CN115410075A - Method, system and storage medium for dynamically configurable detection of tampering of photographed image - Google Patents

Method, system and storage medium for dynamically configurable detection of tampering of photographed image Download PDF

Info

Publication number
CN115410075A
CN115410075A CN202210961997.1A CN202210961997A CN115410075A CN 115410075 A CN115410075 A CN 115410075A CN 202210961997 A CN202210961997 A CN 202210961997A CN 115410075 A CN115410075 A CN 115410075A
Authority
CN
China
Prior art keywords
photographing
picture
user
configuration information
protocol configuration
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210961997.1A
Other languages
Chinese (zh)
Inventor
彭率
谭谈
丁明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Xuanwu Wireless Technology Co Ltd
Original Assignee
Guangzhou Xuanwu Wireless Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Xuanwu Wireless Technology Co Ltd filed Critical Guangzhou Xuanwu Wireless Technology Co Ltd
Priority to CN202210961997.1A priority Critical patent/CN115410075A/en
Publication of CN115410075A publication Critical patent/CN115410075A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/95Pattern authentication; Markers therefor; Forgery detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/547Remote procedure calls [RPC]; Web services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/74Image or video pattern matching; Proximity measures in feature spaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/94Hardware or software architectures specially adapted for image or video understanding
    • G06V10/95Hardware or software architectures specially adapted for image or video understanding structured as a network, e.g. client-server architectures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/96Management of image or video recognition tasks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2209/00Indexing scheme relating to G06F9/00
    • G06F2209/54Indexing scheme relating to G06F9/54
    • G06F2209/541Client-server
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2209/00Indexing scheme relating to G06F9/00
    • G06F2209/54Indexing scheme relating to G06F9/54
    • G06F2209/544Remote
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2209/00Indexing scheme relating to G06F9/00
    • G06F2209/54Indexing scheme relating to G06F9/54
    • G06F2209/545Gui

Abstract

The application discloses a method, a system and a storage medium for dynamically configurable detection of tampering of photographing; the method is applied to a server and comprises the steps of receiving protocol configuration information submitted by a user after the user configures a photographing detection control on an IDE tool; and responding to a request of the user terminal for logging in the application platform, and sending the protocol configuration information to the user terminal so that the user terminal can analyze the protocol configuration information to render the control and take a picture. When the method is applied to a user side, the method comprises the steps of configuring a photographing detection control on an IDE tool and submitting protocol configuration information to a server; after logging in an application platform, receiving protocol configuration information sent by a server; and analyzing the protocol configuration information to render the control and then take a picture. The photographing detection support page dynamic configurable function meets the requirement of inconsistent photographing and submitted data in different service scenes, can be adapted to various monitoring scenes, supports dynamic registration of built-in monitoring types, reduces the configuration difficulty and reduces the secondary development cost.

Description

Method, system and storage medium for dynamically configurable detection of tampering of photographed image
Technical Field
The present application relates to the field of computer application development technologies, and in particular, to a method, a system, and a storage medium for dynamically configurable detection of tampering of photographed images.
Background
In the field of application development, in order to reduce development difficulty, display pages of some application platforms are dynamically configured based on a low-code development platform, and dynamic rendering is mainly performed by issuing a configuration file to a mobile terminal. In order to improve the function of the dynamic configuration page, it is very critical to provide a tamper detection function for the photographed image for the dynamic configuration page.
At present, common photographing modes are divided into three types, wherein the first type is based on a fixed photographing control provided by a mobile phone system; the second is that a user triggers a photographing control based on a self-defined camera providing button; the third is a control for actively acquiring data of each frame output by the camera based on the self-defined camera. However, these photographing methods have their own obvious drawbacks: firstly, can't acquire camera data voluntarily, there is not expansibility. Although the method can meet the requirements in a normal scene, the camera imaging data cannot be acquired actively, and the method cannot be prevented when the photographing data is detected to be tampered. Secondly, for diversified scenes, the functions of the method are lost, and when third-party software intercepts or tampers data output by a system camera by means of an illegal method, the current scheme cannot detect whether the camera data is tampered or replaced.
Disclosure of Invention
The application aims to provide a method, a system and a storage medium for dynamically configuring and detecting photographing tampering so as to solve the problem that the conventional photographing method cannot detect whether photographing data is tampered or can detect tampering but cannot intervene in time.
In order to achieve the above object, the present application provides a method for dynamically configurable detecting that a photographed image is tampered, applied to a server, including:
responding to a request of a user side for logging in an IDE tool, and receiving protocol configuration information submitted by the user after the user configures a photographing detection control on the IDE tool;
and responding to a request of the user terminal for logging in the application platform, sending protocol configuration information to the user terminal so that the user terminal analyzes the protocol configuration information to render the control, and taking a picture by using the rendered picture detection control.
Further, the configuring of the photo detection control on the IDE tool includes:
and configuring the number of the shot pictures, picture copying detection and picture abnormity detection information.
Further, the photographing by using the rendered photographing detection control includes:
when the picture is detected to be abnormal, judging whether a popup window is displayed or not to prompt a user to stop photographing;
if yes, deleting the current shot picture at the user side, and receiving an abnormal picture uploaded by the user side;
if not, enabling the user to submit the data normally, and receiving the abnormal photos uploaded by the user side.
Further, the detecting the picture abnormality includes detecting an abnormality that the photographed picture is tampered, including:
acquiring image stream data output by a photographing control, and replacing the image stream data with a preset first image;
when the preview picture is abnormal, obtaining a second image after the user terminal takes a picture;
comparing the image frame of the second image with the preview frame of the first image; if the images are the same, the current photographed image is considered to be tampered; and if the difference is not the same, the current photographed image is not tampered.
Further, the detecting the picture abnormality includes detecting an abnormality that the photographed picture is tampered, and further includes:
acquiring image stream data output by the photographing control and entering a normal preview interface;
starting a photographing tampering function to enable the user terminal to photograph to obtain a third image;
comparing the image frame of the third image with the preview frame of the normal preview interface; if the images are the same, the current photographed image is considered to be tampered; and if the difference is not the same, the current photographed image is not tampered.
The application also provides a method for dynamically configuring and detecting the tampered photographing, which is applied to a user side and comprises the following steps:
sending a request for logging in an IDE tool, after the server responds and successfully logs in the IDE tool, configuring a photographing detection control on the IDE tool, and submitting protocol configuration information to the server;
sending a request for logging in the application platform, and receiving protocol configuration information sent by the server after the server responds and successfully logs in the application platform;
and resolving the protocol configuration information to render the control, and photographing by using the rendered photographing detection control.
Further, the configuring of the photo detection control on the IDE tool includes:
and configuring the number of the shot pictures, picture copying detection and picture abnormity detection information.
Further, the photographing by using the rendered photographing detection control includes:
when the picture is detected to be abnormal, judging whether a popup window is displayed or not to prompt a user to stop photographing;
if yes, after deleting the current shot picture at the user side, receiving an abnormal picture uploaded by the user side;
if not, enabling the user to submit the data normally, and receiving the abnormal photos uploaded by the user side.
The application also provides a system for dynamically configuring and detecting the tampered photographing, which comprises a server and a user side;
the server, comprising:
the first response unit is used for responding to a request of a user side for logging in an IDE tool, and receiving protocol configuration information submitted by a user after the user configures a photographing detection control on the IDE tool;
the second response unit is used for responding to a request of the user terminal for logging in the application platform, sending the protocol configuration information to the user terminal so that the user terminal can analyze the protocol configuration information to render the control, and photographing by using the rendered photographing detection control;
the user side comprises:
the IDE configuration unit is used for sending a request for logging in an IDE tool, configuring a photographing detection control on the IDE tool after the server responds and successfully logs in the IDE tool, and submitting protocol configuration information to the server;
the platform login unit is used for sending a request for logging in the application platform, and receiving protocol configuration information sent by the server after the server responds and successfully logs in the application platform;
and the photographing detection unit is used for analyzing the protocol configuration information so as to render the control and photograph by using the rendered photographing detection control.
The present application further provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements a method of dynamically configurable detecting that a photograph has been tampered with as described in any of the above.
Compared with the prior art, the beneficial effects of this application lie in:
the application discloses a method, a system and a storage medium for dynamically configurable detection of tampering of photographing; when the method is applied to the server, the method comprises the steps of responding to a request of a user side for logging in an IDE tool, and receiving protocol configuration information submitted by a user after the user configures a photographing detection control on the IDE tool; and responding to a request of the user terminal for logging in the application platform, sending protocol configuration information to the user terminal so that the user terminal analyzes the protocol configuration information to render the control, and taking a picture by using the rendered picture detection control. When the method is applied to a user side, a request for logging in an IDE tool is sent, after a server responds and successfully logs in the IDE tool, a photographing detection control is configured on the IDE tool, and protocol configuration information is submitted to the server; sending a request for logging in the application platform, and receiving protocol configuration information sent by the server after the server responds and successfully logs in the application platform; and analyzing the protocol configuration information to render the control, and photographing by using the rendered photographing detection control.
The photographing detection support page dynamic configurable function meets the requirement of inconsistent photographing and submitted data in different service scenes; the shooting detection parameters are dynamically configured, so that the method can adapt to various monitoring scenes, support dynamic registration of built-in monitoring types, reduce configuration difficulty and reduce secondary development cost.
Drawings
In order to more clearly illustrate the technical solution of the present application, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
Fig. 1 is a schematic flowchart of a method for detecting tampering of a photographing application in a server according to an embodiment of the present application;
fig. 2 is a schematic flow chart of image detection by using two monitoring methods according to an embodiment of the present application;
fig. 3 is a schematic flowchart of a process for determining whether an image is tampered with in two detection manners according to an embodiment of the present application;
fig. 4 is a schematic flowchart illustrating a method for detecting tampering of photographing applied to a user end according to an embodiment of the present application;
FIG. 5 is a schematic overall flowchart of a method for dynamically configurable detection of tampering with a photographed image according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a system for dynamically configurable detecting that a photographing is tampered according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be understood that the step numbers used herein are for convenience of description only and are not intended as limitations on the order in which the steps are performed.
It is to be understood that the terminology used in the description of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the specification of the present application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
The terms "comprises" and "comprising" indicate the presence of the described features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
The term "and/or" refers to and includes any and all possible combinations of one or more of the associated listed items.
It should be noted that the application platform in the present application is a platform dynamically configured based on a low-code development platform, such as the smart 100 application platform. For convenience of description, the following embodiments will be described with respect to the method of the present application based on the intelligent 100 application platform. It should be emphasized that the example of the smart 100 application platform is only a preferred way, and the application does not limit the type of the development platform.
Referring to fig. 1, an embodiment of the present application provides a method for dynamically configurable detection of photo tampering, which is applied to a server, as shown in fig. 1. The method for dynamically configuring detection of the tampering of the photographed image comprises steps S10 to S20. The method comprises the following steps:
and S10, responding to a request of a user side for logging in the IDE tool, and receiving protocol configuration information submitted by the user after the user configures the photographing detection control on the IDE tool.
In this step, after the user logs in the IDE tool, the user can be matched with the photographing detection control to generate the corresponding protocol configuration information. In a specific embodiment, the configurable information comprises information such as the number of pictures to be shot, picture reproduction detection, picture abnormity detection and the like, and then shooting can be carried out, wherein the information only needs to be configured by a developer, and a user does not feel.
In another embodiment, if the photographing basic information is configured in the application platform, the photographing detection control reads the local protocol when the developer does not have a customization requirement, so that the time required by the developer for configuration is reduced.
S20, responding to a request of a user terminal for logging in an application platform, sending protocol configuration information to the user terminal so that the user terminal can analyze the protocol configuration information to render the control, and taking pictures by using the rendered picture detection control.
Specifically, the photographing by using the rendered photographing detection control includes:
when the picture is detected to be abnormal, judging whether a popup window is displayed or not to prompt a user to stop photographing;
if yes, after deleting the current shot picture at the user side, receiving an abnormal picture uploaded by the user side;
if not, enabling the user to submit the data normally, and receiving the abnormal photos uploaded by the user side.
Referring to fig. 2, in the embodiment, 2 monitoring methods are currently supported according to a picture detection method and a service scenario of a user, and a multi-scenario requirement of the user can be satisfied through the following 2 monitoring methods:
1) And the default of the detection scene is closed, when the service only needs to collect the abnormal picture information, a window is not popped up to prompt the user, and the abnormal picture information can be uploaded when the photographing is finished.
2) When the service needs to collect the abnormal picture information and prompt the user, the mode of the pop-up window can be selected for reminding, and the abnormal picture information can be deleted when the mode is used, so that the abnormal picture information cannot be normally submitted. But the abnormal picture is still collected to the server, and the business side determines how to use the abnormal picture.
In a specific embodiment, detecting the picture abnormality includes detecting that the photographed picture is tampered with, and includes two schemes, as shown in fig. 3. The specific contents are as follows:
acquiring image stream data output by a photographing control, and replacing the image stream data with a preset first image;
when the preview picture is abnormal, obtaining a second image after the user terminal takes a picture;
comparing the image frame of the second image with the preview frame of the first image; if the images are the same, the current photographed image is considered to be tampered; and if the difference is not the same, the current photographed image is not tampered.
The step is a detection strategy provided by the first scheme, when the camera outputs the image data, third-party software is used for tampering the image data, the image data is replaced by a preset picture, so that a preview picture of the camera is abnormal, and the picture which is obtained by shooting and belongs to tampering is clicked at the moment. And at the moment, whether the shot picture is the same as the preview frame image or not is judged by capturing picture frame data and comparing key information, if so, the user is shown to cheat by using third-party software, and if not, the user is shown to be normal and not tampered.
Further, the detecting the picture abnormality includes detecting an abnormality that the photographed picture is tampered, and further includes:
acquiring image stream data output by the photographing control and entering a normal preview interface;
starting a photographing tampering function to enable the user terminal to photograph to obtain a third image;
comparing the image frame of the third image with the preview frame of the normal preview interface; if the images are the same, the current photographed image is considered to be tampered; and if the difference is not the same, the current photographed image is not tampered.
The step is a detection strategy provided by the scheme two, when the camera normally outputs image stream data, a camera preview picture is normal, and the camera preview picture is tampered when the camera clicks to acquire an image, so that the acquired image is a preset image of third-party software. At the moment, key information comparison can be carried out by capturing image frame data, if the key information comparison is completely the same, the user is indicated to cheat by using third-party software, and if the key information comparison is not the same, the user is indicated to be normal and not tampered.
Referring to fig. 4, an embodiment of the present application further provides a method for dynamically configuring and detecting tampering of photographed images, which is applied to a user side, and includes:
s01, sending a request for logging in an IDE tool, after the server responds and successfully logs in the IDE tool, configuring a photographing detection control on the IDE tool, and submitting protocol configuration information to the server;
s02, sending a request for logging in the application platform, and receiving protocol configuration information sent by the server after the server responds and successfully logs in the application platform;
and S03, analyzing the protocol configuration information to render the control, and taking a picture by using the rendered picture detection control.
Preferably, the configuring a photo detection control on the IDE tool includes:
and configuring the number of the shot pictures, picture copying detection and picture abnormity detection information.
Preferably, the photographing by using the rendered photographing detection control includes:
when the picture is detected to be abnormal, judging whether a popup window is displayed or not to prompt a user to stop photographing;
if yes, after deleting the current shot picture at the user side, receiving an abnormal picture uploaded by the user side;
if not, enabling the user to submit the data normally, and receiving the abnormal photos uploaded by the user side.
The foregoing embodiments respectively use the server and the user side as execution subjects, and have been described with respect to the solutions provided in the present application, and in an exemplary embodiment, an overall implementation process of the present application is described. Referring to fig. 5, fig. 5 provides an overall implementation process, specifically, the intelligent 100 developer logs in the IDE tool, drags the photo detection control according to specific business requirements in the IDE and configures the detection mode, and then submits the configured protocol to the server. When a user logs in the intelligent 100 mobile terminal, the user actively acquires a photographing detection control protocol configured on the IDE and renders and displays the photographing detection control protocol. And when the control is clicked, the user jumps to a specific photographing page to photograph, detects the picture by combining a configuration protocol, and uploads the detected abnormal picture to the server when the user finishes photographing.
In summary, the photographing detection of the method for detecting the tampered photographing supports the page dynamic configurable function, and meets the requirement of inconsistent photographing and submitted data in different service scenes; the shooting detection parameters are dynamically configured, so that the method can adapt to various monitoring scenes, support dynamic registration of built-in monitoring types, reduce configuration difficulty and reduce secondary development cost.
Referring to fig. 6, an embodiment of the present application further provides a system for dynamically configurable detection of photographing tampering, which includes a server 100 and a user end 200;
a server 100, comprising:
the first response unit 10 is used for responding to a request of a user side for logging in an IDE tool, and receiving protocol configuration information submitted by the user after the user configures a photographing detection control on the IDE tool;
a second response unit 20, configured to respond to a request for the user to log in the application platform, send protocol configuration information to the user, so that the user parses the protocol configuration information to render the control, and take a picture by using the rendered picture detection control;
the user terminal 200 includes:
the IDE configuration unit 01 is used for sending a request for logging in the IDE tool, configuring a photographing detection control on the IDE tool after the server responds and successfully logs in the IDE tool, and submitting protocol configuration information to the server;
the platform login unit 02 is used for sending a request for logging in the application platform, and receiving protocol configuration information sent by the server after the server responds and successfully logs in the application platform;
and the photographing detection unit 03 is configured to analyze the protocol configuration information to render the control, and photograph by using the rendered photographing detection control.
It can be understood that the system for detecting tampered photographed with dynamically configurable is provided in this application, and is used to execute the method for detecting tampered photographed with dynamically configurable provided in any of the above embodiments, and implement the same effect as that of the method for detecting tampered photographed with dynamically configurable provided in any of the above embodiments, and will not be further described herein.
In another exemplary embodiment, a computer readable storage medium is also provided, which comprises a computer program, which when executed by a processor, implements the steps of the method for dynamically configurable detection of tampering with a picture taking as described in any one of the above embodiments. For example, the computer-readable storage medium may be the above-mentioned memory including a computer program, and the above-mentioned computer program may be executed by a processor of a terminal device to implement the method for dynamically configurable detecting that a photo is tampered with according to any of the above-mentioned embodiments, and achieve the technical effects consistent with the above-mentioned method.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical functional division, and there may be other divisions in actual practice, for example, multiple units or page components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some interfaces, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions to enable a computer device (which may be a personal computer, a server, or a network device) or a processor (processor) to execute some steps of the methods according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
Finally, it should be noted that the above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (10)

1. A method for dynamically configuring and detecting that photographing is tampered is applied to a server and is characterized by comprising the following steps:
responding to a request of a user side for logging in an IDE tool, and receiving protocol configuration information submitted by a user after the user configures a photographing detection control on the IDE tool;
and responding to a request of the user terminal for logging in the application platform, sending protocol configuration information to the user terminal so that the user terminal analyzes the protocol configuration information to render the control, and taking a picture by using the rendered picture detection control.
2. The method of claim 1, wherein configuring the photo detection control on the IDE tool comprises:
and configuring the number of the shot pictures, picture copying detection and picture abnormity detection information.
3. The method for dynamically configurable detection of tampering with a photograph as claimed in claim 1, wherein the photographing using the rendered photograph detection control comprises:
when the picture is detected to be abnormal, judging whether a popup window is displayed or not to prompt a user to stop taking a picture;
if yes, deleting the current shot picture at the user side, and receiving an abnormal picture uploaded by the user side;
if not, enabling the user to submit the data normally, and receiving the abnormal photos uploaded by the user side.
4. The method of claim 3, wherein the detecting the picture abnormality comprises detecting an abnormality that the photographed picture is tampered with, and the method comprises:
acquiring image stream data output by a photographing control, and replacing the image stream data with a preset first image;
when the preview picture is abnormal, obtaining a second image after the user terminal takes a picture;
comparing the image frame of the second image with the preview frame of the first image; if the images are the same, the current photographed image is considered to be tampered; and if the difference is not the same, the current photographed image is not tampered.
5. The method of claim 3, wherein the detecting the picture abnormality comprises detecting an abnormality that the photographed picture is tampered with, and further comprising:
acquiring image stream data output by the photographing control and entering a normal preview interface;
starting a photographing tampering function to enable the user terminal to photograph to obtain a third image;
comparing the image frame of the third image with the preview frame of the normal preview interface; if the images are the same, the current photographed image is considered to be tampered; and if the difference is not the same, the current photographed image is not tampered.
6. A method for dynamically configuring detection of tampering of photographing is applied to a user side, and is characterized by comprising the following steps:
sending a request for logging in an IDE tool, after the server responds and successfully logs in the IDE tool, configuring a photographing detection control on the IDE tool, and submitting protocol configuration information to the server;
sending a request for logging in an application platform, and receiving protocol configuration information sent by a server after the server responds and successfully logs in the application platform;
and analyzing the protocol configuration information to render the control, and photographing by using the rendered photographing detection control.
7. The method of claim 6, wherein configuring the photo detection control on the IDE tool comprises:
and configuring the number of the shot pictures, picture copying detection and picture abnormity detection information.
8. The method for dynamically configurable detection of tampering with a photograph as claimed in claim 6, wherein the photographing with the rendered photograph detection control comprises:
when the picture is detected to be abnormal, judging whether a popup window is displayed or not to prompt a user to stop photographing;
if yes, after deleting the current shot picture at the user side, receiving an abnormal picture uploaded by the user side;
if not, enabling the user to submit the data normally, and receiving the abnormal photos uploaded by the user side.
9. A system for dynamically configuring and detecting the tampered photographing is characterized by comprising a server and a user side;
the server, comprising:
the first response unit is used for responding to a request of a user side for logging in an IDE tool, and receiving protocol configuration information submitted by a user after the user configures a photographing detection control on the IDE tool;
the second response unit is used for responding to a request of the user terminal for logging in the application platform, sending the protocol configuration information to the user terminal so that the user terminal can analyze the protocol configuration information to render the control, and photographing by using the rendered photographing detection control;
the user side comprises:
the IDE configuration unit is used for sending a request for logging in the IDE tool, configuring a photographing detection control on the IDE tool after the server responds and successfully logs in the IDE tool, and submitting protocol configuration information to the server;
the platform login unit is used for sending a request for logging in the application platform, and receiving protocol configuration information sent by the server after the server responds and successfully logs in the application platform;
and the photographing detection unit is used for analyzing the protocol configuration information so as to render the control and photograph by using the rendered photographing detection control.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the method for dynamically configurable detecting that a photograph has been tampered with according to any of claims 1 to 8.
CN202210961997.1A 2022-08-11 2022-08-11 Method, system and storage medium for dynamically configurable detection of tampering of photographed image Pending CN115410075A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210961997.1A CN115410075A (en) 2022-08-11 2022-08-11 Method, system and storage medium for dynamically configurable detection of tampering of photographed image

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210961997.1A CN115410075A (en) 2022-08-11 2022-08-11 Method, system and storage medium for dynamically configurable detection of tampering of photographed image

Publications (1)

Publication Number Publication Date
CN115410075A true CN115410075A (en) 2022-11-29

Family

ID=84159328

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210961997.1A Pending CN115410075A (en) 2022-08-11 2022-08-11 Method, system and storage medium for dynamically configurable detection of tampering of photographed image

Country Status (1)

Country Link
CN (1) CN115410075A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116248992A (en) * 2023-02-09 2023-06-09 广州市玄武无线科技股份有限公司 Dynamically configurable shelf image processing method and device, electronic equipment and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116248992A (en) * 2023-02-09 2023-06-09 广州市玄武无线科技股份有限公司 Dynamically configurable shelf image processing method and device, electronic equipment and storage medium
CN116248992B (en) * 2023-02-09 2024-01-16 广州市玄武无线科技股份有限公司 Dynamically configurable shelf image processing method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
KR101455424B1 (en) Enhancing user experiences using aggregated device usage data
US10455110B2 (en) Suggesting image files for deletion based on image file parameters
US9930492B2 (en) Information processing system, information storage apparatus, and location information storing method
WO2016197657A1 (en) Photographing processing method and apparatus
EP3073394A1 (en) Image processing device, image processing method, program, and recording medium
CN111836052B (en) Image compression method, image compression device, electronic equipment and storage medium
CN115410075A (en) Method, system and storage medium for dynamically configurable detection of tampering of photographed image
CN111428570A (en) Detection method and device for non-living human face, computer equipment and storage medium
US9826155B2 (en) Detecting a document
US20200380103A1 (en) Apparatus, method, and storage medium
CN111145189B (en) Image processing method, apparatus, electronic device, and computer-readable storage medium
JP2019118021A (en) Shooting control system, shooting control method, program, and recording medium
TW202117626A (en) Information processing device, information processing system, information processing method, and program
US11755758B1 (en) System and method for evaluating data files
JP2021043546A (en) Information processing apparatus, control method, and program
CN114143429B (en) Image shooting method, device, electronic equipment and computer readable storage medium
CN112312207B (en) Method, device and equipment for getting through traffic between smart television terminal and mobile terminal
CN114187172A (en) Image fusion method and device, computer equipment and computer readable storage medium
JP2002135518A (en) Processing method capable of acquiring digital photographic image
CN117057981B (en) Image processing method and device, electronic equipment and storage medium
JP2004248020A (en) Image processor and image processing system
WO2023062832A1 (en) Authentication device, authentication system, authentication method, and computer-readable medium
JP2007279799A (en) Image exchange device, image exchange method and image exchange processing program
JP4389728B2 (en) Image forming apparatus, image selection screen generation method, and program
JP2004178211A (en) Print image data processor

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination