on the planar image information acquired by shooting, and then sends the encrypted three-dimensional image information to the cloud for identification and judgment. According to the method, the encrypted three-dimensional image information is utilized, the privacy safety of the user is further guaranteed, the three-dimensional image information expresses the characteristics of the target area more visually and comprehensively, and the accuracy and the efficiency of the cloud identification result are improved.
In this embodiment of the application, before the image capturing apparatus sends the image information to the cloud, the method further includes: the terminal device sends a monitoring request to the cloud, wherein the monitoring request is a request for the terminal device to monitor the target area, and the monitoring request comprises identification information of the terminal device and identification information of the camera shooting device for shooting the target area; and the cloud end receives the monitoring request sent by the terminal equipment and stores the identification information of the camera equipment and the identification information of the terminal equipment in an associated manner.
The cloud end carries out association storage on the identification information of the camera equipment and the identification information of the terminal equipment, so that the cloud end can conveniently and directly determine the camera equipment associated with the terminal equipment according to the monitoring request, the communication time between the terminal equipment and the camera equipment is shortened, and the efficiency of obtaining the warning prompt by the working personnel is improved.
In this embodiment of the application, when the event type is a special event, the sending, by the cloud, an alarm prompt to the terminal device includes: the cloud end obtains the position information of the target area shot by the camera equipment according to the identification information of the camera equipment; and the cloud end sends the event type corresponding to the image information and the position information of the target area to the terminal equipment.
Therefore, when the cloud determines that the event type corresponding to the encrypted three-dimensional image information is a special event, the cloud directly sends an alarm prompt to the terminal device. According to the method, the encrypted three-dimensional image information does not need to be decrypted and restored in the terminal equipment or the cloud, so that the privacy safety of the user is improved, meanwhile, the worker can know the place where the special event occurs and the type of the special event in time, the worker can conveniently take corresponding measures, and the working efficiency is greatly improved.
In an embodiment of the present application, the method further includes: training a neural network by using a sample set to obtain a special event recognition model, wherein the sample set comprises image information samples and corresponding event type samples, and the image information samples are obtained by encrypting three-dimensional image information samples through the preset secret key.
Therefore, the encrypted three-dimensional image information is identified and judged by using a large number of known image information samples and a special event identification model obtained by corresponding event type sample training, so that the accuracy of an identification result is improved, and the efficiency of workers is further improved.
In a second aspect, the present application provides a system for performing security alarm through encrypted images, comprising a camera device, a cloud, and a terminal device, wherein,
the camera device is used for sending image information to the cloud, wherein the image information is encrypted three-dimensional image information;
the cloud is used for inputting the image information into a special event recognition model so as to obtain an event type corresponding to the image information; sending an alarm prompt to the terminal equipment under the condition that the event type is a special event;
and the terminal equipment is used for receiving the alarm prompt sent by the cloud end.
In the system, the camera device sends image information to the cloud, the cloud judges the image information after receiving the image information, so that whether a special event is expressed in the image information or not is obtained, and if the special event is expressed, the cloud sends an alarm prompt to the terminal device. Therefore, when the system is used for monitoring the target area, the privacy safety of the user can be effectively guaranteed, and meanwhile, the safety protection of the target area is greatly improved.
In this embodiment of the application, before the image capturing apparatus sends the image information to the cloud, the image capturing apparatus is further configured to: shooting a target area to obtain plane image information; performing three-dimensional reconstruction on the plane image information to obtain three-dimensional image information; and encrypting the three-dimensional image information by using a preset key to obtain the image information.
The image information is subjected to three-dimensional reconstruction and image encryption by the image pickup equipment, so that the data security of the image information is further enhanced, and the privacy of a user is protected.
In this embodiment of the application, before the image pickup device sends image information to a cloud, the terminal device is further configured to send a monitoring request to the cloud, where the monitoring request is a request for the terminal device to monitor the target area, and the monitoring request includes identification information of the terminal device and identification information of the image pickup device that captures the target area; and the cloud is also used for receiving the monitoring request sent by the terminal equipment and storing the identification information of the camera equipment and the identification information of the terminal equipment in an associated manner.
The terminal equipment and the camera equipment are communicated through the cloud end, when the terminal equipment needs to monitor a target area, the result fed back by the camera equipment for shooting the target area can be directly sent to the terminal equipment through the cloud end, the time for artificially judging image information is saved, and meanwhile the privacy safety of a user is improved.
In this embodiment of the application, in a case that the event type is a special event, the cloud is further configured to: acquiring the position information of the target area according to the identification information of the camera equipment; and sending the event type corresponding to the image information and the position information of the target area to the terminal equipment.
Therefore, when a special event occurs in the area, the cloud can timely send the position of the area and the occurred special event to the terminal equipment, so that the alarm efficiency is improved, and the privacy safety of a user is protected.
In an embodiment of the present application, the image capturing apparatus is further configured to: training a neural network by using a sample set to obtain a special event recognition model, wherein the sample set comprises image information samples and corresponding event type samples, and the image information samples are obtained by encrypting three-dimensional image information samples through the preset secret key.
The method has the advantages that the image pickup equipment trains the neural network by using a large number of image information samples and corresponding event type samples, so that the special event recognition model is obtained, and the accuracy of the result obtained when the image information of the target area is recognized by using the special event recognition model is greatly improved. In addition, because image information does not need to be decrypted in the identification process, the privacy and the safety of the user are protected.
In a third aspect, the present application provides a computer-readable storage medium storing a computer program which, when executed by hardware (e.g. a processor, etc.), implements the method as described in the first aspect or any specific implementation manner of the first aspect.
In a fourth aspect, the present application provides a computer program product comprising instructions for causing a system for security alerting by means of an encrypted image according to the second aspect to perform the method according to the first aspect or any specific implementation manner of the first aspect.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flowchart of a method for acquiring an encrypted three-dimensional image according to an embodiment of the present application;
FIG. 2 is a flowchart illustrating a method for performing security alarm through an encrypted image according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a system for performing security alarm through an encrypted image according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an image pickup apparatus provided in an embodiment of the present application;
fig. 5 is a schematic structural diagram of a cloud according to an embodiment of the present disclosure;
fig. 6 is a schematic structural diagram of a terminal device according to an embodiment of the present application;
Detailed Description
The technical solutions in the embodiments of the present application are clearly and completely described below with reference to the drawings in the embodiments of the present application. It is to be understood that the terminology used in the examples section of the present application is for the purpose of describing particular embodiments of the present application only and is not intended to be limiting of the application. The embodiments described herein are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without inventive step, are within the scope of the present disclosure.
The application provides a method for carrying out safety alarm through an encrypted image, so that whether an abnormal event occurs in a monitoring area or not is identified under the condition of ensuring privacy. Next, a detailed description will be given of an encrypted image for security alerting according to an embodiment of the present application.
Generally, an image captured by an image capturing apparatus is a planar image, and the planar image generally reflects only a two-dimensional relationship between the top and bottom and the left and right of an object, that is, the planar image can only convey surface layer information of the object. Compared with a plane image, a three-dimensional image carries more information (e.g., the spatial relationship of an object), so that the three-dimensional image can reflect the deep information of the object, for example, the plane image of a football is a circle, the three-dimensional image is a sphere, the circle can only reflect one surface of the football, and the sphere can reflect the outline, size and shape of the football. Therefore, the embodiment of the application restores the real scene of the target monitoring area by using the three-dimensional image information, so as to obtain the information such as the position, the posture, the three-dimensional contour and the like of the person in the monitoring area, and then accurately judges whether the abnormal event occurs in the monitoring area by using the information.
In the embodiment of the present application, in order to avoid the three-dimensional image information from being illegally browsed or processed during storage, transmission, and use, the image capturing apparatus also needs to perform encryption processing on the three-dimensional image information.
Referring to fig. 1, fig. 1 is a schematic flow chart of a method for acquiring an encrypted three-dimensional image according to the present application, which includes, but is not limited to, the following steps:
s101, shooting a target area by the image pickup equipment to obtain plane image information.
Specifically, when the image pickup apparatus detects that a target person enters a monitoring area of the image pickup apparatus, the image pickup apparatus starts a shooting mode, and then the image pickup apparatus extracts multi-frame planar image information from a shot video at preset sampling intervals. It should be noted that the multi-frame plane image information is plane image information at different angles, that is, the image capturing apparatus needs to capture the target monitoring area at different angles, so as to obtain plane image information at different angles.
It can be understood that the multiple frames of plane images at different angles may be captured by one image capturing device, or may be captured by multiple image capturing devices, and the present application is not limited specifically. Under the condition that one camera device is installed in the target monitoring area, the camera device enables the camera to rotate by a certain angle or move by a certain distance by controlling the holder, so that the target monitoring area is shot at different angles. In the case where a plurality of image pickup apparatuses are installed in the target monitoring area and the image pickup apparatuses are respectively installed at different corners of the target monitoring area, it is possible to obtain multi-frame plane images at different shooting angles at the same time. Here, at least one of the plurality of image pickup apparatuses has an image processing function to receive the planar images transmitted from the other image pickup apparatuses and process the received multi-frame planar images.
S102, the image pickup equipment carries out three-dimensional reconstruction on the plane image information to obtain three-dimensional image information.
In the embodiment of the application, the three-dimensional image information is obtained by performing three-dimensional reconstruction on planar images of a plurality of frames of target areas shot at different angles, wherein the three-dimensional image information is three-dimensional contour information, for example, human contour information of a target person in the target area, in other words, the three-dimensional image only displays the contour of the target person, and does not display specific five-sense organ features or appearance features of the target person, so that the privacy and safety of the target person are protected.
In one possible embodiment, the three-dimensional reconstruction of the planar image information is as follows:
the method comprises the steps that firstly, the camera equipment obtains n sections of videos shot at n different angles, wherein n is larger than or equal to 2, each section of video in the n sections of videos is composed of video frames at different moments, and each video frame is a plane image and is used for reflecting the condition of a target area at the current moment.
And step two, the camera equipment extracts a plane image at a preset moment from each of the n sections of videos to obtain n plane images, wherein the n plane images reflect n target areas with different angles.
And step three, the camera equipment respectively extracts m characteristic points of each plane image in the n plane images, so that n multiplied by m characteristic points are obtained.
The feature points include feature points of a person in the target area, feature points of an object, relative positions between the person and the object, and the like. Taking the feature points of the person as an example, the feature points of the person in the region include a head vertex, a shoulder peak point, or a joint point, and the like.
In a specific embodiment of the present application, the feature points of the person in the target region may be extracted by using a key point detection model or by using a Harris feature extraction operator, which is not specifically limited herein.
And step four, the image pickup equipment matches the n multiplied by m characteristic points, namely, the corresponding relation of the same characteristic point in the n plane images is determined, so that the corresponding relation between the plane images of n angles is established.
And step five, the image pickup equipment calculates the position of each matching point in the three-dimensional space according to the coordinate of each matching point between the n plane images in the corresponding image and the distance between the image pickup equipment, so that the three-dimensional scene in the plane images is recovered, and the three-dimensional image information of the target area is obtained.
It should be noted that the above method for three-dimensionally reconstructing the planar image captured by the image capturing apparatus may be a binocular vision algorithm, or may also be a motion recovery shape algorithm or a contour recovery shape algorithm, and an appropriate three-dimensional reconstruction method may be selected according to an actual use situation, and the embodiment of the present application is not particularly limited.
S103, the image pickup device encrypts the three-dimensional image information by using a preset key, so that the encrypted three-dimensional image information is obtained.
In one possible embodiment, the camera device encrypts the entire three-dimensional image using a homomorphic encryption algorithm. In order to enhance the security effect, the three-dimensional image is scrambled before the image is encrypted, so that the three-dimensional image is converted into a scrambled and illegible image,
step one, the camera shooting equipment is used for shooting according to a preset secret key (x)0,y0,z0) Solving the chaotic system to obtain a chaotic encryption sequence (x) corresponding to the three-dimensional imagei,yi,zi)。
Wherein, the size of the three-dimensional image is p × q, that is, the three-dimensional image has p × q pixel points, chaotic sequence (x × q)i,yi,zi) Can be expressed as { xi|i=1,2,...,p×q},{yi|i=1,2,...,p×q},{zi|i=1,2,...,p×q}。
Step two, the camera device utilizes y in the chaos encryption sequenceiThe i ═ 1, 2.,. p × q } sequence scrambles each row of pixel points in p rows in the three-dimensional image, and a first scrambled image is obtained.
Thirdly, the camera device utilizes z in the chaos encryption sequenceiAnd scrambling each row of pixel points in the q rows in the first scrambled image by using the i ═ 1, 2.
Fourthly, the camera device utilizes { x in the chaotic encryption sequenceiAnd performing exclusive-or operation on the i ═ 1, 2.,. p × q } sequence and each pixel point in the second scrambled image to obtain the encrypted three-dimensional image.
Step five, the camera shooting equipment sets a key (x) through an RSA algorithm0,y0,z0) Encrypting to generate private key (x)0′,y0′,z0′)。
Optionally, the camera device sends the private key to other devices, so that the other devices can decrypt the encrypted three-dimensional image information by using the private key to obtain the three-dimensional image.
It is understood that the above-mentioned encryption process of the three-dimensional image is only an example, and in practical applications, the encryption method may also be in other forms, for example, the chaotic system may be a Lorenz system, and may also be a Chua system, and so on. The encryption mode of the preset key can be an RSA encryption algorithm, a pailler algorithm, or the like. In addition, the three-dimensional image information may also be encrypted based on other encryption algorithms (e.g., AES algorithm), and the like, which is not specifically limited herein.
In another possible embodiment, in order to reduce the workload of the image capturing apparatus, the image capturing apparatus may encrypt only a privacy area in the three-dimensional image, where the privacy area is an area with strong privacy and may be harmful after leakage, for example, five sense organs of a human face, a private part of a human body, and the like. It can be understood that the encryption process of the privacy area by the image capturing apparatus is similar to the encryption process of the entire three-dimensional image by the image capturing apparatus, and for simplicity, the details are not repeated here.
In addition, it should be noted that the above-mentioned image pickup apparatus may be a general image pickup apparatus, and may also be a 3D image pickup apparatus, and is not particularly limited herein. When the image pickup apparatus is a 3D image pickup apparatus, a three-dimensional image of the target area can be directly picked up.
Referring to fig. 2, fig. 2 is a method for performing security alarm through an encrypted image according to the present application. As shown in fig. 2, the method for performing security alarm through encrypted image according to the embodiment of the present application includes, but is not limited to, the following steps:
s201, the terminal equipment sends a monitoring request to the cloud.
The monitoring request is a request of the terminal device for monitoring the target area, and the monitoring request comprises identification information of the terminal device and identification information of the camera device for shooting the target area.
S202, the cloud receives the monitoring request sent by the terminal equipment, and the camera equipment identification information and the terminal equipment identification information are stored in an associated mode.
And S203, the camera device sends image information to the cloud.
The image information is encrypted three-dimensional image information, and the encrypted three-dimensional image information may be image information obtained by encrypting the whole three-dimensional image, or image information obtained by encrypting a privacy area in the three-dimensional image, and is not limited in this respect.
And S204, the cloud inputs the image information into the special event recognition model to obtain an event type corresponding to the image information.
In a possible embodiment, the special event recognition model may be expressed as:
y=Recognition(x)
wherein x is the image information, y is the Recognition result of the event type corresponding to the image information, and Recognition () represents the mapping relationship between the image information and the Recognition result of the event type corresponding to the image information.
In a specific embodiment, a special event Recognition model Recognition () may be obtained by training a neural network using a large sample set, where the sample set includes an image information sample and a corresponding event type sample, and the image information sample is obtained by encrypting a three-dimensional image information sample through a predetermined key. It is understood that the image information sample may include image information obtained by encrypting the entire three-dimensional image information sample by using the preset key, and may also include image information obtained by encrypting the privacy area in the entire three-dimensional image information sample by using the preset key.
S205, the cloud judges whether the event type corresponding to the image information is a special event. And executing S206 when the event type is a special event, otherwise returning to S203, and carrying out identification judgment on the image information at the next moment transmitted by the image pickup device.
S206, the cloud sends an alarm prompt to the terminal equipment.
In a specific embodiment of the application, before the cloud sends an alarm prompt to the terminal device, the cloud obtains position information of a target area according to identification information of the camera device; and then sending the event type corresponding to the image information and the position information of the target area to the terminal equipment.
And S207, after receiving the alarm prompt sent by the cloud, the terminal equipment makes corresponding measures according to the alarm prompt.
For example, a camera is installed in a target area, when a target object enters a monitoring area of the camera, the camera starts to shoot, and after a preset time, the camera moves to the left by a preset distance to continue shooting. Then, the camera can extract two frames of plane images with different angles according to the shot video, and the two frames of plane images are subjected to three-dimensional reconstruction and encryption to obtain encrypted three-dimensional image information. Then, the camera uploads the encrypted three-dimensional image information to the cloud, the cloud recognizes the encrypted three-dimensional image by using the special event model, and then the target object is obtained and falls down in the target area, and at the moment, the cloud sends an alarm prompt to a worker to inform the worker of the specific position of the target object, so that the worker can help the target object in time.
It should be noted that, for simplicity, the detailed description of the acquisition of the image information is not provided in this embodiment, and refer to fig. 1 and the description of the related embodiment.
The method can directly perform safety judgment on the target area according to the encrypted three-dimensional image information, and can obtain the safety alarm prompt without decrypting the encrypted three-dimensional image information in the judgment process.
Referring to fig. 3, fig. 3 is a schematic structural diagram of a system 300 for performing security alarm through encrypted images according to the present application. The security alarm system 300 of the embodiment of the application includes a camera 310, a cloud 320, and a terminal 330, where the camera 310 is associated with the terminal 330 through the cloud 320. In particular, the amount of the solvent to be used,
the camera device 310 is configured to send image information to the cloud 320, where the image information is encrypted three-dimensional image information;
the cloud 320 is used for inputting the image information into the special event identification model to obtain an event type corresponding to the image information; and, in case the event type is a special event, an alarm prompt is sent to the terminal device 330;
the terminal device 330 is configured to receive an alarm prompt sent by the cloud 320.
In a possible embodiment, before the camera device sends the image information to the cloud, the camera device 310 is further configured to: shooting a target area to obtain plane image information; performing three-dimensional reconstruction on the plane image information to obtain three-dimensional image information; and encrypting the three-dimensional image information by using a preset key to obtain the image information.
In a possible embodiment, before the image capturing apparatus sends the image information to the cloud, the terminal apparatus 330 is further configured to send a monitoring request to the cloud 320, where the monitoring request is a request for the terminal apparatus 330 to monitor a target area, and the monitoring request includes identification information of the terminal apparatus 330 and identification information of the image capturing apparatus 310 that captures the target area; the cloud 320 is further configured to receive a monitoring request sent by the terminal device 330, and store the identification information of the camera device 310 and the identification information of the terminal device 330 in an associated manner.
In a possible embodiment, in the case that the event type is a special event, the cloud 320 is further configured to: obtaining position information of the target area according to the identification information of the image pickup apparatus 310; the event type corresponding to the image information and the position information of the target area are transmitted to the terminal device 330.
In one possible embodiment, the image capture device 310 is further configured to: training the neural network by using a sample set to obtain a special event recognition model, wherein the sample set comprises an image information sample and a corresponding event type sample, and the image information sample is obtained by encrypting a three-dimensional image information sample through a preset key.
It should be noted that, for simplicity, the detailed description of the acquisition of the image information is not provided in this embodiment, and refer to fig. 1 and the description of the related embodiment.
In the above-mentioned system of giving an alarm through the image after encrypting, camera equipment sends the encrypted three-dimensional image information who obtains to the high in the clouds, and the high in the clouds discerns the back to encrypted three-dimensional image information, sends the terminal equipment with the special event be the recognition result for the staff of terminal equipment end can in time learn the position of taking place special event and the special event type that corresponds, has also avoided revealing problem of user's privacy when improving safety protection.
The following describes the camera device 310, the cloud 320, and the terminal device 330 according to the embodiment of the present application.
Referring to fig. 4, fig. 4 is a schematic structural diagram of a possible image capturing apparatus 310 provided by the present application. The camera device 310 in the embodiment of the present application integrates multiple functions of video capture, image processing (e.g., three-dimensional reconstruction, image encryption), encoding compression, front-end storage, and network transmission, and specifically includes at least one of the following functions: a lens unit 311, an image sensor 312, an analog-to-digital conversion unit 313, an image processing unit 314, a control unit 315, a communication interface 316, and a storage unit 317.
The lens unit 311 is configured with a lens control unit for controlling the lens to move left and right and rotate at multiple angles. The image sensor 312 converts the captured image light signal into an electric signal. The analog-to-digital conversion unit 313 converts the electric signal into a digital signal, and then sends the digital signal to the image processing unit 314. The image processing unit 314 is used for performing optical correction, three-dimensional image reconstruction, image encryption and the like.
The control unit 315 has functions of video output, a network communication interface, a serial communication interface, and the like, and the control unit 315 is further configured to call a corresponding program in the storage unit 317 to control the image processing unit to obtain encrypted three-dimensional image information.
The communication interface 316 may be a wired interface, such as an ethernet interface, a Local Interconnect Network (LIN) interface, and a FlexRay interface, or a wireless interface, such as a cellular network interface or a wireless lan interface, for communicating with other modules or devices. For example, in the embodiment of the present application, the communication interface 316 may be specifically configured to receive image data sent by an external other image capturing device (e.g., a camera), receive external parameters of the camera input by an external input device, and receive internal parameters such as a focal length.
The storage unit 317 is coupled to the other units for storing various data (e.g., image information, optical correction data, or camera internal and external parameters, etc.), various software programs, and/or sets of program instructions (e.g., three-dimensional image reconstruction algorithms, image encryption algorithms, etc.). In particular implementations, storage unit 317 may include high speed random access memory and may also include non-volatile memory, such as one or more magnetic disk storage devices, flash memory devices, or other non-volatile solid state storage devices.
It should be noted that the camera 310 may include more or less components than those shown in fig. 4, or have a different component configuration, and the description thereof is omitted here.
Referring to fig. 5, fig. 5 is a schematic structural diagram of a cloud 320 provided in the present application. The cloud 320 in the embodiment of the present application includes: a processor 321, a memory 322 (one or more computer-readable storage media), a communication interface 323, and the processor 321, the memory 322 and the communication interface 323 are coupled by a bus 324, which may be, in particular,
the processor 321 may be one or more Central Processing Units (CPUs), and in the case that the processor 321 is one CPU, the CPU may be a single-core CPU or a multi-core CPU. The processor 321 is configured to read the program codes stored in the memory 322, and cooperate with the communication interface 323 to perform part or all of the steps of the methods performed by S202 and S204-S206 in the above embodiments of the present application.
The memory 322 may include, but is not limited to, Random Access Memory (RAM), erasable programmable read-only memory (EPROM), read-only memory (ROM), or portable read-only memory (CD-ROM), among others. The memory 322 is coupled to the processor 321 for storing various software programs and/or sets of instructions. In a specific implementation, the memory 322 stores therein image information, image capturing apparatus identification information, terminal apparatus identification information, and the like transmitted by the image capturing apparatus 310. The memory 322 may also store network communication programs that may be used to communicate with one or more camera devices 310, one or more terminal devices 330. The memory 322 may also store event-specific recognition model algorithms and the like.
The communication interface 323 may be a wired interface (e.g., an ethernet interface) or a wireless interface (e.g., a cellular network interface or using a wireless local area network interface) for communicating with other modules or devices.
The bus 324 may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The bus 324 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in FIG. 5, but this is not intended to represent only one bus or type of bus. In addition, the cloud 320 may include more or fewer components than illustrated in fig. 5, or have a different configuration of components.
Referring to fig. 6, fig. 6 is a schematic structural diagram of a terminal device 330 provided in the present application. As shown in fig. 6, the terminal device 330 according to the embodiment of the present application includes: processor 331, memory 332, and communication interface 333, and processor 331, memory 332, and communication interface 333 are coupled by a bus 334, specifically,
the processor 331 may be one or more Central Processing Units (CPUs), and in the case that the processor 331 is one CPU, the CPU may be a single-core CPU or a multi-core CPU. The processor 331 is configured to read the program code stored in the memory 332, and cooperate with the communication interface 333 to perform part or all of the steps of the methods executed by S201 and S207 in the above embodiments of the present application.
The memory 332 may include, but is not limited to, a Random Access Memory (RAM), an erasable programmable read-only memory (EPROM), a read-only memory (ROM), or a portable read-only memory (CD-ROM), among others. The memory 332 is coupled to the processor 331 for storing various software programs and/or sets of instructions. In a specific implementation, the memory 332 may store an alarm prompt sent by the cloud 320, and may also store a network communication program, where the network communication program may be used for communicating with the cloud 320, and the like.
The communication interface 333 may be a wired interface (e.g., an ethernet interface) or a wireless interface (e.g., a cellular network interface or using a wireless local area network interface) for communicating with other modules or devices. Optionally, the terminal device may further include an input/output interface 335, the input/output interface 335 is connected to an input/output device for receiving input information and outputting an operation result, and the input/output interface 750 may be a mouse, a keyboard, a touch screen, a display, or an optical drive.
The bus 334 may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The bus 334 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in FIG. 6, but this is not intended to represent only one bus or type of bus. In addition, terminal device 330 may contain more or fewer components than shown in FIG. 6, or have a different arrangement of components.
In the embodiment of the present application, the terminal device 330 may be an entity for receiving or transmitting signals on the user side, such as a new generation user equipment (gnee). A terminal device may also be called a terminal equipment (UE), an access terminal, a subscriber unit, a subscriber station, a mobile station, a remote terminal, a mobile device, a user terminal, a wireless communication device, a user agent, or a user equipment. The terminal device may be a Station (ST) in a Wireless Local Area Network (WLAN), and may be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA) device, a handheld device with wireless communication function, a computing device or other processing device connected to a wireless modem, a vehicle-mounted device, a wearable device, and a next-generation communication system, for example, a terminal device in a fifth-generation communication (5G) network or a Public Land Mobile Network (PLMN) network for future evolution, a terminal device in a new wireless (NR) communication system, and the like. By way of example, and not limitation, in embodiments of the present invention, the terminal device may also be a wearable device. Wearable equipment can also be called wearable intelligent equipment, is the general term of applying wearable technique to carry out intelligent design, develop the equipment that can dress to daily wearing, like glasses, gloves, wrist-watch, dress and shoes etc.. A wearable device is a portable device that is worn directly on the body or integrated into the clothing or accessories of the user. The wearable device is not only a hardware device, but also realizes powerful functions through software support, data interaction and cloud interaction. The generalized wearable smart device includes full functionality, large size, and can implement full or partial functionality without relying on a smart phone, such as: smart watches or smart glasses and the like, and only focus on a certain type of application functions, and need to be used in cooperation with other devices such as smart phones, such as various smart bracelets for physical sign monitoring, smart jewelry and the like.
The present application also provides a computer readable storage medium storing a computer program, which is executed by hardware (such as a processor) to implement part or all of the steps of any one of the methods performed by the system for security alarm through encrypted image 300 in the embodiments of the present application.
The present application further provides a computer program product comprising instructions for implementing some or all of the steps of any of the methods performed by the system for security alerting with encrypted images 300 in the embodiments of the present application when the computer program product is run on the system for security alerting with encrypted images 300.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the above computer program instructions are loaded and executed on a computer, the processes or functions described in the embodiments of the present application are wholly or partially generated. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by wire (e.g., coaxial cable, fiber optic, digital subscriber line) or wirelessly (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that includes one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., compact disk), or a semiconductor medium (e.g., solid state disk), among others.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the several embodiments provided in this application, it should be understood that the terms "comprises" and "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the present application herein is for the purpose of describing particular embodiments only, and is not intended to be limiting of the application. As used in the specification of the present application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the division of the above-described units is merely a logical division, and the actual implementation may have another division, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted or not executed. In addition, the indirect coupling or direct coupling or communication connection between each other shown or discussed may be through some interfaces, indirect coupling or communication connection of devices or units, and may be electrical or in other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the elements may be selected according to actual needs to achieve the purpose of the solution of the embodiments of the present application.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit may be stored in a computer-readable storage medium if it is implemented in the form of a software functional unit and sold or used as a separate product. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage media may include, for example: u disk, removable hard disk, read only memory, random access memory, magnetic or optical disk, etc.
While the invention has been described with reference to specific embodiments, the scope of the invention is not limited thereto, and those skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the invention. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A method for security alerting through an encrypted image, comprising:
the method comprises the steps that image information is sent to a cloud end by a camera device, wherein the image information is encrypted three-dimensional image information;
the cloud end inputs the image information into a special event recognition model to obtain an event type corresponding to the image information;
under the condition that the event type is a special event, the cloud end sends an alarm prompt to the terminal equipment;
and the terminal equipment receives the alarm prompt sent by the cloud.
2. The method of claim 1, wherein before the camera device sends image information to a cloud, the method further comprises:
the camera shooting equipment shoots a target area to obtain plane image information;
the image pickup equipment carries out three-dimensional reconstruction on the plane image information to obtain three-dimensional image information;
the image pickup apparatus encrypts the three-dimensional image information with a preset key to obtain the image information.
3. The method according to claim 1 or 2, wherein before the camera device sends image information to a cloud, the method further comprises:
the terminal device sends a monitoring request to the cloud, wherein the monitoring request is a request for the terminal device to monitor the target area, and the monitoring request comprises identification information of the terminal device and identification information of the camera shooting device for shooting the target area;
and the cloud end receives the monitoring request sent by the terminal equipment and stores the identification information of the camera equipment and the identification information of the terminal equipment in an associated manner.
4. The method according to any one of claims 1 to 3, wherein in a case that the event type is a special event, the cloud sending an alarm prompt to the terminal device includes:
the cloud end obtains the position information of the target area shot by the camera equipment according to the identification information of the camera equipment;
and the cloud end sends the event type corresponding to the image information and the position information of the target area to the terminal equipment.
5. The method of claim 4, further comprising:
the image pickup equipment trains a neural network by using a sample set to obtain a special event recognition model, wherein the sample set comprises image information samples and corresponding event type samples, and the image information samples are obtained by encrypting three-dimensional image information samples through the preset secret key.
6. A system for carrying out safety alarm through encrypted images is characterized by comprising a camera device, a cloud end and a terminal device, wherein,
the camera device is used for sending image information to the cloud, wherein the image information is encrypted three-dimensional image information;
the cloud is used for inputting the image information into a special event recognition model so as to obtain an event type corresponding to the image information; sending an alarm prompt to the terminal equipment under the condition that the event type is a special event;
and the terminal equipment is used for receiving the alarm prompt sent by the cloud end.
7. The system of claim 6, wherein before the camera device sends image information to a cloud, the camera device is further configured to:
shooting a target area to obtain plane image information;
performing three-dimensional reconstruction on the plane image information to obtain three-dimensional image information;
and encrypting the three-dimensional image information by using a preset key to obtain the image information.
8. The system of claim 6 or 7, wherein, before the camera device sends image information to a cloud,
the terminal device is further configured to send a monitoring request to the cloud, where the monitoring request is a request for the terminal device to monitor the target area, and the monitoring request includes identification information of the terminal device and identification information of the camera device that captures the target area;
and the cloud is also used for receiving the monitoring request sent by the terminal equipment and storing the identification information of the camera equipment and the identification information of the terminal equipment in an associated manner.
9. The system according to any one of claims 6 to 8, wherein in the case that the event type is a special event, the cloud is further configured to:
acquiring the position information of the target area according to the identification information of the camera equipment;
and sending the event type corresponding to the image information and the position information of the target area to the terminal equipment.
10. The system of claim 9, wherein the imaging device is further configured to:
training a neural network by using a sample set to obtain a special event recognition model, wherein the sample set comprises image information samples and corresponding event type samples, and the image information samples are obtained by encrypting three-dimensional image information samples through the preset secret key.
CN202110022220.4A 2021-01-07 2021-01-07 Method and system for carrying out safety alarm through encrypted image Pending CN112686199A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110022220.4A CN112686199A (en) 2021-01-07 2021-01-07 Method and system for carrying out safety alarm through encrypted image

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110022220.4A CN112686199A (en) 2021-01-07 2021-01-07 Method and system for carrying out safety alarm through encrypted image

Publications (1)

Publication Number Publication Date
CN112686199A true CN112686199A (en) 2021-04-20

Family

ID=75456404

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110022220.4A Pending CN112686199A (en) 2021-01-07 2021-01-07 Method and system for carrying out safety alarm through encrypted image

Country Status (1)

Country Link
CN (1) CN112686199A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115037863A (en) * 2022-06-28 2022-09-09 广东电网有限责任公司 Power distribution network operation and maintenance system and method for uploading operation images

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107632565A (en) * 2017-08-28 2018-01-26 上海欧忆能源科技有限公司 Power construction building site intellectualized management system and method
CN108877221A (en) * 2018-07-06 2018-11-23 北京中交华安科技有限公司 A kind of highway collision accident detection method and system
CN110189524A (en) * 2019-06-19 2019-08-30 刘先进 A kind of active violation recognition methods, system and electronic equipment violating the regulations
CN110363426A (en) * 2019-07-15 2019-10-22 软通动力信息技术有限公司 A kind of long-range enforcement approach of cloud platform, device, server and storage medium
CN110543901A (en) * 2019-08-22 2019-12-06 阿里巴巴集团控股有限公司 image recognition method, device and equipment
CN110796015A (en) * 2019-09-27 2020-02-14 深圳市大拿科技有限公司 Remote monitoring method and device
CN111063144A (en) * 2019-12-03 2020-04-24 联通物联网有限责任公司 Abnormal behavior monitoring method, device, equipment and computer readable storage medium
CN111274601A (en) * 2020-03-23 2020-06-12 上海金桥信息股份有限公司 Image security identification system and method under network environment
CN111292504A (en) * 2020-01-23 2020-06-16 深圳市大拿科技有限公司 Method and system for carrying out safety alarm through image identification
CN111294482A (en) * 2020-01-23 2020-06-16 深圳市大拿科技有限公司 Image processing method and system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107632565A (en) * 2017-08-28 2018-01-26 上海欧忆能源科技有限公司 Power construction building site intellectualized management system and method
CN108877221A (en) * 2018-07-06 2018-11-23 北京中交华安科技有限公司 A kind of highway collision accident detection method and system
CN110189524A (en) * 2019-06-19 2019-08-30 刘先进 A kind of active violation recognition methods, system and electronic equipment violating the regulations
CN110363426A (en) * 2019-07-15 2019-10-22 软通动力信息技术有限公司 A kind of long-range enforcement approach of cloud platform, device, server and storage medium
CN110543901A (en) * 2019-08-22 2019-12-06 阿里巴巴集团控股有限公司 image recognition method, device and equipment
CN110796015A (en) * 2019-09-27 2020-02-14 深圳市大拿科技有限公司 Remote monitoring method and device
CN111063144A (en) * 2019-12-03 2020-04-24 联通物联网有限责任公司 Abnormal behavior monitoring method, device, equipment and computer readable storage medium
CN111292504A (en) * 2020-01-23 2020-06-16 深圳市大拿科技有限公司 Method and system for carrying out safety alarm through image identification
CN111294482A (en) * 2020-01-23 2020-06-16 深圳市大拿科技有限公司 Image processing method and system
CN111274601A (en) * 2020-03-23 2020-06-12 上海金桥信息股份有限公司 Image security identification system and method under network environment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115037863A (en) * 2022-06-28 2022-09-09 广东电网有限责任公司 Power distribution network operation and maintenance system and method for uploading operation images

Similar Documents

Publication Publication Date Title
EP3241183A1 (en) Method for determining the position of a portable device
JP2010081480A (en) Portable suspicious individual detecting apparatus, suspicious individual detecting method, and program
CN107113354A (en) Communication system including headset equipment
KR20120052637A (en) Object tracking apparatus and method of camera and secret management system
CN111353336B (en) Image processing method, device and equipment
CN111294482B (en) Image processing method and system
CN112085647B (en) Face correction method and electronic equipment
WO2020011016A1 (en) Iris information leakage prevention method and apparatus, and electronic device
CN105022946A (en) Face decryption method and device
CN111931145A (en) Face encryption method, face recognition method, face encryption device, face recognition device, electronic equipment and storage medium
CN112686199A (en) Method and system for carrying out safety alarm through encrypted image
KR20130114037A (en) Masking and recovering method of privacy region
JP7456446B2 (en) Image processing method, image processing device and program
Lim et al. BodyTrak: Inferring Full-Body Poses from Body Silhouettes Using a Miniature Camera on a Wristband
CN108512651B (en) Artificial intelligence image identification attack defense method, system and storage medium
CN201238357Y (en) All-directional wireless monitoring apparatus
CN111126214A (en) Living body detection method and apparatus, computer device, and computer-readable storage medium
CN108921036B (en) Random number generation method and generation system based on face image recognition
CN111881438B (en) Method and device for carrying out biological feature recognition based on privacy protection and electronic equipment
CN110826045A (en) Authentication method and device, electronic equipment and storage medium
CN210222867U (en) Portable security inspection recognition device
CN114124345A (en) Data homomorphic encryption reasoning method, device, equipment, system and storage medium
Lee et al. Application of wearable devices in crime scene investigation and virtual reality
US10528809B2 (en) Iris image capturing device, iris image recognition device and method thereof
JP2004241945A (en) Device, method, and program for image monitoring, and recording medium where same program is recorded

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination