CN114401092A - Image file sharing platform infringement protection method based on block chain and IPFS - Google Patents
Image file sharing platform infringement protection method based on block chain and IPFS Download PDFInfo
- Publication number
- CN114401092A CN114401092A CN202111554945.4A CN202111554945A CN114401092A CN 114401092 A CN114401092 A CN 114401092A CN 202111554945 A CN202111554945 A CN 202111554945A CN 114401092 A CN114401092 A CN 114401092A
- Authority
- CN
- China
- Prior art keywords
- image file
- phash
- ipfs
- dct
- method based
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 239000011159 matrix material Substances 0.000 claims description 33
- 230000001131 transforming effect Effects 0.000 claims description 5
- 238000004364 calculation method Methods 0.000 description 2
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/18—File system types
- G06F16/182—Distributed file systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T5/00—Image enhancement or restoration
- G06T5/10—Image enhancement or restoration using non-spatial domain filtering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2207/00—Indexing scheme for image analysis or image enhancement
- G06T2207/20—Special algorithmic details
- G06T2207/20048—Transform domain processing
- G06T2207/20052—Discrete cosine transform [DCT]
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Databases & Information Systems (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Data Mining & Analysis (AREA)
- Computing Systems (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses an image file sharing platform infringement protection method based on a block chain and an IPFS (Internet protocol file system), which comprises the following steps: receiving the uploaded new image file; calculating pHash of the new image file; judging whether the uploaded new image file meets the standard or not according to the calculated pHash; adding new image files meeting the standard to the IPFS network; updating the block chain network, and adding the pHash of the new image file into the block chain network. The image file sharing platform infringement protection method based on the block chain and the IPFS adopts a perceptual hash algorithm, is different from password hashes such as MD5 and the like, and has similar output for the input of similar characteristics. Therefore, the copyright infringement of the video by the user can be effectively prevented, and the intellectual property of the creator can be well protected under the condition of no manual review.
Description
Technical Field
The invention relates to a copyright protection method for an image file sharing platform, in particular to an image file sharing platform infringement protection method based on a block chain and an IPFS.
Background
The InterPlanetary File System (IPFS) is a network transport protocol for storing and sharing data in a distributed File System via a peer-to-peer network. IPFS may employ distributed web gateways that allow simple, fast, and secure access to file systems without local nodes. IPFS can avoid large-area downtime and data loss of a centralized server from the beginning of design, and is particularly suitable for transmission of high-concurrency, large-file and real-time media streams in a big data era. When the node added with IPFS reaches a certain scale, the distributed Web becomes the fastest, most reliable and largest data warehouse in the world.
The block chain shows a wide application prospect in the aspects of information tracing and rights and interests certification, but naturally faces the problems of insufficient bandwidth, low storage efficiency of a large amount of data and the like. While IPFS and blockchains appear to be a natural pair, their design philosophy is distributed, decentralized. The block chain cannot be tampered but is slow in speed and high in storage cost, and the IPFS file system cannot be tampered in a single direction but is high in access speed.
Currently, online video playback providers typically implement a self-built large server or purchase a cloud server. Both of these approaches are expensive and centralized, and video is easily stolen, a non-profit alliance video sharing platform may attempt distributed deployment based on blockchain and IPFS.
In the field of video copyright protection, in order to avoid infringement, the conventional cryptographic hash matching technology (such as SHA-1 and MD5) is commonly used by existing video sharing websites to match the uploaded video content with the existing version in the database. However, these techniques are characterized by the avalanche effect. This means that minimal changes to the original image or video will result in drastic changes to the resulting hash. In other words, as soon as a certain frame of the video is modified, both SHA-1 and MD5 of the video will change, and thus it is considered that a new video is uploaded, although the two videos are not different from each other to human eyes.
Disclosure of Invention
The invention provides an image file sharing platform infringement protection method based on a block chain and an IPFS (Internet protocol file system), which solves the technical problems and specifically adopts the following technical scheme:
an image file sharing platform infringement protection method based on a block chain and an IPFS comprises the following steps:
receiving the uploaded new image file;
calculating pHash of the new image file;
judging whether the uploaded new image file meets the standard or not according to the calculated pHash;
and adding a new image file meeting the standard to the IPFS network, updating the block chain network, and adding the pHash of the new image file to the block chain network.
Further, the new image file uploaded contains images and video.
Further, when the new image file uploaded is an image,
the specific method for calculating the pHash of the new image file comprises the following steps:
reducing the size of the image to 32 x 32;
converting the image into a grayscale image;
calculating DCT of the converted image to obtain a DCT matrix of 32 x 32;
selecting a small DCT matrix of 8 × 8 at the upper left corner of the DCT matrix of 32 × 32;
calculating the mean value of 8 x 8 small DCT matrixes;
transforming 32 x 32 DCT matrices from the calculated mean;
pHash is created from the transformed 32 x 32 DCT matrix.
Further, the DCT of the transformed image is calculated by the following formula to obtain a 32 × 32 DCT matrix:
Xkis a DCT coefficient, k ∈ [0,63 ]]。
Further, the mean of 8 × 8 small DCT matrices is calculated by the following formula:
wherein m is the pixel mean of the small DCT matrix of 8X 8, r is the column index row, c is the column index cow, Xr,cIs the pixel value of the r row and c column.
Further, the specific method of transforming the 32 × 32 DCT matrix according to the calculated mean value is:
comparing each value in the 32 × 32 DCT matrix with the mean value m, assigning 1 if greater than or equal to the mean value m, assigning 0 if less than the mean value m, and converting the 32 × 32 DCT matrix into a 32 × 32 matrix composed of 0 and 1.
Further, the specific method for judging whether the uploaded image file meets the standard according to the calculated pHash comprises the following steps:
and calculating the similarity of the pHash of the new image file and the pHash of the image file in the block chain network, and judging whether the similarity meets the standard or not according to the similarity.
Further, when the similarity is more than or equal to 50%, judging that the similarity does not meet the standard;
and when the similarity is less than 50%, judging that the standard is met.
Further, calculating the pHash of the new image file and the Hamming distance of the existing pHash;
at a calculated Hamming distance of less than or equal toIf so, judging that the standard is not met;
The image file sharing platform infringement protection method based on the block chain and the IPFS has the advantages that the infringement protection method can effectively prevent a user from infringing copyright through simply modifying the video, and can well protect intellectual property of an author under the condition of no manual review. It uses a perceptual hashing algorithm, which is different from the cryptographic hashing such as MD5, which has similar output for similar feature inputs.
Drawings
Fig. 1 is a schematic diagram of an image file sharing platform infringement protection method based on a block chain and an IPFS according to the present invention.
Detailed Description
The invention is described in detail below with reference to the figures and the embodiments.
The present application is based on a system framework that facilitates secure distributed sharing and storage to detect copyright infringement of multimedia objects. It contains the following three different modules:
picture video upload layer: this module is responsible for uploading various images and videos of photographers, video providers and graphic designers along with their details, and by sharing these images and videos, due points of their work can be obtained.
A secure distributed storage layer: this module is responsible for the secure storage of multimedia objects and the creation of addressable hashes of uploaded objects. IPFS provides a facility to synchronize these videos and images to the respective peers. The underlying method uses distributed hash table based address storage and versioning to reduce redundancy of images and videos in the network.
Perceptual hash creation and matching layer: this module is responsible for perceptual hash creation and matching. Suitable for detecting small changes made in the original file.
Fig. 1 shows an image file sharing platform infringement protection method based on a blockchain and IPFS according to the present application, which is based on the foregoing system framework. Comprises the following steps: s1: an uploaded new image file is received. S2: the pHash of the new image file is calculated. S3: and judging whether the uploaded new image file meets the standard or not according to the calculated pHash. S4: and adding a new image file meeting the standard to the IPFS network, updating the block chain network, and adding the pHash of the new image file to the block chain network. The image file sharing platform infringement protection method based on the block chain and the IPFS adopts a perceptual hash algorithm, is different from password hashes such as MD5 and the like, and has similar output for input of similar characteristics. Therefore, the copyright infringement of the video by the user can be effectively prevented, and the intellectual property of the creator can be well protected under the condition of no manual review. The above steps are specifically described below.
For step S1: an uploaded new image file is received.
Users can upload self-authored image files to a designated IPFS peer-to-peer distributed file storage system.
It is understood that the user may be a designer or a photographer who wants to upload his or her creative work. Or may be a person who wants to infringe the copyright of another person. They attempt to upload the work of others as their own work into the IPFS network by simply adjusting them.
In the present application, the image file uploaded by the user may be an image or a video. Persons attempting to infringe the copyright of others slightly modify the image works of others by resizing, sharpening, darkening, gradation conversion, adding noise, blurring, and rotating, and wish to upload the modified images onto a platform as their works. Similarly, a person attempting to infringe the copyright of another person may perform a similar operation on the video. It is an object of the present application to automatically identify these hinted image files.
For step S2: the pHash of the new image file is calculated.
In the present application, the image file may be an image or a video.
When the uploaded image file is an image, a specific method for calculating the pHash of the uploaded image file is as follows:
the first step is as follows: the image is reduced in size to 32 x 32.
Reducing the size of the image can reduce the amount of computation for subsequent DCT (Discrete Cosine Transform) calculations.
The second step is that: the image is converted into a grayscale image.
The image in the RGB format is converted into a gray scale image, so that the subsequent DCT calculation amount can be further reduced.
The third step: calculating the DCT of the transformed image yields a 32 x 32 DCT matrix.
The DCT is to decompose the picture into frequency aggregation and ladder shapes, specifically, a DCT matrix of 32 × 32 is obtained by calculating the DCT of the converted image according to the following formula:
Xkis a DCT coefficient, k ∈ [0,63 ]]。
The fourth step: the small DCT matrix of 8 x 8 at the top left corner of the 32 x 32 DCT matrix is chosen.
Although the result of DCT is a matrix of 32 x 32 size, we only need to retain the 8 x 8 matrix in the upper left corner, which part presents the lowest frequencies in the picture.
The fifth step: the mean of 8 x 8 small DCT matrices is calculated.
As with the mean hash, the mean of 8 x 8 small DCTs is calculated.
Specifically, the mean of 8 × 8 small DCT matrices is calculated by the following formula:
wherein m is the pixel mean of 8 × 8 small DCT matrix, r is the column index (row), c is the column index (cow), Xr,cIs the pixel value of the r row and c column.
And a sixth step: the 32 x 32 DCT matrix is transformed from the calculated mean.
Preferably, the specific method of transforming the 32 × 32 DCT matrix according to the calculated mean value is:
each value in the 32 x 32 DCT matrix is compared to the mean m, and a value of 1 is assigned if greater than or equal to the mean m, and a value of 0 is assigned if less than the mean m. Thereby converting the 32 × 32 DCT matrix into a 32 × 32 matrix composed of 0 and 1. As described by the following equations.
The seventh step: pHash is created from the transformed 32 x 32 DCT matrix. A 64-bit binary representation of the perceptual hash is created.
When the uploaded image file is a video, the specific method for calculating the pHash comprises the following steps:
the first step is as follows: the video is extracted as a picture file using a frame-by-frame extraction technique.
The Python and cv2 libraries were used.
Specifically, the video is read, the get method of cv2 is used to obtain the frequency fps and the total frame number frames of the video, and then each frame picture in the video is read frame by frame through the loop frames.
The second step is that: and calculating the pHash of the picture frame by frame and obtaining the video hash.
And applying the method for calculating the pHash of the picture to the picture, and combining the calculated pHash of the picture line by line to obtain the pHash of the video.
For step S3: and judging whether the uploaded new image file meets the standard or not according to the calculated pHash.
The specific method for judging whether the uploaded image file meets the standard or not according to the calculated pHash comprises the following steps:
and calculating the similarity of the pHash of the new image file and the pHash of the image file in the block chain network, and judging whether the similarity meets the standard or not according to the similarity. And when the similarity is more than or equal to 50%, the newly uploaded image file is highly similar to a certain image file existing in the IPFS network, and the newly uploaded image file is judged to be not in accordance with the standard. And for the image file which does not meet the standard, the uploading platform is prohibited. And when the similarity is less than 50%, judging that the standard is met.
Preferably, the pHash of the new image file and the Hamming distance of the existing pHash are calculated.
Specifically, the minimum length loh of two pHash is obtained by comparison, then two pHash are traversed bit by bit, two pHash are compared, and if the characters at the same position are different, the Hamming distance is increased by 1.
At a calculated Hamming distance of less than or equal toWhen it is determined, it does not meet the standard.
For step S4: and adding a new image file meeting the standard to the IPFS network, updating the block chain network, and adding the pHash of the new image file to the block chain network.
For new image files that meet the standard, they are formally added to the IPFS network and the blockchain network is updated.
The foregoing illustrates and describes the principles, general features, and advantages of the present invention. It should be understood by those skilled in the art that the above embodiments do not limit the present invention in any way, and all technical solutions obtained by using equivalent alternatives or equivalent variations fall within the scope of the present invention.
Claims (9)
1. An image file sharing platform infringement protection method based on a block chain and IPFS is characterized by comprising the following steps:
receiving the uploaded new image file;
calculating pHash of the new image file;
judging whether the uploaded new image file meets the standard or not according to the calculated pHash;
and adding a new image file meeting the standard to the IPFS network, updating the block chain network, and adding the pHash of the new image file to the block chain network.
2. The image file sharing platform infringement protection method based on blockchain and IPFS according to claim 1,
the new image file uploaded contains images and video.
3. The image file sharing platform infringement protection method based on blockchain and IPFS according to claim 2,
when the new image file being uploaded is an image,
the specific method for calculating the pHash of the new image file comprises the following steps:
reducing the size of the image to 32 x 32;
converting the image into a grayscale image;
calculating DCT of the converted image to obtain a DCT matrix of 32 x 32;
selecting a small DCT matrix of 8 × 8 at the upper left corner of the DCT matrix of 32 × 32;
calculating the mean value of 8 x 8 small DCT matrixes;
transforming 32 x 32 DCT matrices from the calculated mean;
pHash is created from the transformed 32 x 32 DCT matrix.
5. The image file sharing platform infringement protection method based on blockchain and IPFS according to claim 4, wherein,
the mean of the small DCT matrices of 8 x 8 is calculated by the following formula:
wherein m is the pixel mean of the small DCT matrix of 8X 8, r is the column index row, c is the column index cow, Xr,cIs the pixel value of the r row and c column.
6. The image file sharing platform infringement protection method based on blockchain and IPFS according to claim 5,
the specific method of transforming the 32 × 32 DCT matrix according to the calculated mean value is as follows:
comparing each value in the 32 × 32 DCT matrix with the mean value m, assigning 1 if greater than or equal to the mean value m, assigning 0 if less than the mean value m, and converting the 32 × 32 DCT matrix into a 32 × 32 matrix composed of 0 and 1.
7. The image file sharing platform infringement protection method based on blockchain and IPFS according to claim 1,
the specific method for judging whether the uploaded image file meets the standard or not according to the calculated pHash comprises the following steps:
and calculating the similarity of the pHash of the new image file and the pHash of the image file in the block chain network, and judging whether the similarity meets the standard or not according to the similarity.
8. The image file sharing platform infringement protection method based on blockchain and IPFS according to claim 7,
when the similarity is more than or equal to 50%, judging that the similarity does not meet the standard;
and when the similarity is less than 50%, judging that the standard is met.
9. The image file sharing platform infringement protection method based on blockchain and IPFS according to claim 7,
calculating the pHash of the new image file and the Hamming distance of the existing pHash;
at a calculated Hamming distance of less than or equal toloh, judging that it does not meet the standard;
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111554945.4A CN114401092A (en) | 2021-12-17 | 2021-12-17 | Image file sharing platform infringement protection method based on block chain and IPFS |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111554945.4A CN114401092A (en) | 2021-12-17 | 2021-12-17 | Image file sharing platform infringement protection method based on block chain and IPFS |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114401092A true CN114401092A (en) | 2022-04-26 |
Family
ID=81226217
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111554945.4A Pending CN114401092A (en) | 2021-12-17 | 2021-12-17 | Image file sharing platform infringement protection method based on block chain and IPFS |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114401092A (en) |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010010729A1 (en) * | 2000-01-21 | 2001-08-02 | Kohichi Kamijoh | Image processing apparatus and method therefor |
CN104717072A (en) * | 2015-03-10 | 2015-06-17 | 南京师范大学 | Remote-sensing image authentication method based on perceptual hash and elliptic curve |
CN107086920A (en) * | 2017-06-20 | 2017-08-22 | 无锡井通网络科技有限公司 | Copyright based on block chain really weighs method |
CN108897775A (en) * | 2018-06-01 | 2018-11-27 | 昆明理工大学 | A kind of rapid image identifying system and method based on perceptual hash |
CN109547500A (en) * | 2019-01-21 | 2019-03-29 | 信雅达系统工程股份有限公司 | A kind of data sharing method and system for protecting user data ownership |
CN109614775A (en) * | 2018-11-20 | 2019-04-12 | 安徽大学 | A kind of protect-ing frame structure and method that the copyright based on block chain is traced to the source |
US20190182047A1 (en) * | 2017-12-07 | 2019-06-13 | NEC Laboratories Europe GmbH | Method and system for securely sharing validation information using blockchain technology |
CN110110500A (en) * | 2019-06-04 | 2019-08-09 | 施建锋 | Has the decentralization image copyright protection system and method that infringement detects immediately |
CN110427895A (en) * | 2019-08-06 | 2019-11-08 | 李震 | A kind of video content similarity method of discrimination based on computer vision and system |
CN110929230A (en) * | 2019-12-04 | 2020-03-27 | 腾讯科技(深圳)有限公司 | Work management method, device, equipment and storage medium |
CN111460395A (en) * | 2020-04-03 | 2020-07-28 | 北京邮电大学 | Shared data storage and copyright protection tracing method and system |
KR20200093262A (en) * | 2019-01-28 | 2020-08-05 | 주식회사 린아레나 | Method for proving original contents of knowledge sharing service using blockchain technology and system thereof |
CN113763225A (en) * | 2021-05-17 | 2021-12-07 | 西安电子科技大学 | Image perception hashing method, system and equipment and information data processing terminal |
-
2021
- 2021-12-17 CN CN202111554945.4A patent/CN114401092A/en active Pending
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010010729A1 (en) * | 2000-01-21 | 2001-08-02 | Kohichi Kamijoh | Image processing apparatus and method therefor |
CN104717072A (en) * | 2015-03-10 | 2015-06-17 | 南京师范大学 | Remote-sensing image authentication method based on perceptual hash and elliptic curve |
CN107086920A (en) * | 2017-06-20 | 2017-08-22 | 无锡井通网络科技有限公司 | Copyright based on block chain really weighs method |
US20190182047A1 (en) * | 2017-12-07 | 2019-06-13 | NEC Laboratories Europe GmbH | Method and system for securely sharing validation information using blockchain technology |
CN108897775A (en) * | 2018-06-01 | 2018-11-27 | 昆明理工大学 | A kind of rapid image identifying system and method based on perceptual hash |
CN109614775A (en) * | 2018-11-20 | 2019-04-12 | 安徽大学 | A kind of protect-ing frame structure and method that the copyright based on block chain is traced to the source |
CN109547500A (en) * | 2019-01-21 | 2019-03-29 | 信雅达系统工程股份有限公司 | A kind of data sharing method and system for protecting user data ownership |
KR20200093262A (en) * | 2019-01-28 | 2020-08-05 | 주식회사 린아레나 | Method for proving original contents of knowledge sharing service using blockchain technology and system thereof |
CN110110500A (en) * | 2019-06-04 | 2019-08-09 | 施建锋 | Has the decentralization image copyright protection system and method that infringement detects immediately |
CN110427895A (en) * | 2019-08-06 | 2019-11-08 | 李震 | A kind of video content similarity method of discrimination based on computer vision and system |
CN110929230A (en) * | 2019-12-04 | 2020-03-27 | 腾讯科技(深圳)有限公司 | Work management method, device, equipment and storage medium |
CN111460395A (en) * | 2020-04-03 | 2020-07-28 | 北京邮电大学 | Shared data storage and copyright protection tracing method and system |
CN113763225A (en) * | 2021-05-17 | 2021-12-07 | 西安电子科技大学 | Image perception hashing method, system and equipment and information data processing terminal |
Non-Patent Citations (2)
Title |
---|
张鑫港;闫浩文;张黎明;: "一种用于DEM数据认证与篡改定位的感知哈希算法", 地球信息科学学报, no. 03 * |
杨帆;: "运用哈希算法的图片版权保护", 电子技术, no. 11 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10972807B2 (en) | Dynamic watermarking of digital media content at point of transmission | |
Cao et al. | Coverless information hiding based on the molecular structure images of material. | |
US20150074107A1 (en) | Storing and serving images in memory boxes | |
US10606888B2 (en) | Image inventory production | |
US8406571B2 (en) | Automatic super-resolution transformation for images | |
US20090044128A1 (en) | Adaptive publishing of content | |
WO2021129435A1 (en) | Method for training video definition evaluation model, video recommendation method, and related device | |
US10614539B2 (en) | Detecting multiple parts of a screen to fingerprint to detect abusive uploading videos | |
CN108345685A (en) | More granularity data processing methods, system, equipment and storage medium under block chain | |
US10034031B2 (en) | Generating a single content entity to manage multiple bitrate encodings for multiple content consumption platforms | |
Liu et al. | Coverless image steganography based on DenseNet feature mapping | |
CN112868224A (en) | Techniques to capture and edit dynamic depth images | |
CN106503112B (en) | Video retrieval method and device | |
US10958987B1 (en) | Matching based on video data | |
US20140029854A1 (en) | Metadata supersets for matching images | |
CN111898544A (en) | Character and image matching method, device and equipment and computer storage medium | |
US9264584B2 (en) | Video synchronization | |
CN114401092A (en) | Image file sharing platform infringement protection method based on block chain and IPFS | |
CN113011254A (en) | Video data processing method, computer equipment and readable storage medium | |
CN115250352A (en) | Partitioning ASTC textures into sub-image sets | |
CN109657098B (en) | Video fingerprint extraction method and device | |
CN108984614B (en) | Visual image rapid identification method based on big data environment | |
Li et al. | Research on Night Tourism Recommendation Based on Intelligent Image Processing Technology | |
Wei et al. | Which gray level should be given the smallest cost for adaptive steganography? | |
Kokoulin | Distributed storage approach in content delivery networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |