WO2020228368A1 - 基于区块链的图片处理方法及装置 - Google Patents

基于区块链的图片处理方法及装置 Download PDF

Info

Publication number
WO2020228368A1
WO2020228368A1 PCT/CN2020/071012 CN2020071012W WO2020228368A1 WO 2020228368 A1 WO2020228368 A1 WO 2020228368A1 CN 2020071012 W CN2020071012 W CN 2020071012W WO 2020228368 A1 WO2020228368 A1 WO 2020228368A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
target picture
identification information
blockchain
historical
Prior art date
Application number
PCT/CN2020/071012
Other languages
English (en)
French (fr)
Inventor
栗志果
Original Assignee
创新先进技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 创新先进技术有限公司 filed Critical 创新先进技术有限公司
Priority to US16/866,526 priority Critical patent/US10963542B2/en
Publication of WO2020228368A1 publication Critical patent/WO2020228368A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Definitions

  • This application relates to the field of blockchain technology, and in particular to a method and device for image processing based on blockchain.
  • the purpose of the embodiments of this specification is to provide a block chain-based image processing method and device.
  • the target image will be updated based on the copyright owner information of the target image and current environmental information.
  • the historical identification information in the pixel matrix makes the target image carry the copyright owner information, which facilitates copyright protection in the event of subsequent image infringement; and every time the target image is displayed, it will be based on the target image
  • the copyright owner information and the current environment information update the historical identification information in the pixel dot matrix, so that the identification information embedded in the pixel dot matrix is generated based on the relevant information of the latest display, so that when a screenshot occurs
  • copyright tracking can be carried out based on the environmental information carried in the target picture, thereby realizing the copyright protection of the target picture; in addition, in the embodiment of this specification, the relevant information of the target picture is encrypted in the blockchain , Utilizing the immutable property of the blockchain, the unique tracking of the copyright of
  • the embodiment of this specification provides a method for image processing based on blockchain, including:
  • the relevant information includes the copyright owner information of the target picture and current environmental information
  • the environmental information includes at least one of the following information One: time information, geographic location information, and the terminal device information
  • the historical identification information existing in the pixel dot matrix of the target picture is updated based on the ciphertext information; wherein the historical identification information is determined based on relevant information when the target picture was previously displayed.
  • the embodiment of this specification also provides a block chain-based image processing device, including:
  • the first acquisition module is configured to acquire relevant information of the target picture when the target picture is displayed through the terminal device; wherein, the relevant information includes the copyright owner information of the target picture and current environment information; the environment The information includes at least one of the following information: time information, geographic location information, and the terminal device information;
  • the publishing module is configured to publish the related information to the blockchain, so that the node device in the blockchain can encrypt the related information to obtain the corresponding ciphertext information;
  • the second acquisition module is configured to acquire the ciphertext information from the blockchain
  • the update module is used to update the historical identification information existing in the pixel dot matrix of the target picture based on the ciphertext information; wherein the historical identification information is based on the relevant information of the target picture when it was previously displayed determine.
  • the embodiment of this specification also provides a block chain-based image processing device, including:
  • a memory arranged to store computer-executable instructions which, when executed, cause the processor to:
  • the relevant information includes the copyright owner information of the target picture and current environmental information
  • the environmental information includes at least one of the following information One: time information, geographic location information, and the terminal device information
  • the historical identification information existing in the pixel dot matrix of the target picture is updated based on the ciphertext information; wherein the historical identification information is determined based on relevant information when the target picture was previously displayed.
  • the embodiments of this specification also provide a storage medium for storing computer executable instructions, which, when executed, implement the following processes:
  • the relevant information includes the copyright owner information of the target picture and current environmental information
  • the environmental information includes at least one of the following information One: time information, geographic location information, and the terminal device information
  • the historical identification information existing in the pixel dot matrix of the target picture is updated based on the ciphertext information; wherein the historical identification information is determined based on relevant information when the target picture was previously displayed.
  • the historical identification information existing in the pixel matrix of the target picture is updated based on the copyright owner information of the target picture and the current environmental information, so that the target picture
  • the picture contains the copyright owner information, which is convenient for copyright protection in case of subsequent image infringement; and each time the target picture is displayed, the pixel dot matrix will be adjusted based on the target picture’s copyright owner information and current environmental information.
  • the historical identification information in the image is updated so that the identification information embedded in the pixel matrix is generated based on the relevant information during the most recent display, so that when a screenshot attack or a photo attack occurs, it can be based on the target image carried
  • the environmental information is tracked to realize the copyright protection of the target picture; in addition, in the embodiment of this specification, the relevant information of the target picture is encrypted in the block chain, and the non-tamperable property of the block chain is used. Realize the unique tracking of picture copyright, thereby further protecting the copyright security of pictures.
  • Figure 1 is one of the method flowcharts of the block chain-based image processing method provided by the embodiment of this specification
  • FIG. 2 is the second method flowchart of the block chain-based image processing method provided by the embodiment of this specification
  • FIG. 3(a) is a schematic diagram of the pixel dot matrix of the target image before updating in the image processing method based on the blockchain provided by the embodiment of this specification;
  • FIG. 3(b) is a schematic diagram of the updated pixel dot matrix of the target image in the image processing method based on the blockchain provided by the embodiment of this specification;
  • FIG. 4 is the third method flowchart of the block chain-based image processing method provided by the embodiment of this specification.
  • Figure 5 (a) is a schematic diagram of the pixel dot matrix of the target image before publishing in the blockchain-based image processing method provided by the embodiment of this specification;
  • FIG. 5(b) is one of the schematic diagrams of the pixel dot matrix after inserting the relevant information of the target picture into the pixel dot matrix of the target picture before publishing in the image processing method based on the blockchain provided by the embodiment of this specification;
  • FIG. 5(c) is a schematic diagram of dividing the pixel matrix of the target image before publishing into multiple pixel regions in the image processing method based on the blockchain provided by the embodiment of this specification;
  • Fig. 5(d) is the second schematic diagram of the pixel dot matrix after inserting the relevant information of the target picture into the pixel dot matrix of the target picture before publishing in the image processing method based on the blockchain provided by the embodiment of this specification;
  • FIG. 5(e) is the third schematic diagram of the pixel dot matrix after inserting relevant information of the target picture into the pixel dot matrix of the target picture before publishing in the blockchain-based image processing method provided by the embodiment of this specification;
  • FIG. 6 is the fourth method flowchart of the block chain-based image processing method provided by the embodiment of this specification.
  • FIG. 7 is the fifth method flowchart of the block chain-based image processing method provided by the embodiment of this specification.
  • FIG. 8 is the sixth method flowchart of the block chain-based image processing method provided by the embodiment of this specification.
  • FIG. 9 is a schematic diagram of the module composition of a block chain-based image processing device provided by an embodiment of this specification.
  • Fig. 10 is a schematic structural diagram of a block chain-based image processing device provided by an embodiment of the specification.
  • the embodiments of this specification provide a blockchain-based image processing method, device, equipment, and storage medium. Each time a target image is displayed through a terminal device, the image is processed based on the copyright owner information of the image and the current environmental information. The historical identification information existing in the pixel dot matrix is updated to facilitate the copyright protection of the picture.
  • the block chain-based image processing method provided in the embodiments of this specification can be applied to terminal devices such as mobile phones, tablet computers, and computers, and can also be applied to servers. That is, the execution subject of the blockchain-based image processing method provided in the embodiments of this specification may be a terminal device or a server, specifically, it may be a blockchain-based image processing device installed on the terminal device or the server.
  • the method provided in the embodiments of this specification can also be implemented through the interaction between the server and the terminal device, that is, some steps in the method can be executed by the terminal device, some steps are executed by the server, and the subsequent It will be explained through specific embodiments.
  • Fig. 1 is one of the method flowcharts of the block chain-based image processing method provided by the embodiment of this specification.
  • the method shown in Fig. 1 at least includes the following steps:
  • Step 102 Obtain relevant information of the target picture when displaying the target picture through the terminal device; wherein the above-mentioned relevant information includes the copyright owner information of the target picture and current environmental information; the environmental information includes at least one of the following information: Time information, geographic location information and terminal equipment information.
  • the aforementioned terminal device may be a smart device such as a mobile phone, a tablet computer, or a computer.
  • the target picture displayed by the terminal device may be a picture in an offline environment such as a picture stored on the terminal device, or a picture in an online environment such as a picture on a website browsed by the user.
  • the execution subject of the method provided in the embodiment of this specification is a terminal device; if the above-mentioned target picture is a picture in an online environment, the embodiment of this specification provides The execution subject of the method may be a server, a terminal device, or a terminal device and a server, that is, the terminal device and the server are jointly executed through the interaction between the terminal device and the server.
  • the above-mentioned copyright owner may be the creator of the target picture, or may be the authorized user or owner of the target picture, and so on.
  • the above copyright owner information includes at least the name of the copyright owner and the ID number of the copyright owner; of course, in the specific implementation, the address information, gender, age, occupation and other information of the copyright owner can also be added.
  • the information only needs to include information that can uniquely identify the copyright owner, and the embodiments of this specification do not limit the specific information contained in the above copyright owner information.
  • the above-mentioned environmental information may include any one, any two, and three of time information, geographic location information, and terminal device information.
  • the aforementioned geographic location information may be the current geographic location information located by the terminal device when the target picture is displayed;
  • the aforementioned time information is the time at which the target picture is displayed;
  • the aforementioned terminal device information is the information that can display the target picture
  • the identification information of the terminal device may include the Media Access Control (MAC) address and/or the Internet Protocol (IP) address of the terminal device.
  • the foregoing terminal device information may be the MAC address of the terminal device, or the IP address of the terminal device, or include both the MAC address and the IP address.
  • Step 104 Publish the above-mentioned related information to the blockchain, so that the node device in the blockchain can encrypt the above-mentioned related information to obtain corresponding ciphertext information.
  • the relevant information of the target picture is obtained, since the relevant information contains more information, the data volume of the information is relatively large.
  • the relevant information obtained above can be embedded in the target picture
  • the relevant information obtained above can be compressed.
  • the above-mentioned related information can be compressed through encryption.
  • the above-mentioned related information can be published to the blockchain, and the above-mentioned related information can be encrypted through the node device of the blockchain.
  • the above-mentioned related information can be converted into a ciphertext string, which realizes the compression processing of the above-mentioned related information, and also improves the security of the above-mentioned related information.
  • an encryption algorithm such as hash can be used. If a hash algorithm is used to encrypt the above-mentioned related information, it can be understood as performing a hash conversion on the above-mentioned related information to obtain the hash value corresponding to the related information. Of course, other encryption algorithms can also be used to encrypt the above-mentioned related information, which will not be listed in the embodiment of this specification.
  • the above-mentioned related information when the above-mentioned related information is encrypted, the above-mentioned related information needs to be uploaded to the blockchain for encryption, which makes use of the immutable modification of the blockchain. The authenticity of the above-mentioned related information is guaranteed, and the unique tracking of the copyright of the image can be realized when the subsequent incident of image infringement occurs.
  • Step 106 Obtain the above-mentioned ciphertext information from the blockchain.
  • Step 108 Update the historical identification information existing in the pixel dot matrix of the target picture based on the above-mentioned ciphertext information; wherein the above-mentioned historical identification information is determined based on relevant information when the target picture was previously displayed.
  • each time the target picture is displayed the historical identification information currently existing in the pixel matrix of the target picture is updated, so that every time the target picture is displayed, the relevant information at the current display will be updated.
  • Embedded in the pixel matrix if someone illegally obtains the target image by taking a screenshot or taking a photo during the display of the target image, copyright tracking can be carried out based on the current environmental information and copyright owner information embedded in the target image, thereby achieving The copyright protection of the target image.
  • updating the historical identification information existing in the pixel matrix of the target picture based on the above ciphertext information specifically includes the following steps 1 and 2;
  • Step 1 Encoding the above-mentioned ciphertext information to obtain the binary character string corresponding to the above-mentioned ciphertext information as the current identification information of the target picture;
  • Step 2 Use the aforementioned identification information to replace the historical identification information.
  • the ciphertext information can be converted into a binary character string using an existing encoding method, that is, a series of character strings composed of characters such as 0 and 1 is obtained, and the binary character string is used as the target The current identification information of the picture.
  • the aforementioned historical identification information is also a binary string, which is obtained by encoding the cipher text information corresponding to the relevant information of the target picture when it was previously displayed.
  • the encryption algorithm used when encrypting the relevant information of the target picture may be the same, and the encoding method used when encoding the encrypted ciphertext may also be the same In this way, the number of binary characters contained in the current identification information and historical identification information can be made equal.
  • Fig. 2 is the second method flowchart of the block chain-based image processing method provided by the embodiment of this specification.
  • the method shown in Fig. 2 at least includes the following steps:
  • Step 202 Acquire relevant information of the target picture when displaying the target picture through the terminal device.
  • the above-mentioned related information includes the copyright owner information of the target picture and current environmental information; the environmental information includes at least one of the following information: time information, geographic location information, and terminal device information.
  • Step 204 Publish the above-mentioned relevant information to the blockchain, so that the node device in the blockchain can encrypt the above-mentioned relevant information to obtain corresponding ciphertext information.
  • Step 206 Obtain the above-mentioned ciphertext information from the blockchain.
  • Step 208 Perform encoding processing on the ciphertext information to obtain the binary character string corresponding to the ciphertext information as the current identification information of the target picture.
  • Step 210 Use the identification information to replace the historical identification information existing in the pixel matrix of the target picture.
  • the above-mentioned historical identification information is determined based on relevant information when the target picture was displayed last time, and the historical identification information is also a binary string.
  • replacing the historical identification information with the above identification information specifically includes the following process: determining the position of each historical binary character in the historical identification information in the pixel matrix; using each of the historical identification information The binary characters replace the historical binary characters at the above positions respectively.
  • each binary character in order to facilitate the determination of the position information of each binary character in the identification information in the pixel dot matrix, each time the identification information embedded in the pixel dot matrix of the target picture is updated, each binary character is located at the pixel dot.
  • the historical identification information currently existing in the pixel matrix of the target picture is 00110
  • the pixel matrix of the target picture embedded with the historical identification information is shown in Figure 3(a)
  • Figure 3(a) use a box to circle each historical binary character in the above historical identification information. If the current identification information obtained based on the current related information of the target picture is 01100 when the target picture is currently displayed, then use each binary character in the current identification information to replace each historical binary character in Figure 3(a), and replace A possible pixel matrix obtained later is shown in Figure 3(b), that is, the first binary character in the current identification information is used to replace the first historical binary character in the historical identification information, and the current identification information is used. The second binary character replaces the second historical binary character in the historical identification information, and so on.
  • FIG. 3(a) and FIG. 3(b) are all exemplary descriptions and do not constitute a limitation to the embodiments of this specification.
  • the number of binary characters in the currently determined identification information is not equal to the number of historical binary characters in the historical identification information. For example, it may be that the number of binary characters in the current identification information is more than the number of historical binary characters in the historical identification information, or it may be that the number of binary characters in the current identification information is less than that in the historical identification information. The number of historical binary characters.
  • the number of binary characters in the currently determined identification information is more than the number of historical binary characters in the historical identification information, at certain positions, two or three binary characters can be used to replace a historical binary Characters: If the number of binary characters in the currently determined identification information is less than the number of historical binary characters in the historical identification information, at certain positions, the historical binary characters embedded in the position can be directly deleted.
  • FIG. 4 is the third method flowchart of the block chain-based image processing method provided by the embodiment of this specification.
  • the method shown in FIG. 4 at least includes the following steps:
  • Step 402 Acquire relevant information of the target picture when displaying the target picture through the terminal device.
  • the above-mentioned related information includes the copyright owner information of the target picture and current environmental information; the environmental information includes at least one of the following information: time information, geographic location information, and terminal device information.
  • Step 404 Publish the above-mentioned related information to the blockchain, so that the node devices in the blockchain can encrypt the above-mentioned related information to obtain corresponding ciphertext information.
  • Step 406 Obtain the above-mentioned ciphertext information from the blockchain.
  • Step 408 Perform encoding processing on the ciphertext information to obtain a binary character string corresponding to the ciphertext information, which is used as the current identification information of the target picture.
  • Step 410 Determine the respective positions of each historical binary character in the historical identification information existing in the pixel dot matrix of the target picture in the pixel dot matrix.
  • Step 412 Use each binary character in the identification information to replace the historical binary character at each position.
  • the method provided in this embodiment of the specification further includes:
  • the above-mentioned historical identification information and identification information are composed of binary character strings
  • the above-mentioned update process information may include a binary character string obtained based on the current ciphertext information encoding, and each of the binary character strings. The historical binary character at which position the binary character is replaced.
  • the above-mentioned recorded update process information is uploaded to the blockchain for storage. Since the blockchain is non-tamperable, the authenticity and non-tamperable modification of the above-mentioned update process information are guaranteed.
  • the update process information can be obtained from the blockchain.
  • the method provided in the embodiment of this specification may further include the following steps:
  • the copyright owner information and current environmental information of the target picture where the current environmental information includes at least one of the following information: current time information, current geographic location information, and current device information; based on the above
  • the copyright owner information and the current environment information generate the identification information of the target picture, and the identification information is embedded in the pixel matrix of the target picture.
  • the creator of the target picture completes the creation of the target picture, before publishing the target picture, he embeds the creator-related information and current environment information in the pixel matrix of the target picture; or After the owner of the target picture obtains the target picture, the relevant information of the owner and the current environment information are embedded in the pixel matrix of the target picture.
  • the current environment information mentioned in this embodiment may include any one, any two or three of the current time information, the current geographic location information, and the currently used device information.
  • the current time information is the time information when processing the pixel dot matrix of the target picture
  • the current geographic location information is the geographical position information processed when the pixel dot matrix of the target picture is processed.
  • the device can be the terminal device or server currently used to process the pixel dot matrix
  • the current device information can be the identification information of the currently used device, for example, if the terminal device is used, it can be the terminal device MAC address and/or IP address etc.
  • the copyright owner information and current environmental information of the target image can be obtained, and the copyright owner information and current environmental information can be uploaded to the blockchain.
  • the node device in the block Encryption processing is performed on the copyright owner information and the current environmental information to obtain the cipher text information corresponding to the copyright owner information and the current environmental information.
  • the ciphertext information is obtained from the blockchain, the ciphertext information is encoded, and the binary string corresponding to the ciphertext information is obtained, and the binary string is inserted into the target image according to the set insertion rule.
  • the pixel dot matrix or use the binary character string to replace the redundant dot matrix in the pixel dot matrix of the target image.
  • the foregoing insertion of the binary string into the pixel matrix of the target image according to the set insertion rule includes at least the following situations:
  • each binary character in the binary string is inserted into the pixel dot matrix of the target picture at the set character interval, which can start from any position of the pixel dot matrix, and the character interval is set at every interval, such as two , Three pixels, insert one character in the above binary string.
  • the pixel dot matrix corresponding to the target picture is an 8*10 pixel dot matrix, that is, the pixel dot matrix includes 8 rows of pixels and 10 columns of pixels, as shown in Figure 5(a) .
  • the binary string is 01101110. You can insert a binary character every three pixels starting from the third pixel of each row of pixels, and the above The binary character string is inserted into the pixel dot matrix of the target image.
  • the schematic diagram of the pixel dot matrix obtained after insertion is shown in Figure 5(b), and each inserted binary character string is circled by the box in Figure 5(b) Pixels out.
  • a picture is generated based on the pixel dot matrix corresponding to Figure 5(b).
  • the target icon generated based on the pixel dot matrix corresponding to Figure 5(b) is displayed, and each time During this display, replace the binary string currently existing in the pixel matrix of the target image based on the relevant information of the target image at the time of display.
  • the pixel dot matrix of the target picture can be divided into multiple pixel regions, and the above binary character string can be inserted into one or several pixel regions.
  • the divided pixel dot matrix is shown in Figure 5 (c), which can be in the four pixel areas Insert the above-mentioned binary character string in a certain pixel area in.
  • the above-mentioned binary character string can be inserted in the second pixel area.
  • the above binary string can also be split, and the binary characters in the binary string can be split into multiple copies (the number of splits and the number of pixel regions obtained by the split) Equal), and then insert a binary character in each pixel area.
  • the binary characters in the binary string are averaged Divided into four parts, namely 01, 10, 11, 10, you can insert 01 into the first pixel area, 10 into the second pixel area, 11 into the third pixel area, and 10 into the fourth pixel area.
  • the same insertion rule can be used in each pixel area, or different insertion rules can be used.
  • a binary character is inserted at every interval from the second pixel of each row of pixels.
  • the pixel dot matrix after insertion is shown in Figure 5(e) .
  • each binary character in the binary string can also be directly used to replace the redundant pixels in the pixel matrix of the target picture. .
  • the binary characters in the binary string can be directly used to replace the pixels in turn
  • the redundant pixels in the array are sufficient; if the number of redundant pixels is more than the number of binary characters in the binary string, you can select the same number of redundant pixels as the number of binary characters in the binary string Pixels, and replace the selected redundant pixels with each binary character in the binary string; if the number of redundant pixels is less than the number of binary characters in the binary string, the same number can be used Replace the above-mentioned easy pixels with binary characters, and the remaining binary characters can be inserted into the pixel matrix according to the set rules; or if the number of redundant pixels is less than the number of binary characters in the binary string, you can use Two or more binary characters replace a redundant pixel.
  • FIG. 6 is the fourth method flowchart of the block chain-based image processing method provided by the embodiment of this specification. The method shown in FIG. 6 at least includes the following steps:
  • Step 602 When displaying the target picture through the terminal device, the terminal device obtains relevant information of the target picture.
  • the aforementioned related information includes information about the copyright owner of the target picture and current environmental information; the environmental information includes current display time information, current geographic location information, and terminal device information.
  • the aforementioned copyright owner information can be obtained from the attribute information of the target picture
  • the aforementioned current display time information can be the time information currently displayed by the terminal device
  • the aforementioned geographical position information can be located by the terminal device.
  • the output geographic location information can be obtained from the location information of the terminal device, and the above-mentioned terminal device information can be the MAC address and/or IP address information of the terminal device.
  • Step 604 The terminal device publishes the above-mentioned related information to the blockchain, so that the node device in the blockchain encrypts the related information to obtain the corresponding ciphertext information.
  • Step 606 The terminal device obtains the above-mentioned ciphertext information from the blockchain.
  • step 608 the terminal device encodes the ciphertext information obtained from the blockchain to obtain a binary character string corresponding to the ciphertext information.
  • Step 610 The terminal device determines the position information of each historical binary character in the historical binary character string embedded in the pixel dot matrix of the target picture.
  • the terminal device can read from the blockchain the update process information of the previous update of the historical binary character string in the pixel matrix of the target image, and based on the update process information, determine whether each historical binary character is in Position information in the pixel matrix.
  • Step 612 The terminal device uses each binary character in the currently obtained binary character string to replace the historical binary character at each position respectively.
  • Step 614 The terminal device records the process information of replacing each historical binary character in the pixel dot matrix of the target picture.
  • Step 616 The terminal device uploads the recorded process information to the blockchain for storage.
  • Fig. 7 is the fifth method flowchart of the block chain-based image processing method provided by the embodiment of this specification. The method shown in Fig. 7 at least includes the following steps:
  • Step 702 When the user browses the target picture through the terminal device, the server obtains relevant information of the target picture.
  • the above-mentioned related information includes the copyright owner information of the target picture and current environment information;
  • the current environment information may include any one of the time information of displaying the target picture, the geographic location information where the terminal device is located, and the terminal device information , Any two or three.
  • the server can obtain time information when the terminal device displays the target picture from itself, and can obtain the geographic location information and terminal device information currently located by the terminal device from the terminal device.
  • the terminal device information may be the MAC address and/or IP address of the terminal device.
  • step 704 the server publishes the above-mentioned related information to the blockchain, so that the node device in the blockchain can encrypt the above-mentioned related information to obtain corresponding ciphertext information.
  • Step 706 The server obtains the above-mentioned ciphertext information from the blockchain.
  • step 708 the server performs encoding processing on the ciphertext information to obtain a binary character string corresponding to the ciphertext information.
  • Step 710 The server determines the position information of each historical binary character in the historical binary character string embedded in the pixel matrix of the target image.
  • the server can read the update process information of the previous update of the historical binary character string in the pixel matrix of the target image from the blockchain, and determine that each historical binary character is in the pixel based on the update process information. Position information in the dot matrix.
  • Step 712 The server uses each binary character in the currently obtained binary string to replace the historical binary character at each position respectively.
  • Step 714 The server records the process information of replacing each historical binary character in the pixel matrix of the target picture.
  • step 716 the server uploads the recorded process information to the blockchain for storage.
  • Fig. 8 is the sixth method flowchart of the block chain-based image processing method provided by the embodiment of this specification. The method shown in Fig. 8 at least includes the following steps:
  • Step 802 When displaying the target picture through the terminal device, the terminal device obtains relevant information of the target picture.
  • the above-mentioned related information may include the copyright owner information of the target picture and current environmental information; the environmental information includes current display time information, current geographic location information, and terminal device information.
  • the aforementioned copyright owner information can be obtained from the attribute information of the target picture
  • the aforementioned current display time information can be the time information currently displayed by the terminal device
  • the aforementioned current geographic location information can be obtained through the terminal device.
  • the geographic location information located by the device can be obtained from the location information of the terminal device
  • the above-mentioned terminal device information can be the MAC address and/or IP address information of the terminal device.
  • Step 804 The terminal device sends the acquired relevant information of the target picture to the server.
  • step 806 the server sends the relevant information to the blockchain, so that the node device in the blockchain encrypts the relevant information to obtain the corresponding ciphertext information.
  • step 808 the server obtains the above-mentioned ciphertext information from the blockchain.
  • Step 810 The server performs encoding processing on the ciphertext information to obtain a binary character string corresponding to the ciphertext information.
  • step 812 the server determines the position information of each historical binary character in the historical binary character string embedded in the pixel matrix of the target picture.
  • the server can read the update process information of the previous update of the historical binary character string in the pixel matrix of the target image from the blockchain, and determine that each historical binary character is in the pixel based on the update process information. Position information in the dot matrix.
  • Step 814 The server uses each binary character in the currently obtained binary string to replace the historical binary character at each position respectively.
  • step 816 the server records the process information of replacing each historical binary character in the pixel matrix of the target image, and uploads the recorded process information to the blockchain for storage, and the server will replace the pixel matrix information obtained Send to the terminal device.
  • Step 818 The terminal device updates the target picture according to the received pixel dot matrix information after replacement.
  • the processing of the target picture is realized through the interaction between the server and the terminal device, which can reduce the workload of the terminal device and reduce the workload of the terminal device.
  • the block chain-based image processing method will update the pixel matrix of the target image based on the copyright owner information of the target image and current environmental information every time the target image is displayed through the terminal device.
  • the historical identification information of the target image makes the target image carry the copyright owner's information, which facilitates copyright protection when an image infringement event occurs later; and each time the target image is displayed, it will be based on the target image’s copyright owner information and current Update the historical identification information in the pixel dot matrix so that the identification information embedded in the pixel dot matrix is generated based on the relevant information of the latest display, so that when a screenshot attack or a photo attack occurs,
  • the copyright tracking can be carried out based on the environmental information carried in the target picture, thereby realizing the copyright protection of the target picture; in addition, in the embodiment of this specification, the relevant information of the target picture is encrypted in the blockchain, and the blockchain is used.
  • the non-tamperable attribute of can realize the unique tracking of the copyright of the picture, thereby further protecting
  • Fig. 9 is a schematic diagram of the module composition of a block chain-based image processing device provided by an embodiment of this specification.
  • the device shown in Fig. 9 includes at least the following modules:
  • the first obtaining module 902 is used to obtain relevant information of the target picture when the target picture is displayed through the terminal device; wherein the relevant information includes the copyright owner information of the target picture and current environmental information; the environmental information includes at least one of the following information One: time information, geographic location information and terminal equipment information;
  • the publishing module 904 is used to publish relevant information to the blockchain, so that the node devices in the blockchain can encrypt the relevant information to obtain corresponding ciphertext information;
  • the second obtaining module 906 is used to obtain ciphertext information from the blockchain
  • the update module 908 is configured to update the historical identification information existing in the pixel dot matrix of the target picture based on the cipher text information; wherein the historical identification information is determined based on the relevant information of the target picture when it was previously displayed.
  • the aforementioned update module 908 includes:
  • the encoding unit is used to encode the ciphertext information to obtain the binary character string corresponding to the ciphertext information as the current identification information of the target picture;
  • the replacement unit is used to replace historical identification information with identification information.
  • the above replacement unit is specifically used for:
  • the device provided in the embodiment of this specification further includes:
  • the recording module is used to record the update process information for updating the historical identification information in the pixel dot matrix
  • the storage module is used to store the update process information in the blockchain.
  • the device provided in the embodiment of this specification further includes:
  • the third acquisition module is used to acquire the copyright owner information and current environmental information of the target picture;
  • the current environmental information includes at least one of the following information: current time information, current geographic location information, and current Information of the equipment used;
  • the generating module is used to generate the identification information of the target picture based on the copyright owner information and the current environment information;
  • the embedding module is used to embed the identification information in the pixel matrix of the target picture.
  • the copyright owner information includes at least: the name of the copyright owner and the ID number of the copyright owner;
  • the terminal device information includes the media access control MAC address and/or Internet Protocol IP address of the terminal device.
  • the block chain-based image processing device of the embodiment of this specification can also execute the method executed by the block chain-based image processing device in Figures 1 to 8, and realize the block chain-based image processing device in Figures 1 to 8 The functions of the illustrated embodiment will not be repeated here.
  • the block chain-based image processing device updates the pixel matrix of the target image based on the copyright owner information of the target image and current environmental information every time the target image is displayed through the terminal device
  • the historical identification information of the target image makes the target image carry the copyright owner's information, which facilitates copyright protection when an image infringement event occurs later; and each time the target image is displayed, it will be based on the target image’s copyright owner information and current Update the historical identification information in the pixel dot matrix so that the identification information embedded in the pixel dot matrix is generated based on the relevant information of the latest display, so that when a screenshot attack or a photo attack occurs,
  • the copyright tracking can be carried out based on the environmental information carried in the target picture, thereby realizing the copyright protection of the target picture; in addition, in the embodiment of this specification, the relevant information of the target picture is encrypted in the blockchain, and the blockchain is used.
  • the non-tamperable attribute of can realize the unique tracking of the copyright of the picture, thereby further protecting the copy
  • an embodiment of this specification also provides a block chain-based image processing device, as shown in FIG. 10.
  • Blockchain-based image processing equipment may have relatively large differences due to different configurations or performances, and may include one or more processors 1001 and memory 1002.
  • the memory 1002 may store one or more storage applications or data . Among them, the memory 1002 may be short-term storage or persistent storage.
  • the application program stored in the memory 1002 may include one or more modules (not shown in the figure), and each module may include a series of computer executable instruction information in the blockchain-based image processing device.
  • the processor 1001 may be configured to communicate with the memory 1002, and execute a series of computer-executable instruction information in the memory 1002 on a block chain-based image processing device.
  • the blockchain-based image processing device may also include one or more power supplies 1003, one or more wired or wireless network interfaces 1004, one or more input and output interfaces 1005, one or more keyboards 1006, and so on.
  • a block chain-based image processing device includes a memory and one or more programs.
  • One or more programs are stored in the memory, and the one or more programs may include one or more programs.
  • the above modules, and each module may include a series of computer-executable instruction information in a block chain-based image processing device, and is configured to be executed by one or more processors including one or more programs for performing The following computer executable instruction information:
  • the relevant information includes the copyright owner information of the target picture and current environmental information
  • the environmental information includes at least one of the following information: time information, geographic location Information and terminal equipment information
  • the historical identification information existing in the pixel matrix of the target picture is updated based on the ciphertext information; wherein the historical identification information is determined based on the relevant information of the target picture when the target picture was previously displayed.
  • the historical identification information existing in the pixel matrix of the target picture is updated based on the ciphertext information, including:
  • the identification information is used to replace the historical identification information, including:
  • the following steps may be performed before obtaining relevant information of the target picture:
  • the current environmental information includes at least one of the following information: current time information, current geographic location information, and current device information;
  • the identification information of the target picture is generated based on the copyright owner information and the current environment information, and the identification information is embedded in the pixel matrix of the target picture.
  • the copyright owner information includes at least: the name of the copyright owner and the ID number of the copyright owner;
  • the terminal device information includes the media access control MAC address and/or Internet Protocol IP address of the terminal device.
  • the block chain-based picture processing device updates the pixel matrix of the target picture based on the copyright owner information of the target picture and current environmental information every time the target picture is displayed through the terminal device
  • the historical identification information of the target image makes the target image carry the copyright owner's information, which facilitates copyright protection when an image infringement event occurs later; and each time the target image is displayed, it will be based on the target image’s copyright owner information and current Update the historical identification information in the pixel dot matrix so that the identification information embedded in the pixel dot matrix is generated based on the relevant information of the latest display, so that when a screenshot attack or a photo attack occurs,
  • the copyright tracking can be carried out based on the environmental information carried in the target picture, thereby realizing the copyright protection of the target picture; in addition, in the embodiment of this specification, the relevant information of the target picture is encrypted in the blockchain, and the blockchain is used.
  • the non-tamperable attribute of can realize the unique tracking of the copyright of the picture, thereby further protecting the copy
  • an embodiment of this specification also provides a storage medium for storing computer executable instruction information.
  • the storage medium may be U Disk, optical disk, hard disk, etc., when the computer executable instruction information stored in the storage medium is executed by the processor, the following process can be realized:
  • the relevant information includes the copyright owner information of the target picture and current environmental information
  • the environmental information includes at least one of the following information: time information, geographic location Information and terminal equipment information
  • the historical identification information existing in the pixel matrix of the target picture is updated based on the ciphertext information; wherein the historical identification information is determined based on the relevant information of the target picture when the target picture was previously displayed.
  • the historical identification information existing in the pixel matrix of the target picture is updated based on the cipher text information, including:
  • replacing historical identification information with identification information includes:
  • the following steps may be performed:
  • the following steps may be performed before obtaining relevant information of the target picture:
  • the current environmental information includes at least one of the following information: current time information, current geographic location information, and current device information;
  • the identification information of the target picture is generated based on the copyright owner information and the current environment information, and the identification information is embedded in the pixel matrix of the target picture.
  • the copyright owner information includes at least: the name of the copyright owner and the ID number of the copyright owner;
  • the terminal device information includes the media access control MAC address and/or Internet Protocol IP address of the terminal device.
  • the target picture is updated based on the copyright owner information of the target picture and the current environment information.
  • the historical identification information in the pixel dot matrix makes the target image carry copyright owner information, which is convenient for copyright protection in case of subsequent image infringement; and every time the target image is displayed, it will be based on the target image
  • the copyright owner information and the current environmental information update the historical identification information in the pixel dot matrix, so that the identification information embedded in the pixel dot matrix is generated based on the relevant information of the latest display, so that the In a screenshot attack or a photo attack, copyright tracking can be carried out based on the environmental information carried in the target picture, so as to realize the copyright protection of the target picture; in addition, in the embodiment of this specification, the relevant information of the target picture is performed on the blockchain. Encryption utilizes the immutable properties of the blockchain to realize the unique tracking of the copyright
  • a programmable logic device Programmable Logic Device, PLD
  • FPGA Field Programmable Gate Array
  • HDL Hardware Description Language
  • ABEL Advanced Boolean Expression Language
  • AHDL Altera Hardware Description Language
  • HDCal JHDL
  • Lava Lava
  • Lola MyHDL
  • PALASM RHDL
  • Verilog Verilog
  • the controller can be implemented in any suitable manner.
  • the controller can take the form of, for example, a microprocessor or a processor and a computer-readable medium storing computer-readable program codes (such as software or firmware) executable by the (micro)processor. , Logic gates, switches, application specific integrated circuits (ASICs), programmable logic controllers and embedded microcontrollers. Examples of controllers include but are not limited to the following microcontrollers: ARC625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicon Labs C8051F320, the memory controller can also be implemented as part of the memory control logic.
  • controller in addition to implementing the controller in a purely computer-readable program code manner, it is entirely possible to program the method steps to make the controller use logic gates, switches, application specific integrated circuits, programmable logic controllers and embedded The same function can be realized in the form of a microcontroller, etc. Therefore, such a controller can be regarded as a hardware component, and the devices included in it for implementing various functions can also be regarded as a structure within the hardware component. Or even, the device for realizing various functions can be regarded as both a software module for realizing the method and a structure within a hardware component.
  • a typical implementation device is a computer.
  • the computer may be, for example, a personal computer, a laptop computer, a cell phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or Any combination of these devices.
  • the embodiments of the present application can be provided as methods, systems, or computer program products. Therefore, the present application may adopt the form of a complete hardware embodiment, a complete software embodiment, or an embodiment combining software and hardware. Moreover, this application may adopt the form of a computer program product implemented on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer-usable program codes.
  • a computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
  • These computer program instruction information can also be stored in a computer-readable memory that can guide a computer or other programmable data processing equipment to work in a specific manner, so that the instruction information stored in the computer-readable memory generates a manufactured product including the instruction information device.
  • the instruction information device realizes the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.
  • These computer program instruction information can also be loaded on a computer or other programmable data processing equipment, so that a series of operation steps are executed on the computer or other programmable equipment to produce computer-implemented processing, which can be executed on the computer or other programmable equipment.
  • the instruction information of provides the steps used to implement the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.
  • the computing device includes one or more processors (CPU), input/output interfaces, network interfaces, and memory.
  • processors CPU
  • input/output interfaces network interfaces
  • memory volatile and non-volatile memory
  • the memory may include non-permanent memory in computer readable media, random access memory (RAM) and/or non-volatile memory, such as read-only memory (ROM) or flash memory (flash RAM). Memory is an example of computer readable media.
  • RAM random access memory
  • ROM read-only memory
  • flash RAM flash memory
  • Computer-readable media include permanent and non-permanent, removable and non-removable media, and information storage can be realized by any method or technology.
  • the information can be computer-readable instruction information, data structures, program modules, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, CD-ROM, digital versatile disc (DVD) or other optical storage, Magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices or any other non-transmission media can be used to store information that can be accessed by computing devices. According to the definition in this article, computer-readable media does not include transitory media, such as modulated data signals and carrier waves.
  • this application can be provided as methods, systems, or computer program products. Therefore, this application may adopt the form of a complete hardware embodiment, a complete software embodiment, or an embodiment combining software and hardware. Moreover, this application may take the form of a computer program product implemented on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer-usable program codes.
  • computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
  • program modules include routines, programs, objects, components, data structures, etc. that perform specific tasks or implement specific abstract data types.
  • This application can also be practiced in distributed computing environments. In these distributed computing environments, remote processing devices connected through a communication network perform tasks.
  • program modules can be located in local and remote computer storage media including storage devices.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Abstract

本说明书实施例提供了一种基于区块链的图片处理方法及装置,该方法包括:在通过终端设备展示目标图片时,获取目标图片的相关信息;将该相关信息发布至区块链,以由区块链中的节点设备对相关信息进行加密处理,得到对应的密文信息;从区块链获取上述密文信息;基于所获取的密文信息更新目标图片的像素点阵中所存在的历史标识信息;其中,上述相关信息包括目标图片的版权所有者信息和当前的环境信息;环境信息包括以下信息中的至少一种:时间信息、地理位置信息和终端设备信息;历史标识信息基于目标图片在前一次被展示时的相关信息所确定。

Description

基于区块链的图片处理方法及装置 技术领域
本申请涉及区块链技术领域,尤其涉及一种基于区块链的图片处理方法及装置。
背景技术
随着计算机和互联网技术的快速发展,人们获取各种信息变得越来越便利。但随之而来的,也为未经作者同意、随意盗取、传播他人的创作内容提供了极大的便利。例如,人们随意盗取某个网站上用户原创的图片、从某个网站上对图片进行截屏或者对正在展示的图片进行拍照等,从而导致用户的图片版权被侵犯。
因此,有必要提出一种可靠方案,以实现对用户创作的图片的版权保护。
发明内容
本说明书实施例的目的是提供一种基于区块链的图片处理方法及装置,每次在通过终端设备展示目标图片时,都会基于目标图片的版权所有者信息和当前的环境信息更新目标图片的像素点阵中所存在的历史标识信息,使得目标图片中携带有版权所有者信息,后续在发生图片侵权事件时,便于进行版权保护;并且,在每次展示目标图片时,都会基于目标图片的版权所有者信息和当前的环境信息对像素点阵中的历史标识信息进行更新,这样使得嵌入在像素点阵中的标识信息都是基于最近一次展示时的相关信息所生成的,从而在发生截屏攻击或者拍照攻击时,可以基于目标图片中所携带的环境信息进行版权追踪,从而实现目标图片的版权保护;另外,在本说明书实施例中,在区块链中对目标图片的相关信息进行加密,利用了区块链的不可篡改的属性,可实现图片版权的唯一追踪,从而进一步保障了图片的版权安全性。
为解决上述技术问题,本说明书实施例是这样实现的:
本说明书实施例提供了一种基于区块链的图片处理方法,包括:
在通过终端设备展示目标图片时,获取所述目标图片的相关信息;其中,所述相关信息包括所述目标图片的版权所有者信息和当前的环境信息;所述环境信息包括以下信息中的至少一种:时间信息、地理位置信息和所述终端设备信息;
将所述相关信息发布至区块链,以由所述区块链中的节点设备对所述相关信息进行 加密处理,得到对应的密文信息;
从所述区块链获取所述密文信息;
基于所述密文信息更新所述目标图片的像素点阵中所存在的历史标识信息;其中,所述历史标识信息基于所述目标图片在前一次被展示时的相关信息所确定。
本说明书实施例还提供了一种基于区块链的图片处理装置,包括:
第一获取模块,用于在通过终端设备展示目标图片时,获取所述目标图片的相关信息;其中,所述相关信息包括所述目标图片的版权所有者信息和当前的环境信息;所述环境信息包括以下信息中的至少一种:时间信息、地理位置信息和所述终端设备信息;
发布模块,用于将所述相关信息发布至区块链,以由所述区块链中的节点设备对所述相关信息进行加密处理,得到对应的密文信息;
第二获取模块,用于从所述区块链获取所述密文信息;
更新模块,用于基于所述密文信息更新所述目标图片的像素点阵中所存在的历史标识信息;其中,所述历史标识信息基于所述目标图片在前一次被展示时的相关信息所确定。
本说明书实施例还提供了一种基于区块链的图片处理设备,包括:
处理器;以及
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:
在通过终端设备展示目标图片时,获取所述目标图片的相关信息;其中,所述相关信息包括所述目标图片的版权所有者信息和当前的环境信息;所述环境信息包括以下信息中的至少一种:时间信息、地理位置信息和所述终端设备信息;
将所述相关信息发布至区块链,以由所述区块链中的节点设备对所述相关信息进行加密处理,得到对应的密文信息;
从所述区块链获取所述密文信息;
基于所述密文信息更新所述目标图片的像素点阵中所存在的历史标识信息;其中,所述历史标识信息基于所述目标图片在前一次被展示时的相关信息所确定。
本说明书实施例还提供了一种存储介质,用于存储计算机可执行指令,所述可执行 指令在被执行时实现以下流程:
在通过终端设备展示目标图片时,获取所述目标图片的相关信息;其中,所述相关信息包括所述目标图片的版权所有者信息和当前的环境信息;所述环境信息包括以下信息中的至少一种:时间信息、地理位置信息和所述终端设备信息;
将所述相关信息发布至区块链,以由所述区块链中的节点设备对所述相关信息进行加密处理,得到对应的密文信息;
从所述区块链获取所述密文信息;
基于所述密文信息更新所述目标图片的像素点阵中所存在的历史标识信息;其中,所述历史标识信息基于所述目标图片在前一次被展示时的相关信息所确定。
本实施例中的技术方案,每次在通过终端设备展示目标图片时,都会基于目标图片的版权所有者信息和当前的环境信息更新目标图片的像素点阵中所存在的历史标识信息,使得目标图片中携带有版权所有者信息,后续在发生图片侵权事件时,便于进行版权保护;并且,在每次展示目标图片时,都会基于目标图片的版权所有者信息和当前的环境信息对像素点阵中的历史标识信息进行更新,这样使得嵌入在像素点阵中的标识信息都是基于最近一次展示时的相关信息所生成的,从而在发生截屏攻击或者拍照攻击时,可以基于目标图片中所携带的环境信息进行版权追踪,从而实现目标图片的版权保护;另外,在本说明书实施例中,在区块链中对目标图片的相关信息进行加密,利用了区块链的不可篡改的属性,可实现图片版权的唯一追踪,从而进一步保障了图片的版权安全性。
附图说明
为了更清楚地说明本说明书实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请中记载的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为本说明书实施例提供的基于区块链的图片处理方法的方法流程图之一;
图2为本说明书实施例提供的基于区块链的图片处理方法的方法流程图之二;
图3(a)为本说明书实施例提供的基于区块链的图片处理方法中,更新前的目标图片的像素点阵的示意图;
图3(b)为本说明书实施例提供的基于区块链的图片处理方法中,更新后的目标图片的像素点阵的示意图;
图4为本说明书实施例提供的基于区块链的图片处理方法的方法流程图之三;
图5(a)为本说明书实施例提供的基于区块链的图片处理方法中,发布前的目标图片的像素点阵的示意图;
图5(b)为本说明书实施例提供的基于区块链的图片处理方法中,在发布前的目标图片的像素点阵中插入目标图片的相关信息后的像素点阵示意图之一;
图5(c)为本说明书实施例提供的基于区块链的图片处理方法中,将发布前的目标图片的像素点阵划分为多个像素区域的示意图;
图5(d)为本说明书实施例提供的基于区块链的图片处理方法中,在发布前的目标图片的像素点阵中插入目标图片的相关信息后的像素点阵示意图之二;
图5(e)为本说明书实施例提供的基于区块链的图片处理方法中,在发布前的目标图片的像素点阵中插入目标图片的相关信息后的像素点阵示意图之三;
图6为本说明书实施例提供的基于区块链的图片处理方法的方法流程图之四;
图7为本说明书实施例提供的基于区块链的图片处理方法的方法流程图之五;
图8为本说明书实施例提供的基于区块链的图片处理方法的方法流程图之六;
图9为本说明书实施例提供的基于区块链的图片处理装置的模块组成示意图;
图10为本说明书实施例提供的基于区块链的图片处理设备的结构示意图。
具体实施方式
为了使本技术领域的人员更好地理解本申请中的技术方案,下面将结合本说明书实施例中的附图,对本说明书实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都应当属于本申请保护的范围。
本说明书实施例提供了一种基于区块链的图片处理方法、装置、设备及存储介质,在每次通过终端设备展示目标图片时,都会基于图片的版权所有者信息和当前的环境信息对图片的像素点阵中存在的历史标识信息进行更新,从而便于进行图片的版权保护。
本说明书实施例提供的基于区块链的图片处理方法,可以应用于手机、平板电脑、计算机等终端设备,也可以应用于服务器。即本说明书实施例提供的基于区块链的图片处理方法的执行主体可以为终端设备或者服务器,具体的,可以为安装在终端设备或者服务器上的基于区块链的图片处理装置。
当然,在某些应用场景下,也可以通过服务器和终端设备的交互来实现本说明书实施例提供的方法,即该方法中的某些步骤可以通过终端设备执行,某些步骤通过服务器执行,后续将会通过具体实施例进行说明。
图1为本说明书实施例提供的基于区块链的图片处理方法的方法流程图之一,图1所示的方法至少包括如下步骤:
步骤102,在通过终端设备展示目标图片时,获取目标图片的相关信息;其中,上述相关信息包括目标图片的版权所有者信息和当前的环境信息;该环境信息包括以下信息中的至少一种:时间信息、地理位置信息和终端设备信息。
其中,上述终端设备可以为手机、平板电脑、计算机等智能设备。
通过终端设备所展示的目标图片,可以是存储在终端设备上的图片等离线环境下的图片、也可以是用户所浏览的网站上的图片等在线环境下的图片。在具体实施时,若是上述目标图片为离线环境下的图片,则本说明书实施例提供的方法的执行主体则为终端设备,若是上述目标图片为在线环境下的图片,则本说明书实施例提供的方法的执行主体可以为服务器、也可以为终端设备,或者还可以为终端设备和服务器,即通过终端设备和服务器之间的交互共同执行。
在本说明书实施例中,上述版权所有者可以为目标图片的创作者,也可以为目标图片的授权使用者或者拥有者等等。
上述版权所有者信息至少包括版权所有者的姓名和版权所有者的身份证号;当然,在具体实施时,还可以加入版权所有者的住址信息、性别、年龄、职业等信息,上述版权所有者信息只要包含可以唯一识别版权所有者的信息即可,本说明书实施例并不对上述版权所有者信息中所包含的具体信息进行限定。
在本说明书实施例中,上述环境信息可以包括时间信息、地理位置信息和终端设备信息中的任意一种、任意两种和三种。其中,上述地理位置信息可以为展示目标图片时,终端设备所定位出的当前所处的地理位置信息;上述时间信息则为展示目标图片的时间;上述终端设备信息则为可以展示该目标图片的终端设备的标识信息,可以包括终端设备 的媒体访问控制(Media Access Control,MAC)地址和/或互连网协议(Internet Protocol,IP)地址。在具体实施时,上述终端设备信息可以为终端设备的MAC地址,也可以为终端设备的IP地址,或者同时包括MAC地址和IP地址。
步骤104,将上述相关信息发布至区块链,以由区块链中的节点设备对上述相关信息进行加密处理,得到对应的密文信息。
在本说明书实施例中,当获取到目标图片的相关信息后,由于该相关信息中包含有较多的信息,信息的数据量较大,为了实现可以将上述目标图片的相关信息嵌入至目标图片的像素点阵中,可以对上述所获取到的相关信息进行压缩处理。具体的,可以通过加密的方式实现对上述相关信息的压缩处理。
在具体实施时,可以将上述相关信息发布至区块链,通过区块链的节点设备对上述相关信息进行加密处理。通过加密,可以将上述相关信息转换为密文字符串,即实现了对上述相关信息的压缩处理,还提高了上述相关信息的安全性。
其中,在对上述相关信息进行加密处理时,可以采用哈希等加密算法。若是采用哈希算法对上述相关信息进行加密处理,可以理解为对上述相关信息进行哈希转换,从而得到该相关信息所对应的哈希值。当然,也可以采用其他加密算法对上述相关信息进行加密处理,本说明书实施例不再一一列举。
另外,需要说明的是,在本说明书实施例中,在对上述相关信息进行加密处理时,需要将上述相关信息上传至区块链中进行加密,这样利用了区块链的不可篡改性,从而保证了上述相关信息的真实性,在后续出现图片侵权事件时,可以实现对图片版权的唯一追踪。
步骤106,从区块链中获取上述密文信息。
步骤108,基于上述密文信息更新目标图片的像素点阵中所存在的历史标识信息;其中,上述历史标识信息基于目标图片在前一次被展示时的相关信息所确定。
在本说明书实施例中,在每次展示目标图片时,都对目标图片的像素矩阵中当前存在的历史标识信息进行更新处理,这样使得目标图片每被展示一次,都会将当前展示时的相关信息嵌入至像素点阵中,若是在该次展示目标图片时,有人通过截屏或者拍照的方式非法获取目标图片,可以基于目标图片中嵌入的当前的环境信息和版权所有者信息进行版权追踪,从而实现目标图片的版权保护。
在具体实施时,上述步骤108中,基于上述密文信息更新目标图片的像素点阵中所 存在的历史标识信息,具体包括如下步骤一和步骤二;
步骤一、对上述密文信息进行编码处理,得到上述密文信息所对应的二进制字符串,作为目标图片当前的标识信息;
步骤二、使用上述标识信息替换历史标识信息。
其中,在上述步骤一中,可以采用现有的编码方式将上述密文信息转换为二进制字符串,即得到一系列由0和1这样的字符所组成的字符串,将该二进制字符串作为目标图片当前的标识信息。
需要说明的是,上述历史标识信息也为二进制字符串,是对目标图片在前一次被展示时的相关信息所对应的密文信息进行编码得到的。
在某些具体实施方式中,每次展示目标图片时,对目标图片的相关信息进行加密时所采用的加密算法可以相同,且对加密后的密文进行编码时所采用的编码方式也可以相同,这样,可以使得当前的标识信息和历史标识信息中所包含的二进制字符的个数相等。
当然,也可以采用不同的加密算法和编码方式进行处理,本说明书实施例并不对此进行限定。
图2为本说明书实施例提供的基于区块链的图片处理方法的方法流程图之二,图2所示的方法,至少包括如下步骤:
步骤202,在通过终端设备展示目标图片时,获取目标图片的相关信息。
其中,上述相关信息包括目标图片的版权所有者信息和当前的环境信息;该环境信息包括以下信息中的至少一种:时间信息、地理位置信息和终端设备信息。
步骤204,将上述相关信息发布至区块链,以由区块链中的节点设备对上述相关信息进行加密处理,得到对应的密文信息。
步骤206,从区块链获取上述密文信息。
步骤208,对上述密文信息进行编码处理,得到该密文信息所对应的二进制字符串,作为目标图片当前的标识信息。
步骤210,使用该标识信息替换目标图片的像素点阵中所存在的历史标识信息。
其中,上述历史标识信息基于目标图片在前一次被展示时的相关信息所确定,且历史标识信息也为二进制字符串。
在具体实施时,上述步骤二中,使用上述标识信息替换历史标识信息,具体包括如下过程:确定历史标识信息中的各个历史二进制字符分别在像素点阵中的位置;使用历史标识信息中的各个二进制字符分别替换上述各位置处的历史二进制字符。
在本说明书实施例中,为了便于确定标识信息中的各二进制字符在像素点阵中的位置信息,在每次更新目标图片的像素点阵中所嵌入的标识信息后,各个二进制字符在像素点阵中的位置信息,以及其所替换的历史二进制字符。
为便于理解,下述将举例说明上述具体替换过程。
例如,在一种具体实施方式中,目标图片的像素点阵中当前存在的历史标识信息为00110,且嵌入该历史标识信息的目标图片的像素点阵如图3(a)所示,且在图3(a)中,使用方框将上述历史标识信息中的各历史二进制字符圈出。若是当前展示目标图片时,基于目标图片当前的相关信息所得到的当前的标识信息为01100,则使用当前的标识信息中的各个二进制字符替换掉图3(a)中的各个历史二进制字符,替换后得到的一种可能的像素点阵如图3(b)所示,即使用当前标识信息中的第一个二进制字符替换历史标识信息中的第一个历史二进制字符,使用当前标识信息中的第二个二进制字符替换历史标识信息中的第二个历史二进制字符,以此类推。
当然,上述图3(a)和图3(b)所对应实施例均为示例性说明,并不构成对本说明书实施例的限定。
另外,需要说明的是,在某些具体实施方式中,可能会存在当前确定出的标识信息中的二进制字符的个数与历史标识信息中的历史二进制字符的个数不相等的情况。例如,可以是当前的标识信息中的二进制字符的个数多于历史标识信息中的历史二进制字符的个数,也可以是当前的标识信息中的二进制字符的个数少于历史标识信息中的历史二进制字符的个数。若是当前确定出的标识信息中的二进制字符的个数多于历史标识信息中的历史二进制字符的个数,在某些位置处,可以使用两个或者三个等多个二进制字符替换一个历史二进制字符;若是当前确定出的标识信息中的二进制字符的个数少于历史标识信息中的历史二进制字符的个数,在某些位置处,可以直接删除该位置处所嵌入的历史二进制字符。
图4为本说明书实施例提供的基于区块链的图片处理方法的方法流程图之三,图4所示的方法至少包括如下步骤:
步骤402,在通过终端设备展示目标图片时,获取目标图片的相关信息。
其中,上述相关信息包括目标图片的版权所有者信息和当前的环境信息;该环境信息包括以下信息中的至少一项:时间信息、地理位置信息和终端设备信息。
步骤404,将上述相关信息发布至区块链,以由区块链中的节点设备对上述相关信息进行加密处理,得到对应的密文信息。
步骤406,从区块链中获取上述密文信息。
步骤408,对上述密文信息进行编码处理,得到该密文信息所对应的二进制字符串,作为目标图片当前的标识信息。
步骤410,确定目标图片的像素点阵中所存在的历史标识信息中的各个历史二进制字符分别在像素点阵中的位置。
步骤412,使用上述标识信息中的各个二进制字符分别替换上述各位置处的历史二进制字符。
另外,在本说明书实施例中,为了在每次更新目标图片的像素点阵中所嵌入的历史标识信息时,便于查看该历史标识信息中的各历史二进制字符的嵌入位置信息,在上述步骤108中,基于密文信息更新上述目标图片的像素点阵中所存在的历史标识信息之后,本说明书实施例提供的方法还包括:
记录对上述像素点阵中的历史标识信息进行更新的更新过程信息,并将该更新过程信息存储至区块链中。
由于在本说明书实施例中,上述历史标识信息以及标识信息均由二进制字符串构成,因此,上述更新过程信息可以包含基于当前的密文信息编码得到的二进制字符串,以及二进制字符串中的各个二进制字符分别替换的哪个位置的历史二进制字符。
另外,在本说明书实施例中,将上述记录的更新过程信息上传至区块链中进行存储,由于区块链具有不可篡改性,因此,保证了上述更新过程信息的真实性和不可篡改性。后续再次展示目标图片时,为了确定出历史二进制字符在像素点阵中的位置信息,可以从区块链中获取该更新过程信息。
在一种具体实施方式中,在执行上述步骤102之前,本说明书实施例提供的方法还可以包括如下步骤:
获取目标图片的版权所有者信息和当前的环境信息;其中,当前的环境信息包括以下信息中的至少一种:当前的时间信息、当前所处的地理位置信息和当前所使用设备信 息;基于上述版权所有者信息和当前的环境信息生成目标图片的标识信息,并将该标识信息嵌入目标图片的像素点阵中。
在一种具体实施方式中,可以是目标图片的创作者在完成目标图片的创作后,将目标图片发布之前,在目标图片的像素点阵中嵌入创作者相关信息和当前的环境信息;也可以是在目标图片的拥有者在获取到目标图片后,在目标图片的像素点阵中嵌入该拥有者相关信息和当前的环境信息等等。
其中,在该实施例中所提及到的当前的环境信息可以包括当前的时间信息、当前所处的地理位置信息和当前所使用设备信息中的任意一种、任意两种或者三种。且当前的时间信息则为在对目标图片的像素点阵进行处理时的时间信息,当前的地理位置信息则为在对目标图片的像素点阵进行处理时所处理的地理位置信息,当前所使用设备可以为当前对像素点阵进行处理时所使用的终端设备或服务器,当前所使用设备信息可以为当前所使用设备的标识信息,例如,若是所使用的为终端设备,则可以为该终端设备的MAC地址和/或IP地址等。
下述将详细介绍上述具体实施过程。
在具体实施时,可以在目标图片被发布之前,获取目标图片的版权所有者信息和当前的环境信息,将版权所有者信息和当前的环境信息上传至区块链,由区块中的节点设备对上述版权所有者信息和当前的环境信息进行加密处理,得到版权所有者信息和当前的环境信息所对应的密文信息。然后,从区块链中获取上述密文信息,对该密文信息进行编码处理,得到该密文信息所对应的二进制字符串,按照设定的插入规则将该二进制字符串插入至目标图片的像素点阵中或者使用该二进制字符串替换目标图片的像素点阵中的冗余点阵。
具体的,上述按照设定的插入规则将该二进制字符串插入至目标图片的像素点阵中,至少包括如下几种情形:
1)、将上述二进制字符串中的各二进制字符按照设定的字符间隔插入目标图片的像素点阵中;
2)、按照设定的划分规则将上述像素点阵划分为多个像素区域,在指定的至少一个像素区域中插入上述二进制字符串;
3)、按照设定的划分规则将上述像素点阵划分为多个像素区域,在每个像素区域中插入上述二进制字符串中的一部分字符。
下述将一一举例进行说明。
上述情形1)中将二进制字符串中的各二进制字符按照设定的字符间隔插入目标图片的像素点阵中,可以从像素点阵的任意位置开始,每间隔设定的字符间隔,如两个、三个像素点,插入上述二进制字符串中的一个字符。
例如,在一种具体实施方式中,目标图片所对应的像素点阵为8*10的像素点阵,即该像素点阵中包括8行像素、10列像素,如图5(a)所示,根据目标图片的版权所有者信息和当前的环境信息所得到的二进制字符串为01101110,可以按照从每行像素的第三个像素点开始,每间隔三个像素点插入一个二进制字符,将上述二进制字符串插入目标图片的像素点阵中,插入后得到的像素点阵的示意图如图5(b)所示,且所插入的各个二进制字符串为图5(b)中的方框所圈出的像素点。最后,则基于图5(b)所对应的像素点阵生成图片,每次在展示目标图片时,展示的为基于图5(b)所对应的像素点点阵所生成的目标图标,并在每次展示时,基于展示时目标图片的相关信息替换该目标图片的像素点阵中当前存在的二进制字符串。
针对上述情形2),可以将目标图片的像素点阵划分为多个像素区域,将上述二进制字符串插入上述某一个或者某几个像素区域中。
例如,继续沿用图5(a)所示的像素点阵,将上述像素点阵划分为四个像素区域,划分后的像素点阵如图5(c)所示,可以在上述四个像素区域中的某个像素区域中插入上述二进制字符串,例如,可以在第二个像素区域中插入上述二进制字符串,在将上述二进制字符串(01101110)插入该像素点阵的第二像素区域中时,可以按照设定的插入规则(例如,可以是从每行像素的第二个像素点开始每间隔一个像素点插入一个二进制字符)将上述二进制字符串中的各二进制字符插入该像素点阵的第二像素区域中,插入后所得到的像素点阵的示意图如图5(d)所示。
当然,在本说明书实施例中,还可以将上述二进制字符串进行拆分,将二进制字符串中的二进制字符拆分为多份(所拆分成的份数与划分得到的像素区域的个数相等),然后在每个像素区域中插入一份二进制字符。
例如,继续沿用图5(c)所示的像素点阵,将得到的二进制字符串01101110划分为四份(可以平均划分,也可以随机划分),例如,将该二进制字符串中的二进制字符平均划分为四份,分别为01、10、11、10,可以将01插入第一像素区域,将10插入第二像素区域,将11插入第三像素区域,将10插入第四像素区域。在每个像素区 域中可以采用相同的插入规则,也可以采用不同的插入规则。在本实施例中,在每个像素区域中,都是从每行像素的第二个像素点开始每间隔一个像素点插入一个二进制字符,插入后的像素点阵如图5(e)所示。
另外,对于图片而言,一般都会存在一些冗余像素点,因此,在本说明书实施例中,也可以直接使用二进制字符串中的各二进制字符替换目标图片的像素点阵中的冗余像素点。
在具体实施时,若是目标图片的像素点阵中的冗余像素点的个数和二进制字符串中的二进制字符的个数相等,则可以直接使用二进制字符串中的各二进制字符依次替换像素点阵中的冗余像素点即可;若是冗余像素点的个数多与二进制字符串中的二进制字符的个数,则可以选取与二进制字符串中的二进制字符的个数相等数量个冗余像素点,并使用二进制字符串中的各二进制字符分别替换所选取的各个冗余像素点;若是冗余像素点的个数少于二进制字符串中的二进制字符的个数,则可以使用相等数量个二进制字符替换上述容易像素点,剩余的二进制字符则可以按照设定规则插入像素点阵中;或者,若是冗余像素点的个数少于二进制字符串中的二进制字符的个数,可以使用两个或者多个二进制字符替换一个冗余像素点。
下述将通过具体实施例介绍本说明书实施例提供的基于区块链的图片处理方法。
在一种具体实施方式中,若是目标图片为存储在终端设备上的目标图片,则在使用终端设备展示目标图片时,可以通过终端设备对目标图片执行上述处理操作。图6为本说明书实施例提供的基于区块链的图片处理方法的方法流程图之四,图6所示的方法,至少包括如下步骤:
步骤602,在通过终端设备展示目标图片时,该终端设备获取目标图片的相关信息。
具体的,上述相关信息包括目标图片的版权所有者信息和当前的环境信息;该环境信息包括当前的展示时间信息、当前所处的地理位置信息和该终端设备信息。
其中,上述版权所有者信息可以从目标图片的属性信息中获取,上述当前的展示时间信息可以为终端设备当前所显示的时间信息,上述当前所处的地理位置信息可以是通过该终端设备所定位出的地理位置信息,即可以从终端设备的定位信息中获取,上述终端设备信息可以为终端设备的MAC地址和/或IP地址信息。
步骤604,终端设备将上述相关信息发布至区块链,以由区块链中的节点设备对 该相关信息进行加密处理,得到对应的密文信息。
步骤606,终端设备从区块链获取上述密文信息。
步骤608,终端设备对从区块链中获取的密文信息进行编码处理,得到该密文信息所对应的二进制字符串。
步骤610,终端设备确定目标图片的像素点阵中所嵌入的历史二进制字符串中的各历史二进制字符的位置信息。
其中,在具体实施时,终端设备可以从区块链中读取前一次对目标图片的像素点阵中的历史二进制字符串进行更新的更新过程信息,基于该更新过程信息确定各历史二进制字符在像素点阵中的位置信息。
步骤612,终端设备使用当前得到的二进制字符串中的各二进制字符分别替换各位置处的历史二进制字符。
步骤614,终端设备记录替换目标图片的像素点阵中的各历史二进制字符的过程信息。
步骤616,终端设备将上述记录的过程信息上传至区块链中进行存储。
在另外一种具体实施方式中,若是目标图片为某些网站上所展示的图片,用户浏览网站时通过终端设备对该图片进行展示,则在使用终端设备展示目标图片时,可以通过该网站所对应的服务器对目标图片执行上述处理操作。例如,用户在百度浏览照片,则可以通过百度服务器对该图片执行上述处理操作。图7为本说明书实施例提供的基于区块链的图片处理方法的方法流程图之五,图7所示的方法,至少包括如下步骤:
步骤702,用户在通过终端设备浏览目标图片时,服务器获取该目标图片的相关信息。
其中,上述相关信息包括该目标图片的版权所有者信息和当前的环境信息;当前的环境信息可以包括展示目标图片的时间信息、终端设备所处的地理位置信息和终端设备信息中的任意一种、任意两种或者三种。
在具体实施时,服务器可以从自身获取终端设备展示目标图片时的时间信息,可以从终端设备获取终端设备当前所定位的地理位置信息和终端设备信息。其中,该终端设备信息可以为终端设备的MAC地址和/或IP地址。
步骤704,服务器将上述相关信息发布至区块链,以由区块链中的节点设备对上 述相关信息进行加密处理,得到对应的密文信息。
步骤706,服务器从区块链中获取上述密文信息。
步骤708,服务器对上述密文信息进行编码处理,得到上述密文信息所对应的二进制字符串。
步骤710,服务器确定目标图片的像素点阵中所嵌入的历史二进制字符串中的各历史二进制字符的位置信息。
其中,在具体实施时,服务器可以从区块链中读取前一次对目标图片的像素点阵中的历史二进制字符串进行更新的更新过程信息,基于该更新过程信息确定各历史二进制字符在像素点阵中的位置信息。
步骤712,服务器使用当前得到的二进制字符串中的各二进制字符分别替换各位置处的历史二进制字符。
步骤714,服务器记录替换目标图片的像素点阵中的各历史二进制字符的过程信息。
步骤716,服务器将上述记录的过程信息上传至区块链中进行存储。
还例如,在某些具体实施方式中,若是目标图片为存储在终端设备上的图片,用户在使用终端设备浏览该图片时,也可以通过服务器对该图片进行上述处理。图8为本说明书实施例提供的基于区块链的图片处理方法的方法流程图之六,图8所示的方法,至少包括如下步骤:
步骤802,在通过终端设备展示目标图片时,该终端设备获取目标图片的相关信息。
其中,上述相关信息可以包括目标图片的版权所有者信息和当前的环境信息;该环境信息包括当前的展示时间信息、当前所处的地理位置信息和该终端设备信息。
在具体实施时,上述版权所有者信息可以从目标图片的属性信息中获取,上述当前的展示时间信息可以为终端设备当前所显示的时间信息,上述当前所处的地理位置信息可以是通过该终端设备所定位出的地理位置信息,即可以从终端设备的定位信息中获取,上述终端设备信息可以为终端设备的MAC地址和/或IP地址信息。
步骤804,终端设备将所获取的目标图片的相关信息发送给服务器。
步骤806,服务器将该相关信息发送至区块链,以由区块链中的节点设备对该相 关信息进行加密处理,得到对应的密文信息。
步骤808,服务器从区块链中获取上述密文信息。
步骤810,服务器对上述密文信息进行编码处理,得到上述密文信息所对应的二进制字符串。
步骤812,服务器确定目标图片的像素点阵中所嵌入的历史二进制字符串中的各历史二进制字符的位置信息。
其中,在具体实施时,服务器可以从区块链中读取前一次对目标图片的像素点阵中的历史二进制字符串进行更新的更新过程信息,基于该更新过程信息确定各历史二进制字符在像素点阵中的位置信息。
步骤814,服务器使用当前得到的二进制字符串中的各二进制字符分别替换各位置处的历史二进制字符。
步骤816,服务器记录替换目标图片的像素点阵中的各历史二进制字符的过程信息,并将记录的该过程信息上传至区块链中进行存储,以及,服务器将替换后得到的像素点阵信息发送给终端设备。
步骤818,终端设备根据接收到的替换后的像素点阵信息更新该目标图片。
在本说明书实施例中,通过服务器和终端设备进行交互的方式实现对目标图片的处理,可以减少终端设备的工作量,降低终端设备的工作负担。
当然,上述只是结合可能的应用场景列举了本说明书实施例提供的基于区块链的图片处理方法的可能的具体实现方式,除此之外,还可以存在其他具体实施方式,例如,针对服务器和终端设备交互的情形的具体实施方式,本说明书不再一一列举。
本说明书实施例提供的基于区块链的图片处理方法,每次在通过终端设备展示目标图片时,都会基于目标图片的版权所有者信息和当前的环境信息更新目标图片的像素点阵中所存在的历史标识信息,使得目标图片中携带有版权所有者信息,后续在发生图片侵权事件时,便于进行版权保护;并且,在每次展示目标图片时,都会基于目标图片的版权所有者信息和当前的环境信息对像素点阵中的历史标识信息进行更新,这样使得嵌入在像素点阵中的标识信息都是基于最近一次展示时的相关信息所生成的,从而在发生截屏攻击或者拍照攻击时,可以基于目标图片中所携带的环境信息进行版权追踪,从而实现目标图片的版权保护;另外,在本说明书实施例中,在区块链中对目标图片的 相关信息进行加密,利用了区块链的不可篡改的属性,可实现图片版权的唯一追踪,从而进一步保障了图片的版权安全性。
对应于本说明书实施例提供的基于区块链的图片处理方法,基于相同的思路,本说明书实施例还提供了一种基于区块链的图片处理装置,用于执行本说明书实施例提供的上述方法。图9为本说明书实施例提供的基于区块链的图片处理装置的模块组成示意图,图9所示的装置,至少包括如下模块:
第一获取模块902,用于在通过终端设备展示目标图片时,获取目标图片的相关信息;其中,相关信息包括目标图片的版权所有者信息和当前的环境信息;环境信息包括以下信息中的至少一种:时间信息、地理位置信息和终端设备信息;
发布模块904,用于将相关信息发布至区块链,以由区块链中的节点设备对相关信息进行加密处理,得到对应的密文信息;
第二获取模块906,用于从区块链获取密文信息;
更新模块908,用于基于密文信息更新目标图片的像素点阵中所存在的历史标识信息;其中,历史标识信息基于目标图片在前一次被展示时的相关信息所确定。
可选的,上述更新模块908,包括:
编码单元,用于对密文信息进行编码处理,得到密文信息所对应的二进制字符串,作为目标图片当前的标识信息;
替换单元,用于使用标识信息替换历史标识信息。
可选的,上述替换单元,具体用于:
确定历史标识信息中的各个历史二进制字符分别在像素点阵中的位置;使用标识信息中的各个二进制字符分别替换各位置处的历史二进制字符。
可选的,本说明书实施例提供的装置,还包括:
记录模块,用于记录对像素点阵中的历史标识信息进行更新的更新过程信息;
存储模块,用于将更新过程信息存储至区块链中。
可选的,本说明书实施例提供的装置,还包括:
第三获取模块,用于获取目标图片的版权所有者信息和当前的环境信息;其中,当前的环境信息包括以下信息中的至少一种:当前的时间信息、当前所处的地理位置信 息和当前所使用设备信息;
生成模块,用于基于版权所有者信息和当前的环境信息生成目标图片的标识信息;
嵌入模块,用于将标识信息嵌入目标图片的像素点阵中。
可选的,版权所有者信息至少包括:版权所有者的姓名和版权所有者的身份证号;
终端设备信息包括终端设备的媒体访问控制MAC地址和/或互联网协议IP地址。
本说明书实施例的基于区块链的图片处理装置还可执行图1-图8中基于区块链的图片处理装置执行的方法,并实现基于区块链的图片处理装置在图1-图8所示实施例的功能,在此不再赘述。
本说明书实施例提供的基于区块链的图片处理装置,每次在通过终端设备展示目标图片时,都会基于目标图片的版权所有者信息和当前的环境信息更新目标图片的像素点阵中所存在的历史标识信息,使得目标图片中携带有版权所有者信息,后续在发生图片侵权事件时,便于进行版权保护;并且,在每次展示目标图片时,都会基于目标图片的版权所有者信息和当前的环境信息对像素点阵中的历史标识信息进行更新,这样使得嵌入在像素点阵中的标识信息都是基于最近一次展示时的相关信息所生成的,从而在发生截屏攻击或者拍照攻击时,可以基于目标图片中所携带的环境信息进行版权追踪,从而实现目标图片的版权保护;另外,在本说明书实施例中,在区块链中对目标图片的相关信息进行加密,利用了区块链的不可篡改的属性,可实现图片版权的唯一追踪,从而进一步保障了图片的版权安全性。
进一步地,基于上述图1至图8所示的方法,本说明书实施例还提供了一种基于区块链的图片处理设备,如图10所示。
基于区块链的图片处理设备可因配置或性能不同而产生比较大的差异,可以包括一个或一个以上的处理器1001和存储器1002,存储器1002中可以存储有一个或一个以上存储应用程序或数据。其中,存储器1002可以是短暂存储或持久存储。存储在存储器1002的应用程序可以包括一个或一个以上模块(图示未示出),每个模块可以包括对基于区块链的图片处理设备中的一系列计算机可执行指令信息。更进一步地,处理器1001可以设置为与存储器1002通信,在基于区块链的图片处理设备上执行存储器1002中的一系列计算机可执行指令信息。基于区块链的图片处理设备还可以包括一个或 一个以上电源1003,一个或一个以上有线或无线网络接口1004,一个或一个以上输入输出接口1005,一个或一个以上键盘1006等。
在一个具体的实施例中,基于区块链的图片处理设备包括有存储器,以及一个或一个以上的程序,其中一个或者一个以上程序存储于存储器中,且一个或者一个以上程序可以包括一个或一个以上模块,且每个模块可以包括对基于区块链的图片处理设备中的一系列计算机可执行指令信息,且经配置以由一个或者一个以上处理器执行该一个或者一个以上程序包含用于进行以下计算机可执行指令信息:
在通过终端设备展示目标图片时,获取目标图片的相关信息;其中,相关信息包括目标图片的版权所有者信息和当前的环境信息;环境信息包括以下信息中的至少一种:时间信息、地理位置信息和终端设备信息;
将相关信息发布至区块链,以由区块链中的节点设备对相关信息进行加密处理,得到对应的密文信息;
从区块链获取密文信息;
基于密文信息更新目标图片的像素点阵中所存在的历史标识信息;其中,历史标识信息基于目标图片在前一次被展示时的相关信息所确定。
可选的,计算机可执行指令信息在被执行时,基于密文信息更新目标图片的像素点阵中所存在的历史标识信息,包括:
对密文信息进行编码处理,得到密文信息所对应的二进制字符串,作为目标图片当前的标识信息;
使用标识信息替换历史标识信息。
可选的,计算机可执行指令信息在被执行时,使用标识信息替换历史标识信息,包括:
确定历史标识信息中的各个历史二进制字符分别在像素点阵中的位置;
使用标识信息中的各个二进制字符分别替换各位置处的历史二进制字符。
可选的,计算机可执行指令信息在被执行时,基于密文信息更新目标图片的像素点阵中所存在的历史标识信息之后,还可执行如下步骤:
记录对像素点阵中的历史标识信息进行更新的更新过程信息,并将更新过程信息存储至区块链中。
可选的,计算机可执行指令信息在被执行时,在通过终端设备展示目标图片时,获取目标图片的相关信息之前,还可执行如下步骤:
获取目标图片的版权所有者信息和当前的环境信息;其中,当前的环境信息包括以下信息中的至少一种:当前的时间信息、当前所处的地理位置信息和当前所使用设备信息;
基于版权所有者信息和当前的环境信息生成目标图片的标识信息,并将标识信息嵌入目标图片的像素点阵中。
可选的,计算机可执行指令信息在被执行时,版权所有者信息至少包括:版权所有者的姓名和版权所有者的身份证号;
终端设备信息包括终端设备的媒体访问控制MAC地址和/或互联网协议IP地址。
本说明书实施例提供的基于区块链的图片处理设备,每次在通过终端设备展示目标图片时,都会基于目标图片的版权所有者信息和当前的环境信息更新目标图片的像素点阵中所存在的历史标识信息,使得目标图片中携带有版权所有者信息,后续在发生图片侵权事件时,便于进行版权保护;并且,在每次展示目标图片时,都会基于目标图片的版权所有者信息和当前的环境信息对像素点阵中的历史标识信息进行更新,这样使得嵌入在像素点阵中的标识信息都是基于最近一次展示时的相关信息所生成的,从而在发生截屏攻击或者拍照攻击时,可以基于目标图片中所携带的环境信息进行版权追踪,从而实现目标图片的版权保护;另外,在本说明书实施例中,在区块链中对目标图片的相关信息进行加密,利用了区块链的不可篡改的属性,可实现图片版权的唯一追踪,从而进一步保障了图片的版权安全性。
进一步地,基于上述图1至图8所示的方法,本说明书实施例还提供了一种存储介质,用于存储计算机可执行指令信息,一种具体的实施例中,该存储介质可以为U盘、光盘、硬盘等,该存储介质存储的计算机可执行指令信息在被处理器执行时,能实现以下流程:
在通过终端设备展示目标图片时,获取目标图片的相关信息;其中,相关信息包括目标图片的版权所有者信息和当前的环境信息;环境信息包括以下信息中的至少一种:时间信息、地理位置信息和终端设备信息;
将相关信息发布至区块链,以由区块链中的节点设备对相关信息进行加密处理,得到对应的密文信息;
从区块链获取密文信息;
基于密文信息更新目标图片的像素点阵中所存在的历史标识信息;其中,历史标识信息基于目标图片在前一次被展示时的相关信息所确定。
可选的,该存储介质存储的计算机可执行指令信息在被处理器执行时,基于密文信息更新目标图片的像素点阵中所存在的历史标识信息,包括:
对密文信息进行编码处理,得到密文信息所对应的二进制字符串,作为目标图片当前的标识信息;
使用标识信息替换历史标识信息。
可选的,该存储介质存储的计算机可执行指令信息在被处理器执行时,使用标识信息替换历史标识信息,包括:
确定历史标识信息中的各个历史二进制字符分别在像素点阵中的位置;
使用标识信息中的各个二进制字符分别替换各位置处的历史二进制字符。
可选的,该存储介质存储的计算机可执行指令信息在被处理器执行时,基于密文信息更新目标图片的像素点阵中所存在的历史标识信息之后,还可执行如下步骤:
记录对像素点阵中的历史标识信息进行更新的更新过程信息,并将更新过程信息存储至区块链中。
可选的,该存储介质存储的计算机可执行指令信息在被处理器执行时,在通过终端设备展示目标图片时,获取目标图片的相关信息之前,还可执行如下步骤:
获取目标图片的版权所有者信息和当前的环境信息;其中,当前的环境信息包括以下信息中的至少一种:当前的时间信息、当前所处的地理位置信息和当前所使用设备信息;
基于版权所有者信息和当前的环境信息生成目标图片的标识信息,并将标识信息嵌入目标图片的像素点阵中。
可选的,该存储介质存储的计算机可执行指令信息在被处理器执行时,版权所有者信息至少包括:版权所有者的姓名和版权所有者的身份证号;
终端设备信息包括终端设备的媒体访问控制MAC地址和/或互联网协议IP地址。
本说明书实施例提供的存储介质存储的计算机可执行指令信息在被处理器执行 时,每次在通过终端设备展示目标图片时,都会基于目标图片的版权所有者信息和当前的环境信息更新目标图片的像素点阵中所存在的历史标识信息,使得目标图片中携带有版权所有者信息,后续在发生图片侵权事件时,便于进行版权保护;并且,在每次展示目标图片时,都会基于目标图片的版权所有者信息和当前的环境信息对像素点阵中的历史标识信息进行更新,这样使得嵌入在像素点阵中的标识信息都是基于最近一次展示时的相关信息所生成的,从而在发生截屏攻击或者拍照攻击时,可以基于目标图片中所携带的环境信息进行版权追踪,从而实现目标图片的版权保护;另外,在本说明书实施例中,在区块链中对目标图片的相关信息进行加密,利用了区块链的不可篡改的属性,可实现图片版权的唯一追踪,从而进一步保障了图片的版权安全性。
在20世纪90年代,对于一个技术的改进可以很明显地区分是硬件上的改进(例如,对二极管、晶体管、开关等电路结构的改进)还是软件上的改进(对于方法流程的改进)。然而,随着技术的发展,当今的很多方法流程的改进已经可以视为硬件电路结构的直接改进。设计人员几乎都通过将改进的方法流程编程到硬件电路中来得到相应的硬件电路结构。因此,不能说一个方法流程的改进就不能用硬件实体模块来实现。例如,可编程逻辑器件(Programmable Logic Device,PLD)(例如现场可编程门阵列(Field Programmable Gate Array,FPGA))就是这样一种集成电路,其逻辑功能由用户对器件编程来确定。由设计人员自行编程来把一个数字系统“集成”在一片PLD上,而不需要请芯片制造厂商来设计和制作专用的集成电路芯片。而且,如今,取代手工地制作集成电路芯片,这种编程也多半改用“逻辑编译器(logic compiler)”软件来实现,它与程序开发撰写时所用的软件编译器相类似,而要编译之前的原始代码也得用特定的编程语言来撰写,此称之为硬件描述语言(Hardware Description Language,HDL),而HDL也并非仅有一种,而是有许多种,如ABEL(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby Hardware Description Language)等,目前最普遍使用的是VHDL(Very-High-Speed Integrated Circuit Hardware Description Language)与Verilog。本领域技术人员也应该清楚,只需要将方法流程用上述几种硬件描述语言稍作逻辑编程并编程到集成电路中,就可以很容易得到实现该逻辑方法流程的硬件电路。
控制器可以按任何适当的方式实现,例如,控制器可以采取例如微处理器或处理器以及存储可由该(微)处理器执行的计算机可读程序代码(例如软件或固件)的计算机可读介质、逻辑门、开关、专用集成电路(Application Specific Integrated Circuit, ASIC)、可编程逻辑控制器和嵌入微控制器的形式,控制器的例子包括但不限于以下微控制器:ARC 625D、Atmel AT91SAM、Microchip PIC18F26K20以及Silicone Labs C8051F320,存储器控制器还可以被实现为存储器的控制逻辑的一部分。本领域技术人员也知道,除了以纯计算机可读程序代码方式实现控制器以外,完全可以通过将方法步骤进行逻辑编程来使得控制器以逻辑门、开关、专用集成电路、可编程逻辑控制器和嵌入微控制器等的形式来实现相同功能。因此这种控制器可以被认为是一种硬件部件,而对其内包括的用于实现各种功能的装置也可以视为硬件部件内的结构。或者甚至,可以将用于实现各种功能的装置视为既可以是实现方法的软件模块又可以是硬件部件内的结构。
上述实施例阐明的系统、装置、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机。具体的,计算机例如可以为个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任何设备的组合。
为了描述的方便,描述以上装置时以功能分为各种单元分别描述。当然,在实施本申请时可以把各单元的功能在同一个或多个软件和/或硬件中实现。
本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本申请是参照根据本说明书实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令信息实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令信息到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令信息产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令信息也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令信息 产生包括指令信息装置的制造品,该指令信息装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令信息也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令信息提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
在一个典型的配置中,计算设备包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令信息、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。
还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、商品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、商品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、商品或者设备中还存在另外的相同要素。
本领域技术人员应明白,本申请的实施例可提供为方法、系统或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算 机程序产品的形式。
本申请可以在由计算机执行的计算机可执行指令信息的一般上下文中描述,例如程序模块。一般地,程序模块包括执行特定任务或实现特定抽象数据类型的例程、程序、对象、组件、数据结构等等。也可以在分布式计算环境中实践本申请,在这些分布式计算环境中,由通过通信网络而被连接的远程处理设备来执行任务。在分布式计算环境中,程序模块可以位于包括存储设备在内的本地和远程计算机存储介质中。
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于系统实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。
以上所述仅为本申请的实施例而已,并不用于限制本申请。对于本领域技术人员来说,本申请可以有各种更改和变化。凡在本申请的精神和原理之内所作的任何修改、等同替换、改进等,均应包含在本申请的权利要求范围之内。

Claims (13)

  1. 一种基于区块链的图片处理方法,所述方法包括:
    在通过终端设备展示目标图片时,获取所述目标图片的相关信息;其中,所述相关信息包括所述目标图片的版权所有者信息和当前的环境信息;所述环境信息包括以下信息中的至少一种:时间信息、地理位置信息和所述终端设备信息;
    将所述相关信息发布至区块链,以由所述区块链中的节点设备对所述相关信息进行加密处理,得到对应的密文信息;
    从所述区块链获取所述密文信息;
    基于所述密文信息更新所述目标图片的像素点阵中所存在的历史标识信息;其中,所述历史标识信息基于所述目标图片在前一次被展示时的相关信息所确定。
  2. 如权利要求1所述的方法,所述基于所述密文信息更新所述目标图片的像素点阵中所存在的历史标识信息,包括:
    对所述密文信息进行编码处理,得到所述密文信息所对应的二进制字符串,作为所述目标图片当前的标识信息;
    使用所述标识信息替换所述历史标识信息。
  3. 如权利要求2所述的方法,所述使用所述标识信息替换所述历史标识信息,包括:
    确定所述历史标识信息中的各个历史二进制字符分别在所述像素点阵中的位置;
    使用所述标识信息中的各个二进制字符分别替换各所述位置处的历史二进制字符。
  4. 如权利要求1-3任一项所述的方法,所述基于所述密文信息更新所述目标图片的像素点阵中所存在的历史标识信息之后,所述方法还包括:
    记录对所述像素点阵中的历史标识信息进行更新的更新过程信息,并将所述更新过程信息存储至所述区块链中。
  5. 如权利要求1-3任一项所述的方法,所述在通过终端设备展示目标图片时,获取所述目标图片的相关信息之前,所述方法还包括:
    获取所述目标图片的版权所有者信息和当前的环境信息;其中,所述当前的环境信息包括以下信息中的至少一种:当前的时间信息、当前所处的地理位置信息和当前所使 用设备信息;
    基于所述版权所有者信息和当前的环境信息生成所述目标图片的标识信息,并将所述标识信息嵌入所述目标图片的像素点阵中。
  6. 如权利要求1-3任一项所述的方法,所述版权所有者信息至少包括:版权所有者的姓名和版权所有者的身份证号;
    所述终端设备信息包括所述终端设备的媒体访问控制MAC地址和/或互联网协议IP地址。
  7. 一种基于区块链的图片处理装置,所述装置包括:
    第一获取模块,用于在通过终端设备展示目标图片时,获取所述目标图片的相关信息;其中,所述相关信息包括所述目标图片的版权所有者信息和当前的环境信息;所述环境信息包括以下信息中的至少一种:时间信息、地理位置信息和所述终端设备信息;
    发布模块,用于将所述相关信息发布至区块链,以由所述区块链中的节点设备对所述相关信息进行加密处理,得到对应的密文信息;
    第二获取模块,用于从所述区块链获取所述密文信息;
    更新模块,用于基于所述密文信息更新所述目标图片的像素点阵中所存在的历史标识信息;其中,所述历史标识信息基于所述目标图片在前一次被展示时的相关信息所确定。
  8. 如权利要求7所述的装置,所述更新模块,包括:
    编码单元,用于对所述密文信息进行编码处理,得到所述密文信息所对应的二进制字符串,作为所述目标图片当前的标识信息;
    替换单元,用于使用所述标识信息替换所述历史标识信息。
  9. 如权利要求8所述的装置,所述替换单元,具体用于:
    确定所述历史标识信息中的各个历史二进制字符分别在所述像素点阵中的位置;使用所述标识信息中的各个二进制字符分别替换各所述位置处的历史二进制字符。
  10. 如权利要求7-9任一项所述的装置,所述装置还包括:
    记录模块,用于记录对所述像素点阵中的历史标识信息进行更新的更新过程信息;
    存储模块,用于将所述更新过程信息存储至所述区块链中。
  11. 如权利要求7-9任一项所述的装置,所述装置还包括:
    第三获取模块,用于获取所述目标图片的版权所有者信息和当前的环境信息;其中,所述当前的环境信息包括以下信息中的至少一种:当前的时间信息、当前所处的地理位置信息和当前所使用设备信息;
    生成模块,用于基于所述版权所有者信息和当前的环境信息生成所述目标图片的标识信息;
    嵌入模块,用于将所述标识信息嵌入所述目标图片的像素点阵中。
  12. 一种基于区块链的图片处理设备,包括:
    处理器;以及
    被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:
    在通过终端设备展示目标图片时,获取所述目标图片的相关信息;其中,所述相关信息包括所述目标图片的版权所有者信息和当前的环境信息;所述环境信息包括以下信息中的至少一种:时间信息、地理位置信息和所述终端设备信息;
    将所述相关信息发布至区块链,以由所述区块链中的节点设备对所述相关信息进行加密处理,得到对应的密文信息;
    从所述区块链获取所述密文信息;
    基于所述密文信息更新所述目标图片的像素点阵中所存在的历史标识信息;其中,所述历史标识信息基于所述目标图片在前一次被展示时的相关信息所确定。
  13. 一种存储介质,用于存储计算机可执行指令,所述可执行指令在被执行时实现以下流程:
    在通过终端设备展示目标图片时,获取所述目标图片的相关信息;其中,所述相关信息包括所述目标图片的版权所有者信息和当前的环境信息;所述环境信息包括以下信息中的至少一种:时间信息、地理位置信息和所述终端设备信息;
    将所述相关信息发布至区块链,以由所述区块链中的节点设备对所述相关信息进行加密处理,得到对应的密文信息;
    从所述区块链获取所述密文信息;
    基于所述密文信息更新所述目标图片的像素点阵中所存在的历史标识信息;其中,所述历史标识信息基于所述目标图片在前一次被展示时的相关信息所确定。
PCT/CN2020/071012 2019-05-13 2020-01-08 基于区块链的图片处理方法及装置 WO2020228368A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/866,526 US10963542B2 (en) 2019-05-13 2020-05-04 Blockchain-based image processing method and apparatus

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910392621.1A CN110263502B (zh) 2019-05-13 2019-05-13 基于区块链的图片处理方法及装置
CN201910392621.1 2019-05-13

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/866,526 Continuation US10963542B2 (en) 2019-05-13 2020-05-04 Blockchain-based image processing method and apparatus

Publications (1)

Publication Number Publication Date
WO2020228368A1 true WO2020228368A1 (zh) 2020-11-19

Family

ID=67913096

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/071012 WO2020228368A1 (zh) 2019-05-13 2020-01-08 基于区块链的图片处理方法及装置

Country Status (2)

Country Link
CN (2) CN111881422B (zh)
WO (1) WO2020228368A1 (zh)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10963542B2 (en) 2019-05-13 2021-03-30 Advanced New Technologies Co., Ltd. Blockchain-based image processing method and apparatus
CN111881422B (zh) * 2019-05-13 2024-04-16 创新先进技术有限公司 基于区块链的图片处理方法及装置
CN110866224A (zh) * 2019-11-15 2020-03-06 支付宝(杭州)信息技术有限公司 一种基于区块链的图片确权方法和系统
CN113325990A (zh) * 2020-02-28 2021-08-31 李庆成 智能终端图片的处理方法
CN113032594B (zh) * 2021-02-26 2023-12-08 广东核电合营有限公司 标牌图像存储方法、装置、计算机设备和存储介质
CN113204755B (zh) * 2021-04-20 2022-10-14 重庆工业职业技术学院 一种区块链大数据安全的数据抓取方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108833099A (zh) * 2018-07-27 2018-11-16 深圳市新名泽科技有限公司 密钥生成方法、装置、密钥恢复方法及装置
CN109145632A (zh) * 2017-06-28 2019-01-04 北京京东尚科信息技术有限公司 用于生成可追溯文件的方法及装置
CN109711120A (zh) * 2018-12-17 2019-05-03 浙江大学 一种基于区块链数字水印的数字资源侵权追踪方法与系统
CN110263502A (zh) * 2019-05-13 2019-09-20 阿里巴巴集团控股有限公司 基于区块链的图片处理方法及装置

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103428503B (zh) * 2013-07-24 2016-08-10 北京印刷学院 一种在数字媒体上水印提取的方法和装置
CN107145768B (zh) * 2016-03-01 2021-02-12 华为技术有限公司 版权管理方法和系统
CN106682457A (zh) * 2016-12-16 2017-05-17 北京握奇智能科技有限公司 一种基于区块链技术的图片版权保护方法和系统
CN107657554B (zh) * 2017-09-22 2020-10-02 朱志文 一种版权注册交易和确权方法及系统
JP6998747B2 (ja) * 2017-12-08 2022-02-10 長瀬産業株式会社 データ管理装置及びコンテンツデータの提供方法
KR101897032B1 (ko) * 2018-04-26 2018-09-10 이준엽 블록체인을 이용한 저작권 보호 장치 및 저작권 보호 방법
CN109002487A (zh) * 2018-06-25 2018-12-14 百度在线网络技术(北京)有限公司 一种基于版权登记信息的后处理方法、装置、设备和介质
CN109063424B (zh) * 2018-08-09 2022-10-04 京东方科技集团股份有限公司 一种版权管理方法、系统、可读存储介质和计算机设备
CN109376504B (zh) * 2018-09-26 2022-04-12 福州大学 一种基于区块链技术的图片隐私保护方法
CN109409030A (zh) * 2018-10-19 2019-03-01 微梦创科网络科技(中国)有限公司 一种数字版权生成方法及装置
CN109493224A (zh) * 2018-11-10 2019-03-19 平凡视界(深圳)科技有限公司 一种区块链图片社交系统
CN109492351A (zh) * 2018-11-23 2019-03-19 北京奇眸科技有限公司 基于区块链的版权保护方法、装置及可读存储介质
CN109635521A (zh) * 2018-12-06 2019-04-16 中链科技有限公司 一种基于区块链的版权保护、验证方法及装置
CN109727134B (zh) * 2018-12-29 2024-04-05 三六零科技集团有限公司 一种图片的版权交易方法及装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109145632A (zh) * 2017-06-28 2019-01-04 北京京东尚科信息技术有限公司 用于生成可追溯文件的方法及装置
CN108833099A (zh) * 2018-07-27 2018-11-16 深圳市新名泽科技有限公司 密钥生成方法、装置、密钥恢复方法及装置
CN109711120A (zh) * 2018-12-17 2019-05-03 浙江大学 一种基于区块链数字水印的数字资源侵权追踪方法与系统
CN110263502A (zh) * 2019-05-13 2019-09-20 阿里巴巴集团控股有限公司 基于区块链的图片处理方法及装置

Also Published As

Publication number Publication date
CN110263502A (zh) 2019-09-20
CN111881422B (zh) 2024-04-16
CN110263502B (zh) 2020-08-21
CN111881422A (zh) 2020-11-03

Similar Documents

Publication Publication Date Title
WO2020228368A1 (zh) 基于区块链的图片处理方法及装置
US10963542B2 (en) Blockchain-based image processing method and apparatus
JP6804668B2 (ja) ブロックデータ検証方法および装置
EP3910513B1 (en) Blockchain-based data processing method and device
TWI695290B (zh) 登錄資訊處理方法及設備
EP3893180B1 (en) Service data processing method and apparatus
WO2020228366A1 (zh) 基于区块链的图片处理方法及装置
US9853820B2 (en) Intelligent deletion of revoked data
US10083311B2 (en) Cryptographic key
EP3644574B1 (en) Key management method and apparatus
US11188660B2 (en) Blockchain-based image processing method and apparatus
TWI724579B (zh) 區塊鏈資料處理方法、裝置、系統、處理設備及儲存媒體
JP6636647B2 (ja) ランダム文字列を生成する方法および装置
CN109583224B (zh) 一种用户隐私数据处理方法、装置、设备及系统
CN113076527B (zh) 一种基于区块链的数字资产处理方法及装置
TW202008763A (zh) 資料處理方法和裝置、用戶端
WO2019095854A1 (zh) 可溯源的多方数据处理方法、装置及设备
CN109145053B (zh) 数据处理方法和装置、客户端、服务器
CN111934878A (zh) 一种基于区块链的数据加密与解密方法、设备及介质
CN115834018A (zh) 一种保护隐私的多方数据处理方法、系统和设备
TW201734877A (zh) 基於應用程序的用戶資訊的隱藏方法及裝置
CN111641499A (zh) 一种基于区块链的私钥还原方法、装置、设备及介质
CN110995447A (zh) 一种数据存证方法、装置、设备以及介质
US11343071B2 (en) Extended ciphertexts
CN116011003A (zh) 一种基于隐私保护的信息推荐方法、装置及设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20805741

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20805741

Country of ref document: EP

Kind code of ref document: A1