WO2018153299A1 - Procédé et appareil de traitement d'images et support d'informations - Google Patents

Procédé et appareil de traitement d'images et support d'informations Download PDF

Info

Publication number
WO2018153299A1
WO2018153299A1 PCT/CN2018/076419 CN2018076419W WO2018153299A1 WO 2018153299 A1 WO2018153299 A1 WO 2018153299A1 CN 2018076419 W CN2018076419 W CN 2018076419W WO 2018153299 A1 WO2018153299 A1 WO 2018153299A1
Authority
WO
WIPO (PCT)
Prior art keywords
image
elements
sequence
target
conversion information
Prior art date
Application number
PCT/CN2018/076419
Other languages
English (en)
Chinese (zh)
Inventor
范俊豪
程明宇
罗凡
Original Assignee
腾讯科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 腾讯科技(深圳)有限公司 filed Critical 腾讯科技(深圳)有限公司
Publication of WO2018153299A1 publication Critical patent/WO2018153299A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0085Time domain based watermarking, e.g. watermarks spread over several images
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0051Embedding of the watermark in the spatial domain

Definitions

  • the embodiments of the present invention relate to the field of image processing technologies, and in particular, to a method, an apparatus, and a storage medium for image processing.
  • a watermark refers to a semi-transparent logo, icon, etc. added to the image to prevent others from stealing the map.
  • a typical online store owner will add a unique text watermark or icon to his product image.
  • the embodiment of the present application provides a method, a device, and a storage medium for image processing.
  • a target image element corresponding to a user identifier By adding a target image element corresponding to a user identifier to an image, the image is protected, and the original information of the target image element in the image is reduced. Impact.
  • An embodiment of the present application provides a method for image processing, which is applied to a user equipment, and in response to a user acquiring an image, obtains a user identifier, and converts the user identifier into corresponding conversion information, where the conversion information includes a plurality of information elements for adjusting display states of the plurality of image elements on the image;
  • the display states of the plurality of target elements are adjusted such that display states of the plurality of target elements are different from other image elements in the image.
  • the embodiment of the present application further provides a method for image processing, which is applied to a terminal device or a server, and includes:
  • the embodiment of the present application further provides an apparatus for image processing, including:
  • a memory coupled to the processor; storing, in the memory, a machine readable instruction unit; the machine readable instruction unit comprising:
  • a first acquiring unit configured to acquire a user identifier in response to a user acquiring an image
  • a second acquiring unit configured to convert the user identifier into corresponding conversion information, where the conversion information includes a plurality of information elements, to adjust a display state of the plurality of image elements on the image;
  • a third acquiring unit configured to acquire the image according to the request
  • a fourth acquiring unit configured to acquire a plurality of image elements in the image, where the multiple image elements are arranged in a manner consistent with a predetermined arrangement rule
  • a fifth acquiring unit configured to select a plurality of target elements from the plurality of image elements according to the plurality of information elements in the conversion information, wherein a positional relationship between the plurality of target elements and the conversion Corresponding to multiple information elements in the information;
  • a labeling unit configured to adjust a display state of the plurality of target elements such that a display state of the plurality of target elements is different from other image elements in the image.
  • the embodiment of the present application further provides an apparatus for image processing, including:
  • a memory coupled to the processor; storing, in the memory, a machine readable instruction unit; the machine readable instruction unit comprising:
  • a first acquiring unit configured to acquire an image to be processed in response to the identification request for the image
  • a second acquiring unit configured to acquire a plurality of image elements in the image to be processed, and the arrangement manner of the plurality of image elements conforms to a predetermined arrangement rule
  • a first determining unit configured to determine, from the plurality of image elements, a plurality of target elements, wherein display states of the plurality of target elements are different from display states of other image elements in the image;
  • a second determining unit configured to determine, according to the multiple target elements, a user identifier corresponding to the image.
  • the embodiment of the present application also provides a non-transitory computer readable storage medium, wherein the storage medium stores machine readable instructions, which are executable by a processor to perform any of the methods described above.
  • 1A is a system architecture diagram of an embodiment of the present application.
  • FIG. 1B is a flowchart of a method for image processing according to an embodiment of the present disclosure
  • FIG. 2 is a flowchart of another method for image processing provided by an embodiment of the present application.
  • FIG. 3 is a flowchart of another method for image processing provided by an embodiment of the present application.
  • FIG. 4 is a schematic diagram of a grid line provided by an embodiment of the present application.
  • FIG. 5 is a flowchart of another method for image processing according to an embodiment of the present application.
  • FIG. 6 is a schematic diagram of an image element marked in a grid line according to an embodiment of the present application.
  • FIG. 7 is a schematic diagram of an effect of adding a label image element to a grid line according to an embodiment of the present application.
  • FIG. 8 is a flowchart of another method for image processing according to an embodiment of the present application.
  • FIG. 9 is a flowchart of another method for image processing according to an embodiment of the present application.
  • FIG. 10 is a flowchart of another method for image processing according to an embodiment of the present application.
  • FIG. 11 is a block diagram showing the composition of an apparatus for image processing according to an embodiment of the present application.
  • FIG. 12 is a block diagram showing the composition of another apparatus for image processing according to an embodiment of the present application.
  • FIG. 13 is a block diagram showing the composition of another apparatus for image processing according to an embodiment of the present application.
  • FIG. 14 is a block diagram showing the composition of another apparatus for image processing according to an embodiment of the present application.
  • FIG. 15 is a schematic structural diagram of a computing device in an example of the present application.
  • FIG. 1A is a system architecture diagram of the present application.
  • the system architecture includes: a client 1001 and a server 1002, wherein the client 1001 and the server 1002 are connected through the Internet.
  • the client may be an application on the terminal device, and the application may be a browser or an application APP.
  • the server may be a server that provides icon data.
  • the terminal device may be a portable terminal device such as a mobile phone, a tablet, a palmtop computer, a wearable device, or a PC such as a desktop computer or a notebook computer, or may be a smart computer having various Internet access capabilities and a display interface. device.
  • the client 1001 acquires data of the image in response to an operation of the user acquiring the image, wherein the data of the image can be acquired from the server.
  • the client 1001 obtains the login account of the user
  • the server 1002 obtains the user identifier uniquely corresponding to the login account according to the login account, and adds a watermark to the image according to the identifier of the user, and the added watermark uniquely corresponds to the user identifier.
  • the corresponding user causing the leak can be determined based on the watermark on the image, thereby protecting the image.
  • user A accesses the company's financial system through his own account on the browser.
  • the browser goes to the server to obtain the unique user identifier of the user according to the account of the user A, according to the user identifier.
  • the watermark is added to the financial statement.
  • the watermark on the leaked financial statement can identify the identifier of the user A, so that it can be determined that the user A leaks the financial statement, thereby realizing the financial of the company. Data protection.
  • the user identifier is a unique identifier assigned by the server to each user account.
  • the user can also submit a watermarked picture to the server through the client, so that the server recognizes the user account corresponding to the watermark and returns.
  • An embodiment of the present application provides a method for image processing, which is applied to a client in the system architecture, and is applicable to any device or software carrier that can process a picture, for example, an application on a mobile phone, a tablet, or a device. (for example, browser). As shown in FIG. 1B, it includes:
  • the user logs in to the server through the client. After successfully logging in to the server, the user can browse the web page or data icon through the client. If the user wants to view a data icon or operate on a data icon that has already been displayed (e.g., screenshot, save image, etc.), the client obtains the user identification in response to the user's request to acquire the image.
  • the client obtains the user identification in response to the user's request to acquire the image.
  • the user identifier is a user identifier that is allocated by the server for each user account, and the user identifier uniquely corresponds to the user account.
  • the user identifier is various types of information used to identify the user identity corresponding to the user account, and may include a user name, a digital signature, a unique code assigned by the system, and the like.
  • the user account is a user's permission account. For example, log in to the account of the financial management system, log in to the member account of the website of the social group, and the like.
  • the conversion information includes a plurality of information elements for adjusting display states of the plurality of image elements on the image.
  • the embodiment of the present application determines a conversion information uniquely corresponding to the user identifier by using the user identifier, and the conversion information may be a sequence of numbers, a sequence of letters, a sequence of symbols, etc. It is a mixed sequence of the foregoing various types of sequences, or a preset conversion rule, etc., which is not limited by the embodiment of the present application.
  • the image to be processed may be an image of various types of identification information such as a watermark to be added, and the corresponding image storage format may be JPG, PNG, BMP, or the like.
  • the client has a function of image processing. For example, when a user logs into the company's financial system through a browser, a quarterly sales chart is obtained in the system, the browser goes to the server to obtain quarterly sales data, and the image processing component in the browser also defines some image elements, for example, Columns in the histogram, abscissa, ordinate, grid lines, etc. The image processing component in the browser generates a quarterly sales chart based on the acquired sales data and the customized image element rendering.
  • adding a watermark in the chart can be added before the selection, so that the watermark corresponding to the user has been added to the quarterly sales chart that the user sees.
  • the watermark corresponding to the user can be added to the rendered chart.
  • step 104 acquiring a plurality of image elements in the image to be processed is performed, and the arrangement manner of the plurality of image elements conforms to a predetermined arrangement rule.
  • the image processing component in the browser is to customize some image elements to be added to the generated image, for example, grid lines, abscissas, ordinates, and the like.
  • an image element with the same interval in the image may be acquired, for example, a grid line in the image is selected as an image element, and then the display state is changed for a specific grid point in the grid line to implement watermarking. Operation so that the watermark does not affect the original information in the image.
  • the specific grid point needs to be determined based on the conversion information.
  • the image elements with the same interval may be image elements that are equally arranged in various arrangements, wherein the arrangement refers to conforming to a specific regular shape, such as a square, a line, a circle, and the like.
  • the image elements are selected according to a predetermined rule. For example, at the corners of the image (including the four corners of the image), a row of pixels or a column of pixels of substantially gray color is used as the image element.
  • a plurality of target elements are selected from the plurality of image elements such that a positional relationship of the plurality of target elements corresponds to the conversion information.
  • a target element is obtained from the image element according to the conversion information, and a positional relationship of the target element in all image elements corresponds to the conversion information.
  • the implementation of this step can be understood as the relative positional relationship between the image elements can reflect the sequence relationship specified by the various elements or rules carried in the conversion information.
  • the relative positional relationship between the image elements can reflect information such as the numerical size and numerical order carried by the digital sequence; if the conversion information is a sequence of letters, the relative positional relationship between the image elements can be It reflects the position and order of the letters in the corresponding alphabet; if the conversion information is a sequence of symbols, the relative positional relationship between the image elements can reflect the order of appearance of the symbols and the like.
  • the display state of the target element is adjusted such that the display state of the target element is different from other elements.
  • the labeling is to distinguish the display state of other image elements, and may be to adjust the size of the target element; and the color of the target element may also be adjusted.
  • color deepening, color change or size adjustment, or size and color synchronization adjustments are all optional implementations.
  • the process of labeling the target element can be added by the SVG method, so that the image of the watermark corresponding to the user identifier can be obtained by integrating the SVG path of the original image to be processed and the SVG path of the labeled target element.
  • the image processing method provided by the embodiment of the present application converts a user identifier corresponding to a user into a target element in an image uniquely corresponding to the user identification information, and adds a watermark (target element) to the image to be processed. In the image element. In this way, the user's identification information (watermark) is added to the image without affecting the original information of the image. Compared with the prior art, the technical solution provided by the embodiment of the present application can reduce the influence of the watermark on the original information of the image.
  • the image processing method provided by the present application further includes the following steps:
  • the obtaining the user identifier in response to the user acquiring the image includes:
  • the user identification needs to be processed to determine appropriate conversion information. For example, if the image element needs to be supported by a digital sequence in the labeling process, and the user identifier is indeed a sequence of letters, it is necessary to convert the user identifier that satisfies the sequence of letters into a sequence of numbers for labeling subsequent image elements, similarly, if In the labeling process of image elements, the support of the alphabetic sequence is required. When the user identifier is indeed a sequence of numbers, it is necessary to convert the user identifier satisfying the digit sequence into a sequence of letters for labeling subsequent image elements, and the like. For this purpose, the embodiment of the present application provides a corresponding implementation process for the conversion of the user identifier, that is, the specific implementation process of step 102 is provided, as shown in FIG. 2, including:
  • the specified rule is a first encryption rule
  • the first encryption rule is an encryption algorithm, configured to convert a user identifier into conversion information.
  • the specified rules (first encryption rules) can be implemented in a variety of ways, and can be arbitrarily selected according to requirements, such as inserting redundant bits, data confusion, conversion to binary numbers, ACSII code conversion, and the like.
  • the selection of the specified rule in the embodiment of the present application is open, and different devices or software applications allow different processing modes to be selected, which has both flexibility and privacy, and the selection of the specified rule (first encryption rule) is in the function. There is no difference between good and bad, as long as the original data can be accurately and uniquely represented, but for device performance and recognition cost, it is more efficient to select a lower complexity specification rule (first encryption rule).
  • step 104 In order to facilitate the annotation of image elements, it is necessary to edit based on the existing image elements in the image to be processed.
  • the embodiment of the present application provides a specific implementation manner related to step 104, as shown in FIG. 3, including:
  • step 1041 acquiring a plurality of image elements having the same interval in the image to be processed is performed.
  • the points conforming to the linear arrangement may include grid lines, mark lines, page lines, and the like, and line-shaped image elements which are composed of points, circles or squares, and short line segments and arranged in a certain regular pattern, as shown in FIG. 4 .
  • the image processing layout in the browser is to set some image elements and add image elements to the rendered image.
  • the image processing layout also positions the image elements of the order, for example, defining a number of grid lines, the position of each grid line (for example, adding grid lines at positions of ordinates of 10, 20, 30, and 40, respectively),
  • a watermark corresponding to the user identifier is added on the first grid lines, for example, a watermark is added on the first grid line.
  • image elements having a specific arrangement may also be selected in the embodiment of the present application, for example, a dot matrix, a field lattice, and the like.
  • the points in the linear arrangement may not exist in all the images to be processed. Therefore, in the implementation manner provided by the embodiment of the present application, the display effect of the original image is not affected. If there is a point in the image to be processed that conforms to the linear arrangement, it is directly used as the basis of the labeling of the image element; if there is no point in the image to be processed that conforms to the linear arrangement, the point according to the preset linear arrangement may be used. Add a position where the image is not conspicuous (for example, at the corner position of the image, a row of pixels whose pixels are substantially gray is used as the basis of the annotation).
  • the conversion information includes N information elements, N being a positive integer.
  • the embodiment of the present application further provides a description of a specific implementation manner of the method for performing image element labeling using a digital sequence, that is, a specific implementation manner of step 105, and the process is as shown in FIG. 5, including:
  • the sorting sequence is a sequence of numbers including N digits, and each digit in the digit sequence corresponds to each information element in the conversion information.
  • the user identifier is stored on the server, and the server administrator can obtain the user identifier.
  • the first encryption rule is preset, and the user identifier is converted into the first encryption rule by using the first encryption rule. Convert information.
  • the administrator of the server cannot obtain the first encryption rule.
  • the sorting sequence is to further improve the security of the user identification and facilitate the annotation of the target element.
  • the conversion information is converted into a sorting sequence by a preset second encryption rule.
  • it may be a sequence in which the elements in the conversion information are reversed in the order of the preceding and succeeding, scrambled in a specified order, or regenerated according to a specified operation rule operation, alphanumeric substitution, ACSII code conversion, or the like.
  • the first target element is a reference image element in all the image elements that may be labeled, and the first point or the random point in the point of the linear arrangement may be selected, which is not limited in this embodiment of the present application.
  • the above sorting sequence is generally a sequence based on numbers.
  • other feasible forms such as letters or symbols can also be used, and it is necessary to select according to actual conditions.
  • the conversion information is converted to the sorted sequence according to a preset second encryption rule.
  • the second encryption rule is an encryption algorithm, and the specific encryption algorithm is not limited in this application.
  • the conversion information is a digital sequence
  • converting the conversion information into the sequence according to the preset second encryption rule includes at least one of the following:
  • the second encryption rule is a predetermined sorting manner, and the numbers in the digital sequence are sorted according to the predetermined sorting manner to obtain the sorting sequence;
  • the second encryption rule is a predetermined magnification, and the numbers in the digital sequence are resized according to the predetermined magnification to obtain the sorting sequence.
  • performing the converting the conversion information into the sorting sequence according to a preset second encryption rule comprises:
  • the sorting sequence is determined based on the position of each letter in the alphabet in the alphabet.
  • the second encryption rule is to obtain the position number of each letter in the alphabet sequence in the alphabet.
  • the conversion information is a sequence of symbols
  • the method includes:
  • the sorting sequence is determined according to an ACSII code value corresponding to each symbol in the symbol sequence.
  • the second encryption rule is to obtain an ACSII code value for each symbol in the symbol sequence.
  • the conversion information may include various expressions, such as a digital sequence, a letter sequence, a symbol sequence, and the like. Therefore, depending on the way the conversion information is expressed, there are some differences in the process of determining the sorting sequence.
  • the determination method of the sorting sequence will be discussed below in conjunction with a specific example.
  • the first case the conversion information is a sequence of numbers.
  • each digit in the digital sequence is sorted according to a specified sorting manner to obtain the sorting sequence, or the digits in the digit sequence are resized according to a specified multiple, the sorting sequence is obtained, or a combination thereof .
  • This is beneficial to increase the security of the user identity and the difficulty of other users in identifying the user identity.
  • the corresponding number sequence is obtained according to the first encryption rule, which may be 12345.
  • the first encryption rule is to obtain the position number of the letter in the alphabet.
  • the sorting sequence is obtained according to the second encryption rule.
  • the sorting sequence can be adjusted to 54321 by the reverse processing, or the multiples can be uniformly expanded to 2, 4, 6, 8, and 10.
  • the sorting sequence is tentatively set to 54321. At this time, if there are 40 points that match the linear arrangement, then the 5th point can be selected as the first target element. At this time, the position of the second target element is the 11th (5+5+1)th point.
  • the position of the third target element is the 16th (11+4+1)th point
  • the position of the fourth target element is the 20th (16+3+1)th point
  • the position of the fifth target element is the first 23 (20 + 2 + 1) points
  • the position of the sixth target element is the 25th (23 + 1 + 1) points.
  • the marked grid lines show the effect as shown in the dotted line frame in Figure 7.
  • the second case the conversion information is a sequence of letters.
  • the sorting sequence is obtained according to the positional relationship of each letter in the alphabetic sequence in its corresponding alphabet.
  • the corresponding letter sequence may be bcdef (according to the first encryption rule), and the corresponding sorting sequence may map bcdef to 23456 by alphabetical order of the English alphabet (according to the second encryption rule) Get), you can also offset the sequence number to map bcdef to 45678.
  • the sorting sequence is tentatively set to 23456. At this time, if there are 40 points that match the linear arrangement, then the third point can be selected as the first target element. At this time, the position of the second target element is the 6th (3+2+1)th point.
  • the position of the third target element is the 10th (6+3+1)th point
  • the position of the fourth target element is the 15th (10+4+1)th point
  • the position of the fifth target element is the first 21 (15 + 5 + 1) points
  • the position of the sixth target element is the 27th (21 + 5 + 1) points.
  • the third case the conversion information is a sequence of symbols.
  • the sorting sequence is tentatively set to 60, 61, 62, 63, 64 here. At this time, if there are 80 points that match the linear arrangement, then the first point can be selected as the first target element. At this time, the position of the second target element is the 62nd (60+1+1)th point.
  • the position of the third target element is the 124th (62+61+1)th point
  • the position of the fourth target element is the 187th (124+62+1)th point
  • the position of the fifth target element is the first 251 (187 + 63 + 1) points
  • the position of the sixth target element is the 316 (251 + 64 + 1) points.
  • the selection and examples of the target elements in this case are similar to the first case, and the principles shown in FIGS. 6 and 7 can also be referred to.
  • the display state of the target element is adjusted, including at least one of the following:
  • the image processing method is applied to the terminal device or the server. As shown in FIG. 8 , the method includes:
  • the image to be processed here is the image obtained after performing the aforementioned step 106.
  • the image to be processed is acquired in response to the identification request for the image. For example, when the financial staff of the formula leaks the company's quarterly sales chart, when the company finds the chart, the company related personnel can submit the chart to the server online to identify the user identifier corresponding to the watermark carried therein. This makes it possible to find the person who leaked the chart.
  • the chart can be handed over to the maintenance personnel of the server, and the maintenance personnel input the chart into the application program on the terminal device, identify the user identifier carried in the chart, and output the user identifier corresponding to the user. user account.
  • step 202 When the above step 202 is performed, a plurality of image elements in the image to be processed are acquired, and the arrangement manner of the plurality of image elements conforms to a predetermined arrangement rule.
  • the image elements mentioned in the specific arrangement mentioned here correspond to the image elements mentioned in step 104, because the labeled image elements will be reflected in the image elements in the image to be processed that match the specific arrangement, so Find in the image to be processed.
  • a plurality of target elements are determined from the plurality of image elements, wherein display states of the plurality of target elements are different from display states of other image elements in the image.
  • the specific implementation of the step 202 is to obtain a point in the image to be processed that conforms to the linear arrangement.
  • step 203 requires determining image elements having specific specifications and/or specific colors from the image elements that conform to the particular arrangement as the labeled target elements.
  • the acquiring the plurality of image elements in the image to be processed includes:
  • determining a plurality of target elements from the plurality of image elements comprises:
  • An image element having at least one of a display specification and a display color different from the other images is used as the target element among the plurality of image elements.
  • the target element can be determined according to the specification and/or color of the target element.
  • the determining, by the plurality of target elements, the user identifier corresponding to the image includes:
  • the ordering of the target elements may be a sorting rule from the heading to the back, a sorting rule from the back to the front, a sorting rule from the top to the bottom, a sorting rule from the bottom up, and other sorting rules.
  • the sorting sequence is a sequence of numbers comprising N digits, N being a positive integer
  • the determining the sequence of the plurality of target elements according to the spacing between the two adjacent target elements comprises:
  • step 204 is as shown in FIG. 9, and includes:
  • steps 20431 and 20432 are further included, as shown in FIG. 10, including:
  • the sorting sequence is converted into conversion information according to a preset first decryption rule.
  • the conversion information is converted into the user identifier according to a preset second decryption rule.
  • the first decryption rule corresponds to the second encryption rule and is an inverse operation of the second encryption rule.
  • the second decryption rule corresponds to the first encryption rule and is an inverse operation of the first encryption rule.
  • the converting the sorting sequence into conversion information according to a preset first decryption rule includes at least one of the following:
  • the first decryption rule is a predetermined sorting manner, and each digit in the sorting sequence is sorted according to the predetermined sorting manner to obtain the conversion information;
  • the first decryption rule is a predetermined magnification, and each digit in the sorting sequence is resized according to the predetermined magnification to obtain the conversion information.
  • the embodiment of the present application is convenient for the technical personnel to understand, and the corresponding user identification restoration process is also provided here.
  • the first case the conversion information is a sequence of numbers.
  • the specific implementation manner of determining the conversion information corresponding to the user identifier according to the quantity, the sorting, and the size of the elements in the determined sorting sequence may be to sort the numbers in the sorting sequence according to a specified sorting manner, and obtain a digital sequence. And as the conversion information; and/or, resizing each digit in the sorting sequence by a specified multiple to obtain a digital sequence as the conversion information.
  • the corresponding user identification identification process may include, for example, determining that the fifth, 11, 16, 20, 23, and 25 are six target elements according to the execution result of step 203.
  • the corresponding sorting sequence 5(11-5-1)4(16-11-1)3(20-16-1)2(23-20-1)1 can be confirmed.
  • the corresponding number sequence can be 12345, and the user ID is finally determined to be ABCDE.
  • the second case the conversion information is a sequence of letters.
  • the specific implementation manner of determining the conversion information corresponding to the user identifier according to the number, order, and size of the elements in the determined sorting sequence may be based on the positional relationship of each letter in the specified alphabet, according to the elements in the sorting sequence.
  • the number, order, and size of the number of letters in the corresponding letter sequence are determined as the conversion information.
  • the corresponding user identification and recognition process may include, for example, determining that the third, sixth, ten, 15, 21, and 27 are six target elements according to the execution result of step 203.
  • the corresponding sorting sequence 2(6-3-1)3(10-6-1)4(15-10-1)5(21-15-1)6 can be confirmed.
  • the corresponding letter sequence can be bcdef, and the user ID is finally determined to be 12345.
  • the third case the conversion information is a sequence of symbols.
  • the specific implementation manner of determining the conversion information corresponding to the user identifier according to the number, order, and size of the elements in the determined sorting sequence may be based on the ACSII code table, and determining corresponding according to the size of each element in the sorting sequence.
  • the corresponding user identification identification process may include: determining, according to the execution result of step 203, that the first target element is 62, 124, 187, 251, and 316.
  • the embodiment of the present application provides an apparatus 1100 for image processing, as shown in FIG. 11, which can be used to implement the foregoing 101 to 106 and a specific method thereof, including:
  • the first obtaining unit 31 is configured to acquire the user identifier in response to the user acquiring the image.
  • the second obtaining unit 32 is configured to convert the user identifier into corresponding conversion information, where the conversion information includes a plurality of information elements for adjusting display states of the plurality of image elements on the image.
  • a third obtaining unit 33 configured to acquire the image according to the request
  • the fourth obtaining unit 34 is configured to acquire a plurality of image elements in the image, and the plurality of image elements are arranged in a manner consistent with a predetermined arrangement rule.
  • a fifth obtaining unit 35 configured to select, from the plurality of image elements, a plurality of target elements according to the plurality of information elements in the conversion information, wherein a positional relationship between the plurality of target elements is Multiple information elements in the conversion information correspond.
  • the labeling unit 36 is configured to adjust display states of the plurality of target elements such that display states of the plurality of target elements are different from other image elements in the image.
  • the second obtaining unit 31 is specifically configured to perform encryption processing on the user identifier by using a preset first encryption rule to obtain the conversion information.
  • the fourth obtaining unit 34 is specifically configured to acquire a plurality of image elements having the same interval in the image.
  • the conversion information includes N information elements, N is a positive integer, and the fifth obtaining unit 35 is specifically configured to determine a sorting sequence and a first target element according to the conversion information, where
  • the sorting sequence is a sequence of numbers comprising N digits, each digit in the digit sequence corresponding to each information element in the conversion information; determining the first target according to the size of the first digit in the sorting sequence An image element having an element spacing of the size of the first number as a second target element; determining, according to a size of the second number in the sorting sequence, a spacing from the second target element to the second The image element of the size of the number, as the third target element; and so on, until N target elements are obtained.
  • the conversion information is a sequence of numbers
  • the fifth obtaining unit 35 is further configured to perform at least one of the following operations
  • the second encryption rule is a predetermined sorting manner, and the numbers in the digital sequence are sorted according to the predetermined sorting manner to obtain the sorting sequence;
  • the second encryption rule is a predetermined magnification, and the numbers in the digital sequence are resized according to the predetermined magnification to obtain the sorting sequence.
  • the fifth obtaining unit 35 is further configured to: when the conversion information is a sequence of letters, obtain the sort according to a positional relationship of each letter in the alphabet sequence in its corresponding alphabet. sequence.
  • the fifth obtaining unit 35 is further configured to: when the converted information is a symbol sequence, obtain the sorting sequence according to an ACSII code value corresponding to each symbol in the symbol sequence.
  • the labeling unit 36 is specifically configured to adjust a size of the target element; and/or adjust a color of the target element.
  • the embodiment of the present application provides an apparatus 1200 for image processing, as shown in FIG. 12, which can be used to implement the foregoing 201 to 204 and a specific method thereof, including:
  • the first obtaining unit 41 is configured to acquire an image to be processed in response to the identification request for the image.
  • the second obtaining unit 42 is configured to acquire a plurality of image elements in the image to be processed, and the arrangement manners of the plurality of image elements conform to a predetermined arrangement rule.
  • the first determining unit 43 is configured to determine, from the plurality of image elements, a plurality of target elements, wherein display states of the plurality of target elements are different from display states of other image elements in the image.
  • the second determining unit 44 is configured to determine, according to the multiple target elements, a user identifier corresponding to the image.
  • the second obtaining unit 42 is specifically configured to acquire a plurality of image elements having the same interval in the image to be processed.
  • the first determining unit 43 is specifically configured to use, as the target element, an image element that is different from the other images in at least one of the display specification and the display color among the plurality of image elements.
  • the second determining unit 44 includes:
  • a first determining module 441 configured to determine an order of the plurality of target elements; and determine a spacing between adjacent two target elements in the sorting according to the sorting of the plurality of target elements.
  • the second determining mode 442 is configured to determine a sorting sequence of the plurality of target elements according to a spacing between the two adjacent target elements.
  • the third determining module 443 is configured to determine, according to the sorting sequence, a user identifier corresponding to the image.
  • the sorting sequence is a sequence of numbers including N digits, N is a positive integer; and the second determining module 442 is configured to:
  • the third determining module 443 is configured to:
  • the first determining module 441 includes:
  • the first determining sub-module 4411 is configured to determine, according to the determined number, order, and size of the elements in the sorting sequence, the conversion information corresponding to the user identifier.
  • the second determining sub-module 4412 is configured to obtain a corresponding user identifier according to the determined conversion information.
  • the first determining sub-module 4411 is specifically configured to sort each digit in the sorting sequence according to a specified sorting manner to obtain the digit sequence; and/or, for each digit in the sorting sequence The sequence of numbers is obtained by resizing according to a specified multiple.
  • the first determining sub-module 4411 is specifically configured to determine, according to the positional relationship of each letter in the specified alphabet, the letters in the corresponding alphabetic sequence according to the number, order, and size of the elements in the sorting sequence. Quantity and sorting as the conversion information.
  • the first determining sub-module 4411 is specifically configured to determine, according to an ACSII code table, a corresponding symbol according to a size of each element in the sorting sequence; according to the determined number, order, and The determined symbol determines the corresponding symbol sequence as the conversion information
  • the present application also provides a non-transitory computer readable storage medium, wherein the storage medium stores machine readable instructions, which are executable by a processor to perform the method.
  • the apparatus for image processing converts a user identifier corresponding to a user into a target element in an image uniquely corresponding to the user identification information, and adds a watermark (target element) to the existing image to be processed. In the image element. In this way, the user's identification information (watermark) is added to the image without affecting the original information of the image.
  • the technical solution provided by the embodiment of the present application can reduce the influence of the watermark on the original information of the image.
  • FIG. 15 is a diagram showing the composition of a computing device in which the image processing apparatus 1100 and the image processing apparatus 1200 are located.
  • the computing device includes one or more processors (CPUs) 1502, communication modules 1504, memories 1506, user interfaces 1510, and a communication bus 1508 for interconnecting these components.
  • processors CPUs
  • communication modules 1504
  • memories 1506, user interfaces 1510
  • communication bus 1508 for interconnecting these components.
  • the processor 1502 can receive and transmit data through the communication module 1504 to effect network communication and/or local communication.
  • User interface 1510 includes one or more output devices 1512 that include one or more speakers and/or one or more visual displays.
  • User interface 1510 also includes one or more input devices 1514 including, for example, a keyboard, a mouse, a voice command input unit or loudspeaker, a touch screen display, a touch sensitive tablet, a gesture capture camera or other input button or control, and the like.
  • Memory 1506 can be a high speed random access memory such as DRAM, SRAM, DDR RAM, or other random access solid state storage device; or nonvolatile memory such as one or more disk storage devices, optical disk storage devices, flash memory devices, Or other non-volatile solid-state storage devices.
  • DRAM dynamic random access memory
  • SRAM static random access memory
  • DDR RAM dynamic random access memory
  • nonvolatile memory such as one or more disk storage devices, optical disk storage devices, flash memory devices, Or other non-volatile solid-state storage devices.
  • the memory 1506 stores a set of instructions executable by the processor 1502, the instruction code stored in the memory being configured to be executed by the processor to implement the steps in the method of image processing in the present application described above, while also implementing image processing of the present application.
  • the disclosed system, apparatus, and method may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • multiple units or components may be combined.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of hardware plus software functional units.
  • the above-described integrated unit implemented in the form of a software functional unit can be stored in a computer readable storage medium.
  • the software functional unit is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor to perform the methods of the various embodiments of the present application. Part of the steps.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program codes. .

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

Un mode de réalisation de la présente invention concerne un procédé et un dispositif de traitement d'image. Le procédé est appliqué à un équipement utilisateur et ledit procédé comporte les étapes suivantes : l'obtention, en réponse à une demande d'un utilisateur d'obtention d'une image, d'un identifiant de l'utilisateur et la conversion de l'identifiant de l'utilisateur en les informations de conversion correspondantes; l'obtention de l'image en fonction de la demande et l'obtention des éléments d'image multiples dans l'image, une manière d'agencement des éléments d'image multiples étant conforme à une règle d'agencement prédéfinie; la sélection des éléments cibles multiples à partir des éléments d'image multiples en fonction des éléments d'informations multiples dans les informations de conversion et la sélection d'une relation de position à partir des éléments cibles multiples correspondant aux éléments d'informations multiples dans les informations de conversion; et le réglage d'un état d'affichage des éléments cibles multiples de telle sorte que l'état d'affichage des éléments cibles multiples est différent de l'état d'affichage des autres éléments d'image dans l'image. La présente invention concerne en outre un autre procédé de traitement d'image, un appareil correspondant et un support d'informations.
PCT/CN2018/076419 2017-02-23 2018-02-12 Procédé et appareil de traitement d'images et support d'informations WO2018153299A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710099135.1A CN108510424B (zh) 2017-02-23 2017-02-23 一种图像处理的方法及装置
CN201710099135.1 2017-02-23

Publications (1)

Publication Number Publication Date
WO2018153299A1 true WO2018153299A1 (fr) 2018-08-30

Family

ID=63253544

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/076419 WO2018153299A1 (fr) 2017-02-23 2018-02-12 Procédé et appareil de traitement d'images et support d'informations

Country Status (2)

Country Link
CN (1) CN108510424B (fr)
WO (1) WO2018153299A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2768533C1 (ru) * 2021-04-01 2022-03-24 Публичное Акционерное Общество "Сбербанк России" (Пао Сбербанк) Способ и система защиты цифровой информации, отображаемой на мониторе, с помощью цифровых меток

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109670330A (zh) * 2018-12-29 2019-04-23 上海掌门科技有限公司 用于处理图像的方法、电子设备和计算机可读介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102685076A (zh) * 2011-03-16 2012-09-19 中国电信股份有限公司 在线信息防护方法和装置
JP2013041382A (ja) * 2011-08-12 2013-02-28 Oki Data Corp 画像形成システム
US20130125196A1 (en) * 2005-05-18 2013-05-16 William M. Shapiro Method and apparatus for combining encryption and steganography in a file control system
CN103678957A (zh) * 2012-09-12 2014-03-26 上海聚力传媒技术有限公司 生成图片信息并获取身份编码信息的方法、装置和设备
CN106023059A (zh) * 2016-05-26 2016-10-12 北京启迪思创科技有限公司 一种水印信息生成方法及装置

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3749884B2 (ja) * 2002-08-28 2006-03-01 株式会社東芝 電子透かし埋め込み装置、電子透かし解析装置、電子透かし埋め込み方法、電子透かし解析方法及びプログラム
CN101122995B (zh) * 2007-09-11 2010-10-13 北京大学 二值图像中数字水印的嵌入、提取方法和装置
CN101231742B (zh) * 2008-01-08 2011-01-05 北京大学 二值文本图像中数字水印的嵌入和提取的方法及装置
CN102761563A (zh) * 2011-04-25 2012-10-31 中国移动通信集团山东有限公司 一种传输数据方法、装置及系统
CN103379101A (zh) * 2012-04-20 2013-10-30 腾讯科技(深圳)有限公司 一种水印生成方法、客户端及服务器
CN105631797B (zh) * 2015-12-24 2019-03-08 小米科技有限责任公司 水印添加方法及装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130125196A1 (en) * 2005-05-18 2013-05-16 William M. Shapiro Method and apparatus for combining encryption and steganography in a file control system
CN102685076A (zh) * 2011-03-16 2012-09-19 中国电信股份有限公司 在线信息防护方法和装置
JP2013041382A (ja) * 2011-08-12 2013-02-28 Oki Data Corp 画像形成システム
CN103678957A (zh) * 2012-09-12 2014-03-26 上海聚力传媒技术有限公司 生成图片信息并获取身份编码信息的方法、装置和设备
CN106023059A (zh) * 2016-05-26 2016-10-12 北京启迪思创科技有限公司 一种水印信息生成方法及装置

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2768533C1 (ru) * 2021-04-01 2022-03-24 Публичное Акционерное Общество "Сбербанк России" (Пао Сбербанк) Способ и система защиты цифровой информации, отображаемой на мониторе, с помощью цифровых меток
WO2022211663A1 (fr) * 2021-04-01 2022-10-06 Публичное Акционерное Общество "Сбербанк России" Procédé et système de protection d'informations numériques représentées sur un moniteur à l'aide de marques numériques

Also Published As

Publication number Publication date
CN108510424A (zh) 2018-09-07
CN108510424B (zh) 2022-11-29

Similar Documents

Publication Publication Date Title
US10068071B2 (en) Screen shot marking and identification for device security
US9331856B1 (en) Systems and methods for validating digital signatures
US10825130B2 (en) Method and apparatus for displaying picture content in application, and storage medium
JP6507472B2 (ja) 処理方法、処理システム及びコンピュータプログラム
US11158057B2 (en) Device, method, and graphical user interface for processing document
CN110245469B (zh) 网页的水印生成方法、水印解析方法、装置及存储介质
US20160085994A1 (en) Endorsement of unmodified photographs using watermarks
WO2019201076A1 (fr) Procédé, appareil et système d'ajout de filigrane à un fichier secret, et support
US20160148068A1 (en) Image processing apparatus and method, and electronic device
CN108108342B (zh) 结构化文本的生成方法、检索方法及装置
US20210090203A1 (en) Method and system for generating watermark on the basis of graphic, terminal, and medium
TWI515641B (zh) 變更桌面圖示的方法及系統
CN108898082B (zh) 图片处理方法、图片处理装置及终端设备
US20210110579A1 (en) Screenshot processing method and device
EP3175375A1 (fr) Interrogation basée sur une image et permettant d'identifier des objets dans des documents
KR20130089407A (ko) 이동 단말기 및 그 제어방법
US20160378296A1 (en) Augmented Reality Electronic Book Mechanism
CN109255355A (zh) 图像处理方法、装置、终端、电子设备及计算机可读介质
US8485428B1 (en) Systems and methods for providing security information about quick response codes
WO2018153299A1 (fr) Procédé et appareil de traitement d'images et support d'informations
CN106203141A (zh) 一种应用的数据处理方法和装置
WO2016018682A1 (fr) Traitement d'image pour identifier un objet à insérer dans un document
CN105354506B (zh) 隐藏文件的方法和装置
KR101477642B1 (ko) 오프라인 노트를 이용한 전자책 서비스 방법
CN109492249B (zh) 设计图的快速生成方法、装置及终端设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18756571

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18756571

Country of ref document: EP

Kind code of ref document: A1