KR101757682B1 - Outside diversion preventing method of security image and system therof - Google Patents
Outside diversion preventing method of security image and system therof Download PDFInfo
- Publication number
- KR101757682B1 KR101757682B1 KR1020160003021A KR20160003021A KR101757682B1 KR 101757682 B1 KR101757682 B1 KR 101757682B1 KR 1020160003021 A KR1020160003021 A KR 1020160003021A KR 20160003021 A KR20160003021 A KR 20160003021A KR 101757682 B1 KR101757682 B1 KR 101757682B1
- Authority
- KR
- South Korea
- Prior art keywords
- image
- security
- specific object
- edge
- intersection
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19654—Details concerning communication with a camera
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T7/00—Image analysis
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19663—Surveillance related processing done local to the camera
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19665—Details related to the storage of video surveillance data
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19678—User interface
- G08B13/19682—Graphic User Interface [GUI] presenting system data to the user, e.g. information on a screen helping a user interacting with an alarm system
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19678—User interface
- G08B13/19686—Interfaces masking personal details for privacy, e.g. blurring faces, vehicle license plates
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Theoretical Computer Science (AREA)
- Alarm Systems (AREA)
Abstract
The present invention provides a method and system for preventing external leakage of an image requiring security. The present invention discloses a technique for determining whether there is an item (for example, a specific image) to be secured in a photographed image using an algorithm. The image security according to the present invention is based on the premise that a video call is made in a photographable area, and in order to determine a security object in the captured image, a gaussian blurring pre-processing for strong edge detection, a blurring pre- , It is possible to precisely judge the security target by sequentially detecting the edges as line segments, extracting the closed edges of the detected edges, extracting straight edges, estimating the intersections (line intersections) of the outlines and straight lines, generating the vector of segments and filtering the intersections. .
Description
The present invention relates to a method and system for preventing external leakage of a secure image.
More specifically, the present invention relates to a video security method for judging whether a captured image includes a security target and a more specific security target image (for example, a specific object) is included in the security target, .
Recently, due to the proliferation of smartphones, vulnerabilities have appeared in information security such as personal information leakage accidents and financial security accidents. Various security systems have been developed to prevent such information security.
In the case of a general video call security device, when facial image is recognized and there is a facial output disturbance element, a method of blocking image information or blocking the system device is used.
However, in the case of using an existing video communication device to communicate with the outside, when the security related objects such as confidential documents, firearms, and weapons are photographed, the image may be leaked to the outside, .
In other words, since the image security system uses the face recognition method in general, there is no problem in using it for an immigration control station, a financial institution, or a device using facial recognition for identification of the user. However, when a video call is made at a specific place, When a video call is made in a place where security is required, a security setting for a specific object is insufficient, and a video of a confidential document, a gun, a weapon, or a specific object related to security can be transmitted to the outside.
SUMMARY OF THE INVENTION The present invention has been made to solve the above-mentioned problems in the prior art, and it is an object of the present invention to provide an image- Or replacing the image with another image stored in advance, and to provide a system and a method for preventing the leakage of the security image.
It is another object of the present invention to provide a security information management system and a security information management system in which when a security object including a specific object is photographed, user information and location information are notified to a specific organization or a security inspector, And to provide a system and method for preventing leakage.
Other objects of the present invention will be apparent from the following description.
According to another aspect of the present invention, there is provided a method for preventing external leakage of a security image, the method comprising: performing a video call in a photographable area; determining whether a specific object is included in the security- A method for preventing external leakage of a security image to be prevented, the security object recognition comprising: a first step of inputting a photographed image; A second step of performing a Gaussian blurring preprocessing for strong edge detection in an input image; A third step of detecting an edge as a line segment component in the blurring pre-processed image; A fourth step of extracting a closed section outline of the detected edge; A fifth step of extracting a straight edge; A sixth step of estimating an intersection (line segment intersection) of an outline and a straight line; And a seventh step of filtering the intersection points. The intersection points where the line segments of the line segment intersect are detected. When the intersection angle is within a predetermined angle, the outline of the candidate line is selected as the outline of the candidate line. It is finally determined that there is a security violation when the sum of the lengths of line segments based on the intersection point is equal to or larger than a predetermined size based on the horizontal width of the image and the total number of intersections is equal to or less than a predetermined number .
The intersection angle is 40 ° to 50 ° or 80 ° to 100 °, and the sum of the lengths of the line segments based on the intersection point is 70% or more of the horizontal width standard of the image, and the total number of intersections is 6.
The third step is characterized by obtaining an edge image which changes from white to black or from black to white in the blurred image.
In the fourth step, an outline corresponding to a closed section having a cycle (connected to and returning to the starting point) is extracted from eight adjacent edges of the edge, and if there is at least two 90 ° inflection points with respect to the detected closed section, And judges it as a security target.
Step 7 is a step for correcting a case where a line segment is lost, and is characterized by generating a line segment vector that traverses the entire image through fitting with respect to the advancing angle direction of the straight edge extracted at the straight line edge extracting step.
In step 7, the image is characterized by generating a segment vector that traverses the height in the case of vertical and the width in the case of horizontal.
According to an aspect of the present invention, there is provided an apparatus for preventing external leakage of a security image, the apparatus including a security object recognition algorithm and a security program including a specific object, An image security device including an image security terminal for blocking transmission of the image or replacing the image with another image stored in advance when the captured security object includes a specific object; And a server for transmitting an image of a security object transmitted from the image security means to a specific organization or a security inspector and for updating a security object image including a specific object by accessing the image security means at a remote place, And the image security means is equipped with a security object recognition algorithm and a security program. When the image of a specific object included in the photographed image of the security object coincides with the image of a specific object stored in the memory, A central processing unit which periodically replaces the user ID and the position data with the other image or intercepts the video transmission of the security target, and transmits the user ID and the position data to the server; A camera for capturing an image and inputting the captured image to the central processing unit; An audio processing unit for processing audio included in an image photographed by the camera; A memory for storing an image of a specific object included in the security object judged by the central processing unit; And a network transmission unit for transmitting a security object image including a specific object determined by the central processing unit to a server, receiving a security object image including a specific object to be updated from the server, and transmitting the image to the central processing unit .
The image security means includes a first step of inputting a photographed image; A second step of performing a Gaussian blurring preprocessing for strong edge detection in an input image; A third step of detecting an edge as a line segment component in the blurring pre-processed image; A fourth step of extracting a closed section outline of the detected edge; A fifth step of extracting a straight edge; A sixth step of estimating an intersection (line segment intersection) of an outline and a straight line; And a seventh step of filtering the intersection points. When the crossing points at which the line segments of the line segment vectors intersect are detected and the crossing angle is within the range of 40 ° to 50 ° or 80 ° to 100 °, And when the sum of the lengths of line segments based on the intersection points of the result of the line segment intersection and the candidates of the security target of the corrected segment vector is larger than 70% of the width of the image and the total number of intersections is 6 or less, And finally determines that there is a security violation.
The server is characterized in that, when a video image of a security target containing a specific object is received from the video security means, the server transmits the video image, user ID and location information including the specific object to a specific institution or security inspector .
The server checks the status of the image security means at a remote location, and when the network communication is enabled as an idle mode, the server transmits an image of a security object including a specific object to the image security means and updates the image.
According to the method and system for preventing the outflow of the security image of the present invention, a security object including specific objects such as confidential documents, firearms, and weapons, among the video calls performed in places requiring security, , It is possible to precisely judge the security target by using an algorithm to prevent external leakage and to transmit user information and location information to a specific organization or a security inspector so as to promptly cope with the leakage situation of security information It has excellent effect.
1 is a network configuration diagram of a video security system according to an embodiment of the present invention;
2 is a configuration diagram of a video security terminal according to an embodiment of the present invention;
3 is an illustration of a specific object included in a security object according to an embodiment of the present invention.
4 is a flowchart illustrating an operation of determining a security object including a specific object according to an embodiment of the present invention.
FIG. 5 is a detailed flowchart of the security object determination of FIG. 4;
6 is an operational flowchart for updating an image of a security object including a specific object in the embodiment of the present invention.
Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
Unless defined otherwise, all terms used herein, including technical or scientific terms, have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. Terms such as those defined in commonly used dictionaries should be interpreted as having a meaning consistent with the meaning in the context of the relevant art and are to be interpreted in an ideal or overly formal sense unless explicitly defined in the present application Do not.
It should be understood that the present invention covers all modifications, equivalents, and alternatives falling within the spirit and scope of the present invention as defined by the appended claims.
In the embodiment of the present invention, a case in which a video call proceeds in a secure area will be described as an example. In the following description, the terms "image" and "image" are used.
1 is a network configuration diagram of a video security system according to an embodiment of the present invention.
1, the image security system of the present invention includes a
In one embodiment, the
The configuration of the
The
In one embodiment, the
In one embodiment, the
In one embodiment, the
In one embodiment, the
In one embodiment, the
In one embodiment, the
The
Referring back to FIG. 1, the
The
In one embodiment, the
In an exemplary embodiment, a
The operation flow of the image security system according to the present invention will be described in detail with reference to FIGS. 3 to 6. FIG.
First, an operation flow according to security object recognition in the embodiment of the present invention will be described with reference to FIG.
First, when the user attempts to make a call from the
Accordingly, if the user inputs the user ID on the user authentication screen and succeeds in authentication, the
Then, the
The security object recognition (S40) including the specific object is implemented through the detailed operation flow shown in FIG.
Especially in the security object recognition operation, paper detection that can be a security target will be described as an example.
First, we estimate quadrilateral paper based on segment analysis.
5 is a quadrangular detection method based on the intersection angles of line segments by inferring the intersection point (ignoring break) between the outline of the closed section and the straight line in the user image.
First, when a photographed image is input in the input unit 130 (S10), a gaussian blurring preprocessing for strong edge detection is performed on the input image (S20). Here, blurring refers to a phenomenon in which, for example, the camera moves or the image becomes unclear due to other reasons during photographing, so blurring is preferably applied ten times in order to detect the highest contrast area.
An edge, which is a line component, is detected in the blurred image (S30).
This step is to obtain an edge image that changes from white to black or from black to white in the blurred image, and is a step for detecting an area irrelevant to the paper color like a character.
The outline of the closed section of the detected edge is extracted (S40).
This step extracts an outline corresponding to a closed section with a cycle (connected to and returning to the starting point) out of eight edge neighboring edges of the edge. If there is at least two 90 ° inflection points for the detected closed interval, it is determined that the specific form of the security target can be derived to some extent and the security target is immediately determined.
Next, the straight edge is extracted (S50).
This step is to select only the edge of the straight line without the inflection point from the obtained edge when there is no square closed interval outline.
Next, an intersection (line segment intersection) of the outline and the straight line is estimated (S60).
In this step, an intersection at which a line segment intersects the straight lines detected in step S40 is detected, and when the intersection angle is within a predetermined angle range, preferably within a range of 40 to 50 degrees or 80 to 100 degrees, As shown in FIG.
Next, segment vector generation and intersection points are filtered (S70, S80).
These steps are steps for correcting the disappearance of the line segment, and the entire image (the height in the case of the vertical direction and the case of the horizontal direction in the case of the horizontal direction, Quot; width ").
If the intersection angle is within the range of 40 ° to 50 ° or 80 ° to 100 °, it is selected as the outline of the candidate of the security target candidate, and the result of the line intersection at step S 5 And the corrected candidate segment vector of the corrected segment vector, when the sum of the lengths of the segments based on the intersection point is equal to or larger than 70% of the width of the image and the total number of intersections is 6 or less, a security violation exists .
After the security object recognition process is completed, if the image photographed during the video call is recognized as a security object and a specific object (for example, FIG. 3) is included in the security object such as the paper If the determination is made, the
In addition, the
The
Accordingly, the special agency or security inspector analyzes whether the image transmitted from the
As described above, according to the present invention, when a security object including an image of a specific object stored in advance is photographed, it can be replaced with another image, or the leakage of security information can be prevented by blocking the image transmission. If the present invention is employed in a place such as a special institution, a military unit or a police station requiring security, leakage of security information can be prevented in advance.
On the other hand, since the specific objects included in the security target vary depending on the organization or the individual, the objects to be compared should be renewable directly or through a wireless network or a wired network.
In the meantime, the present invention can be performed at a remote place to block external transmission of a security target image including a specific object stored in the
First, the
If it is determined that the
When the
The
When the update operation for the image of the security object including the specific object is completed, the
Therefore, according to the present invention, when applied to a public institution or a special institution requiring security, it is possible to prevent an image of a specific object included in a security target from being leaked to the outside during a video call. In particular, The image of the object can be updated and the reliability of the security system can be improved.
In addition, according to the present invention, when applied to a public institution or a special institution requiring security, it is possible to prevent a security target image including a specific object from being leaked to the outside during a video call. In particular, The reliability of the security system can be improved.
100: video security terminal 200: video storage server
300: registration server 400: terminal
Claims (10)
The security object recognition may include:
A first step of inputting a photographed image;
A second step of performing Gaussian blurring pre-processing for strong edge detection in the input image;
A third step of detecting an edge as a line segment component in the blurring pre-processed image;
A fourth step of extracting a closed section outline of the detected edge;
A fifth step of extracting a straight edge;
A sixth step of estimating an intersection (line segment intersection) of an outline and a straight line;
And a seventh step of generating a segment vector and filtering the intersection points,
The crossing point at which the line segments of the segment vector intersect is detected, and when the crossing angle is within a predetermined angle, the line is selected as the outline of the security target candidate group, When the sum of the lengths of the segments is equal to or larger than a predetermined size based on the width of the image and the number of the total intersections is equal to or less than a predetermined number, a final determination is made that a security violation exists.
If the edge of a closed section with a cycle (connected back to the starting point) among the eight edges neighboring edges of the edge is extracted and there are at least two 90 ° inflection points for the detected closed section, Wherein the secure image is protected from external leakage.
And generating a segment vector that traverses the entire image through fitting of the straight edge extracted in the straight edge extraction step to the progress angle direction, How to prevent spills.
A server for transmitting a security target image transmitted from the image security means to a specific organization or a security inspector and for updating a security target image including a specific object by accessing the image security means at a remote place, Lt; / RTI >
Wherein the image security means comprises:
A security object recognition algorithm and a security program are installed. When the image of a specific object included in the captured image of the secured object coincides with the image of a specific object stored in the memory, the image of the object of security is replaced with another image, A central processing unit that intercepts video transmission and periodically transmits user ID and location data to a server;
A camera for capturing an image and inputting the captured image to the central processing unit;
An audio processing unit for processing audio included in an image photographed by the camera;
A memory for storing an image of a specific object included in the security object determined by the central processing unit; And
A network transmission unit for transmitting a security target image including a specific object determined by the central processing unit to a server, receiving a security target image including a specific object to be updated from the server and transmitting the image to the central processing unit, Wherein the secure image is protected from external leakage.
A first step of inputting a photographed image;
A second step of performing Gaussian blurring pre-processing for strong edge detection in the input image;
A third step of detecting an edge as a line segment component in the blurring pre-processed image;
A fourth step of extracting a closed section outline of the detected edge;
A fifth step of extracting a straight edge;
A sixth step of estimating an intersection (line segment intersection) of an outline and a straight line;
And a seventh step of generating a segment vector and filtering the intersection points,
If the crossing point at which the line segments of the segment vector intersect is detected and the crossing angle is within 40 ° to 50 ° or 80 ° to 100 °, it is selected as the outline of the candidate for security target, and the result of the line intersection and the corrected line segment vector Characterized in that, when the sum of the lengths of line segments on the basis of the intersection point is greater than or equal to 70% of the horizontal width of the image and the total number of intersections is equal to or less than 6, A system to prevent the outflow of images.
A secure object image, a user ID, and location information including the specific object are transmitted to a specific organization or a security inspector when a secure object image including a specific object is received from the image security means, A system to prevent outflow.
Wherein the image security unit checks the status of the image security unit at a remote location and transmits a security object image containing a specific object to the image security unit when the network communication is enabled as the idle mode. system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020160003021A KR101757682B1 (en) | 2016-01-11 | 2016-01-11 | Outside diversion preventing method of security image and system therof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020160003021A KR101757682B1 (en) | 2016-01-11 | 2016-01-11 | Outside diversion preventing method of security image and system therof |
Publications (1)
Publication Number | Publication Date |
---|---|
KR101757682B1 true KR101757682B1 (en) | 2017-07-13 |
Family
ID=59352459
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020160003021A KR101757682B1 (en) | 2016-01-11 | 2016-01-11 | Outside diversion preventing method of security image and system therof |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR101757682B1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101946579B1 (en) * | 2018-10-19 | 2019-05-21 | (주)동광지엔티 | System For Drawing Of Renewal Area |
KR101946573B1 (en) * | 2018-10-24 | 2019-05-21 | (주)동광지엔티 | Equipment For Drawing Image |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100785339B1 (en) | 2006-11-16 | 2007-12-17 | 중앙대학교 산학협력단 | Apparatus and method for recognizing shape from an image |
KR101277322B1 (en) | 2010-11-08 | 2013-06-20 | 주식회사 원포유 | Video communication apparatus and real time face recognition video communication method thereof |
-
2016
- 2016-01-11 KR KR1020160003021A patent/KR101757682B1/en active IP Right Grant
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100785339B1 (en) | 2006-11-16 | 2007-12-17 | 중앙대학교 산학협력단 | Apparatus and method for recognizing shape from an image |
KR101277322B1 (en) | 2010-11-08 | 2013-06-20 | 주식회사 원포유 | Video communication apparatus and real time face recognition video communication method thereof |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101946579B1 (en) * | 2018-10-19 | 2019-05-21 | (주)동광지엔티 | System For Drawing Of Renewal Area |
KR101946573B1 (en) * | 2018-10-24 | 2019-05-21 | (주)동광지엔티 | Equipment For Drawing Image |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7159509B1 (en) | Systems and methods using multiple focal stacks for image-based spoofing detection | |
US11321575B2 (en) | Method, apparatus and system for liveness detection, electronic device, and storage medium | |
CN109002786B (en) | Face detection method, face detection equipment and computer-readable storage medium | |
US20180012094A1 (en) | Spoofing attack detection during live image capture | |
CN104834866A (en) | Method and device for protecting privacy-sensitive information by automatically recognizing scene | |
KR101057882B1 (en) | Wanted-vehicle and illegal parking crackdown system | |
KR102406804B1 (en) | Method and system for automatically detecting objects in image based on deep learning | |
US10991292B2 (en) | System and method for protecting sensitive on-screen information | |
CN113012383B (en) | Fire detection alarm method, related system, related equipment and storage medium | |
CN104834839A (en) | Bar code generating method, authentication method based on bar code and relative terminal | |
CN109902611B (en) | Target certificate detection method and device and terminal equipment | |
CN107294915A (en) | Image-pickup method, system and terminal | |
CN110619239A (en) | Application interface processing method and device, storage medium and terminal | |
KR101757682B1 (en) | Outside diversion preventing method of security image and system therof | |
US9197851B2 (en) | Apparatus and method for modulating images for videotelephony | |
US10299117B2 (en) | Method for authenticating a mobile device and establishing a direct mirroring connection between the authenticated mobile device and a target screen device | |
CN108334761B (en) | User authority identification method and device | |
KR101654797B1 (en) | Interactive CAPTCHA System Resilient to Phishing Attacks | |
KR101925799B1 (en) | Computer program for preventing information spill displayed on display device and security service using the same | |
CN108063665B (en) | Communication method and terminal device | |
CN110135204A (en) | Data guard method and device | |
CN112906651B (en) | Target detection method and device | |
CN110134565A (en) | Environment light detection method and device | |
CN110084076A (en) | Evidence display methods and device | |
KR101736095B1 (en) | Outside diversion preventing method of security image and system thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
E701 | Decision to grant or registration of patent right | ||
GRNT | Written decision to grant |