CN114936354A - Information processing method and device for engineering supervision - Google Patents

Information processing method and device for engineering supervision Download PDF

Info

Publication number
CN114936354A
CN114936354A CN202210557082.4A CN202210557082A CN114936354A CN 114936354 A CN114936354 A CN 114936354A CN 202210557082 A CN202210557082 A CN 202210557082A CN 114936354 A CN114936354 A CN 114936354A
Authority
CN
China
Prior art keywords
image
watermark
information
user side
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210557082.4A
Other languages
Chinese (zh)
Other versions
CN114936354B (en
Inventor
陈成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Yuncheng Information Technology Co Ltd
Original Assignee
Zhejiang Yuncheng Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Yuncheng Information Technology Co Ltd filed Critical Zhejiang Yuncheng Information Technology Co Ltd
Priority to CN202210557082.4A priority Critical patent/CN114936354B/en
Publication of CN114936354A publication Critical patent/CN114936354A/en
Application granted granted Critical
Publication of CN114936354B publication Critical patent/CN114936354B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Closed-Circuit Television Systems (AREA)
  • Alarm Systems (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The embodiment of the disclosure discloses an information processing method and device for engineering supervision, when an image acquisition request of a user side is triggered through a preset component, acquiring an image related to engineering, wherein watermark information is added to the image, and the watermark information comprises shooting time; when the user side detects that the image acquisition is finished, automatically sending the image and watermark information contained in the image to a preset block chain for chain linking and structured storage; after the image is linked, the image and the watermark information contained in the image can be called to verify the authenticity of the image; after the user side detects that the image acquisition is finished, detecting whether the user side is networked currently, and if the user side is networked, automatically sending the image to a preset block chain for uplink; if not, the image is automatically uploaded after the networking is detected. The technical problem that images related to engineering are false in the related technology is solved.

Description

Information processing method and device for engineering supervision
Technical Field
The disclosure relates to the technical field of data processing of engineering supervision, in particular to an information processing method and device for engineering supervision.
Background
In engineering consultation and engineering supervision industries, picture fixing evidences are generally required, for example, a certain project is in a key node stage, photographing may be required, evidence is retained, and progress comparison is performed through photographing time before and after.
But in practical applications, if the picture is forged, a false report problem is caused.
Disclosure of Invention
The main purpose of the present disclosure is to provide an information processing method and apparatus for engineering supervision.
In order to achieve the above object, according to a first aspect of the present disclosure, there is provided an information processing method for engineering supervision, including: when an image acquisition request of a user side is triggered through a preset component, acquiring an image related to a project, wherein watermark information is added to the image, and the watermark information comprises shooting time; when the user side detects that the image acquisition is finished, automatically sending the image and watermark information contained in the image to a preset block chain for chain linking and structured storage; after the image is linked, the image and the watermark information contained in the image can be called to verify the authenticity of the image; after the user side detects that the image acquisition is finished, detecting whether the user side is networked currently, and if the user side is networked, automatically sending the image to a preset block chain for uplink; if not, storing the currently acquired image into a gallery; encrypting the image stored in the gallery to freeze the image so that the image state is changed into an uneditable state; and after the networking is detected, the frozen image is decrypted and automatically uploaded.
Optionally, when the frozen image is decrypted and automatically uploaded, the image is uploaded according to the time sequence stored in the gallery.
Optionally, before the image capturing request of the user side is triggered by the preset component, the method further includes: detecting whether a user side is networked currently, and if not, locking a preset component of the user side for triggering an image acquisition request so as to keep the preset component in a non-triggerable state; and when the current networking of the user terminal is detected, the preset component is changed from the non-triggerable state to the triggerable state.
Optionally, the method further comprises: and sending the images of the uplink and the watermark information contained in the images to a mutually-trusted block chain.
Optionally, the method further comprises: acquiring account information for logging in the user side; adding watermark account information to an image when acquiring the image related to the project; and the image and the watermark account information in the image are structurally stored during the uplink, wherein the image and the watermark account information contained in the image can be called for verifying the authenticity of the image after the uplink.
Optionally, the method further comprises: adding watermark positioning information to the image when acquiring the image related to the engineering; and the image and the watermark positioning information in the image are structurally stored during the chain winding, wherein the image and the watermark positioning information contained in the image can be called for verifying the authenticity of the image after the chain winding.
Optionally, the watermark positioning information contained in the image can be called to verify the authenticity of the image, including: the method comprises the steps of performing uplink on a movement track of a user terminal in a preset time period, wherein the movement track can be used for predicting a position corresponding to the shooting time of any image; and judging the matching degree of the watermark positioning information and the position, and if the matching degree meets the preset condition, determining that the watermark positioning information is real.
Optionally, the watermark positioning information contained in the image can be called to verify the authenticity of the image, including: when the authenticity verification is carried out, the method comprises the following steps: acquiring a plurality of images after chain loading, and sequencing the images according to the time sequence of the chain loading to obtain the serialized watermark positioning information; based on a preset engineering positioning sequence, judging the similarity between the sequence of the watermark positioning information and the preset engineering positioning sequence; if the similarity does not meet a preset value, false locations exist in the plurality of images.
Optionally, the method further comprises: and labeling a keyword label on the image based on the information of the watermark, wherein the image can be retrieved based on the keyword label.
According to a second aspect of the present disclosure, there is provided a computer-readable storage medium storing computer instructions for causing a computer to execute the information processing method for engineering supervision described in any one of the implementations of the first aspect.
According to a third aspect of the present disclosure, there is provided an electronic device comprising: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores a computer program executable by the at least one processor, the computer program being executable by the at least one processor to cause the at least one processor to perform the information processing method for engineering supervision according to any one of the implementations of the first aspect.
The information processing method and device for engineering supervision in the embodiment of the disclosure comprise the following steps: when an image acquisition request of a user side is triggered through a preset component, acquiring an image related to a project, wherein watermark information is added to the image, and the watermark information comprises shooting time; when the user side detects that the image acquisition is finished, automatically sending the image and watermark information contained in the image to a preset block chain for chain linking and structured storage; after the image is linked, the image and the watermark information contained in the image can be called to verify the authenticity of the image; after the user side detects that the image acquisition is finished, detecting whether the user side is networked currently, and if the user side is networked, automatically sending the image to a preset block chain for uplink; if not, the image is automatically uploaded after the networking is detected. By adding watermark information and combining with a block chain technology, authenticity of images and image information related to engineering is prevented, and the technical problem that images related to engineering are false in the related technology is solved.
Drawings
In order to more clearly illustrate the embodiments of the present disclosure or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present disclosure, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a flow chart of an information processing method for engineering supervision according to an embodiment of the present disclosure;
fig. 2 is a schematic diagram of an electronic device according to an embodiment of the disclosure.
Detailed Description
In order to make the technical solutions of the present disclosure better understood by those skilled in the art, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the drawings in the embodiments of the present disclosure, and it is obvious that the described embodiments are only some embodiments of the present disclosure, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments disclosed herein without making any creative effort, shall fall within the protection scope of the present disclosure.
It should be noted that the terms "first," "second," and the like in the description and claims of the present disclosure and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the present disclosure may be described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In the present disclosure, the terms "upper", "lower", "left", "right", "front", "rear", "top", "bottom", "inner", "outer", "middle", "vertical", "horizontal", "lateral", "longitudinal", and the like indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings. These terms are used primarily to better describe the present disclosure and its embodiments, and are not used to limit the indicated devices, elements or components to a particular orientation or to be constructed and operated in a particular orientation.
Moreover, some of the above terms may be used to indicate other meanings besides the orientation or positional relationship, for example, the term "on" may also be used to indicate some kind of attachment or connection relationship in some cases. The specific meaning of these terms in this disclosure can be understood by one of ordinary skill in the art as a matter of context.
Furthermore, the terms "mounted," "disposed," "provided," "connected," and "sleeved" are to be construed broadly. For example, it may be a fixed connection, a removable connection, or a unitary construction; can be a mechanical connection, or an electrical connection; may be directly connected, or indirectly connected through intervening media, or may be in internal communication between two devices, elements or components. The specific meaning of the above terms in the present disclosure can be understood by those of ordinary skill in the art as appropriate.
It should be noted that, in the present disclosure, the embodiments and features of the embodiments may be combined with each other without conflict. The present disclosure will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
According to an embodiment of the present disclosure, there is provided an information processing method for engineering supervision, as shown in fig. 1, the method includes the following steps 101 to 103:
step 101: when an image acquisition request of a user side is triggered through a preset component, acquiring an image related to engineering, wherein watermark information is added to the image, and the watermark information comprises shooting time.
In this embodiment, the user terminal may be a device for image capturing, the device may capture an image and also have a function of remote communication, and the device may be a mobile phone, a tablet, or the like. The user can trigger the shooting assembly of the image through the preset page of the user side, then enter the shooting page to complete the shooting of the project site image, and when the image shooting is completed, the shooting page can be automatically uploaded to the server side.
In the process of checking the engineering image, the engineering can be supervised based on the relevant information of the image (such as the shooting time of the image, the position in the image, the image shooting user), for example, the progress supervision and the like. The relevant information of the image is false, including the false shooting time, for example, the engineering image of a certain link in 4 months and 1 day is replaced by the engineering image in 1 month and 1 day; shooting place false, for example, a place image of the place A is replaced by a place image of the place B; the photographing user is false, for example, the information of the photographing user a is replaced with the B user, etc., which are merely exemplary. Thus, when shooting, the user end can add watermark information to the shot image, the watermark information and the image can be structurally stored, and the watermark information can comprise shooting time. By adding the watermark shooting time to the image, the engineering image can be ensured to have the recordable performance and the authenticity of the time during shooting. It is understood that the watermark information may also include account information, positioning information, and the like.
Step 102: when the user side detects that the image acquisition is finished, automatically sending the image and watermark information contained in the image to a preset block chain for chain linking and structured storage; after the image is linked, the image and watermark information contained in the image can be called to verify the authenticity of the image, wherein when a user terminal detects that the image is acquired, whether the user terminal is currently networked or not is detected, and if the user terminal is networked, the image is automatically sent to a preset block chain for linking; if not, storing the currently acquired image into the gallery; encrypting the image stored in the gallery to freeze the image so that the image state is changed into a non-editable state; and after the networking is detected, the frozen image is decrypted and automatically uploaded.
In this embodiment, by linking the image and the watermark information in the image, the problem that the authenticity of the image information cannot be ensured by manually inputting the image information in the related art is solved. After the image is collected, the shot image can be automatically subjected to chain loading, during uploading, the watermark information in the image is also subjected to chain loading, and the image and the watermark information after chain loading are structurally stored. In this embodiment, the image is automatically linked up once being photographed, so as to prevent the information of the image from being tampered. Furthermore, the images and image information of the chain can be called, and the called supervisor can compare the information of the images and images with the information of other images and images based on the information of the images and images to realize project supervision.
The block chain may be set on a server that receives the image information, and the block chain may be a public chain or a private chain, which is not limited herein.
Furthermore, after the image is collected, the image can be automatically uploaded to a block chain, so that the image can be photographed and uploaded, and the watermark information of the image can be prevented from being tampered, for example, the watermark information can be changed by trimming the image through image trimming software. However, since there is an area with a poor network in the engineering environment, such as a basement, a non-network engineering area, etc., the ue of this embodiment may continue to upload and uplink images after detecting that the ue is networked.
Further, in the current non-networking state, in order to avoid tampering with the currently shot image, the current image shooting page can be locked, so that the shot current page cannot be used, and the shooting completion state is always maintained. However, if only one picture is taken, it can be ensured that the picture is not tampered, and in practice, multiple pictures may need to be taken in a non-web area, so the present embodiment can implement the function of tamper resistance in the following implementation manner.
The captured image may be encrypted in a predetermined manner such that the captured image cannot be edited, including but not limited to export, local editing, and the like. And after the user side detects networking, the encrypted image can be decrypted, and the decrypted image is subjected to uplink transmission.
When the encryption is realized, the following method can be used for realizing the encryption: the image can be compressed and encrypted firstly, and after the encrypted compressed packet is obtained, the storage format of the compressed packet is changed to obtain the encrypted image which cannot be read, modified and the like.
Through the optional implementation mode, the image and the information of the image can be prevented from being tampered.
As an optional implementation manner of this embodiment, when the frozen image is decrypted and automatically uploaded, the frozen image is uploaded according to the time sequence stored in the gallery.
In the optional implementation mode, the images stored in the gallery can be stored in sequence according to the shooting time, the cochain can be carried out according to the sequence during cochain, the authenticity of the shooting time sequence can be guaranteed through the mode, and the method can be used for restoring the shooting sequence based on the authenticity, so that whether false pictures exist in the group of pictures or not can be distinguished.
As an optional implementation manner of this embodiment, before the image capturing request of the user side is triggered by the preset component, the method further includes: detecting whether a user side is networked currently, and if not, locking a preset component of the user side for triggering an image acquisition request so as to keep the preset component in a non-triggerable state; and when the current networking of the user terminal is detected, the preset component is changed from the non-triggerable state to the triggerable state.
In this optional implementation manner, in addition to the purpose of tamper prevention through the encryption manner disclosed above, when networking is not detected, the component for shooting may be locked so that it cannot be triggered, and thus image acquisition cannot be completed. The optional implementation mode can ensure that the image can be collected only under the condition of networking, and then the image is uploaded immediately after being collected, so that the problem that the image is tampered is avoided.
As an optional implementation manner of this embodiment, the method further includes: the method further comprises the following steps: and sending the images of the uplink and the watermark information contained in the images to a mutually-trusted block chain.
In this optional implementation manner, the preset blockchain may further establish a mutual trust mechanism with a third-party blockchain, and the image without the abnormality may be sent to the third-party blockchain in real time, so as to implement the call of the third-party blockchain. The third party blockchain may be a blockchain set by a third party that needs to acquire the project image data, and the third party may be a receiver or a supervisor of the project, and so on.
As an optional implementation manner of this embodiment, account information for logging in the user side is obtained; adding watermark account information to an image when acquiring the image related to the project; and the image and the watermark account information in the image are structurally stored during the uplink, wherein the image and the watermark account information contained in the image can be called for verifying the authenticity of the image after the uplink.
In this optional implementation, the image related to the project generally needs to determine information of a shooting user of the image, so that a login account can be acquired, the shooting user can be uniquely determined by the account, and the account information can be added to the image during image acquisition. After the account information and the image are linked together, the image and the information can be called to check whether the user indicated by the account information in the watermark is consistent with the information of the uploader, during checking, login account information of the user side during linking can be acquired, the login account information is compared with the watermark account information in the image, and whether the two information are consistent is checked.
As an optional implementation manner of this embodiment, the method further includes: adding watermark positioning information to the image when acquiring the image related to the engineering; and the image and the watermark positioning information in the image are structurally stored during the uplink, wherein the image and the watermark positioning information contained in the image can be called for verifying the authenticity of the image after the uplink.
In this optional implementation manner, the watermark information may also be automatically tagged with positioning information, in addition to the tagged shooting time and the account number of the shooting user, where the positioning information is used to indicate the location where the image is shot, and it is very important to determine the authenticity of the positioning information in the engineering supervision link. Therefore, according to the optional implementation mode, the watermark information can be added during image acquisition, and the situation that a target image-taking place is replaced by another place during evidence storage in an information input mode is avoided.
Further, when performing positioning, a preset mode may be adopted to avoid the user from implementing virtual positioning at the user side, and the mode is not limited herein. However, the problem of virtual positioning cannot be avoided in percentage by this method, so that the optional implementation method may further perform watermark addition by obtaining the positioning information of the trust device, and the trust device may interact with the user side.
As an optional implementation manner of this embodiment, the watermark positioning information included in the image may be called to verify the authenticity of the image, including: sending the movement track of the user side in a preset time period to the server side so that the server side can predict the position corresponding to the shooting time based on the movement track; and judging the matching degree of the watermark positioning information and the position, and if the matching degree meets the preset condition, determining that the watermark positioning information is real.
In this optional implementation manner, when the user terminal shoots the engineering image, the user terminal may record the movement track in real time, and uplink the movement track in the uplink process. When authenticity verification is required, watermark positioning information in images arranged according to a time sequence can be extracted to obtain a sequence of the watermark positioning information; comparing the sequence with the movement track within the shooting time, (specifically, the watermark positioning sequence corresponds to the shooting time, a real position point can be determined from the movement track of the user end based on the time, and the watermark positioning information is compared with the real position point), so that which image the watermark positioning information in may be false. Since the true location point and the watermark positioning information at a certain time may not be completely identical due to factors such as devices, it is possible to determine whether the watermark positioning information is counterfeit by comparing the similarity between the watermark positioning information sequence and the movement track sequence, for example, the watermark positioning information sequence { A, B, C }, and the movement track sequence may include the location point { A, P, M, N, B, Q }, and it is possible to calculate the matching degree of the two sequences to determine whether the watermark positioning information is counterfeit. And the rule for judging the sequence similarity can be set according to the business requirements.
As an optional implementation manner of this embodiment, the watermark positioning information included in the image may be called to verify the authenticity of the image, including: acquiring a plurality of images after chain loading, and sequencing the images according to the time sequence of the chain loading to obtain the serialized watermark positioning information; based on a preset engineering positioning sequence, judging the similarity between the sequence of the watermark positioning information and the preset engineering positioning sequence; if the similarity does not meet a preset value, false locations exist in the plurality of images.
In this optional implementation manner, the preset engineering positioning sequence may be customized according to a plan in the engineering, for example, if the time a is at the point a, and the time B is at the point B, the preset engineering positioning sequence is ordered according to the time sequence of the engineering plan, so as to obtain the planned positioning sequence information; after acquiring the sequence of the watermark positioning information from the block chain, whether the watermark positioning sequence has the fake or not can be determined by calculating the similarity of the two sequences. For example, the engineering positioning sequence { a, B, C, D }, and the watermark positioning sequence { a, Q, B, E, D }, if the similarity between the two sequences is greater than a preset value, it can be considered that there is no counterfeit for the positioning sequence. It will be appreciated that the method of calculating the similarity of the two sequences may be set based on actual traffic requirements.
Furthermore, the authenticity can be judged through an image identification method, after images sorted according to the time sequence are obtained from the block chain, the image content can be identified according to the sequence, and authenticity verification is achieved based on each position point in the engineering positioning sequence. For example, according to the sequence in the watermark positioning information sequence, the image content in each watermark positioning point is identified, and if the identified position sequence is matched with the position point in the engineering positioning sequence (for example, the similarity reaches a preset threshold), then no counterfeiting exists. The image recognition technology can be realized by a trained image recognition model, and the model performs recognition training on the image recognition model by taking images of a plurality of branch position points and a plurality of angles at a certain position as training samples, so that the obtained model can recognize the position corresponding to each image.
Through the optional implementation mode, whether the positioning information of the image is fake or not can be accurately determined.
As an optional implementation manner of this embodiment, the method further includes: labeling a keyword label to the image based on the information of the watermark, wherein the image can be retrieved based on the keyword label.
In this embodiment, when the image is collected, a keyword tag is labeled on the uplink image based on the watermark information (which may include shooting time, watermark account information, and/or watermark positioning information), and the tag may be stored in association with the image; and then when the user inquires the image, the target keyword label which is consistent with the inquired keyword can be determined based on the inquired keyword, and the image corresponding to the target keyword label is the image to be inquired.
In the optional implementation manner, after the chaining, the image itself and the information of the image may be stored in a database, and the retrieval of the image may be realized based on the database, so that in the optional implementation manner, the image is labeled, and the content of the label may be a keyword determined based on the watermark information, and in addition, the keyword may be described in addition to the keyword that may describe the watermark information, and the keyword labeling may be performed according to the content in the image. And after the annotation is finished, the image and the label can be stored in an associated manner. Further, when an image retrieval request is received, a keyword in the request can be obtained, a target keyword similar to or identical to the keyword is determined based on the keyword, and an image associated with the target keyword can be used as a retrieval result.
As an optional implementation manner of this embodiment, before uplink, the image and the image information are also encrypted. In this alternative implementation, the image and the image information may be encrypted by symmetric encryption or asymmetric encryption before uplink to prevent information leakage.
The embodiment ensures the authenticity of the image based on the information related to the image when the image is shot and the block chain technology; meanwhile, real image information can be presented in a watermark mode, and the supervision efficiency of the engineering image is guaranteed.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
According to an embodiment of the present disclosure, there is also provided an apparatus for implementing the above information processing method for engineering supervision, the apparatus including: the system comprises an image acquisition unit, a processing unit and a display unit, wherein the image acquisition unit is configured to acquire an image related to engineering when an image acquisition request of a user side is triggered through a preset component, and watermark information is added to the image and comprises shooting time; the sending unit is configured to automatically send the image and watermark information contained in the image to a preset block chain for chain linking and structured storage when the user side detects that the image acquisition is finished; after the image is linked, the image and the watermark information contained in the image can be called to verify the authenticity of the image; after the user side detects that the image acquisition is finished, detecting whether the user side is networked currently, and if the user side is networked, automatically sending the image to a preset block chain for uplink; if not, storing the currently acquired image into a gallery; encrypting the image stored in the gallery to freeze the image so that the image state is changed into a non-editable state; and after the networking is detected, the frozen image is decrypted and automatically uploaded.
The embodiment of the present disclosure provides an electronic device, as shown in fig. 2, the electronic device includes one or more processors 21 and a memory 22, where one processor 21 is taken as an example in fig. 2.
The controller may further include: an input device 23 and an output device 24.
The processor 21, the memory 22, the input device 23 and the output device 24 may be connected by a bus or other means, which is exemplified in fig. 2.
The processor 21 may be a Central Processing Unit (CPU). The processor 21 may also be other general purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or any combination thereof. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 22, which is a non-transitory computer-readable storage medium, may be used to store non-transitory software programs, non-transitory computer-executable programs, and modules, such as program instructions/modules corresponding to the control methods in the embodiments of the present disclosure. The processor 21 executes various functional applications of the server and data processing by running non-transitory software programs, instructions and modules stored in the memory 22, namely, implements the information processing method for engineering supervision of the above method embodiment.
The memory 22 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to use of a processing device operated by the server, and the like. Further, the memory 22 may include high speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, the memory 22 may optionally include memory located remotely from the processor 21, which may be connected to a network connection device via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input device 23 may receive input numeric or character information and generate key signal inputs related to user settings and function control of the processing device of the server. The output device 24 may include a display device such as a display screen.
One or more modules are stored in the memory 22, which when executed by the one or more processors 21 perform the method as shown in FIG. 1.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program to instruct related hardware, and the program can be stored in a computer readable storage medium, and when executed, the program can include the processes of the embodiments of the motor control methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-only memory (ROM), a Random Access Memory (RAM), a flash memory (FlashMemory), a hard disk (hard disk drive, abbreviated as HDD) or a Solid State Drive (SSD), etc.; the storage medium may also comprise a combination of memories of the kind described above.
Although the embodiments of the present disclosure have been described in conjunction with the accompanying drawings, those skilled in the art may make various modifications and variations without departing from the spirit and scope of the present disclosure, and such modifications and variations fall within the scope defined by the appended claims.

Claims (10)

1. An information processing method for engineering supervision, comprising:
when an image acquisition request of a user side is triggered through a preset component, acquiring an image related to a project, wherein watermark information is added to the image, and the watermark information comprises shooting time;
when the user side detects that the image acquisition is finished, automatically sending the image and watermark information contained in the image to a preset block chain for chain linking and structured storage; after the image is linked, the image and the watermark information contained in the image can be called to verify the authenticity of the image;
after the user side detects that the image acquisition is finished, detecting whether the user side is networked currently, and if the user side is networked, automatically sending the image to a preset block chain for uplink; if not, storing the currently acquired image into a gallery; encrypting the image stored in the gallery to freeze the image so that the image state is changed into a non-editable state; and after the networking is detected, the frozen image is decrypted and automatically uploaded.
2. The information processing method for engineering supervision according to claim 1, characterized in that when the frozen image is decrypted and automatically uploaded, the uploading is performed according to the chronological order stored in the gallery.
3. The information processing method for engineering supervision according to claim 1, wherein before the image capturing request of the user side is triggered by the preset component, the method further comprises:
detecting whether a user side is networked currently, and if not, locking a preset component of the user side for triggering an image acquisition request so as to keep the preset component in a non-triggerable state;
and when the current networking of the user side is detected, changing the preset component from the non-triggerable state to the triggerable state.
4. The information processing method for engineering supervision according to claim 1, characterized in that the method further comprises:
and sending the images of the upper chain and the watermark information contained in the images to a mutually trusted block chain.
5. The information processing method for engineering supervision according to claim 1, characterized in that the method further comprises:
acquiring account information for logging in the user side;
adding watermark account information to an image when acquiring the image related to the project;
and the image and the watermark account information in the image are structurally stored during the uplink, wherein the image and the watermark account information contained in the image can be called for verifying the authenticity of the image after the uplink.
6. The information processing method for engineering supervision according to claim 2, characterized in that the method further comprises:
adding watermark positioning information to the image when acquiring the image related to the engineering;
and the image and the watermark positioning information in the image are structurally stored during the chain winding, wherein the image and the watermark positioning information contained in the image can be called for verifying the authenticity of the image after the chain winding.
7. The information processing method for engineering supervision according to claim 6, characterized in that the watermark locating information contained in the image can be called for authenticity verification of the image comprises:
the method comprises the steps of performing uplink on a movement track of a user terminal in a preset time period, wherein the movement track can be used for predicting a position corresponding to the shooting time of any image;
and judging the matching degree of the watermark positioning information and the position, and if the matching degree meets the preset condition, determining that the watermark positioning information is real.
8. The information processing method for engineering supervision according to claim 6, characterized in that the watermark locating information contained in the image can be called for authenticity verification of the image comprises:
when the authenticity verification is carried out, the method comprises the following steps: acquiring a plurality of images after chain winding, and sequencing the images according to the time sequence of the chain winding to obtain the serialized watermark positioning information;
based on a preset engineering positioning sequence, judging the similarity between the sequence of the watermark positioning information and the preset engineering positioning sequence;
if the similarity does not meet a preset value, false locations exist in the plurality of images.
9. The information processing method for engineering supervision according to claim 1, characterized in that the method further comprises:
and labeling a keyword label on the image based on the information of the watermark, wherein the image can be retrieved based on the keyword label.
10. An electronic device, comprising: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores a computer program executable by the at least one processor, the computer program being executable by the at least one processor to cause the at least one processor to perform the information processing method for engineering supervision according to any one of claims 1 to 9.
CN202210557082.4A 2022-05-20 2022-05-20 Information processing method and device for engineering supervision Active CN114936354B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210557082.4A CN114936354B (en) 2022-05-20 2022-05-20 Information processing method and device for engineering supervision

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210557082.4A CN114936354B (en) 2022-05-20 2022-05-20 Information processing method and device for engineering supervision

Publications (2)

Publication Number Publication Date
CN114936354A true CN114936354A (en) 2022-08-23
CN114936354B CN114936354B (en) 2023-02-17

Family

ID=82865308

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210557082.4A Active CN114936354B (en) 2022-05-20 2022-05-20 Information processing method and device for engineering supervision

Country Status (1)

Country Link
CN (1) CN114936354B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115426350A (en) * 2022-09-23 2022-12-02 北京有竹居网络技术有限公司 Image uploading method, image uploading device, electronic equipment and storage medium
CN116405611A (en) * 2023-06-07 2023-07-07 建信金融科技有限责任公司 Image uploading method, system, device, equipment and medium
CN117874425A (en) * 2023-12-14 2024-04-12 浙江云程信息科技有限公司 Building material data structured cleaning method and system based on artificial intelligence

Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104284125A (en) * 2013-07-08 2015-01-14 腾讯科技(深圳)有限公司 Multimedia shooting processing method, device and system
CN106210928A (en) * 2016-08-10 2016-12-07 深圳市企拍文化科技有限公司 Add real-time geographical locations information watermaking system and method in video
CN108141366A (en) * 2015-08-03 2018-06-08 真实影像有限公司 For the system and method for certification production image data
CN108521448A (en) * 2018-03-22 2018-09-11 平安信托有限责任公司 Business witnesses method, apparatus, equipment and storage medium
US10325156B1 (en) * 2018-06-25 2019-06-18 Eight Plus Ventures, LLC Manufacture of printed image inventories
US10361866B1 (en) * 2018-08-13 2019-07-23 Truepic Inc. Proof of image authentication on a blockchain
CN110084622A (en) * 2019-04-18 2019-08-02 西安邮电大学 A kind of commodity are traced to the source block catenary system and code key saves and method for retrieving
CN110362571A (en) * 2019-06-25 2019-10-22 智链万源(北京)数字科技有限公司 Data safety retroactive method and device based on block chain
CN111108522A (en) * 2019-08-12 2020-05-05 阿里巴巴集团控股有限公司 Block chain based summons delivery
CN111145069A (en) * 2019-12-03 2020-05-12 支付宝(杭州)信息技术有限公司 Image watermarking processing method and device based on block chain
CN111738896A (en) * 2020-05-27 2020-10-02 山西东易园智能家居科技有限公司 Picture watermark compression method based on block chain
CN112000928A (en) * 2020-07-15 2020-11-27 西安电子科技大学 Picture distributed infringement right confirming method, system, storage medium and computer equipment
CN112084932A (en) * 2020-09-07 2020-12-15 中国平安财产保险股份有限公司 Data processing method, device and equipment based on image recognition and storage medium
CN112419136A (en) * 2020-11-23 2021-02-26 平安普惠企业管理有限公司 Picture watermark adding method and device, electronic equipment and storage medium
CN112650875A (en) * 2020-12-22 2021-04-13 深圳壹账通智能科技有限公司 House image verification method and device, computer equipment and storage medium
CN112667976A (en) * 2021-03-18 2021-04-16 深圳佳兆业科技集团有限公司 Offline task processing method and device, computer equipment and storage medium
CN112749636A (en) * 2020-12-29 2021-05-04 精英数智科技股份有限公司 Method, device and system for monitoring water exploration and drainage of coal mine and storage medium
CN114462817A (en) * 2022-01-14 2022-05-10 珠海格力电器股份有限公司 Verification method, verification device, electronic equipment and storage medium

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104284125A (en) * 2013-07-08 2015-01-14 腾讯科技(深圳)有限公司 Multimedia shooting processing method, device and system
CN108141366A (en) * 2015-08-03 2018-06-08 真实影像有限公司 For the system and method for certification production image data
CN106210928A (en) * 2016-08-10 2016-12-07 深圳市企拍文化科技有限公司 Add real-time geographical locations information watermaking system and method in video
CN108521448A (en) * 2018-03-22 2018-09-11 平安信托有限责任公司 Business witnesses method, apparatus, equipment and storage medium
US10325156B1 (en) * 2018-06-25 2019-06-18 Eight Plus Ventures, LLC Manufacture of printed image inventories
US10361866B1 (en) * 2018-08-13 2019-07-23 Truepic Inc. Proof of image authentication on a blockchain
CN110084622A (en) * 2019-04-18 2019-08-02 西安邮电大学 A kind of commodity are traced to the source block catenary system and code key saves and method for retrieving
CN110362571A (en) * 2019-06-25 2019-10-22 智链万源(北京)数字科技有限公司 Data safety retroactive method and device based on block chain
CN111108522A (en) * 2019-08-12 2020-05-05 阿里巴巴集团控股有限公司 Block chain based summons delivery
CN111145069A (en) * 2019-12-03 2020-05-12 支付宝(杭州)信息技术有限公司 Image watermarking processing method and device based on block chain
CN111738896A (en) * 2020-05-27 2020-10-02 山西东易园智能家居科技有限公司 Picture watermark compression method based on block chain
CN112000928A (en) * 2020-07-15 2020-11-27 西安电子科技大学 Picture distributed infringement right confirming method, system, storage medium and computer equipment
CN112084932A (en) * 2020-09-07 2020-12-15 中国平安财产保险股份有限公司 Data processing method, device and equipment based on image recognition and storage medium
CN112419136A (en) * 2020-11-23 2021-02-26 平安普惠企业管理有限公司 Picture watermark adding method and device, electronic equipment and storage medium
CN112650875A (en) * 2020-12-22 2021-04-13 深圳壹账通智能科技有限公司 House image verification method and device, computer equipment and storage medium
CN112749636A (en) * 2020-12-29 2021-05-04 精英数智科技股份有限公司 Method, device and system for monitoring water exploration and drainage of coal mine and storage medium
CN112667976A (en) * 2021-03-18 2021-04-16 深圳佳兆业科技集团有限公司 Offline task processing method and device, computer equipment and storage medium
CN114462817A (en) * 2022-01-14 2022-05-10 珠海格力电器股份有限公司 Verification method, verification device, electronic equipment and storage medium

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115426350A (en) * 2022-09-23 2022-12-02 北京有竹居网络技术有限公司 Image uploading method, image uploading device, electronic equipment and storage medium
CN116405611A (en) * 2023-06-07 2023-07-07 建信金融科技有限责任公司 Image uploading method, system, device, equipment and medium
CN117874425A (en) * 2023-12-14 2024-04-12 浙江云程信息科技有限公司 Building material data structured cleaning method and system based on artificial intelligence
CN117874425B (en) * 2023-12-14 2024-07-02 浙江云程信息科技有限公司 Building material data structured cleaning method and system based on artificial intelligence

Also Published As

Publication number Publication date
CN114936354B (en) 2023-02-17

Similar Documents

Publication Publication Date Title
CN114936354B (en) Information processing method and device for engineering supervision
US11128838B2 (en) Systems and methods for automated cloud-based analytics for security and/or surveillance
US20170373859A1 (en) Cryptographic Signature System and Related Systems and Methods
US8503718B2 (en) Using camera signatures from uploaded images to authenticate users of an online system
CN111159651A (en) Block chain online evidence storage method and system
KR102213120B1 (en) System and method for providing smart contract of content sharing for integrity verification based on blockchain
CN112464030B (en) Suspicious person determination method and suspicious person determination device
CN110022355B (en) Storage method, verification method and equipment of environment data in specific scene
CN105447642A (en) Engineering digital photograph verification system based on two-dimension code and verification method
CN111800740B (en) Data remote acquisition method and device, computer equipment and storage medium
CN113254964A (en) Log security certificate storage method and device, electronic equipment and storage medium
CN117395474B (en) Locally stored tamper-resistant video evidence obtaining and storing method and system
JP6989592B2 (en) Computer system for generating authentication data
CN111386711A (en) Method, device and system for managing electronic fingerprints of electronic files
US20210099772A1 (en) System and method for verification of video integrity based on blockchain
CN111682955B (en) Tool arrangement device for criminal scene electronic data evidence obtaining
CN106339953B (en) Construction engineering on-site detection management system and method based on Internet of things
CN115618427B (en) Data chaining method, device and data platform
CN114040223A (en) Image processing method and system
CN114418092A (en) Block chain-based federal learning malicious node screening method
CN107666573A (en) The method for recording of object video and device, computing device under camera scene
CN111767579A (en) Certificate storage method and device, computer equipment and storage medium
CN112784285A (en) Evidence obtaining system
US20230306583A1 (en) System and method for improving admissibility of electronic evidence
US20230089680A1 (en) Systems and Methods Using Cameras on Smartphones to Provide Provably Trusted and Authentic Photographs of Persons, Locations, Items, and Property

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant