CN117135365A - Peep-proof shooting method and device based on image pixel value out-of-order coding - Google Patents

Peep-proof shooting method and device based on image pixel value out-of-order coding Download PDF

Info

Publication number
CN117135365A
CN117135365A CN202311125375.6A CN202311125375A CN117135365A CN 117135365 A CN117135365 A CN 117135365A CN 202311125375 A CN202311125375 A CN 202311125375A CN 117135365 A CN117135365 A CN 117135365A
Authority
CN
China
Prior art keywords
image
image data
peeping
zero terminal
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311125375.6A
Other languages
Chinese (zh)
Inventor
龙科
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Wanxiang Electronics Technology Co Ltd
Original Assignee
Xian Wanxiang Electronics Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Wanxiang Electronics Technology Co Ltd filed Critical Xian Wanxiang Electronics Technology Co Ltd
Priority to CN202311125375.6A priority Critical patent/CN117135365A/en
Publication of CN117135365A publication Critical patent/CN117135365A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/85Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using pre-processing or post-processing specially adapted for video compression
    • H04N19/88Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using pre-processing or post-processing specially adapted for video compression involving rearrangement of data among different coding units, e.g. shuffling, interleaving, scrambling or permutation of pixel data or permutation of transform coefficient data among different blocks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Controls And Circuits For Display Device (AREA)

Abstract

The disclosure relates to an anti-peeping method and device based on out-of-order coding of image pixel values. The method comprises the following steps: the virtual machine establishes connection with the zero terminal; the virtual machine receives user image data sent by the zero terminal and judges whether a peeping event occurs according to the user image data; if a peeping event occurs, the virtual machine performs pixel value out-of-order coding on the desktop image to obtain image data; the virtual machine sends the image data to the zero terminal. After the zero terminal and the virtual terminal are connected, the virtual terminal normally encodes a desktop image and sends the desktop image to the zero terminal, and meanwhile, the zero terminal performs peep-proof monitoring; when a peeping event is found, the zero terminal carries out disorder coding transmission on the desktop image, and the zero terminal obtains a disorder code image after decoding; when the peeping event is eliminated, the virtual terminal encodes and transmits the desktop image again normally, and the zero terminal obtains the normal desktop image after decoding, so that information leakage is prevented.

Description

Peep-proof shooting method and device based on image pixel value out-of-order coding
Technical Field
The embodiment of the disclosure relates to the technical field of information security protection, in particular to an anti-peeping method and device based on out-of-order coding of image pixel values.
Background
In the related technology, the cloud office zero terminal system has wider application in the special industry with high secret-related property due to higher security. The higher security is shown in: the user does not have data storage locally, all data sources and video images are derived from the cloud image, and the user watermark can be added to the image at the cloud, so that the data cannot be easily leaked. However, this method still cannot solve the data leakage caused by the manual peeping at the display end.
For cloud desktop users, even if the users can not divulge the secret, the users cannot avoid other people from intercepting the data through the network, and the data is restored again to form an image for display.
Accordingly, there is a need to provide a new solution to ameliorate one or more of the problems presented in the above solutions.
It should be noted that the information disclosed in the above background section is only for enhancing understanding of the background of the present disclosure and thus may include information that does not constitute prior art known to those of ordinary skill in the art.
Disclosure of Invention
An object of the embodiments of the present disclosure is to provide a peep-proof method and apparatus based on out-of-order encoding of image pixel values, thereby overcoming one or more of the problems due to the limitations and disadvantages of the related art, at least to some extent.
According to a first aspect of an embodiment of the present disclosure, there is provided a peep-proof method based on out-of-order encoding of image pixel values, the method including:
the virtual machine establishes connection with the zero terminal;
the virtual machine receives user image data sent by the zero terminal and judges whether a peeping event occurs according to the user image data;
if the peeping event occurs, the virtual machine performs pixel value out-of-order coding on the desktop image to obtain image data;
and the virtual machine sends the image data to a zero terminal.
In an embodiment of the disclosure, the method further comprises:
and if the peeping event does not occur, the virtual machine normally codes the desktop image to obtain image data.
In an embodiment of the disclosure, the step of determining whether a peeping event occurs according to the using user image data includes:
the zero terminal identifies the image data of the users and judges the number of the identified current users;
if the user is not detected, judging that a peeping event occurs;
and if one or more using users are detected, carrying out subsequent judgment.
In an embodiment of the disclosure, the step of performing subsequent judgment if one or more of the users are detected includes:
if one user is detected, judging whether the user is a legal user or not according to legal user image data;
if not, judging that a peeping event occurs;
if yes, continuing to judge whether the action of the legal user is suspicious, and if yes, judging that a peeping event occurs.
In an embodiment of the disclosure, if one or more of the users are detected, the step of performing subsequent judgment further includes:
if a plurality of using users are detected, judging whether the legal users are contained in the plurality of using users or not;
if the peep event does not exist, judging that the peep event exists;
if yes, continuing to judge whether the actions of the legal users and the rest of the using users are suspicious, and if yes, judging that a peeping event occurs.
In an embodiment of the disclosure, the step of performing, by the virtual machine, out-of-order encoding of pixel values on the desktop image to obtain image data includes:
establishing a new pixel matrix according to the pixel matrix of the desktop image;
and marking the pixel values of the desktop image, and scrambling and storing the pixel value sequence of the desktop image into the new pixel matrix to finish the pixel value scrambling coding.
According to a second aspect of an embodiment of the present disclosure, there is provided a peep-proof method based on out-of-order encoding of image pixel values, the method including:
the zero terminal is connected with the virtual machine;
the zero terminal collects the image data of the current user and sends the image data to the virtual terminal;
and the zero terminal receives the image data and analyzes the image data to display a desktop image.
According to a third aspect of embodiments of the present disclosure, there is provided a peep-proof device based on out-of-order encoding of image pixel values, the device comprising:
the first connection module is used for establishing connection between the virtual machine and the zero terminal;
the judging module is used for receiving the user image data sent by the zero terminal by the virtual machine and judging whether a peeping event occurs or not according to the user image data;
the first coding module is used for carrying out pixel value out-of-order coding on the desktop image by the virtual machine if the peeping event occurs so as to obtain image data;
and the sending module is used for sending the image data to a zero terminal by the virtual machine.
In one embodiment of the present disclosure, the apparatus further comprises:
and the second coding module is used for normally coding the desktop image by the virtual machine if the peeping event does not occur, so as to obtain image data.
According to a fourth aspect of embodiments of the present disclosure, there is provided a peep-proof device based on out-of-order encoding of image pixel values, the device comprising:
the second connection module is used for establishing connection between the zero terminal and the virtual machine;
the user image acquisition module is used for acquiring current user image data of a user by the zero terminal and sending the current user image data to the virtual terminal;
and the analysis module is used for receiving the image data by the zero terminal and analyzing the image data to display a desktop image.
The technical scheme provided by the embodiment of the disclosure can comprise the following beneficial effects:
in the embodiment of the disclosure, by the above anti-peeping method and device based on the out-of-order coding of the image pixel values, after the zero terminal is connected with the virtual terminal, the virtual terminal normally codes the desktop image and sends the desktop image to the zero terminal, and meanwhile, the zero terminal performs anti-peeping monitoring; when a peeping event is found, the zero terminal carries out disorder coding transmission on the desktop image, and the zero terminal obtains a disorder code image after decoding; when the peeping event is eliminated, the virtual terminal encodes and transmits the desktop image again normally, and the zero terminal obtains the normal desktop image after decoding, so that information leakage is prevented.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure. It will be apparent to those of ordinary skill in the art that the drawings in the following description are merely examples of the disclosure and that other drawings may be derived from them without undue effort.
FIG. 1 illustrates a step diagram of a privacy-preserving method based on out-of-order encoding of image pixel values in an exemplary embodiment of the present disclosure;
FIG. 2 illustrates a flow chart of a method of determining whether a peep event occurs in an exemplary embodiment of the present disclosure;
FIG. 3 schematically illustrates a step diagram of another anti-peeping method based on out-of-order encoding of image pixel values in an exemplary embodiment of the present disclosure;
FIG. 4 schematically illustrates a flowchart of a privacy shooting prevention method based on video image out-of-order encoding in an exemplary embodiment of the present disclosure;
FIG. 5 schematically illustrates a view of a privacy beat based on out-of-order encoding of image pixel values in an exemplary embodiment of the present disclosure;
FIG. 6 schematically illustrates another view of anti-peeping based on out-of-order encoding of image pixel values in an exemplary embodiment of the present disclosure;
FIG. 7 schematically illustrates a schematic diagram of a program product in an exemplary embodiment of the present disclosure;
fig. 8 schematically illustrates a schematic diagram of an electronic device in an exemplary embodiment of the present disclosure.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. However, the exemplary embodiments may be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus a repetitive description thereof will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in software or in one or more hardware modules or integrated circuits or in different networks and/or processor devices and/or microcontroller devices.
In this example embodiment, a peep-proof method based on out-of-order coding of image pixel values is provided first, and the method can be applied to a terminal device with a display screen, for example, a mobile terminal such as a mobile phone, a personal digital assistant, a notebook computer, a tablet computer, a smart watch, or a non-mobile terminal such as a desktop computer, a smart television, etc. Referring to what is shown in fig. 1, the method may include: step S101 to step S104.
Step S101: the virtual machine establishes connection with the zero terminal;
step S102: the virtual machine receives user image data sent by the zero terminal and judges whether a peeping event occurs according to the user image data;
step S103: if the peeping event occurs, the virtual machine performs pixel value out-of-order coding on the desktop image to obtain image data;
step S104: and the virtual machine sends the image data to a zero terminal.
By the peep-proof method based on the out-of-order coding of the image pixel values, after the zero terminal is connected with the virtual terminal, the virtual terminal normally codes the desktop image and sends the desktop image to the zero terminal, and meanwhile, the zero terminal performs peep-proof monitoring; when a peeping event is found, the zero terminal carries out disorder coding transmission on the desktop image, and the zero terminal obtains a disorder code image after decoding; when the peeping event is eliminated, the virtual terminal encodes and transmits the desktop image again normally, and the zero terminal obtains the normal desktop image after decoding, so that information leakage is prevented.
Hereinafter, each step of the above-described method in the present exemplary embodiment will be described in more detail with reference to fig. 1 to 2.
In step S101, the zero terminal logs in to the virtual machine through the correct account number and password, so as to establish a connection between the virtual machine and the zero terminal.
In step S102, after the virtual machine and the zero terminal are connected, the currently used user image data needs to be compared with the legal user image data, so as to ensure that the currently used user is a legal user.
Before a legal user uses an intelligent terminal (zero terminal), a camera firstly collects images of the legal user sitting in front of a screen when the legal user uses the zero terminal, and the collected images are used as reference images for subsequent image comparison; on one hand, the face can be identified from the image data of the current user and used as a reference face in the subsequent face recognition, and on the other hand, the image data of the real-time user can be compared with the image data of the legal user in the subsequent process, so that whether the use state of the user is changed or not is judged.
In order to ensure that the user in the acquired user usage image in the step is a legal user of the current intelligent zero terminal, the validity of the current user needs to be verified in other authentication modes before the image is acquired.
In step S103 and step S104, during the process of using the intelligent zero terminal by the user, the camera continuously collects the user used image according to a preset period, and the period can be set according to the actual needs, which is not limited herein.
In addition, determining whether a suspicious usage condition has occurred includes, but is not limited to: whether the user is a legal user, whether the legal user leaves the seat, whether people outside the legal user watch the screen image, whether other people take photos or not, and the like are judged.
The above-mentioned judgment of whether the peep-screen event occurs is implemented by an AI (Artificial Intelligence ) module, and the judgment result of the AI module is used as a judgment condition for whether to start the peep-back event. In actual implementation, the AI module may determine whether a suspicious shooting event occurs in a variety of ways. The AI module is not an important point of the present application, and the working principle of the AI module is the prior art, and the specific principle thereof is not described herein.
When an AI identification module of a VGTP-R end (zero terminal) detects a suspicious shooting event, directly starting a peeping flow, comprising the following steps: and after decoding each image macro block which is received from the VGTP-S and is subjected to out-of-order coding, directly arranging according to the decoding sequence to obtain a final display image. Therefore, the sequence of the macro blocks which are arranged in disorder is not restored, so that each macro block in the whole frame of the obtained image is arranged according to the sequence which is arranged in disorder, namely, for the image frame which is obtained through processing, the information in the whole frame is disordered, and therefore, even if a suspicious peeping user successfully implements peeping behavior, effective information cannot be obtained, and the safety of the user information is ensured.
In one embodiment, the method further comprises: and if the peeping event does not occur, the virtual machine normally codes the desktop image to obtain image data.
Specifically, the VGTP-R intelligent terminal receives the encoded image, restores the original video image by decoding, and displays the source video image obtained by decoding on a screen. The method specifically comprises the following steps:
after receiving the transmitted messy code image data, the receiving end (zero terminal) analyzes the image data to obtain the image data, and then the desktop image can be obtained.
It will be appreciated that in order to better protect privacy security, techniques such as adding authentication mechanisms, digital watermarks, etc. during decoding may be considered.
In one embodiment, the step of determining whether a peeping event occurs according to the using user image data includes: the zero terminal identifies the image data of the users and judges the number of the identified current users; if the user is not detected, judging that a peeping event occurs; and if one or more using users are detected, carrying out subsequent judgment.
Specifically, when the AI module receives a current use image of the user, the AI module performs face recognition on the current use image of the user; and comparing the identified face image with a face image of a legal user prestored in the system, and judging whether a suspicious shooting event occurs. The AI module carries out face recognition on the currently received use image of the user; the AI module judges the number of the identified faces; and carrying out subsequent judgment according to the identification result so as to determine whether a suspicious shooting event occurs. If the face is not detected, the legal user is considered to leave the seat, and at this time, the reverse shooting event is directly started (namely, the occurrence of the peeping event is judged).
In one embodiment, the step of performing subsequent judgment if one or more of the users are detected includes: if one user is detected, judging whether the user is a legal user or not according to legal user image data; if not, judging that a peeping event occurs; if yes, continuing to judge whether the action of the legal user is suspicious, and if yes, judging that a peeping event occurs.
If a plurality of using users are detected, judging whether the legal users are contained in the plurality of using users or not; if the peep event does not exist, judging that the peep event exists; if yes, continuing to judge whether the actions of the legal users and the rest of the using users are suspicious, and if yes, judging that a peeping event occurs.
Specifically, as shown in fig. 2, if a face is detected, the face is firstly compared with the face of a legal user stored locally, if the faces are not the same, the current user is determined to be not the legal user, the peeping process is directly started, if the faces are the same, whether the current user has suspicious actions similar to photographing is continuously judged, and if the faces are the same, the peeping process is started; otherwise, the subsequent discrimination flow is continued without any processing.
If a plurality of faces are detected, firstly judging whether the faces of legal users are included, if not, directly starting a peeping flow, if so, continuously judging whether suspicious actions similar to photographing occur to all people appearing in the current use image of the user, and if so, starting the peeping flow; if not, no processing is carried out, and the subsequent discrimination flow is continued.
In one embodiment, the step of performing out-of-order encoding on pixel values of the desktop image by the virtual machine to obtain image data includes: establishing a new pixel matrix according to the pixel matrix of the desktop image; and marking the pixel values of the desktop image, and scrambling and storing the pixel value sequence of the desktop image into the new pixel matrix to finish the pixel value scrambling coding.
Specifically, the pixel value disorder algorithm flow is as follows: the VGTP-S end transforms the image by means of mathematics or other technology to make it an unordered image for transmission. The method comprises the steps of disturbing the pixel value sequence of an image, creating an empty pixel matrix according to the pixel matrix of the acquired image, marking each pixel value of the acquired image, determining the coordinates of other pixels according to the coordinates of a pixel, moving the a pixel to a b pixel position, moving the b pixel to a c pixel position, … …, and the like, storing the pixel to the newly created pixel matrix, and finishing the picture disorder.
The coordinate relationship of a pixel and b pixel can be as follows:
1) The a pixel and the b pixel are two pixels adjacent left and right;
2) The a pixel and the b pixel are two pixels spaced left and right (1 or more);
3) The pixel a and the pixel b are two pixels which are adjacent up and down;
4) The a pixel and the b pixel are two pixels spaced up and down (1 or more);
5) The pixel a and the pixel b are two obliquely adjacent pixels;
6) The a pixel and the b pixel are two pixels diagonally spaced (1 or more);
7) The a pixel and the b pixel are two random pixels in the image;
the edge pixel shifting method can be as follows:
1) Moving in a row, the last of the rows moving to the first of the next row;
2) Move in a column, the last of which moves to the first of the next column;
3) Moving in an oblique direction, wherein the last oblique direction moves to the first oblique direction of the next oblique direction;
4) Random movement does not involve edge pixels, the last pixel being moved to the position of the a pixel;
the same or different disorder modes are repeated for a plurality of times, so that the disorder modes are converted into disorder pictures which are difficult to recognize, and then the disorder pictures are transmitted to a VGTP-R end for decoding. In the image transmission process, the correlation of the image matrix is destroyed by rearranging the image pixel matrix, so that an illegal interceptor cannot obtain original image information from the disordered image, thereby realizing the encryption of the information.
And displaying the image with the pixel values subjected to out-of-order coding, namely, after the VGTP-S terminal carries out-of-order coding on the pixel values of the image, sending the image to the out-of-order image displayed after being decoded by the VGTP-R terminal, wherein the pixel information is chaotic and the picture is fuzzy and irregular for the image obtained through the processing, so that effective information cannot be obtained even if a suspicious peeping user successfully carries out peeping, and the safety of the user information is ensured.
It should be noted that although the steps of the methods of the present disclosure are illustrated in the accompanying drawings in a particular order, this does not require or imply that the steps must be performed in that particular order or that all of the illustrated steps be performed in order to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step to perform, and/or one step decomposed into multiple steps to perform, etc. In addition, it is also readily understood that these steps may be performed synchronously or asynchronously, for example, in a plurality of modules/processes/threads.
Further, in the present exemplary embodiment, another anti-peeping method based on out-of-order encoding of image pixel values is also provided. Referring to fig. 3, the method may include. Wherein: step S201 to step S203.
Step S201: the zero terminal is connected with the virtual machine;
step S202: the zero terminal collects the image data of the current user and sends the image data to the virtual terminal;
step S203: and the zero terminal receives the image data and analyzes the image data to display a desktop image.
Specifically, as shown in fig. 4, after the zero terminal and the virtual terminal are connected, the virtual terminal normally encodes the desktop image and sends the desktop image to the zero terminal, and meanwhile, the zero terminal performs peep-proof monitoring; when a peeping event is found, the virtual terminal carries out-of-order encoding transmission on the desktop image, and a zero terminal obtains an out-of-order image after decoding; when the peeping event is eliminated, the virtual terminal encodes and transmits the desktop image again normally, and the zero terminal obtains the normal desktop image after decoding, so that information leakage is prevented.
Further, in this example embodiment, a peep-proof device based on out-of-order encoding of image pixel values is also provided. Referring to fig. 5, the apparatus 100 includes: a first connection module 101, a judgment module 102, a first encoding module 103 and a transmission module 104. The first connection module 101 is configured to establish connection between the virtual machine and the zero terminal; the judging module 102 is configured to receive the user image data sent by the zero terminal by using the virtual machine, and judge whether a peeping event occurs according to the user image data; the first encoding module 103 is configured to, if the peeping event occurs, perform out-of-order encoding on pixel values of the desktop image by using the virtual machine to obtain image data; and the sending module 104 is used for sending the image data to a zero terminal by the virtual machine.
Further, in this example embodiment, another anti-peeping device based on out-of-order encoding of image pixel values is also provided. Referring to fig. 6, the apparatus 200 includes: a second connection module 201, a user image acquisition module 202 and an analysis module 203. The second connection module 201 is configured to establish connection between the zero terminal and the virtual machine; the user image acquisition module 202 is configured to acquire user image data of a current user by using the zero terminal, and send the user image data to the virtual terminal; and the parsing module 203 is configured to receive the image data by the zero terminal, and parse the image data to display a desktop image.
By the peep-proof method and the peep-proof device based on the image pixel value out-of-order coding, after the zero terminal is connected with the virtual terminal, the virtual terminal normally codes the desktop image and sends the desktop image to the zero terminal, and meanwhile, the zero terminal performs peep-proof monitoring; when a peeping event is found, the zero terminal carries out disorder coding transmission on the desktop image, and the zero terminal obtains a disorder code image after decoding; when the peeping event is eliminated, the virtual terminal encodes and transmits the desktop image again normally, and the zero terminal obtains the normal desktop image after decoding, so that information leakage is prevented.
The specific manner in which the various modules perform the operations in the apparatus of the above embodiments have been described in detail in connection with the embodiments of the method, and will not be described in detail herein.
It should be noted that although in the above detailed description several modules or units of a device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit in accordance with embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into a plurality of modules or units to be embodied. The components shown as modules or units may or may not be physical units, may be located in one place, or may be distributed across multiple network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution. Those of ordinary skill in the art will understand and implement the present application without undue burden.
In an exemplary embodiment of the present disclosure, there is also provided a computer readable storage medium having stored thereon a computer program, which when executed by a processor, implements the steps of the anti-peeping method based on out-of-order encoding of image pixel values described in any of the above embodiments. In some possible embodiments, the aspects of the present application may also be implemented in the form of a program product comprising program code for causing a terminal device to carry out the steps according to the various exemplary embodiments of the present application as described in the above section of the anti-peeping method based on out-of-order encoding of image pixel values of the present specification, when said program product is run on a terminal device.
Referring to fig. 7, a program product 300 for implementing the above-described method according to an embodiment of the present application is described, which may employ a portable compact disc read only memory (CD-ROM) and include program code, and may be run on a terminal device, such as a personal computer. However, the program product of the present application is not limited thereto, and in this document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. The readable storage medium can be, for example, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium would include the following: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The computer readable storage medium may include a data signal propagated in baseband or as part of a carrier wave, with readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A readable storage medium may also be any readable medium that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations of the present application may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
In an exemplary embodiment of the present disclosure, an electronic device is also provided, which may include a processor, and a memory for storing executable instructions of the processor. Wherein the processor is configured to perform the steps of the anti-peeping method described in any of the embodiments above based on out-of-order encoding of image pixel values via execution of the executable instructions.
Those skilled in the art will appreciate that the various aspects of the application may be implemented as a system, method, or program product. Accordingly, aspects of the application may be embodied in the following forms, namely: an entirely hardware embodiment, an entirely software embodiment (including firmware, micro-code, etc.) or an embodiment combining hardware and software aspects may be referred to herein as a "circuit," module "or" system.
An electronic device 600 according to this embodiment of the application is described below with reference to fig. 8. The electronic device 600 shown in fig. 8 is merely an example, and should not be construed as limiting the functionality and scope of use of embodiments of the present application.
As shown in fig. 8, the electronic device 600 is in the form of a general purpose computing device. Components of electronic device 600 may include, but are not limited to: at least one processing unit 610, at least one memory unit 620, a bus 630 connecting the different system components (including the memory unit 620 and the processing unit 610), a display unit 640, etc.
Wherein the storage unit stores program code that is executable by the processing unit 610 such that the processing unit 610 performs the steps according to various exemplary embodiments of the present application described in the above-described anti-peeping method section based on out-of-order encoding of image pixel values of the present specification. For example, the processing unit 610 may perform the steps as shown in fig. 1.
The memory unit 620 may include readable media in the form of volatile memory units, such as Random Access Memory (RAM) 6201 and/or cache memory unit 6202, and may further include Read Only Memory (ROM) 6203.
The storage unit 620 may also include a program/utility 6204 having a set (at least one) of program modules 6205, such program modules 6205 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each or some combination of which may include an implementation of a network environment.
Bus 630 may be a local bus representing one or more of several types of bus structures including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or using any of a variety of bus architectures.
The electronic device 600 may also communicate with one or more external devices 700 (e.g., keyboard, pointing device, bluetooth device, etc.), one or more devices that enable a user to interact with the electronic device 600, and/or any device (e.g., router, modem, etc.) that enables the electronic device 600 to communicate with one or more other computing devices. Such communication may occur through an input/output (I/O) interface 650. Also, electronic device 600 may communicate with one or more networks such as a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the Internet, through network adapter 660. The network adapter 660 may communicate with other modules of the electronic device 600 over the bus 630. It should be appreciated that although not shown, other hardware and/or software modules may be used in connection with electronic device 600, including, but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, data backup storage systems, and the like.
From the above description of embodiments, those skilled in the art will readily appreciate that the example embodiments described herein may be implemented in software, or may be implemented in software in combination with the necessary hardware. Thus, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a nonvolatile storage medium (may be a CD-ROM, a usb disk, a mobile hard disk, etc.) or on a network, and includes several instructions to cause a computing device (may be a personal computer, a server, or a network device, etc.) to perform the above-described anti-peeping method based on out-of-order encoding of image pixel values according to the embodiments of the present disclosure.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any adaptations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.

Claims (10)

1. A peep-proof method based on out-of-order coding of image pixel values is characterized by comprising the following steps:
the virtual machine establishes connection with the zero terminal;
the virtual machine receives user image data sent by the zero terminal and judges whether a peeping event occurs according to the user image data;
if the peeping event occurs, the virtual machine performs pixel value out-of-order coding on the desktop image to obtain image data;
and the virtual machine sends the image data to a zero terminal.
2. The method for privacy shooting based on out-of-order encoding of image pixel values according to claim 1, further comprising:
and if the peeping event does not occur, the virtual machine normally codes the desktop image to obtain image data.
3. The method for preventing peeping based on out-of-order encoding of image pixel values according to claim 1, wherein the step of judging whether a peeping event occurs according to the using user image data comprises the steps of:
the zero terminal identifies the image data of the users and judges the number of the identified current users;
if the user is not detected, judging that a peeping event occurs;
and if one or more using users are detected, carrying out subsequent judgment.
4. The method for preventing peeping based on out-of-order encoding of image pixel values according to claim 3, wherein said step of performing subsequent judgment if one or more of said users are detected comprises:
if one user is detected, judging whether the user is a legal user or not according to legal user image data;
if not, judging that a peeping event occurs;
if yes, continuing to judge whether the action of the legal user is suspicious, and if yes, judging that a peeping event occurs.
5. The method for preventing peeping based on out-of-order encoding of image pixel values according to claim 4, wherein said step of performing a subsequent decision if one or more of said users are detected further comprises:
if a plurality of using users are detected, judging whether the legal users are contained in the plurality of using users or not;
if the peep event does not exist, judging that the peep event exists;
if yes, continuing to judge whether the actions of the legal users and the rest of the using users are suspicious, and if yes, judging that a peeping event occurs.
6. The peep-proof method based on out-of-order coding of image pixel values according to claim 1, wherein the step of performing out-of-order coding of pixel values on a desktop image by the virtual machine to obtain image data comprises the following steps:
establishing a new pixel matrix according to the pixel matrix of the desktop image;
and marking the pixel values of the desktop image, and scrambling and storing the pixel value sequence of the desktop image into the new pixel matrix to finish the pixel value scrambling coding.
7. A peep-proof method based on out-of-order coding of image pixel values is characterized by comprising the following steps:
the zero terminal is connected with the virtual machine;
the zero terminal collects the image data of the current user and sends the image data to the virtual terminal;
and the zero terminal receives the image data and analyzes the image data to display a desktop image.
8. An anti-peeping device based on out-of-order coding of image pixel values is characterized in that the device comprises:
the first connection module is used for establishing connection between the virtual machine and the zero terminal;
the judging module is used for receiving the user image data sent by the zero terminal by the virtual machine and judging whether a peeping event occurs or not according to the user image data;
the first coding module is used for carrying out pixel value out-of-order coding on the desktop image by the virtual machine if the peeping event occurs so as to obtain image data;
and the sending module is used for sending the image data to a zero terminal by the virtual machine.
9. The privacy shooting prevention apparatus based on out-of-order encoding of image pixel values as in claim 8, further comprising:
and the second coding module is used for normally coding the desktop image by the virtual machine if the peeping event does not occur, so as to obtain image data.
10. An anti-peeping device based on out-of-order coding of image pixel values is characterized in that the device comprises:
the second connection module is used for establishing connection between the zero terminal and the virtual machine;
the user image acquisition module is used for acquiring current user image data of a user by the zero terminal and sending the current user image data to the virtual terminal;
and the analysis module is used for receiving the image data by the zero terminal and analyzing the image data to display a desktop image.
CN202311125375.6A 2023-09-01 2023-09-01 Peep-proof shooting method and device based on image pixel value out-of-order coding Pending CN117135365A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311125375.6A CN117135365A (en) 2023-09-01 2023-09-01 Peep-proof shooting method and device based on image pixel value out-of-order coding

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311125375.6A CN117135365A (en) 2023-09-01 2023-09-01 Peep-proof shooting method and device based on image pixel value out-of-order coding

Publications (1)

Publication Number Publication Date
CN117135365A true CN117135365A (en) 2023-11-28

Family

ID=88858074

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311125375.6A Pending CN117135365A (en) 2023-09-01 2023-09-01 Peep-proof shooting method and device based on image pixel value out-of-order coding

Country Status (1)

Country Link
CN (1) CN117135365A (en)

Similar Documents

Publication Publication Date Title
CN113806806B (en) Desensitization and restoration method and system for webpage screenshot
CN110688286B (en) Application program operation information transmission method and device, storage medium and electronic equipment
CN111327947B (en) Screen capture management method and device and mobile terminal
CN111310134B (en) Screen watermark generation method, device and equipment
KR20190120663A (en) Image receiving device, image reconstructing method thereof, method for image masking and reconstructing of image system
CN105117759A (en) Dynamic two-dimensional code generating method, reading method, generating apparatuses and reading apparatuses
CN114418825B (en) Image processing method, image processing device, computer equipment and storage medium
CN112270647A (en) Image processing method and system
WO2020049958A1 (en) Information processing system, information processing method, terminal device, and information processing device
CN113015007B (en) Video frame inserting method and device and electronic equipment
CN111432242B (en) Encrypted video call method, device, equipment and storage medium
CN117135365A (en) Peep-proof shooting method and device based on image pixel value out-of-order coding
CN116756750A (en) Medical sensitive data acquisition desensitization method
KR102095968B1 (en) Image Processing Apparatus and Image Verification Apparatus for Protecting Privacy and Preventing Alteration, and Method thereof
KR102347137B1 (en) Screen data leakage prevention apparatus and method
CN113014609B (en) Multimedia file processing and tracing method, device, equipment and medium
CN107315970B (en) Sensitive data interaction method and device
CN114915464A (en) Image encryption method and image decryption method based on special matrix operation
CN112948869A (en) Data interaction method and device, computer equipment and storage medium
CN116471363A (en) Peep-proof shooting method based on video image out-of-order coding
CN111353133B (en) Image processing method, device and readable storage medium
CN112584151A (en) Image processing method, terminal device and server
CN112434327A (en) Information protection method and device and electronic equipment
US20220215071A1 (en) Privacy protection method for transmitting end and receiving end, electronic device and computer readable storage medium
CN117201689A (en) Anti-peeping method, medium and device based on video image insertion interference frame

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination