CN117424968A - Intelligent scanning data safety transmission method and device and intelligent scanning pen - Google Patents

Intelligent scanning data safety transmission method and device and intelligent scanning pen Download PDF

Info

Publication number
CN117424968A
CN117424968A CN202311726854.3A CN202311726854A CN117424968A CN 117424968 A CN117424968 A CN 117424968A CN 202311726854 A CN202311726854 A CN 202311726854A CN 117424968 A CN117424968 A CN 117424968A
Authority
CN
China
Prior art keywords
splicing
sequence
spliced
encryption
unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311726854.3A
Other languages
Chinese (zh)
Inventor
车建波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Bepal Intelligent Technology Co ltd
Original Assignee
Shenzhen Bepal Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Bepal Intelligent Technology Co ltd filed Critical Shenzhen Bepal Intelligent Technology Co ltd
Priority to CN202311726854.3A priority Critical patent/CN117424968A/en
Publication of CN117424968A publication Critical patent/CN117424968A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V30/00Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
    • G06V30/10Character recognition
    • G06V30/14Image acquisition
    • G06V30/141Image acquisition using multiple overlapping images; Image stitching
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V30/00Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
    • G06V30/10Character recognition
    • G06V30/14Image acquisition
    • G06V30/142Image acquisition using hand-held instruments; Constructional details of the instruments
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00127Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture
    • H04N1/00326Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture with a data reading, recognizing or recording apparatus, e.g. with a bar-code apparatus
    • H04N1/00328Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture with a data reading, recognizing or recording apparatus, e.g. with a bar-code apparatus with an apparatus processing optically-read information
    • H04N1/00331Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture with a data reading, recognizing or recording apparatus, e.g. with a bar-code apparatus with an apparatus processing optically-read information with an apparatus performing optical character recognition

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Compression Or Coding Systems Of Tv Signals (AREA)

Abstract

The application discloses a data security transmission method and device for intelligent scanning and an intelligent scanning pen, relates to the technical field of electronic equipment, and comprises the following steps: s01, acquiring spliced image frames from acquired images based on splicing time sequence intervals, and generating spliced images; s02, dividing the spliced image into a plurality of spliced units, and identifying the spliced units to generate a first encryption sequence; s03, acquiring edge information of the spliced image based on the first encryption sequence, and generating a second encryption sequence; s04, generating a third encryption sequence according to the scanning condition of the spliced image based on the second encryption sequence; s05, outputting an encrypted spliced image based on the third encryption sequence; the image transmission safety can be improved while ensuring the quality of image transmission.

Description

Intelligent scanning data safety transmission method and device and intelligent scanning pen
Technical Field
The present invention relates to the field of electronic devices, and in particular, to a method and an apparatus for securely transmitting data during intelligent scanning, and an intelligent scanning pen.
Background
The scanning pen is a handheld electronic device, a user can trigger a key by pressing a pen point to acquire a scanning image in real time, and can realize operations such as character recognition, storage, editing and the like through a built-in optical character recognition (OpticalCharacterRecognition, OCR) module, so that the scanning pen is widely applied to scenes such as student learning, travel translation and the like.
Such as Chinese patent application number: 202011210076.9 scanning methods, apparatus, scanning pens and storage media, including: based on the splicing interval frame number, extracting a spliced image frame from the acquired image frames, and updating the spliced image frame number; if the number of the spliced image frames reaches the threshold of the identification frame number, identifying the images spliced by all the spliced image frames; the splicing interval frame number and the identification frame number threshold are determined based on the current scanning speed of the scanning pen.
The prior art selects images at the time of transmission by adjusting the interval of image stitching to cope with different scanning speeds.
However, in the prior art, the improvement of the transmission efficiency is only realized by splicing the images, and whether the images are available images or not after the image splicing is not considered, and meanwhile, the safety transmission mode of the images is adjusted during the transmission of the images so as to improve the safety of data processing.
Disclosure of Invention
According to the data security transmission method and device for intelligent scanning and the intelligent scanning pen, the security of image transmission is improved.
The embodiment of the application provides an intelligent scanning data security transmission method, which comprises the following steps: s01, acquiring spliced image frames from acquired images based on splicing time sequence intervals, and generating spliced images;
s02, dividing the spliced image into a plurality of spliced units, and identifying the spliced units to generate a first encryption sequence;
s03, acquiring edge information of the spliced image based on the first encryption sequence, and generating a second encryption sequence;
s04, generating a third encryption sequence according to the scanning condition of the spliced image based on the second encryption sequence;
s05, outputting the encrypted spliced image based on the third encryption sequence.
The above step S02 is implemented by:
s11, acquiring a spliced image to be identified, and dividing the spliced image into a plurality of spliced units; after the spliced image is acquired, determining a splicing unit according to the trace of the spliced image when the image is spliced;
s12, comparing splicing units in continuous frames, and determining pixel point errors of the splicing units;
s13, acquiring a first encryption sequence corresponding to the splicing unit according to the pixel point error of the splicing unit.
The implementation manner of the step S03 is as follows:
s21, for each splicing unit, checking the overlapping area between each splicing unit and the adjacent splicing unit, and recording the overlapping area between each splicing unit and the adjacent unit to obtain the overlapping area between the adjacent splicing units;
s22, extracting significant characteristic points in the overlapping area, and ensuring that the selected characteristic points can keep stability among different frames;
s23, for each spliced unit, matching the characteristic points extracted from the spliced units in the overlapping area with the characteristic points of the adjacent units to obtain a matching result of the spliced units;
s24, determining a second encryption sequence of each splicing unit according to the matching result of the splicing units.
The implementation manner of the step S04 includes:
s31, acquiring a splicing interval frame number and an identification frame number corresponding to a splicing unit;
s32, based on the second encryption sequence, acquiring a third encryption sequence according to the splicing interval frame number and the identification frame number corresponding to the splicing unit.
The manner of obtaining the third encryption sequence in the above step S32 is as follows:
s321, recording the splicing interval frame number and the identification frame number of each spliced image;
s322, determining the number of complementary bits according to the sum of the number of actual splicing intervals, the number of actual identification frames, the number of preset splicing intervals and the ratio of preset identification frames;
s323, generating a bit supplementing sequence according to the scanning state of the spliced image;
s324, according to the number of the complementary bits, the complementary bit sequences are sequentially inserted into the second encryption sequence, and the second encryption sequence after the complementary bits is used as an output third encryption sequence.
An intelligent scanning data security transmission device, comprising: the splicing state determining unit is used for recording the splicing interval frame number and the identification frame number when the spliced images are generated and recording that each spliced image consists of a plurality of splicing units;
the first encryption unit is used for generating a first encryption sequence according to the splicing condition of the splicing unit;
the second encryption unit is used for generating a second encryption sequence according to the overlapping area of the splicing unit;
and the third encryption unit is used for generating a third encryption sequence according to the splicing interval frame number and the identification frame number when the spliced image is generated.
An intelligent scanning pen, comprising: memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the data security transmission method of intelligent scanning as described in any one of the above when executing the program.
One or more technical solutions provided in the embodiments of the present application at least have the following technical effects or advantages:
the first encryption sequence is generated according to the splicing condition of the acquired spliced image, the second encryption sequence is generated according to the overlapping area existing in the spliced image, and the third encryption sequence is finally generated according to the splicing interval frame number and the identification frame number in the spliced image, so that the scanning image during transmission is easier to identify, and meanwhile, the transmission safety is improved.
Drawings
FIG. 1 is a flow chart of a method for secure transmission of data for intelligent scanning;
FIG. 2 is a flow chart of a second embodiment of a data security transmission method for intelligent scanning;
FIG. 3 is a flow chart of a third embodiment of a data security transmission method for intelligent scanning;
FIG. 4 is a flowchart of a fourth embodiment of a data security transmission method for intelligent scanning;
FIG. 5 is a schematic flow chart of a method for acquiring a third encryption sequence in a data security transmission method of intelligent scanning;
fig. 6 is a schematic structural diagram of an intelligent scanning data security transmission device.
Description of the embodiments
In order that the invention may be readily understood, a more complete description of the invention will be rendered by reference to the appended drawings; the preferred embodiments of the present invention are illustrated in the drawings, however, the present invention may be embodied in many different forms and is not limited to the embodiments described herein; rather, these embodiments are provided so that this disclosure will be thorough and complete.
It should be noted that the terms "vertical", "horizontal", "upper", "lower", "left", "right", and the like are used herein for illustrative purposes only and do not represent the only embodiment.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs; the terminology used herein in the description of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention; the term "and/or" as used herein includes any and all combinations of one or more of the associated listed items.
Example 1
As shown in fig. 1, the data security transmission method for intelligent scanning includes:
and S01, acquiring spliced image frames from the acquired images based on the splicing time sequence interval, and generating spliced images.
S02, dividing the spliced image into a plurality of spliced units, and identifying the spliced units to generate a first encryption sequence.
S03, acquiring edge information of the spliced image based on the first encryption sequence, and generating a second encryption sequence.
S04, based on the second encryption sequence, generating a third encryption sequence according to the scanning condition of the spliced image.
S05, outputting the encrypted spliced image based on the third encryption sequence.
Specifically, when a spliced image is acquired, the spliced image is firstly divided into a plurality of spliced units, first encryption is carried out according to the relation among different spliced units, and second encryption is realized according to edge information in an overlapping area of each spliced unit in the spliced image; finally, the third encryption is realized by the parameters generated during the state scanning during the image stitching.
Example two
In order to determine the rationality of the obtained spliced image, after the spliced image is obtained, the spliced image is divided into a plurality of spliced units as shown in fig. 2, the spliced units in continuous frames are compared, whether the pixel points of the currently selected spliced image are aligned accurately is determined, and no obvious dislocation problem exists; and encodes the splice unit to realize encryption during image transmission.
S11, acquiring a spliced image to be identified, and dividing the spliced image into a plurality of spliced units; after the spliced image is obtained, determining a splicing unit according to the trace when the spliced image is spliced.
Specifically, firstly, preprocessing is performed on the acquired spliced image, including denoising, enhancing and other operations, so as to improve the accuracy of subsequent feature extraction and splice trace detection.
Feature points in the image are extracted, such as key points and descriptors detected using a SURF (speed-UpRobustFeatues) or other algorithm, which will be used for subsequent matching and splitting of the stitching unit.
The extraction method for the feature points can be as follows:
and (3) detecting a scale space extremum: first, the SURF algorithm builds a scale-space pyramid of the image, filtering the image at different scales. Each filtered image is subjected to keypoint detection by comparing the size of each pixel with its neighboring pixels to find local extrema, which are considered potential keypoints.
Positioning key points: for each potential keypoint, the SURF algorithm interpolates in the scale space to more accurately locate the position and scale of the keypoint. At the same time, a series of conditions, such as stability, contrast, etc., of the keypoints are applied to screen and preserve the true keypoints.
Key point main direction allocation: to increase the robustness to image rotation, the SURF algorithm assigns a main direction to each keypoint. The Haar wavelet response is calculated in a circular area around the keypoint and the value and direction of the response are used to determine the principal direction of the keypoint.
Generating a descriptor: a square area was taken around the keypoint and divided into 4x4 sub-areas. The Haar wavelet response of 25 pixel points is calculated in each sub-area, and a 4-dimensional descriptor vector is generated according to the value and the direction of the response. Thus, each keypoint will ultimately result in a 64-dimensional descriptor vector.
And detecting splicing marks in the image by analyzing the distribution and the matching result of the feature points. Stitching marks are typically represented by a discontinuous distribution of feature points or abnormal pixel value variations.
Once a stitching trace is detected, the image may be divided into a plurality of stitching units according to the location and shape of the trace. For example, the image is split at the trace, resulting in different stitching units.
S12, comparing the spliced units in the continuous frames, and determining pixel point errors of the spliced units.
And for the splicing units in the continuous frames, acquiring pixel point average values of the splicing units, and determining pixel point errors between adjacent splicing units according to the pixel point average values, wherein the pixel point errors are used for displaying errors between different splicing units.
S13, acquiring a first encryption sequence corresponding to the splicing unit according to the pixel point error of the splicing unit.
Specifically, the first encryption sequence is to sort the splicing units according to the difference between the pixel points according to the pixel point error, and when the sorted positions are obtained, the first encryption is performed on the spliced images through the corresponding position relation of each splicing unit.
First, we can obtain the error value of each stitching unit according to the pixel point error of the stitching unit calculated previously. This error value represents the pixel difference between the stitching unit and its corresponding portion in the successive frames.
The splice units are ordered from small to large in their pixel error values. Thus, the splice unit with the smallest error will be placed at the front of the sequence, and the splice unit with the largest error will be placed at the end.
After the ordering is completed, the position of each splice element in the sequence represents its error level. For example, if a splice element is located at position 5 in the ordered sequence, its position code is 5.
After the ordering position of each splicing unit is obtained, the original spliced image can be encrypted according to the position relations. The specific method may be that the position code of each splicing unit is used as a key to perform certain exclusive-or, substitution or other encryption operation with the corresponding part in the original image.
In this embodiment, by dividing the stitched image into different stitched units, and sorting the stitched units to obtain the first encrypted sequence, we can ensure that the stitched unit with smaller error is protected more in the encryption process, so as to improve the security and visual effect of the whole image.
Example III
In order to improve the security of the transmission after the image scanning, as shown in fig. 3, after the specific position and the splicing condition of each splicing unit in the spliced image are obtained, the edges between the splicing units, such as the intensity, the direction and the like of the edges of the splicing units, are identified, so as to generate an additional encryption key to enhance the security of the data.
Specifically, the edge information of the splicing units can be obtained by identifying the overlapping areas among the splicing units, and the overlapping areas are identified according to a certain form according to the overlapping areas which occur during splicing among the splicing units, so that the edge information of the splicing units is obtained; for the extracted edge information, a second encryption sequence used in encryption is determined according to the feature descriptors of the edge information.
S21, for each splicing unit, checking the overlapping area between each splicing unit and the adjacent splicing unit, and recording the overlapping area between each splicing unit and the adjacent unit to obtain the overlapping area between the adjacent splicing units.
S22, extracting significant characteristic points in the overlapped area, and ensuring that the selected characteristic points can keep stability among different frames.
S23, for each spliced unit, matching the characteristic points extracted in the overlapping area with the characteristic points of the adjacent units to obtain a matching result of the spliced unit. The matching result of the splicing unit is used for determining edge information of the splicing unit, so that a second encryption sequence is generated according to the edge information.
The matching result of the splicing unit comprises feature point matching and edge information extraction of the overlapped area.
Feature point matching is achieved by the following means:
counting the number of matching points, namely successfully matched characteristic point pairs, analyzing the distribution condition of the matching points in the overlapping area, calculating the distance between the matching points, and determining the similarity between the matching points by calculating the Euclidean distance between the matching points.
Preferably, the number of the matching points is determined by calculating the centroid and the distribution density of the matching points, the point which is relatively positioned at the center in the overlapped area is selected as the centroid of the matching points, and the number of the matching points is determined by the distribution density of the matching points around the centroid.
Specifically, the more the number of matching points is, the higher the matching degree between the splicing units is, when the number of matching points exceeds the threshold value, the effective matching is considered to exist between the splicing units, the good matching points are distributed relatively uniformly and concentrated on key positions of the overlapped area, and the similarity of the matching points on the key positions can represent the overall condition of the overlapped area, so that the relatively complete data processing condition is obtained.
The method for extracting the edge information comprises the following steps:
and calculating the geometric relationship between the splicing units according to the position information of the matching points, calculating parameters such as distance, angle and the like between the matching points, and judging the relative position and the posture of the splicing units by comparing the geometric relationship between different matching points.
According to the relative position and the gesture of the splicing unit, determining the matching effect of the splicing unit, extracting the edge information of the splicing unit, including determining the position, the direction and the like of the edge, and extracting the edge information by analyzing the position difference and the distribution condition of the matching points after transformation.
S24, determining a second encryption sequence of each splicing unit according to the matching result of the splicing units.
After the matching result of the splicing units is obtained, extracting corresponding feature descriptors from the edge information of each splicing unit, and determining a second encryption sequence according to the feature descriptors; the elements in the feature descriptor are taken as a second encryption sequence.
Preferably, the obtaining the second encryption sequence of each splice unit includes:
the first encryption sequence of each splicing unit is used as a basic sequence, edge information corresponding to each splicing unit is obtained, feature descriptors corresponding to the edge information are extracted, and the feature descriptors corresponding to the edge information are used as an insertion sequence; and comparing the sizes of adjacent insertion sequences, sequentially inserting each binary number in the insertion sequence into the basic sequence, and determining the insertion position of the insertion sequence according to the difference value between the largest feature descriptor and the feature descriptor of the current splicing unit.
Preferably, when each binary number in the insertion sequence is inserted into the base sequence, the feature point corresponding to the current edge information in the insertion sequence is matched, and the value of the feature point is used as the value inserted into the base sequence.
Preferably, the insertion position of the insertion sequence is determined by calculating the difference between the feature descriptors, and selecting the largest difference from the calculated differences; and determining the offset of the insertion position of the insertion sequence according to the position of the maximum difference value, and sequentially inserting the values, which are required to be inserted, of the insertion sequence into the base sequence according to the offset, wherein the base sequence after the insertion is the second encryption sequence.
Example IV
In order to make the security higher during the transmission of the scanned image, the scanning transmission and the state during the scanning are interacted, and the overall splicing effect of the image during the scanning is improved, as shown in fig. 4, when the overlapping area of the spliced image and the specific condition during the splicing are determined, the spliced image after the identification is transmitted according to the set encryption mode, and the encryption parameters used during the transmission of the spliced image are determined according to the specific parameters during the scanning image, for example, the number of frames of the splicing interval, the number of frames of the identification and the scanning speed adopted during the scanning image.
S31, acquiring the splicing interval frame number and the identification frame number corresponding to the splicing unit.
The splicing interval frame number is used for displaying the inserted frame number when each splicing unit is spliced, and the identification frame number is used for representing the frame number used when each splicing unit is identified.
S32, based on the second encryption sequence, acquiring a third encryption sequence according to the splicing interval frame number and the identification frame number corresponding to the splicing unit.
Specifically, as shown in fig. 5, the third encryption sequence is obtained in the following manner:
s321, recording the splicing interval frame number and the identification frame number of each spliced image;
s322, determining the number of complementary bits according to the sum of the number of actual splicing intervals, the number of actual identification frames, the number of preset splicing intervals and the ratio of preset identification frames;
s323, generating a bit supplementing sequence according to the scanning state of the spliced image;
s324, according to the number of the complementary bits, the complementary bit sequences are sequentially inserted into the second encryption sequence, and the second encryption sequence after the complementary bits is used as an output third encryption sequence.
After the third encryption sequence is acquired, acquiring an interval frame number and an identification frame number during the scanning of the spliced image, and determining the complementary bit of the third encryption sequence according to the interval frame number and the identification frame number, thereby determining the third encryption sequence used during final output;
and supplementing the second encryption sequence according to the scanning state by determining the scanning state when the spliced image is acquired.
Setting the complement of the second encryption sequence to a trigger hint of scan occurrence, e.g., 1 is normal scan, 0 is rescan form, the complement value is 1 if one stitched image is directly scanned successfully, the complement value is 01 if the scan is twice successful, and so on to derive the third encryption sequence.
As shown in fig. 6, the present invention provides an intelligent scanning data security transmission device, which includes:
and the splicing state determining unit is used for recording the splicing interval frame number and the identification frame number when the spliced images are generated and recording that each spliced image consists of a plurality of splicing units.
The first encryption unit is used for generating a first encryption sequence according to the splicing condition of the splicing unit;
the second encryption unit is used for generating a second encryption sequence according to the overlapping area of the splicing unit;
and the third encryption unit is used for generating a third encryption sequence according to the splicing interval frame number and the identification frame number when the spliced image is generated.
The number of the splicing interval frames and the number of the identification frames when the spliced images are generated are recorded, so that the relevance between the splicing unit and the whole spliced images is determined, the images during transmission can be closer to the actual image interval, and a high-safety transmission mode is realized.
The invention provides an intelligent scanning pen, which comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor realizes the data security transmission method of intelligent scanning according to any one of the first to fourth embodiments when executing the program.
The above description is only of the preferred embodiments of the present invention and is not intended to limit the present invention, but various modifications and variations can be made to the present invention by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. The intelligent scanning data security transmission method is characterized by comprising the following steps: s01, acquiring spliced image frames from acquired images based on splicing time sequence intervals, and generating spliced images;
s02, dividing the spliced image into a plurality of spliced units, and identifying the spliced units to generate a first encryption sequence;
s03, acquiring edge information of the spliced image based on the first encryption sequence, and generating a second encryption sequence;
s04, generating a third encryption sequence according to the scanning condition of the spliced image based on the second encryption sequence;
s05, outputting the encrypted spliced image based on the third encryption sequence.
2. The method for securely transmitting data for intelligent scanning according to claim 1, wherein the implementation manner of step S02 includes: s11, acquiring a spliced image to be identified, and dividing the spliced image into a plurality of spliced units; after the spliced image is acquired, determining a splicing unit according to the trace of the spliced image when the image is spliced;
s12, comparing splicing units in continuous frames, and determining pixel point errors of the splicing units;
s13, acquiring a first encryption sequence corresponding to the splicing unit according to the pixel point error of the splicing unit.
3. The method for securely transmitting data for intelligent scanning according to claim 1, wherein the implementation manner of step S03 includes: s21, for each splicing unit, checking the overlapping area between each splicing unit and the adjacent splicing unit, and recording the overlapping area between each splicing unit and the adjacent unit to obtain the overlapping area between the adjacent splicing units;
s22, extracting significant characteristic points in the overlapping area, and ensuring that the selected characteristic points can keep stability among different frames;
s23, for each spliced unit, matching the characteristic points extracted from the spliced units in the overlapping area with the characteristic points of the adjacent units to obtain a matching result of the spliced units;
s24, determining a second encryption sequence of each splicing unit according to the matching result of the splicing units.
4. The intelligent scanning data security transmission method according to claim 3, wherein the matching result of the splicing unit comprises feature point matching and edge information extraction of the overlapping area.
5. The method for securely transmitting data for intelligent scanning according to claim 1, wherein the implementation of step S04 comprises: s31, acquiring a splicing interval frame number and an identification frame number corresponding to a splicing unit;
s32, based on the second encryption sequence, acquiring a third encryption sequence according to the splicing interval frame number and the identification frame number corresponding to the splicing unit.
6. The method for securely transmitting data of intelligent scanning according to claim 5, wherein the obtaining means of the third encryption sequence in step S32 comprises: s321, recording the splicing interval frame number and the identification frame number of each spliced image;
s322, determining the number of complementary bits according to the sum of the number of actual splicing intervals, the number of actual identification frames, the number of preset splicing intervals and the ratio of preset identification frames;
s323, generating a bit supplementing sequence according to the scanning state of the spliced image;
s324, according to the number of the complementary bits, the complementary bit sequences are sequentially inserted into the second encryption sequence, and the second encryption sequence after the complementary bits is used as an output third encryption sequence.
7. The intelligent scanning data security transmission method according to claim 4, wherein the feature point matching is achieved by:
counting the number of matching points, namely successfully matched characteristic point pairs, analyzing the distribution condition of the matching points in an overlapping area, calculating the distance between the matching points, and determining the similarity between the matching points by calculating the Euclidean distance between the matching points;
the method for extracting the edge information comprises the following steps:
calculating the geometric relationship between the splicing units according to the position information of the matching points, calculating parameters such as distance, angle and the like between the matching points, and judging the relative position and the posture of the splicing units by comparing the geometric relationship between different matching points;
and determining the matching effect of the splicing unit according to the relative position and the gesture of the splicing unit, and extracting to obtain the edge information of the splicing unit.
8. The method for secure transmission of intelligently scanned data as recited in claim 1, wherein obtaining the second encryption sequence for each splice unit comprises:
the first encryption sequence of each splicing unit is used as a basic sequence, edge information corresponding to each splicing unit is obtained, feature descriptors corresponding to the edge information are extracted, and the feature descriptors corresponding to the edge information are used as an insertion sequence; comparing the sizes of adjacent insertion sequences, and sequentially inserting each binary number in the insertion sequences into the basic sequence;
when each binary number in the insertion sequence is inserted into the basic sequence, matching the characteristic points corresponding to the current edge information in the insertion sequence, and taking the values of the characteristic points as the values inserted into the basic sequence;
the insertion position of the insertion sequence is determined by calculating the difference value between the feature descriptors, and selecting the largest difference value from the calculated difference values; and determining the offset of the insertion position of the insertion sequence according to the position of the maximum difference value, and sequentially inserting the values, which are required to be inserted, of the insertion sequence into the base sequence according to the offset, wherein the base sequence after the insertion is the second encryption sequence.
9. Data security transmission device of intelligent scanning, its characterized in that includes: the splicing state determining unit is used for recording the splicing interval frame number and the identification frame number when the spliced images are generated and recording that each spliced image consists of a plurality of splicing units;
the first encryption unit is used for generating a first encryption sequence according to the splicing condition of the splicing unit;
the second encryption unit is used for generating a second encryption sequence according to the overlapping area of the splicing unit;
and the third encryption unit is used for generating a third encryption sequence according to the splicing interval frame number and the identification frame number when the spliced image is generated.
10. An intelligent scanning pen, characterized by comprising: memory, a processor and a computer program stored on the memory and executable on the processor, which processor, when executing the program, implements the data security transmission method of intelligent scanning according to any one of claims 1 to 8.
CN202311726854.3A 2023-12-15 2023-12-15 Intelligent scanning data safety transmission method and device and intelligent scanning pen Pending CN117424968A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311726854.3A CN117424968A (en) 2023-12-15 2023-12-15 Intelligent scanning data safety transmission method and device and intelligent scanning pen

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311726854.3A CN117424968A (en) 2023-12-15 2023-12-15 Intelligent scanning data safety transmission method and device and intelligent scanning pen

Publications (1)

Publication Number Publication Date
CN117424968A true CN117424968A (en) 2024-01-19

Family

ID=89523333

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311726854.3A Pending CN117424968A (en) 2023-12-15 2023-12-15 Intelligent scanning data safety transmission method and device and intelligent scanning pen

Country Status (1)

Country Link
CN (1) CN117424968A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102222222A (en) * 2011-05-27 2011-10-19 汉王科技股份有限公司 Frame-skipping scanning and recognizing device and method
CN106452779A (en) * 2016-08-31 2017-02-22 福建联迪商用设备有限公司 Encryption method and apparatus of fingerprint image data
CN109859105A (en) * 2019-01-21 2019-06-07 桂林电子科技大学 A kind of printenv image nature joining method
CN111131657A (en) * 2019-12-20 2020-05-08 长春理工大学 Chaos medical image tamper-proof encryption method based on self-verification matrix

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102222222A (en) * 2011-05-27 2011-10-19 汉王科技股份有限公司 Frame-skipping scanning and recognizing device and method
CN106452779A (en) * 2016-08-31 2017-02-22 福建联迪商用设备有限公司 Encryption method and apparatus of fingerprint image data
CN109859105A (en) * 2019-01-21 2019-06-07 桂林电子科技大学 A kind of printenv image nature joining method
CN111131657A (en) * 2019-12-20 2020-05-08 长春理工大学 Chaos medical image tamper-proof encryption method based on self-verification matrix

Similar Documents

Publication Publication Date Title
EP2783328B1 (en) Text detection using multi-layer connected components with histograms
CN102103698B (en) Image processing apparatus and image processing method
Debiasi et al. PRNU variance analysis for morphed face image detection
JP6080259B2 (en) Character cutting device and character cutting method
Gill et al. A review paper on digital image forgery detection techniques
US20050141766A1 (en) Method, system and program for searching area considered to be face image
Qu et al. Detect digital image splicing with visual cues
US8538170B2 (en) System and method for document location and recognition
Thajeel et al. State of the art of copy-move forgery detection techniques: a review
CN110084781B (en) Passive evidence obtaining method and system for monitoring video tampering detection based on feature points
CN104537376A (en) A method, a relevant device, and a system for identifying a station caption
Thapar et al. Comparing image feature extraction methods using dermoscopy noisy images
US9858481B2 (en) Identifying consumer products in images
CN109740607B (en) Incomplete region detection and incomplete character image restoration method for character image
CN112001200A (en) Identification code identification method, device, equipment, storage medium and system
Jubair et al. Scale invariant feature transform based method for objects matching
CN112001389A (en) Method and device for identifying text information in multi-scene video and electronic equipment
CN117424968A (en) Intelligent scanning data safety transmission method and device and intelligent scanning pen
CN111612083A (en) Finger vein identification method, device and equipment
Agarwal et al. The advent of deep learning-based image forgery detection techniques
CN110428264A (en) Fake method, device, equipment and medium are tested in identification based on dot matrix screen antifalsification label
Raju et al. Text localization and extraction from complex color images
Sreelakshmy et al. An improved method for copy-move forgery detection in digital forensic
CN114359923A (en) Certificate character recognition method and device, computer and storage medium
Xu et al. Coin recognition method based on SIFT algorithm

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination