CN114936354B - Information processing method and device for engineering supervision - Google Patents

Information processing method and device for engineering supervision Download PDF

Info

Publication number
CN114936354B
CN114936354B CN202210557082.4A CN202210557082A CN114936354B CN 114936354 B CN114936354 B CN 114936354B CN 202210557082 A CN202210557082 A CN 202210557082A CN 114936354 B CN114936354 B CN 114936354B
Authority
CN
China
Prior art keywords
image
watermark
information
user side
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210557082.4A
Other languages
Chinese (zh)
Other versions
CN114936354A (en
Inventor
陈成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Yuncheng Information Technology Co ltd
Original Assignee
Zhejiang Yuncheng Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Yuncheng Information Technology Co ltd filed Critical Zhejiang Yuncheng Information Technology Co ltd
Priority to CN202210557082.4A priority Critical patent/CN114936354B/en
Publication of CN114936354A publication Critical patent/CN114936354A/en
Application granted granted Critical
Publication of CN114936354B publication Critical patent/CN114936354B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Closed-Circuit Television Systems (AREA)
  • Alarm Systems (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The embodiment of the disclosure discloses an information processing method and device for engineering supervision, when an image acquisition request of a user side is triggered through a preset component, acquiring an image related to engineering, wherein watermark information is added to the image, and the watermark information comprises shooting time; when the user side detects that the image acquisition is finished, automatically sending the image and watermark information contained in the image to a preset block chain for chain linking and structured storage; after the image is linked, the image and the watermark information contained in the image can be called to verify the authenticity of the image; after the user side detects that the image acquisition is finished, detecting whether the user side is networked currently, and if the user side is networked, automatically sending the image to a preset block chain for uplink; if not, the image is automatically uploaded after the networking is detected. The technical problem that images related to engineering are false in the related technology is solved.

Description

Information processing method and device for engineering supervision
Technical Field
The present disclosure relates to the field of data processing technology for engineering supervision, and in particular, to an information processing method and apparatus for engineering supervision.
Background
In engineering consultation and engineering supervision industries, picture fixing evidences are generally required, for example, a certain project is in a key node stage, photographing may be required, evidence is retained, and progress comparison is performed through photographing time before and after.
But in practical applications, if the picture is forged, it causes a problem of false report.
Disclosure of Invention
The main purpose of the present disclosure is to provide an information processing method and apparatus for engineering supervision.
In order to achieve the above object, according to a first aspect of the present disclosure, there is provided an information processing method for engineering supervision, including: when an image acquisition request of a user side is triggered through a preset component, acquiring an image related to a project, wherein watermark information is added to the image, and the watermark information comprises shooting time; when the user side detects that the image acquisition is finished, automatically sending the image and watermark information contained in the image to a preset block chain for chain linking and structured storage; after the image is linked, the image and the watermark information contained in the image can be called to verify the authenticity of the image; after the user side detects that the image acquisition is finished, detecting whether the user side is networked currently, and if the user side is networked, automatically sending the image to a preset block chain for uplink; if not, storing the currently acquired image into a gallery; encrypting the image stored in the gallery to freeze the image so that the image state is changed into an uneditable state; and after the networking is detected, the frozen image is decrypted and automatically uploaded.
Optionally, when the frozen image is decrypted and automatically uploaded, the image is uploaded according to the chronological order stored in the gallery.
Optionally, before the image capturing request of the user side is triggered by the preset component, the method further includes: detecting whether a user side is connected with a network currently, if not, locking a preset component of the user side for triggering an image acquisition request so as to keep the preset component in a non-triggerable state; and when the current networking of the user side is detected, changing the preset component from the non-triggerable state to the triggerable state.
Optionally, the method further comprises: and sending the images of the uplink and the watermark information contained in the images to a mutually-trusted block chain.
Optionally, the method further comprises: acquiring account information for logging in the user side; adding watermark account information to an image when acquiring the image related to the project; and the image and the watermark account information in the image are structurally stored during the chain winding, wherein the image and the watermark account information contained in the image can be called to verify the authenticity of the image after the chain winding.
Optionally, the method further comprises: adding watermark positioning information to the image when acquiring the image related to the engineering; and the image and the watermark positioning information in the image are structurally stored during the chain winding, wherein the image and the watermark positioning information contained in the image can be called for verifying the authenticity of the image after the chain winding.
Optionally, the watermark positioning information contained in the image can be called to verify the authenticity of the image, including: the method comprises the steps of performing uplink on a movement track of a user terminal in a preset time period, wherein the movement track can be used for predicting a position corresponding to the shooting time of any image; and judging the matching degree of the watermark positioning information and the position, and if the matching degree meets the preset condition, determining that the watermark positioning information is real.
Optionally, the watermark positioning information contained in the image can be called to verify the authenticity of the image, including: when the authenticity verification is carried out, the method comprises the following steps: acquiring a plurality of images after chain loading, and sequencing the images according to the time sequence of the chain loading to obtain the serialized watermark positioning information; based on a preset engineering positioning sequence, judging the similarity between the sequence of the watermark positioning information and the preset engineering positioning sequence; if the similarity does not meet a preset value, false locations exist in the plurality of images.
Optionally, the method further comprises: and labeling a keyword label on the image based on the information of the watermark, wherein the image can be retrieved based on the keyword label.
According to a second aspect of the present disclosure, there is provided a computer-readable storage medium storing computer instructions for causing a computer to execute the information processing method for engineering supervision described in any one of the implementations of the first aspect.
According to a third aspect of the present disclosure, there is provided an electronic device comprising: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores a computer program executable by the at least one processor, and the computer program is executed by the at least one processor to cause the at least one processor to execute the information processing method for engineering supervision according to any one of the implementations of the first aspect.
The information processing method and device for engineering supervision in the embodiment of the disclosure comprise the following steps: when an image acquisition request of a user side is triggered through a preset component, acquiring an image related to a project, wherein watermark information is added to the image, and the watermark information comprises shooting time; when the user side detects that the image acquisition is finished, automatically sending the image and watermark information contained in the image to a preset block chain for chain linking and structured storage; after the image is linked, the image and the watermark information contained in the image can be called to verify the authenticity of the image; after the user side detects that the image acquisition is finished, detecting whether the user side is networked currently, and if the user side is networked, automatically sending the image to a preset block chain for uplink; if not, the image is automatically uploaded after the networking is detected. By adding watermark information and combining with a block chain technology, authenticity of images and image information related to engineering is prevented, and the technical problem that images related to engineering are false in the related technology is solved.
Drawings
In order to more clearly illustrate the detailed description of the present disclosure or the technical solutions in the prior art, the drawings used in the detailed description or the prior art descriptions will be briefly described below, it is obvious that the drawings in the following description are some embodiments of the present disclosure, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a flow chart of an information processing method for engineering supervision according to an embodiment of the present disclosure;
fig. 2 is a schematic diagram of an electronic device according to an embodiment of the disclosure.
Detailed Description
In order to make the technical solutions of the present disclosure better understood by those skilled in the art, the technical solutions of the embodiments of the present disclosure will be clearly and completely described below with reference to the drawings in the embodiments of the present disclosure, and it is obvious that the described embodiments are only some embodiments of the present disclosure, not all embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present disclosure without making creative efforts shall fall within the protection scope of the present disclosure.
It should be noted that the terms "first," "second," and the like in the description and claims of the present disclosure and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the present disclosure may be described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In the present disclosure, the terms "upper", "lower", "left", "right", "front", "rear", "top", "bottom", "inner", "outer", "middle", "vertical", "horizontal", "lateral", "longitudinal", and the like indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings. These terms are used primarily to better describe the present disclosure and its embodiments, and are not used to limit the indicated devices, elements or components to a particular orientation or to be constructed and operated in a particular orientation.
Moreover, some of the above terms may be used to indicate other meanings besides the orientation or positional relationship, for example, the term "on" may also be used to indicate some kind of attachment or connection relationship in some cases. The specific meaning of these terms in this disclosure can be understood by one of ordinary skill in the art as a matter of context.
Furthermore, the terms "mounted," "disposed," "provided," "connected," and "sleeved" are to be construed broadly. For example, it may be a fixed connection, a removable connection, or a unitary construction; can be a mechanical connection, or an electrical connection; may be directly connected, or indirectly connected through intervening media, or may be in internal communication between two devices, elements or components. The specific meaning of the above terms in the present disclosure can be understood by those of ordinary skill in the art as appropriate.
It should be noted that, in the present disclosure, the embodiments and features of the embodiments may be combined with each other without conflict. The present disclosure will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
According to an embodiment of the present disclosure, there is provided an information processing method for engineering supervision, as shown in fig. 1, the method includes the following steps 101 to 103:
step 101: when an image acquisition request of a user side is triggered through a preset component, acquiring an image related to engineering, wherein watermark information is added to the image, and the watermark information comprises shooting time.
In this embodiment, the user terminal may be a device for image capturing, the device may be a mobile phone, a tablet, or the like, and the device may be capable of capturing images and also has a function of remote communication. The user can trigger the shooting assembly of the image through the preset page of the user side, then enter the shooting page to complete the shooting of the project site image, and when the image shooting is completed, the shooting page can be automatically uploaded to the server side.
In the process of checking the engineering image, the engineering can be supervised based on the relevant information of the image (such as the shooting time of the image, the position in the image, the image shooting user), for example, the progress supervision and the like. The relevant information of the image is false, including the false shooting time, for example, the project image of a certain link in 4 months and 1 day is replaced by the project image in 1 month and 1 day; shooting place false, for example, a place image of the place A is replaced by a place image of the place B; the photographing user is false, for example, the information of the photographing user a is replaced with the B user, etc., which are merely exemplary. Thus, when shooting, the user end can add watermark information to the shot image, the watermark information and the image can be structurally stored, and the watermark information can comprise shooting time. By adding the watermark shooting time to the image, the engineering image can be ensured to have the recordable performance and the authenticity of the time during shooting. It is understood that the watermark information may also include account information, positioning information, and the like.
Step 102: when the user side detects that the image acquisition is finished, automatically sending the image and watermark information contained in the image to a preset block chain for chain linking and structured storage; after the image is linked, the image and watermark information contained in the image can be called to verify the authenticity of the image, wherein when the user detects that the image is acquired completely, whether the user is currently networked or not is detected, and if the user is networked, the image is automatically sent to a preset block chain for linking; if not, storing the currently acquired image into the gallery; encrypting the image stored in the gallery to freeze the image so that the image state is changed into a non-editable state; and after the networking is detected, the frozen image is decrypted and automatically uploaded.
In this embodiment, by linking the image and the watermark information in the image, the problem that the authenticity of the image information cannot be ensured by manually inputting the image information in the related art is solved. After the image acquisition is finished, the shot image can be automatically linked, when the shot image is uploaded, the watermark information in the image is also linked, and the image and the watermark information after the chain is linked are structurally stored. In the embodiment, the chain is automatically wound once the image is shot, so that the information of the image can be prevented from being tampered. Furthermore, the images and image information of the chain can be called, and the called supervisor can compare the information of the images and images with the information of other images and images to realize project supervision.
The block chain may be set on a server that receives image information, and the block chain may be a public chain or a private chain, which is not limited herein.
Furthermore, after the image is collected, the image can be automatically uploaded to a block chain, so that the image can be photographed and uploaded, and the watermark information of the image can be prevented from being tampered, for example, the watermark information can be changed by trimming the image through image trimming software. However, since there is an area with a poor network in the engineering environment, such as a basement, a non-network engineering area, etc., the ue of this embodiment may continue to upload and uplink images after detecting that the ue is networked.
Further, in the current non-networking state, in order to avoid tampering with the currently shot image, the current image shooting page can be locked, so that the shot current page cannot be used, and the shooting completion state is always maintained. However, if only one picture is taken, the picture can be guaranteed not to be tampered with in the above manner, and in reality, a plurality of pictures may need to be taken in the non-net area, so that the tamper-proofing function can be implemented in the following manner in the embodiment.
The captured image may be encrypted in a predetermined manner such that the captured image cannot be edited, including but not limited to export, local editing, and the like. And after the user side detects networking, the encrypted image can be decrypted, and the decrypted image is subjected to uplink transmission.
When the encryption is realized, the following method can be used for realizing the encryption: the image can be compressed and encrypted firstly, and after the encrypted compressed packet is obtained, the storage format of the compressed packet is changed to obtain the encrypted image which cannot be read, modified and the like.
Through the optional implementation mode, the image and the information of the image can be prevented from being tampered.
As an optional implementation manner of this embodiment, when the frozen image is decrypted and automatically uploaded, the image is uploaded according to the time sequence stored in the gallery.
In the optional implementation mode, the images stored in the gallery can be stored in sequence according to the shooting time, the cochain can be carried out according to the sequence during cochain, the authenticity of the shooting time sequence can be guaranteed through the mode, and the method can be used for restoring the shooting sequence based on the authenticity, so that whether false pictures exist in the group of pictures or not can be distinguished.
As an optional implementation manner of this embodiment, before the image capturing request of the user side is triggered by the preset component, the method further includes: detecting whether a user side is networked currently, and if not, locking a preset component of the user side for triggering an image acquisition request so as to keep the preset component in a non-triggerable state; and when the current networking of the user side is detected, changing the preset component from the non-triggerable state to the triggerable state.
In this optional implementation manner, in addition to the above-disclosed purpose of preventing tampering by using an encryption manner, when networking is not detected, the component for shooting may be locked so that it cannot be triggered, and thus image acquisition cannot be completed. By the optional implementation mode, the images can be acquired only under the condition of networking, and then are immediately uploaded after being acquired, so that the problem that the images are tampered is avoided.
As an optional implementation manner of this embodiment, the method further includes: the method further comprises the following steps: and sending the images of the upper chain and the watermark information contained in the images to a mutually trusted block chain.
In this optional implementation manner, the preset blockchain may further establish a mutual trust mechanism with a third-party blockchain, and the image without the abnormality may be sent to the third-party blockchain in real time, so as to implement the call of the third-party blockchain. The third party blockchain may be a blockchain set by a third party that needs to acquire the project image data, and the third party may be a receiver or a supervisor of the project, and so on.
As an optional implementation manner of this embodiment, account information for logging in the user side is obtained; adding watermark account information to an image when acquiring the image related to the project; and the image and the watermark account information in the image are structurally stored during the uplink, wherein the image and the watermark account information contained in the image can be called for verifying the authenticity of the image after the uplink.
In this optional implementation, the image related to the project generally needs to determine information of a shooting user of the image, so that a login account can be acquired, the shooting user can be uniquely determined by the account, and the account information can be added to the image during image acquisition. After the account information and the image are linked together, the image and the information can be called to check whether a user indicated by the account information in the watermark is consistent with the information of the uploader, during checking, login account information of a user side during linking can be obtained, the login account information is compared with the watermark account information in the image, and whether the two information are consistent is checked.
As an optional implementation manner of this embodiment, the method further includes: adding watermark positioning information to the image when acquiring the image related to the engineering; and the image and the watermark positioning information in the image are structurally stored during the uplink, wherein the image and the watermark positioning information contained in the image can be called for verifying the authenticity of the image after the uplink.
In this optional implementation manner, the watermark information may also be automatically tagged with positioning information, in addition to the tagged shooting time and the account number of the shooting user, where the positioning information is used to indicate the location where the image is shot, and it is very important to determine the authenticity of the positioning information in the engineering supervision link. Therefore, according to the optional implementation mode, the watermark information can be added during image acquisition, and the situation that a target image-taking place is replaced by another place during evidence storage in an information input mode is avoided.
Further, when performing positioning, a preset mode may be adopted to avoid that the user implements virtual positioning at the user side, and the mode is not limited herein. However, the problem of virtual positioning cannot be avoided in percentage by this method, so that the optional implementation method may further perform watermark addition by obtaining the positioning information of the trust device, and the trust device may interact with the user side.
As an optional implementation manner of this embodiment, the watermark positioning information included in the image may be called to verify the authenticity of the image, including: sending the movement track of the user side in a preset time period to the server side so that the server side can predict the position corresponding to the shooting time based on the movement track; and judging the matching degree of the watermark positioning information and the position, and if the matching degree meets the preset condition, determining that the watermark positioning information is real.
In this optional implementation manner, when the user terminal shoots the engineering image, the user terminal may record the movement track in real time, and uplink the movement track in the uplink process. When authenticity verification is required, watermark positioning information in images arranged according to a time sequence can be extracted to obtain a sequence of the watermark positioning information; comparing the sequence with the movement track within the shooting time, (specifically, the watermark positioning sequence corresponds to the shooting time, a real position point can be determined from the movement track of the user end based on the time, and the watermark positioning information is compared with the real position point), so that which image watermark positioning information may be false can be obtained. Since the actual location point and the watermark positioning information at a certain time may be in a situation that the actual location point and the watermark positioning information may not be completely identical due to factors such as devices, it may be determined whether there is a counterfeit by comparing the similarity between the watermark positioning information sequence and the movement track sequence, for example, the watermark positioning information sequence { a, B, C }, and the movement track sequence may include the following location points { a, P, M, N, B, Q }, and the matching degree of the two sequences may be calculated to determine whether the watermark positioning information is counterfeit. And the rule for judging the sequence similarity can be set according to the business requirements.
As an optional implementation manner of this embodiment, the watermark positioning information included in the image may be called to verify the authenticity of the image, including: acquiring a plurality of images after chain loading, and sequencing the images according to the time sequence of the chain loading to obtain the serialized watermark positioning information; based on a preset engineering positioning sequence, judging the similarity between the sequence of the watermark positioning information and the preset engineering positioning sequence; if the similarity does not meet a preset value, false locations exist in the plurality of images.
In this optional implementation manner, the preset engineering positioning sequence may be customized according to a plan in the engineering, for example, if the time a is at the point a, the time B is at the point B, and the like, then sequencing is performed according to the time sequence of the engineering plan, so as to obtain the planned positioning sequence information; after acquiring the sequence of the watermark positioning information from the block chain, whether the watermark positioning sequence has the fake or not can be determined by calculating the similarity of the two sequences. For example, the engineering positioning sequence { a, B, C, D }, and the watermark positioning sequence { a, Q, B, E, D }, if the similarity between the two sequences is greater than a preset value, it can be considered that there is no counterfeit for the positioning sequence. It will be appreciated that the method of calculating the similarity of the two sequences may be set based on actual traffic requirements.
Furthermore, the authenticity can be judged through an image identification method, after images sorted according to the time sequence are obtained from the block chain, the image content can be identified according to the sequence, and authenticity verification is achieved based on each position point in the engineering positioning sequence. For example, according to the sequence in the watermark positioning information sequence, the image content in each watermark positioning point is identified, and if the identified position sequence is matched with the position point in the engineering positioning sequence (for example, the similarity reaches a preset threshold), then no counterfeiting exists. The image recognition technology can be realized by a trained image recognition model, and the model performs recognition training on the image recognition model by taking images of a plurality of branch position points and a plurality of angles at a certain place as training samples, so that the obtained model can recognize the place corresponding to each image.
Through the optional implementation mode, whether the positioning information of the image is fake or not can be accurately determined.
As an optional implementation manner of this embodiment, the method further includes: and labeling a keyword label on the image based on the information of the watermark, wherein the image can be retrieved based on the keyword label.
In this embodiment, when the image is captured, labeling the uplink image with a keyword tag based on the watermark information (which may include shooting time, watermark account information, and/or watermark positioning information), where the keyword tag may be stored in association with the image; and then when the user inquires the image, the target keyword label which is consistent with the inquired keyword can be determined based on the inquired keyword, and the image corresponding to the target keyword label is the image to be inquired.
In the optional implementation manner, after the chaining, the image itself and the information of the image may be stored in a database, and the retrieval of the image may be realized based on the database, so that in the optional implementation manner, the image is labeled, and the content of the label may be a keyword determined based on the watermark information, and in addition, the keyword may be described in addition to the keyword that may describe the watermark information, and the keyword labeling may be performed according to the content in the image. And after the annotation is finished, the image and the label can be stored in an associated manner. Further, when an image retrieval request is received, a keyword in the request can be obtained, a target keyword similar to or identical to the keyword is determined based on the keyword, and an image associated with the target keyword can be used as a retrieval result.
As an optional implementation manner of this embodiment, before the uplink, the image and the image information are also encrypted. In this alternative implementation, the image and the image information may be encrypted by symmetric encryption or asymmetric encryption before uplink to prevent information leakage.
The embodiment ensures the authenticity of the image based on the information related to the image when the image is shot and the block chain technology; meanwhile, real image information can be presented in a watermark mode, and the supervision efficiency of the engineering image is guaranteed.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than here.
According to an embodiment of the present disclosure, there is also provided an apparatus for implementing the above information processing method for engineering supervision, the apparatus including: the image acquisition unit is configured to acquire an image related to engineering when an image acquisition request of a user side is triggered through a preset component, wherein watermark information is further added to the image, and the watermark information comprises shooting time; the sending unit is configured to automatically send the image and watermark information contained in the image to a preset block chain for chain linking and structured storage when the user side detects that the image acquisition is finished; after the image is linked, the image and the watermark information contained in the image can be called to verify the authenticity of the image; after the user side detects that the image acquisition is finished, detecting whether the user side is networked currently, and if the user side is networked, automatically sending the image to a preset block chain for uplink; if not, storing the currently acquired image into a gallery; encrypting the image stored in the gallery to freeze the image so that the image state is changed into a non-editable state; and after the networking is detected, the frozen image is decrypted and automatically uploaded.
The embodiment of the present disclosure provides an electronic device, as shown in fig. 2, the electronic device includes one or more processors 21 and a memory 22, where one processor 21 is taken as an example in fig. 2.
The controller may further include: an input device 23 and an output device 24.
The processor 21, the memory 22, the input device 23 and the output device 24 may be connected by a bus or other means, which is exemplified in fig. 2.
The processor 21 may be a Central Processing Unit (CPU). The processor 21 may also be other general purpose processors, digital Signal Processors (DSPs), application Specific Integrated Circuits (ASICs), field Programmable Gate Arrays (FPGAs) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or combinations thereof. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 22, which is a non-transitory computer readable storage medium, may be used to store non-transitory software programs, non-transitory computer executable programs, and modules, such as program instructions/modules corresponding to the control methods in the embodiments of the present disclosure. The processor 21 executes various functional applications of the server and data processing by running non-transitory software programs, instructions and modules stored in the memory 22, that is, implements the information processing method for engineering supervision of the above method embodiment.
The memory 22 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to use of a processing device operated by the server, and the like. Further, the memory 22 may include high speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, the memory 22 may optionally include memory located remotely from the processor 21, which may be connected to a network connection device via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input device 23 may receive input numeric or character information and generate key signal inputs related to user settings and function control of the processing device of the server. The output device 24 may include a display device such as a display screen.
One or more modules are stored in the memory 22, which when executed by the one or more processors 21 perform the method as shown in fig. 1.
It will be understood by those skilled in the art that all or part of the processes in the methods according to the embodiments described above may be implemented by instructing relevant hardware through a computer program, and the program may be stored in a computer-readable storage medium, and when executed, may include the processes of the embodiments of the motor control methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-only memory (ROM), a Random Access Memory (RAM), a flash memory (FlashMemory), a hard disk (hard disk drive, abbreviated as HDD) or a Solid State Drive (SSD), etc.; the storage medium may also comprise a combination of memories of the kind described above.
Although the embodiments of the present disclosure have been described in conjunction with the accompanying drawings, those skilled in the art can make various modifications and variations without departing from the spirit and scope of the present disclosure, and such modifications and variations fall within the scope defined by the appended claims.

Claims (8)

1. An information processing method for engineering supervision, comprising:
when an image acquisition request of a user side is triggered through a preset component, acquiring an image related to a project, wherein watermark information is added to the image, and the watermark information comprises shooting time;
when the user side detects that the image acquisition is finished, automatically sending the image and watermark information contained in the image to a preset block chain for chain linking and structured storage; after the image is linked, the image and the watermark information contained in the image can be called to verify the authenticity of the image;
after the user side detects that the image acquisition is finished, detecting whether the user side is networked currently, and if the user side is networked, automatically sending the image to a preset block chain for uplink; if not, storing the currently acquired image into a gallery; encrypting the image stored in the gallery to freeze the image so that the image state is changed into a non-editable state; after the networking is detected, the frozen image is decrypted and then automatically uploaded; when the frozen image is decrypted and automatically uploaded, uploading is carried out according to the time sequence stored in the image library;
adding watermark positioning information to the image when acquiring the image related to the engineering; and the image and the watermark positioning information in the image are structurally stored during the chain, wherein the image and the watermark positioning information contained in the image can be called for verifying the authenticity of the image after the chain is linked;
when the authenticity verification is carried out, the method comprises the following steps: acquiring a plurality of images after chain winding, and sequencing the images according to the time sequence of the chain winding to obtain the serialized watermark positioning information; based on a preset engineering positioning sequence, judging the similarity between the sequence of the watermark positioning information and the preset engineering positioning sequence; if the similarity does not meet a preset value, false locations exist in the plurality of images.
2. The information processing method for engineering supervision according to claim 1, wherein before the image capturing request of the user side is triggered by the preset component, the method further comprises:
detecting whether a user side is networked currently, and if not, locking a preset component of the user side for triggering an image acquisition request so as to keep the preset component in a non-triggerable state;
and when the current networking of the user side is detected, changing the preset component from the non-triggerable state to the triggerable state.
3. The information processing method for engineering supervision according to claim 1, characterized in that the method further comprises:
and sending the images of the upper chain and the watermark information contained in the images to a mutually trusted block chain.
4. The information processing method for engineering supervision according to claim 1, characterized in that the method further comprises:
acquiring account information for logging in the user side;
adding watermark account information to an image when acquiring the image related to the project;
and the image and the watermark account information in the image are structurally stored during the uplink, wherein the image and the watermark account information contained in the image can be called for verifying the authenticity of the image after the uplink.
5. The information processing method for engineering supervision according to claim 1, wherein the watermark positioning information contained in the image can be called to verify the authenticity of the image comprises:
the method comprises the steps that the moving track of a user side in a preset time interval is subjected to uplink winding, wherein the moving track can be used for predicting the position corresponding to the shooting time of any image;
and judging the matching degree of the watermark positioning information and the position, and if the matching degree meets the preset condition, determining that the watermark positioning information is real.
6. The information processing method for engineering supervision according to claim 1, wherein the watermark positioning information contained in the image can be called to verify the authenticity of the image comprises:
acquiring a plurality of images after chain loading, and sequencing the images according to the time sequence of the chain loading to obtain the serialized watermark positioning information; based on a preset engineering positioning sequence, judging the similarity between the sequence of the watermark positioning information and the preset engineering positioning sequence; if the similarity does not meet a preset value, false locations exist in the plurality of images.
7. The information processing method for engineering supervision according to claim 1, characterized in that the method further comprises:
and labeling a keyword label on the image based on the information of the watermark, wherein the image can be retrieved based on the keyword label.
8. An electronic device, comprising: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores a computer program executable by the at least one processor, the computer program being executable by the at least one processor to cause the at least one processor to perform the information processing method for engineering supervision according to any one of claims 1 to 7.
CN202210557082.4A 2022-05-20 2022-05-20 Information processing method and device for engineering supervision Active CN114936354B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210557082.4A CN114936354B (en) 2022-05-20 2022-05-20 Information processing method and device for engineering supervision

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210557082.4A CN114936354B (en) 2022-05-20 2022-05-20 Information processing method and device for engineering supervision

Publications (2)

Publication Number Publication Date
CN114936354A CN114936354A (en) 2022-08-23
CN114936354B true CN114936354B (en) 2023-02-17

Family

ID=82865308

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210557082.4A Active CN114936354B (en) 2022-05-20 2022-05-20 Information processing method and device for engineering supervision

Country Status (1)

Country Link
CN (1) CN114936354B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116405611A (en) * 2023-06-07 2023-07-07 建信金融科技有限责任公司 Image uploading method, system, device, equipment and medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108141366A (en) * 2015-08-03 2018-06-08 真实影像有限公司 For the system and method for certification production image data
CN108521448A (en) * 2018-03-22 2018-09-11 平安信托有限责任公司 Business witnesses method, apparatus, equipment and storage medium
US10325156B1 (en) * 2018-06-25 2019-06-18 Eight Plus Ventures, LLC Manufacture of printed image inventories
CN110084622A (en) * 2019-04-18 2019-08-02 西安邮电大学 A kind of commodity are traced to the source block catenary system and code key saves and method for retrieving
CN112000928A (en) * 2020-07-15 2020-11-27 西安电子科技大学 Picture distributed infringement right confirming method, system, storage medium and computer equipment
CN112084932A (en) * 2020-09-07 2020-12-15 中国平安财产保险股份有限公司 Data processing method, device and equipment based on image recognition and storage medium
CN112650875A (en) * 2020-12-22 2021-04-13 深圳壹账通智能科技有限公司 House image verification method and device, computer equipment and storage medium
CN112667976A (en) * 2021-03-18 2021-04-16 深圳佳兆业科技集团有限公司 Offline task processing method and device, computer equipment and storage medium
CN112749636A (en) * 2020-12-29 2021-05-04 精英数智科技股份有限公司 Method, device and system for monitoring water exploration and drainage of coal mine and storage medium
CN114462817A (en) * 2022-01-14 2022-05-10 珠海格力电器股份有限公司 Verification method, verification device, electronic equipment and storage medium

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104284125B (en) * 2013-07-08 2018-12-07 腾讯科技(深圳)有限公司 A kind of multimedia shooting processing method, apparatus and system
CN106210928A (en) * 2016-08-10 2016-12-07 深圳市企拍文化科技有限公司 Add real-time geographical locations information watermaking system and method in video
US10361866B1 (en) * 2018-08-13 2019-07-23 Truepic Inc. Proof of image authentication on a blockchain
CN110362571A (en) * 2019-06-25 2019-10-22 智链万源(北京)数字科技有限公司 Data safety retroactive method and device based on block chain
SG11202002395UA (en) * 2019-08-12 2020-04-29 Alibaba Group Holding Ltd Blockchain-based service of process
CN111145069B (en) * 2019-12-03 2021-04-27 支付宝(杭州)信息技术有限公司 Image watermarking processing method and device based on block chain
CN111738896A (en) * 2020-05-27 2020-10-02 山西东易园智能家居科技有限公司 Picture watermark compression method based on block chain
CN112419136A (en) * 2020-11-23 2021-02-26 平安普惠企业管理有限公司 Picture watermark adding method and device, electronic equipment and storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108141366A (en) * 2015-08-03 2018-06-08 真实影像有限公司 For the system and method for certification production image data
CN108521448A (en) * 2018-03-22 2018-09-11 平安信托有限责任公司 Business witnesses method, apparatus, equipment and storage medium
US10325156B1 (en) * 2018-06-25 2019-06-18 Eight Plus Ventures, LLC Manufacture of printed image inventories
CN110084622A (en) * 2019-04-18 2019-08-02 西安邮电大学 A kind of commodity are traced to the source block catenary system and code key saves and method for retrieving
CN112000928A (en) * 2020-07-15 2020-11-27 西安电子科技大学 Picture distributed infringement right confirming method, system, storage medium and computer equipment
CN112084932A (en) * 2020-09-07 2020-12-15 中国平安财产保险股份有限公司 Data processing method, device and equipment based on image recognition and storage medium
CN112650875A (en) * 2020-12-22 2021-04-13 深圳壹账通智能科技有限公司 House image verification method and device, computer equipment and storage medium
CN112749636A (en) * 2020-12-29 2021-05-04 精英数智科技股份有限公司 Method, device and system for monitoring water exploration and drainage of coal mine and storage medium
CN112667976A (en) * 2021-03-18 2021-04-16 深圳佳兆业科技集团有限公司 Offline task processing method and device, computer equipment and storage medium
CN114462817A (en) * 2022-01-14 2022-05-10 珠海格力电器股份有限公司 Verification method, verification device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN114936354A (en) 2022-08-23

Similar Documents

Publication Publication Date Title
US11128838B2 (en) Systems and methods for automated cloud-based analytics for security and/or surveillance
US10361866B1 (en) Proof of image authentication on a blockchain
US20170373859A1 (en) Cryptographic Signature System and Related Systems and Methods
US9063956B2 (en) Assisted photo-tagging with facial recognition models
US8503718B2 (en) Using camera signatures from uploaded images to authenticate users of an online system
US8634712B1 (en) Real time transmission of photographic images from portable handheld devices
CN111159651A (en) Block chain online evidence storage method and system
KR102213120B1 (en) System and method for providing smart contract of content sharing for integrity verification based on blockchain
CN114936354B (en) Information processing method and device for engineering supervision
EP3029598B1 (en) Method implemented by computer for capturing evidentiary audiovisual and/or multimedia information and computer program
CN111800740B (en) Data remote acquisition method and device, computer equipment and storage medium
CN105447642A (en) Engineering digital photograph verification system based on two-dimension code and verification method
CN112464030B (en) Suspicious person determination method and suspicious person determination device
CN113254964A (en) Log security certificate storage method and device, electronic equipment and storage medium
CN117395474B (en) Locally stored tamper-resistant video evidence obtaining and storing method and system
JP6989592B2 (en) Computer system for generating authentication data
US20210099772A1 (en) System and method for verification of video integrity based on blockchain
CN111386711A (en) Method, device and system for managing electronic fingerprints of electronic files
CN112771527A (en) Information processing program, information processing apparatus, and information processing method
CN106339953B (en) Construction engineering on-site detection management system and method based on Internet of things
CN114040223A (en) Image processing method and system
CN114596643B (en) Parking management method, device and storage medium
CN107666573A (en) The method for recording of object video and device, computing device under camera scene
CN111767579A (en) Certificate storage method and device, computer equipment and storage medium
US10861495B1 (en) Methods and systems for capturing and transmitting media

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant