CN114401092A - Image file sharing platform infringement protection method based on block chain and IPFS - Google Patents

Image file sharing platform infringement protection method based on block chain and IPFS Download PDF

Info

Publication number
CN114401092A
CN114401092A CN202111554945.4A CN202111554945A CN114401092A CN 114401092 A CN114401092 A CN 114401092A CN 202111554945 A CN202111554945 A CN 202111554945A CN 114401092 A CN114401092 A CN 114401092A
Authority
CN
China
Prior art keywords
image file
phash
ipfs
dct
method based
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111554945.4A
Other languages
Chinese (zh)
Inventor
冉熙
琚春华
鲍福光
许轶航
周华键
沈仲华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Gongshang University
Original Assignee
Zhejiang Gongshang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Gongshang University filed Critical Zhejiang Gongshang University
Priority to CN202111554945.4A priority Critical patent/CN114401092A/en
Publication of CN114401092A publication Critical patent/CN114401092A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/182Distributed file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T5/00Image enhancement or restoration
    • G06T5/10Image enhancement or restoration using non-spatial domain filtering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/20Special algorithmic details
    • G06T2207/20048Transform domain processing
    • G06T2207/20052Discrete cosine transform [DCT]

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Databases & Information Systems (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Computing Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses an image file sharing platform infringement protection method based on a block chain and an IPFS (Internet protocol file system), which comprises the following steps: receiving the uploaded new image file; calculating pHash of the new image file; judging whether the uploaded new image file meets the standard or not according to the calculated pHash; adding new image files meeting the standard to the IPFS network; updating the block chain network, and adding the pHash of the new image file into the block chain network. The image file sharing platform infringement protection method based on the block chain and the IPFS adopts a perceptual hash algorithm, is different from password hashes such as MD5 and the like, and has similar output for the input of similar characteristics. Therefore, the copyright infringement of the video by the user can be effectively prevented, and the intellectual property of the creator can be well protected under the condition of no manual review.

Description

Image file sharing platform infringement protection method based on block chain and IPFS
Technical Field
The invention relates to a copyright protection method for an image file sharing platform, in particular to an image file sharing platform infringement protection method based on a block chain and an IPFS.
Background
The InterPlanetary File System (IPFS) is a network transport protocol for storing and sharing data in a distributed File System via a peer-to-peer network. IPFS may employ distributed web gateways that allow simple, fast, and secure access to file systems without local nodes. IPFS can avoid large-area downtime and data loss of a centralized server from the beginning of design, and is particularly suitable for transmission of high-concurrency, large-file and real-time media streams in a big data era. When the node added with IPFS reaches a certain scale, the distributed Web becomes the fastest, most reliable and largest data warehouse in the world.
The block chain shows a wide application prospect in the aspects of information tracing and rights and interests certification, but naturally faces the problems of insufficient bandwidth, low storage efficiency of a large amount of data and the like. While IPFS and blockchains appear to be a natural pair, their design philosophy is distributed, decentralized. The block chain cannot be tampered but is slow in speed and high in storage cost, and the IPFS file system cannot be tampered in a single direction but is high in access speed.
Currently, online video playback providers typically implement a self-built large server or purchase a cloud server. Both of these approaches are expensive and centralized, and video is easily stolen, a non-profit alliance video sharing platform may attempt distributed deployment based on blockchain and IPFS.
In the field of video copyright protection, in order to avoid infringement, the conventional cryptographic hash matching technology (such as SHA-1 and MD5) is commonly used by existing video sharing websites to match the uploaded video content with the existing version in the database. However, these techniques are characterized by the avalanche effect. This means that minimal changes to the original image or video will result in drastic changes to the resulting hash. In other words, as soon as a certain frame of the video is modified, both SHA-1 and MD5 of the video will change, and thus it is considered that a new video is uploaded, although the two videos are not different from each other to human eyes.
Disclosure of Invention
The invention provides an image file sharing platform infringement protection method based on a block chain and an IPFS (Internet protocol file system), which solves the technical problems and specifically adopts the following technical scheme:
an image file sharing platform infringement protection method based on a block chain and an IPFS comprises the following steps:
receiving the uploaded new image file;
calculating pHash of the new image file;
judging whether the uploaded new image file meets the standard or not according to the calculated pHash;
and adding a new image file meeting the standard to the IPFS network, updating the block chain network, and adding the pHash of the new image file to the block chain network.
Further, the new image file uploaded contains images and video.
Further, when the new image file uploaded is an image,
the specific method for calculating the pHash of the new image file comprises the following steps:
reducing the size of the image to 32 x 32;
converting the image into a grayscale image;
calculating DCT of the converted image to obtain a DCT matrix of 32 x 32;
selecting a small DCT matrix of 8 × 8 at the upper left corner of the DCT matrix of 32 × 32;
calculating the mean value of 8 x 8 small DCT matrixes;
transforming 32 x 32 DCT matrices from the calculated mean;
pHash is created from the transformed 32 x 32 DCT matrix.
Further, the DCT of the transformed image is calculated by the following formula to obtain a 32 × 32 DCT matrix:
Figure BDA0003418378760000021
Xkis a DCT coefficient, k ∈ [0,63 ]]。
Further, the mean of 8 × 8 small DCT matrices is calculated by the following formula:
Figure BDA0003418378760000022
wherein m is the pixel mean of the small DCT matrix of 8X 8, r is the column index row, c is the column index cow, Xr,cIs the pixel value of the r row and c column.
Further, the specific method of transforming the 32 × 32 DCT matrix according to the calculated mean value is:
comparing each value in the 32 × 32 DCT matrix with the mean value m, assigning 1 if greater than or equal to the mean value m, assigning 0 if less than the mean value m, and converting the 32 × 32 DCT matrix into a 32 × 32 matrix composed of 0 and 1.
Further, the specific method for judging whether the uploaded image file meets the standard according to the calculated pHash comprises the following steps:
and calculating the similarity of the pHash of the new image file and the pHash of the image file in the block chain network, and judging whether the similarity meets the standard or not according to the similarity.
Further, when the similarity is more than or equal to 50%, judging that the similarity does not meet the standard;
and when the similarity is less than 50%, judging that the standard is met.
Further, calculating the pHash of the new image file and the Hamming distance of the existing pHash;
at a calculated Hamming distance of less than or equal to
Figure BDA0003418378760000023
If so, judging that the standard is not met;
at a calculated Hamming distance greater than
Figure BDA0003418378760000024
When it is determined, it does not meet the standard.
The image file sharing platform infringement protection method based on the block chain and the IPFS has the advantages that the infringement protection method can effectively prevent a user from infringing copyright through simply modifying the video, and can well protect intellectual property of an author under the condition of no manual review. It uses a perceptual hashing algorithm, which is different from the cryptographic hashing such as MD5, which has similar output for similar feature inputs.
Drawings
Fig. 1 is a schematic diagram of an image file sharing platform infringement protection method based on a block chain and an IPFS according to the present invention.
Detailed Description
The invention is described in detail below with reference to the figures and the embodiments.
The present application is based on a system framework that facilitates secure distributed sharing and storage to detect copyright infringement of multimedia objects. It contains the following three different modules:
picture video upload layer: this module is responsible for uploading various images and videos of photographers, video providers and graphic designers along with their details, and by sharing these images and videos, due points of their work can be obtained.
A secure distributed storage layer: this module is responsible for the secure storage of multimedia objects and the creation of addressable hashes of uploaded objects. IPFS provides a facility to synchronize these videos and images to the respective peers. The underlying method uses distributed hash table based address storage and versioning to reduce redundancy of images and videos in the network.
Perceptual hash creation and matching layer: this module is responsible for perceptual hash creation and matching. Suitable for detecting small changes made in the original file.
Fig. 1 shows an image file sharing platform infringement protection method based on a blockchain and IPFS according to the present application, which is based on the foregoing system framework. Comprises the following steps: s1: an uploaded new image file is received. S2: the pHash of the new image file is calculated. S3: and judging whether the uploaded new image file meets the standard or not according to the calculated pHash. S4: and adding a new image file meeting the standard to the IPFS network, updating the block chain network, and adding the pHash of the new image file to the block chain network. The image file sharing platform infringement protection method based on the block chain and the IPFS adopts a perceptual hash algorithm, is different from password hashes such as MD5 and the like, and has similar output for input of similar characteristics. Therefore, the copyright infringement of the video by the user can be effectively prevented, and the intellectual property of the creator can be well protected under the condition of no manual review. The above steps are specifically described below.
For step S1: an uploaded new image file is received.
Users can upload self-authored image files to a designated IPFS peer-to-peer distributed file storage system.
It is understood that the user may be a designer or a photographer who wants to upload his or her creative work. Or may be a person who wants to infringe the copyright of another person. They attempt to upload the work of others as their own work into the IPFS network by simply adjusting them.
In the present application, the image file uploaded by the user may be an image or a video. Persons attempting to infringe the copyright of others slightly modify the image works of others by resizing, sharpening, darkening, gradation conversion, adding noise, blurring, and rotating, and wish to upload the modified images onto a platform as their works. Similarly, a person attempting to infringe the copyright of another person may perform a similar operation on the video. It is an object of the present application to automatically identify these hinted image files.
For step S2: the pHash of the new image file is calculated.
In the present application, the image file may be an image or a video.
When the uploaded image file is an image, a specific method for calculating the pHash of the uploaded image file is as follows:
the first step is as follows: the image is reduced in size to 32 x 32.
Reducing the size of the image can reduce the amount of computation for subsequent DCT (Discrete Cosine Transform) calculations.
The second step is that: the image is converted into a grayscale image.
The image in the RGB format is converted into a gray scale image, so that the subsequent DCT calculation amount can be further reduced.
The third step: calculating the DCT of the transformed image yields a 32 x 32 DCT matrix.
The DCT is to decompose the picture into frequency aggregation and ladder shapes, specifically, a DCT matrix of 32 × 32 is obtained by calculating the DCT of the converted image according to the following formula:
Figure BDA0003418378760000041
Xkis a DCT coefficient, k ∈ [0,63 ]]。
The fourth step: the small DCT matrix of 8 x 8 at the top left corner of the 32 x 32 DCT matrix is chosen.
Although the result of DCT is a matrix of 32 x 32 size, we only need to retain the 8 x 8 matrix in the upper left corner, which part presents the lowest frequencies in the picture.
The fifth step: the mean of 8 x 8 small DCT matrices is calculated.
As with the mean hash, the mean of 8 x 8 small DCTs is calculated.
Specifically, the mean of 8 × 8 small DCT matrices is calculated by the following formula:
Figure BDA0003418378760000042
wherein m is the pixel mean of 8 × 8 small DCT matrix, r is the column index (row), c is the column index (cow), Xr,cIs the pixel value of the r row and c column.
And a sixth step: the 32 x 32 DCT matrix is transformed from the calculated mean.
Preferably, the specific method of transforming the 32 × 32 DCT matrix according to the calculated mean value is:
each value in the 32 x 32 DCT matrix is compared to the mean m, and a value of 1 is assigned if greater than or equal to the mean m, and a value of 0 is assigned if less than the mean m. Thereby converting the 32 × 32 DCT matrix into a 32 × 32 matrix composed of 0 and 1. As described by the following equations.
Figure BDA0003418378760000051
The seventh step: pHash is created from the transformed 32 x 32 DCT matrix. A 64-bit binary representation of the perceptual hash is created.
When the uploaded image file is a video, the specific method for calculating the pHash comprises the following steps:
the first step is as follows: the video is extracted as a picture file using a frame-by-frame extraction technique.
The Python and cv2 libraries were used.
Specifically, the video is read, the get method of cv2 is used to obtain the frequency fps and the total frame number frames of the video, and then each frame picture in the video is read frame by frame through the loop frames.
The second step is that: and calculating the pHash of the picture frame by frame and obtaining the video hash.
And applying the method for calculating the pHash of the picture to the picture, and combining the calculated pHash of the picture line by line to obtain the pHash of the video.
For step S3: and judging whether the uploaded new image file meets the standard or not according to the calculated pHash.
The specific method for judging whether the uploaded image file meets the standard or not according to the calculated pHash comprises the following steps:
and calculating the similarity of the pHash of the new image file and the pHash of the image file in the block chain network, and judging whether the similarity meets the standard or not according to the similarity. And when the similarity is more than or equal to 50%, the newly uploaded image file is highly similar to a certain image file existing in the IPFS network, and the newly uploaded image file is judged to be not in accordance with the standard. And for the image file which does not meet the standard, the uploading platform is prohibited. And when the similarity is less than 50%, judging that the standard is met.
Preferably, the pHash of the new image file and the Hamming distance of the existing pHash are calculated.
Specifically, the minimum length loh of two pHash is obtained by comparison, then two pHash are traversed bit by bit, two pHash are compared, and if the characters at the same position are different, the Hamming distance is increased by 1.
At a calculated Hamming distance of less than or equal to
Figure BDA0003418378760000052
When it is determined, it does not meet the standard.
At a calculated Hamming distance greater than
Figure BDA0003418378760000053
It is judged that it does not meet the standard.
For step S4: and adding a new image file meeting the standard to the IPFS network, updating the block chain network, and adding the pHash of the new image file to the block chain network.
For new image files that meet the standard, they are formally added to the IPFS network and the blockchain network is updated.
The foregoing illustrates and describes the principles, general features, and advantages of the present invention. It should be understood by those skilled in the art that the above embodiments do not limit the present invention in any way, and all technical solutions obtained by using equivalent alternatives or equivalent variations fall within the scope of the present invention.

Claims (9)

1. An image file sharing platform infringement protection method based on a block chain and IPFS is characterized by comprising the following steps:
receiving the uploaded new image file;
calculating pHash of the new image file;
judging whether the uploaded new image file meets the standard or not according to the calculated pHash;
and adding a new image file meeting the standard to the IPFS network, updating the block chain network, and adding the pHash of the new image file to the block chain network.
2. The image file sharing platform infringement protection method based on blockchain and IPFS according to claim 1,
the new image file uploaded contains images and video.
3. The image file sharing platform infringement protection method based on blockchain and IPFS according to claim 2,
when the new image file being uploaded is an image,
the specific method for calculating the pHash of the new image file comprises the following steps:
reducing the size of the image to 32 x 32;
converting the image into a grayscale image;
calculating DCT of the converted image to obtain a DCT matrix of 32 x 32;
selecting a small DCT matrix of 8 × 8 at the upper left corner of the DCT matrix of 32 × 32;
calculating the mean value of 8 x 8 small DCT matrixes;
transforming 32 x 32 DCT matrices from the calculated mean;
pHash is created from the transformed 32 x 32 DCT matrix.
4. The image file sharing platform infringement protection method based on blockchain and IPFS according to claim 3,
calculating the DCT of the transformed image by the following formula to obtain a 32 x 32 DCT matrix:
Figure FDA0003418378750000011
Xkis a DCT coefficient, k ∈ [0,63 ]]。
5. The image file sharing platform infringement protection method based on blockchain and IPFS according to claim 4, wherein,
the mean of the small DCT matrices of 8 x 8 is calculated by the following formula:
Figure FDA0003418378750000012
wherein m is the pixel mean of the small DCT matrix of 8X 8, r is the column index row, c is the column index cow, Xr,cIs the pixel value of the r row and c column.
6. The image file sharing platform infringement protection method based on blockchain and IPFS according to claim 5,
the specific method of transforming the 32 × 32 DCT matrix according to the calculated mean value is as follows:
comparing each value in the 32 × 32 DCT matrix with the mean value m, assigning 1 if greater than or equal to the mean value m, assigning 0 if less than the mean value m, and converting the 32 × 32 DCT matrix into a 32 × 32 matrix composed of 0 and 1.
7. The image file sharing platform infringement protection method based on blockchain and IPFS according to claim 1,
the specific method for judging whether the uploaded image file meets the standard or not according to the calculated pHash comprises the following steps:
and calculating the similarity of the pHash of the new image file and the pHash of the image file in the block chain network, and judging whether the similarity meets the standard or not according to the similarity.
8. The image file sharing platform infringement protection method based on blockchain and IPFS according to claim 7,
when the similarity is more than or equal to 50%, judging that the similarity does not meet the standard;
and when the similarity is less than 50%, judging that the standard is met.
9. The image file sharing platform infringement protection method based on blockchain and IPFS according to claim 7,
calculating the pHash of the new image file and the Hamming distance of the existing pHash;
at a calculated Hamming distance of less than or equal to
Figure FDA0003418378750000021
loh, judging that it does not meet the standard;
at a calculated Hamming distance greater than
Figure FDA0003418378750000022
loh, it is judged that it does not meet the standard.
CN202111554945.4A 2021-12-17 2021-12-17 Image file sharing platform infringement protection method based on block chain and IPFS Pending CN114401092A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111554945.4A CN114401092A (en) 2021-12-17 2021-12-17 Image file sharing platform infringement protection method based on block chain and IPFS

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111554945.4A CN114401092A (en) 2021-12-17 2021-12-17 Image file sharing platform infringement protection method based on block chain and IPFS

Publications (1)

Publication Number Publication Date
CN114401092A true CN114401092A (en) 2022-04-26

Family

ID=81226217

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111554945.4A Pending CN114401092A (en) 2021-12-17 2021-12-17 Image file sharing platform infringement protection method based on block chain and IPFS

Country Status (1)

Country Link
CN (1) CN114401092A (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010010729A1 (en) * 2000-01-21 2001-08-02 Kohichi Kamijoh Image processing apparatus and method therefor
CN104717072A (en) * 2015-03-10 2015-06-17 南京师范大学 Remote-sensing image authentication method based on perceptual hash and elliptic curve
CN107086920A (en) * 2017-06-20 2017-08-22 无锡井通网络科技有限公司 Copyright based on block chain really weighs method
CN108897775A (en) * 2018-06-01 2018-11-27 昆明理工大学 A kind of rapid image identifying system and method based on perceptual hash
CN109547500A (en) * 2019-01-21 2019-03-29 信雅达系统工程股份有限公司 A kind of data sharing method and system for protecting user data ownership
CN109614775A (en) * 2018-11-20 2019-04-12 安徽大学 A kind of protect-ing frame structure and method that the copyright based on block chain is traced to the source
US20190182047A1 (en) * 2017-12-07 2019-06-13 NEC Laboratories Europe GmbH Method and system for securely sharing validation information using blockchain technology
CN110110500A (en) * 2019-06-04 2019-08-09 施建锋 Has the decentralization image copyright protection system and method that infringement detects immediately
CN110427895A (en) * 2019-08-06 2019-11-08 李震 A kind of video content similarity method of discrimination based on computer vision and system
CN110929230A (en) * 2019-12-04 2020-03-27 腾讯科技(深圳)有限公司 Work management method, device, equipment and storage medium
CN111460395A (en) * 2020-04-03 2020-07-28 北京邮电大学 Shared data storage and copyright protection tracing method and system
KR20200093262A (en) * 2019-01-28 2020-08-05 주식회사 린아레나 Method for proving original contents of knowledge sharing service using blockchain technology and system thereof
CN113763225A (en) * 2021-05-17 2021-12-07 西安电子科技大学 Image perception hashing method, system and equipment and information data processing terminal

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20010010729A1 (en) * 2000-01-21 2001-08-02 Kohichi Kamijoh Image processing apparatus and method therefor
CN104717072A (en) * 2015-03-10 2015-06-17 南京师范大学 Remote-sensing image authentication method based on perceptual hash and elliptic curve
CN107086920A (en) * 2017-06-20 2017-08-22 无锡井通网络科技有限公司 Copyright based on block chain really weighs method
US20190182047A1 (en) * 2017-12-07 2019-06-13 NEC Laboratories Europe GmbH Method and system for securely sharing validation information using blockchain technology
CN108897775A (en) * 2018-06-01 2018-11-27 昆明理工大学 A kind of rapid image identifying system and method based on perceptual hash
CN109614775A (en) * 2018-11-20 2019-04-12 安徽大学 A kind of protect-ing frame structure and method that the copyright based on block chain is traced to the source
CN109547500A (en) * 2019-01-21 2019-03-29 信雅达系统工程股份有限公司 A kind of data sharing method and system for protecting user data ownership
KR20200093262A (en) * 2019-01-28 2020-08-05 주식회사 린아레나 Method for proving original contents of knowledge sharing service using blockchain technology and system thereof
CN110110500A (en) * 2019-06-04 2019-08-09 施建锋 Has the decentralization image copyright protection system and method that infringement detects immediately
CN110427895A (en) * 2019-08-06 2019-11-08 李震 A kind of video content similarity method of discrimination based on computer vision and system
CN110929230A (en) * 2019-12-04 2020-03-27 腾讯科技(深圳)有限公司 Work management method, device, equipment and storage medium
CN111460395A (en) * 2020-04-03 2020-07-28 北京邮电大学 Shared data storage and copyright protection tracing method and system
CN113763225A (en) * 2021-05-17 2021-12-07 西安电子科技大学 Image perception hashing method, system and equipment and information data processing terminal

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
张鑫港;闫浩文;张黎明;: "一种用于DEM数据认证与篡改定位的感知哈希算法", 地球信息科学学报, no. 03 *
杨帆;: "运用哈希算法的图片版权保护", 电子技术, no. 11 *

Similar Documents

Publication Publication Date Title
US10972807B2 (en) Dynamic watermarking of digital media content at point of transmission
Cao et al. Coverless information hiding based on the molecular structure images of material.
US20150074107A1 (en) Storing and serving images in memory boxes
US10606888B2 (en) Image inventory production
US8406571B2 (en) Automatic super-resolution transformation for images
US20090044128A1 (en) Adaptive publishing of content
WO2021129435A1 (en) Method for training video definition evaluation model, video recommendation method, and related device
US10614539B2 (en) Detecting multiple parts of a screen to fingerprint to detect abusive uploading videos
CN108345685A (en) More granularity data processing methods, system, equipment and storage medium under block chain
US10034031B2 (en) Generating a single content entity to manage multiple bitrate encodings for multiple content consumption platforms
Liu et al. Coverless image steganography based on DenseNet feature mapping
CN112868224A (en) Techniques to capture and edit dynamic depth images
CN106503112B (en) Video retrieval method and device
US10958987B1 (en) Matching based on video data
US20140029854A1 (en) Metadata supersets for matching images
CN111898544A (en) Character and image matching method, device and equipment and computer storage medium
US9264584B2 (en) Video synchronization
CN114401092A (en) Image file sharing platform infringement protection method based on block chain and IPFS
CN113011254A (en) Video data processing method, computer equipment and readable storage medium
CN115250352A (en) Partitioning ASTC textures into sub-image sets
CN109657098B (en) Video fingerprint extraction method and device
CN108984614B (en) Visual image rapid identification method based on big data environment
Li et al. Research on Night Tourism Recommendation Based on Intelligent Image Processing Technology
Wei et al. Which gray level should be given the smallest cost for adaptive steganography?
Kokoulin Distributed storage approach in content delivery networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination