WO2021057035A1 - Camera system and video processing method - Google Patents
Camera system and video processing method Download PDFInfo
- Publication number
- WO2021057035A1 WO2021057035A1 PCT/CN2020/089930 CN2020089930W WO2021057035A1 WO 2021057035 A1 WO2021057035 A1 WO 2021057035A1 CN 2020089930 W CN2020089930 W CN 2020089930W WO 2021057035 A1 WO2021057035 A1 WO 2021057035A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- video
- face
- module
- feature vector
- original
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/168—Feature extraction; Face representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N23/00—Cameras or camera modules comprising electronic image sensors; Control thereof
- H04N23/80—Camera processing pipelines; Components thereof
Definitions
- the invention relates to the field of face recognition, in particular to a camera system and a video processing method.
- Face recognition technology has high development prospects and economic benefits in the fields of public security investigations, access control systems, target tracking and other civilian security control systems. But while face recognition technology can become the most powerful security tool, it may also be detrimental to protecting personal privacy.
- face recognition technology can become the most powerful security tool, it may also be detrimental to protecting personal privacy.
- various characteristics of the characters are usually removed, or the characteristics of the characters are changed, so that the video data cannot be used as commercial or security data.
- the existing technology cannot protect the privacy of video characters while ensuring that the video data can also be used as effective commercial or security video data.
- At least one embodiment of the present invention provides a camera system and a video processing method, which can protect the privacy of video characters while ensuring that the video data can also be used as effective commercial or security video data. .
- an embodiment of the present invention proposes a camera system, the system includes: a video acquisition module, which is used to acquire original video images; a structured feature acquisition module, which is used to extract the structured character of each person in the original video Features; face feature vector acquisition module, used to acquire all face regions in the original video, and extract the feature vector of each face separately; feature vector change module, used to extract the face of the face recognition module The feature vector is changed to a forged face feature vector; a face forged module is used to form a forged face according to the structural features of each person and the forged face feature vector; a video generation module is used to convert the The fake faces formed by the face fake module are respectively covered on the original faces of the original video to form a privacy-removed video.
- the structural feature includes at least one of the following: gender, age, whether to wear glasses, accessories, and clothing.
- the camera system further includes: an encryption module for encrypting the original video image; or, encrypting the deprived video.
- the decryption module is used to decrypt the encrypted original video image, or decrypt the encrypted deprived video.
- the video acquisition module, the structured feature acquisition module, the face feature vector acquisition module, the feature vector change module, the face forgery module, and the encryption module are packaged in one Or, the video capture module is located in a camera, the structured feature acquisition module, the face feature vector acquisition module, the feature vector change module, the face forgery module, and the The encryption module is located in the background of the system.
- an embodiment of the present invention also provides a video processing method, including: obtaining an original video image; identifying all character regions in the original video, extracting structural features of each character in the original video; All face regions, and extract the feature vector of the face respectively; perform a change operation on the feature vector of the extracted face to form a forged face feature vector; according to the structured features of each person and the forged person
- the face feature vector forms a fake human face; the fake human face is respectively covered on the original human face of the original video to form a privacy-removed video.
- the video processing method further includes: encrypting the original video image; or encrypting the deprived video.
- the video processing method further includes: decrypting the encrypted original video image, or decrypting the encrypted de-privacy video.
- the encryption includes: encrypting the original video or the deprived video frame by frame; or, encrypting data of a preset size in the original video or the deprived video Block encryption; or, encrypt the entire video of the original video or the deprived video.
- an embodiment of the present invention also provides a video processing device, including: at least one processor; a memory coupled with the at least one processor, the memory storing executable instructions, wherein the executable instructions When executed by the at least one processor, the method as described in any one of the above second aspect is realized.
- an embodiment of the present invention also provides a computer-readable storage medium having a computer program stored on the computer-readable storage medium, and when the computer program is executed by a processor, the above-mentioned second aspect is implemented. The method described.
- the structural features of each person in the original video are extracted, and all face areas in the original video are identified, and Extract the feature vector of the human face respectively, perform a change operation on the extracted feature vector of the human face to form a forged face feature vector, and form a forgery according to the structured features of each person and the forged face feature vector.
- the face, the deprived video obtained in this way can also retain the structural characteristics of the character, so that while protecting the privacy of the video character, it can ensure that the video data can also be used as effective commercial or security video data.
- FIG. 1 is a schematic diagram of the composition structure of an embodiment of the camera system of the present invention
- Fig. 2 is a flowchart of an embodiment of the video processing method of the present invention.
- this embodiment provides a camera system, which includes:
- Video acquisition module 210 which is used to acquire original video images
- the structured feature acquisition module 220 is used to extract the structured features of each person in the original video; if there are multiple characters in the original video, extract the structured features of each person respectively.
- the recorded person can be identified. For example, the corresponding position of each person in the video can be recorded to identify a recorded person.
- the face feature vector acquiring module 230 is used to acquire all face regions in the original video, and extract the feature vectors of each face respectively. If there are multiple faces in the original video, the feature vectors of each face are extracted respectively. At the same time, the corresponding position of each face in the video can be recorded, so that each forged face can be covered to the corresponding original face position when the privacy removal module is finally generated.
- the feature vector changing module 240 is used to change the feature vector of the face extracted by the face recognition module into a fake face feature vector.
- the feature vector change module can use a one-way hash algorithm, such as the md5 algorithm, or other mathematical methods, to change it into a new face feature vector, which can be recorded as a fake feature vector.
- the face forgery module 250 is used to form a forged human face according to the structural features of each person and the forged facial feature vector. For example, according to the forged feature vector and the structured features of the character, a face generation algorithm based on the anti-neural network, such as the deepfake algorithm, is used to generate a new face. This face is different from the original face, and it is recorded as a fake face. .
- a face generation algorithm based on the anti-neural network such as the deepfake algorithm
- the forged face is formed based on the feature vector of the original face and the structural feature of the character, based on the face with the same feature vector, on different occasions, an approximate face can be formed after forging. It can be ensured that the fake face formed by the same original face is similar under any circumstances within the preset time. That is, the horizontal consistency of the forged face is guaranteed. Based on the forged face based on the structural features of the original person, it can ensure that the structural features are consistent before and after the camouflage. Optionally, extract information such as gender, age, whether to wear glasses, etc. through face structuring algorithms.
- conditional face generation algorithms such as conditionGan, stylegan, etc.
- the accessories can be various accessories, such as hats, headwear, etc.
- the video generation module 260 is configured to cover the fake faces formed by the face forgery module on the original faces of the original video, respectively, to form a privacy-removed video.
- a forged face is formed according to the structural characteristics of each person and the forged face feature vector data.
- the deprivation video obtained in this way can protect the privacy of the person in the video while retaining the structural characteristics of the person to ensure Video data can also be used as effective commercial or security video data.
- the camera system of this embodiment may further include: an encryption module, which is used to encrypt the original video image; or, to encrypt the deprived video. And, it may also include: a decryption module for decrypting the encrypted original video image, or decrypting the encrypted deprived video.
- the encryption module encrypts the original video or the deprived video frame by frame; or, encrypts the data block of a preset size in the original video or the deprived video; or, encrypts the entire video of the original video or the deprived video.
- the encryption module can use, for example, an RSA encryption algorithm, and can perform one-way encryption through a public key.
- the specific method can be to encrypt the video frame by frame, or to encrypt each data block of a certain size, or to directly encrypt the entire video.
- the encrypted video is stored and cannot be decrypted without an authorized private key to ensure its security.
- decrypting it is similar to the encryption method, and the original video is obtained by decrypting with the private key.
- the video acquisition module, structured feature acquisition module, face feature vector acquisition module, feature vector change module, face forgery module, and encryption module of the camera system are packaged in one camera.
- all modules are packaged in a camera, and the original video is obtained through the camera.
- Encryption operations are performed through encryption chips or general-purpose processors.
- the de-privacy module calculation is performed through the AI chip or a general-purpose accessory processor (gpu) or central processing unit (cpu).
- the chip module encapsulated in the camera first performs de-privacy processing on the video data, and then transmits it to the background server through a wired or wireless network or a combination thereof. Since the transmitted video data has been processed for privacy, it can reduce the occurrence of leaks and improve the reliability of the system.
- the video acquisition module of the camera system is located in a camera
- the structured feature acquisition module, the face feature vector acquisition module, the feature vector change module, the face forgery module and the encryption module are located in the background of the system.
- the structured feature acquisition module, the face feature vector acquisition module, the feature vector change module, the face forgery module, and the encryption module are extracted from the camera and placed on the back-end server.
- the front-end camera is just a general-purpose camera.
- the system when different camera systems need to be upgraded, the system can be upgraded directly in the background, without the need to replace cameras one by one, and there is no need to perform separate upgrade processing for each camera. Improve the efficiency of replacement and reduce costs.
- this embodiment provides a video processing method, including:
- the original video image may be obtained through any camera of the existing technology or the future technology.
- a change operation on the feature vector of the extracted face to form a forged feature vector of the face.
- a one-way hash algorithm such as the md5 algorithm, or other mathematical methods can be used to perform a change operation to change it into a new face feature vector, which can be recorded as a forged feature vector.
- a fake face according to the structural features of each person and the fake face feature vector.
- a face generation algorithm based on the anti-neural network such as the deepfake algorithm, can be used to generate a new face. This face is different from the original face, so remember it as Falsify human faces.
- extract information such as gender, age, whether to wear glasses, etc. through face structuring algorithms.
- conditional face generation algorithms such as conditionGan, stylegan, etc.
- the forged face is formed based on the feature vector of the original face and the structural feature of the character, based on the face with the same feature vector, in different situations, an approximation can be formed after the forgery Human face. It can be ensured that the fake face formed by the same original face is similar under any circumstances within the preset time. That is, the horizontal consistency of the forged face is guaranteed. Based on the forged face based on the structural features of the original person, it can ensure that the structural features before and after the camouflage are consistent.
- the imitated faces are respectively covered on the faces of the original video to form a deprivation video, and the deprivation video does not contain any one.
- the face in the original video can still be viewed normally, and information such as pedestrian behavior and crowd distribution can be analyzed normally, and the structural characteristics of the character can be maintained.
- the video can be used as effective security or commercial data while protecting privacy.
- a video processing method further includes: encrypting the original video image; or, encrypting the deprived video.
- encryption also includes: decrypting the encrypted original video image, or decrypting the encrypted deprived video.
- the original video or the deprived video when encrypting, can be encrypted frame by frame; or, the original video or the deprived video of a data block of a preset size can be encrypted; or, the original video or the entire video of the deprived video can be encrypted .
- decryption is a process corresponding to encryption, and the decryption method can be adapted to the encryption method.
- the present invention also provides a video processing device, including:
- At least one processor a memory coupled with the at least one processor, and the memory stores executable instructions, where the executable instructions, when executed by the at least one processor, enable the method of the second aspect of the present invention to be implemented.
- This embodiment provides a video processing device, including: at least one processor; and a memory coupled with the at least one processor.
- the memory may include random access memory, flash memory, read-only memory, programmable read-only memory, non-volatile memory, or registers.
- the processor may be a central processing unit (Central Processing Unit, CPU) or the like.
- the memory can store executable instructions.
- the processor can execute executable instructions stored in the memory to implement the various processes described herein.
- the memory in this embodiment may be a volatile memory or a non-volatile memory, or may include both volatile and non-volatile memory.
- the non-volatile memory can be ROM (Read-OnlyMemory), PROM (ProgrammableROM, Programmable Read-Only Memory), EPROM (ErasablePROM, Erasable Programmable Read-Only Memory), EEPROM (Electrically EPROM, Electronic Erasable programmable read-only memory) or flash memory.
- the volatile memory may be RAM (Random Access Memory), which is used as an external cache.
- RAM random access memory
- SRAM StaticRAM, static random access memory
- DRAM DynamicRAM, dynamic random access memory
- SDRAM SynchronousDRAM, synchronous dynamic random access memory
- DDRSDRAM DoubleDataRate SDRAM, double data rate synchronous dynamic random access memory
- ESDRAM Enhanced SDRAM, enhanced synchronous dynamic random access memory
- SLDRAM SynchronousDRAM, synchronous connection dynamic random access memory
- DRRAM DirectRambusRAM, direct RAM bus random access memory.
- the memory 42 described herein is intended to include, but is not limited to, these and any other suitable types of memory.
- the memory stores the following elements, upgrade packages, executable units, or data structures, or a subset of them, or an extended set of them: operating systems and applications.
- the operating system includes various system programs, such as a framework layer, a core library layer, and a driver layer, which are used to implement various basic services and process hardware-based tasks.
- Application programs including various application programs, used to implement various application services.
- a program that implements the method of the embodiment of the present invention may be included in an application program.
- the processor calls a program or instruction stored in the memory, specifically, a program or instruction stored in an application program, and the processor is used to execute the method steps provided in the second aspect.
- the present invention also provides a computer-readable storage medium with a computer program stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the method of the second aspect of the present invention are implemented.
- the machine-readable storage medium may include, but is not limited to, various known and unknown types of non-volatile memory.
- the disclosed system, device, and method may be implemented in other ways.
- the division of units is only a logical function division, and there may be other division methods in actual implementation.
- multiple units or components can be combined or integrated into another system.
- the coupling between the various units may be direct coupling or indirect coupling.
- the functional units in the embodiments of the present application may be integrated into one processing unit, or may be a separate physical existence, and so on.
- the function is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a machine-readable storage medium. Therefore, the technical solution of the present application may be embodied in the form of a software product.
- the software product may be stored in a machine-readable storage medium, which may include a number of instructions to make an electronic device execute the technical solutions described in the embodiments of the present application. All or part of the process.
- the foregoing storage media may include various media capable of storing program codes, such as ROM, RAM, removable disks, hard disks, magnetic disks, or optical disks.
Abstract
Description
Claims (11)
- 一种摄像系统,其特征在于,所述系统包括:A camera system, characterized in that the system includes:视频采集模块,其用于获取原始视频影像;Video acquisition module, which is used to acquire original video images;结构化特征获取模块,用于提取所述原始视频中各个人物的结构化特征;The structured feature acquisition module is used to extract the structured features of each person in the original video;人脸特征向量获取模块,用于获取所述原始视频中所有人脸区域,并分别提取各个人脸的特征向量;The face feature vector acquisition module is used to acquire all face regions in the original video, and extract the feature vectors of each face respectively;特征向量变化模块,用于将所述人脸识别模块提取人脸的特征向量变化为伪造的人脸特征向量;The feature vector change module is used to change the feature vector of the face extracted by the face recognition module into a forged feature vector of the face;人脸伪造模块,用于根据所述各个人物的结构化特征和所述伪造的人脸特征向量形成伪造人脸;A face forgery module, configured to form a forged human face according to the structural features of each person and the forged human face feature vector;视频生成模块,用于将所述人脸伪造模块形成的伪造人脸分别覆盖到所述原始视频的原始人脸上,形成去隐私的视频。The video generation module is used to overlay the fake face formed by the face forge module on the original face of the original video, respectively, to form a privacy-removed video.
- 根据权利要求1所述的摄像系统,其特征在于,所述结构化特征包括以下至少一种:人物的性别、年龄、是否带眼镜、饰品,服装。The camera system according to claim 1, wherein the structural feature includes at least one of the following: gender, age, whether to wear glasses, accessories, and clothing.
- 根据权利要求1所述的摄像系统,其特征在于,还包括:The camera system of claim 1, further comprising:加密模块,用于对所述原始视频影像进行加密;或者An encryption module for encrypting the original video image; or对所述去隐私的视频进行加密。Encrypt the deprived video.
- 根据权利要求3所述的摄像系统,其特征在于,还包括:解密模块,用于对加密的原始视频影像进行解密,或者,对加密的去隐私的视频进行解密。The camera system according to claim 3, further comprising: a decryption module for decrypting the encrypted original video image, or decrypting the encrypted deprived video.
- 根据权利要求3所述摄像系统,其特征在于,所述视频采集模块、所述结构化特征获取模块、所述人脸特征向量获取模块、所述特征向量变化模块、所述人脸伪造模块和所述加密模块封装在一台摄像机中;或者The camera system according to claim 3, wherein the video acquisition module, the structured feature acquisition module, the face feature vector acquisition module, the feature vector change module, the face forgery module, and The encryption module is packaged in a camera; or所述视频采集模块位于一台摄像机中,所述结构化特征获取模块、所 述人脸特征向量获取模块、所述特征向量变化模块、所述人脸伪造模块和所述加密模块位于所述系统的后台。The video acquisition module is located in a camera, the structured feature acquisition module, the face feature vector acquisition module, the feature vector change module, the face forgery module, and the encryption module are located in the system Backstage.
- 一种视频处理方法,其特征在于,包括:A video processing method, characterized in that it comprises:获取原始视频影像;Obtain the original video image;识别所述原始视频中所有人物区域,提取所述原始视频中各个人物的结构化特征;Identifying all character regions in the original video, and extracting structural features of each character in the original video;识别所述原始视频中所有人脸区域,并分别提取人脸的特征向量;Identifying all face regions in the original video, and extracting feature vectors of the faces respectively;对所述提取人脸的特征向量进行变化运算,形成伪造的人脸特征向量;Performing a change operation on the feature vector of the extracted human face to form a forged feature vector of the human face;根据所述各个人物的结构化特征和所述伪造的人脸特征向量形成伪造人脸;Forming a fake face according to the structural features of each person and the fake face feature vector;将所述伪造人脸分别覆盖到所述原始视频的原始人脸上,形成去隐私的视频。The fake faces are respectively covered on the original faces of the original video to form a privacy-removed video.
- 根据权利要求6所述的视频处理方法,其特征在于,还包括:The video processing method according to claim 6, further comprising:对所述原始视频影像进行加密;或者Encrypt the original video image; or对所述去隐私的视频进行加密。Encrypt the deprived video.
- 根据权利要求7所述的视频处理方法,其特征在于,还包括:8. The video processing method of claim 7, further comprising:对所述加密的原始视频影像进行解密,或者,对所述加密的去隐私的视频进行解密。Decrypt the encrypted original video image, or decrypt the encrypted deprived video.
- 根据权利要求7或8所述的视频处理方法,其特征在于,所述加密为:The video processing method according to claim 7 or 8, wherein the encryption is:对所述原始视频或所述去隐私视频进行逐帧加密;或者Encrypt the original video or the deprived video frame by frame; or对所述原始视频或所述去隐私视频中预设大小的数据块加密;或者Encrypt data blocks of a preset size in the original video or the deprived video; or对所述原始视频或所述去隐私视频整个视频加密。Encrypt the original video or the entire video of the privacy-removed video.
- 一种视频处理装置,包括:A video processing device includes:至少一个处理器;At least one processor;与所述至少一个处理器耦合的存储器,所述存储器存储有可执行指令,其中,所述可执行指令在被所述至少一个处理器执行时使得实现根据权利要求6至9中任一项所述的方法。A memory coupled to the at least one processor, the memory storing executable instructions, wherein the executable instructions, when executed by the at least one processor, enable the implementation of the method according to any one of claims 6 to 9 The method described.
- 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时实现如上权利要求6至9中任一项所述的方法的步骤。A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the method according to any one of claims 6 to 9 is implemented. step.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910926444.0 | 2019-09-27 | ||
CN201910926444.0A CN110674765A (en) | 2019-09-27 | 2019-09-27 | Imaging system and video processing method |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021057035A1 true WO2021057035A1 (en) | 2021-04-01 |
Family
ID=69079577
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/089930 WO2021057035A1 (en) | 2019-09-27 | 2020-05-13 | Camera system and video processing method |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110674765A (en) |
WO (1) | WO2021057035A1 (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110674765A (en) * | 2019-09-27 | 2020-01-10 | 上海依图网络科技有限公司 | Imaging system and video processing method |
CN112200796B (en) * | 2020-10-28 | 2023-04-07 | 支付宝(杭州)信息技术有限公司 | Image processing method, device and equipment based on privacy protection |
CN112418179A (en) * | 2020-12-09 | 2021-02-26 | 上海领感科技有限公司 | Face recognition and collection system based on public place and privacy protection method |
CN112668401B (en) * | 2020-12-09 | 2023-01-17 | 中国科学院信息工程研究所 | Face privacy protection method and device based on feature decoupling |
CN113139527B (en) * | 2021-05-28 | 2023-09-22 | 深圳文达智通技术有限公司 | Video privacy protection method, device, equipment and storage medium |
CN115776597A (en) * | 2021-08-30 | 2023-03-10 | 海信集团控股股份有限公司 | Audio and video generation method and device and electronic equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102004897A (en) * | 2009-08-31 | 2011-04-06 | 索尼公司 | Apparatus, method, and program for processing image |
CN103327231A (en) * | 2012-03-19 | 2013-09-25 | 卡西欧计算机株式会社 | Image creating device and image creating method |
CN106599817A (en) * | 2016-12-07 | 2017-04-26 | 腾讯科技(深圳)有限公司 | Face replacement method and device |
US9799096B1 (en) * | 2014-07-08 | 2017-10-24 | Carnegie Mellon University | System and method for processing video to provide facial de-identification |
CN110647659A (en) * | 2019-09-27 | 2020-01-03 | 上海依图网络科技有限公司 | Imaging system and video processing method |
CN110674765A (en) * | 2019-09-27 | 2020-01-10 | 上海依图网络科技有限公司 | Imaging system and video processing method |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3593067B2 (en) * | 2001-07-04 | 2004-11-24 | 沖電気工業株式会社 | Information terminal device with image communication function and image distribution system |
JP2014089625A (en) * | 2012-10-31 | 2014-05-15 | Tadao Ueda | Method of searching for still image or moving image of human in consideration of privacy |
CN204272303U (en) * | 2014-12-31 | 2015-04-15 | 西安蒜泥电子科技有限责任公司 | A kind of secret protection supervisory control system |
-
2019
- 2019-09-27 CN CN201910926444.0A patent/CN110674765A/en active Pending
-
2020
- 2020-05-13 WO PCT/CN2020/089930 patent/WO2021057035A1/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102004897A (en) * | 2009-08-31 | 2011-04-06 | 索尼公司 | Apparatus, method, and program for processing image |
CN103327231A (en) * | 2012-03-19 | 2013-09-25 | 卡西欧计算机株式会社 | Image creating device and image creating method |
US9799096B1 (en) * | 2014-07-08 | 2017-10-24 | Carnegie Mellon University | System and method for processing video to provide facial de-identification |
CN106599817A (en) * | 2016-12-07 | 2017-04-26 | 腾讯科技(深圳)有限公司 | Face replacement method and device |
CN110647659A (en) * | 2019-09-27 | 2020-01-03 | 上海依图网络科技有限公司 | Imaging system and video processing method |
CN110674765A (en) * | 2019-09-27 | 2020-01-10 | 上海依图网络科技有限公司 | Imaging system and video processing method |
Also Published As
Publication number | Publication date |
---|---|
CN110674765A (en) | 2020-01-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2021057035A1 (en) | Camera system and video processing method | |
CN110647659B (en) | Image pickup system and video processing method | |
CN110620891B (en) | Imaging system and video processing method | |
US11615176B2 (en) | Registration and verification of biometric modalities using encryption techniques in a deep neural network | |
US11853857B2 (en) | Secure convolutional neural networks (CNN) accelerator | |
CN110610456A (en) | Imaging system and video processing method | |
WO2018165811A1 (en) | Method for saving and verifying biometric template, and biometric recognition apparatus and terminal | |
CN112949545B (en) | Method, apparatus, computing device and medium for recognizing face image | |
CN104778393A (en) | Security fingerprint identification method for intelligent terminal | |
CN110572604B (en) | Imaging system and video processing method | |
WO2021109691A1 (en) | Blockchain-based picture watermark processing method and apparatus | |
WO2016188154A1 (en) | Method and device for image processing | |
CN106971114A (en) | A kind of method and device of image security | |
US11520931B2 (en) | Privacy masking method using format-preserving encryption in image security system and recording medium for performing same | |
CN101221612A (en) | Method for enciphering and deciphering electric document file by face recognition | |
CN111931145A (en) | Face encryption method, face recognition method, face encryption device, face recognition device, electronic equipment and storage medium | |
Mohanty et al. | PANDORA: Preserving privacy in PRNU-based source camera attribution | |
Pic et al. | Remote KYC: Attacks and counter-measures | |
Zhao et al. | Application of face image detection based on deep learning in privacy security of intelligent cloud platform | |
CN116405211B (en) | Multiple encryption method, device, equipment and storage medium based on biological characteristics | |
Riaz et al. | Enhanced image encryption techniques using modified advanced encryption standard | |
CN113052045B (en) | Method, apparatus, computing device and medium for identifying finger vein image | |
JP5718757B2 (en) | Image management apparatus, image management program, and image management method | |
CN111159737A (en) | Image data protection method, device, equipment and storage medium based on SGX | |
Zanotto et al. | Blockchain-grade privacy protection in surveillance systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20868780 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20868780 Country of ref document: EP Kind code of ref document: A1 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20868780 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 19.10.2022) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20868780 Country of ref document: EP Kind code of ref document: A1 |