WO2021120781A1 - 图片版权认证方法、装置及存储介质 - Google Patents

图片版权认证方法、装置及存储介质 Download PDF

Info

Publication number
WO2021120781A1
WO2021120781A1 PCT/CN2020/118500 CN2020118500W WO2021120781A1 WO 2021120781 A1 WO2021120781 A1 WO 2021120781A1 CN 2020118500 W CN2020118500 W CN 2020118500W WO 2021120781 A1 WO2021120781 A1 WO 2021120781A1
Authority
WO
WIPO (PCT)
Prior art keywords
picture
information
authentication
original
fingerprint information
Prior art date
Application number
PCT/CN2020/118500
Other languages
English (en)
French (fr)
Inventor
曹斌
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2021120781A1 publication Critical patent/WO2021120781A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T9/00Image coding

Definitions

  • This application relates to the field of image processing technology, as well as the field of artificial intelligence, and in particular to a method, device and storage medium for authenticating image copyright.
  • the purpose of this application is to provide a method, device, and storage medium for authenticating image copyright, which solves the technical problems in the prior art that fingerprint information is easily tampered with and difficult to prove copyright.
  • the user identification code and the hash value are combined to form a picture key information string, and the picture key information string is encoded using the erasure code EC algorithm to obtain the fingerprint information of the original picture.
  • the fingerprint The information includes fingerprint data and verification data used to verify the fingerprint data;
  • a picture copyright authentication device including:
  • the user identification module is used to obtain the user identification code based on the received image authentication request
  • the picture information extraction module is used to receive the original picture uploaded by the user, and obtain the identification information of the original picture;
  • the first encoding module is configured to obtain the hash value of the identification information by using a secure hash algorithm
  • the second encoding module is configured to combine the user identification code and the hash value to form a picture key information string, and use the erasure code EC algorithm to encode the picture key information string to obtain the original picture Fingerprint information, where the fingerprint information includes fingerprint data and verification data used to verify the fingerprint data;
  • the authentication storage module is configured to embed the fingerprint information into the original picture, form an authentication picture including the fingerprint information, and store the authentication picture.
  • a picture copyright authentication device includes a processor, and a memory coupled to the processor, and the memory stores a program for implementing the above-mentioned picture copyright authentication method Instructions; the processor implements the following steps when executing the program instructions stored in the memory:
  • the user identification code and the hash value are combined to form a picture key information string, and the picture key information string is encoded using the erasure code EC algorithm to obtain the fingerprint information of the original picture.
  • the fingerprint The information includes fingerprint data and verification data used to verify the fingerprint data;
  • a storage medium stores program instructions capable of realizing the above-mentioned image copyright authentication method, and when the program instructions are executed by a processor, the following steps are implemented:
  • the user identification code and the hash value are combined to form a picture key information string, and the picture key information string is encoded using the erasure code EC algorithm to obtain the fingerprint information of the original picture.
  • the fingerprint The information includes fingerprint data and verification data used to verify the fingerprint data;
  • the image copyright authentication method, device and storage medium of this application create a unique user identification code for each authenticated user, and encode the identification information of the original image to obtain the hash value of the identification information , And then encode the key information string of the picture formed by the combination of the user identification code and the hash value to obtain the fingerprint information of the original picture, and embed the fingerprint information in the original picture to form an authentication picture and store it. Fingerprint information points to both the image identification and user identity. It is difficult to forge and tamper with, and at the same time, it is convenient for users to carry out copyright certification. Moreover, if the fingerprint information embedded in the authentication picture is partially lost, data can be restored, which further increases fingerprint information forgery and tampering Difficulty.
  • FIG. 1 is a schematic flowchart of a method for authenticating image copyright according to the first embodiment of the application
  • FIG. 2 is a schematic flowchart of a method for authenticating image copyright according to a second embodiment of this application;
  • FIG. 3 is a schematic structural diagram of a picture copyright authentication device according to a third embodiment of the application.
  • FIG. 4 is a schematic structural diagram of a picture copyright authentication device according to a fourth embodiment of the application.
  • FIG. 5 is a schematic structural diagram of a storage medium according to a fifth embodiment of this application.
  • first”, “second”, and “third” in this application are only used for descriptive purposes, and cannot be understood as indicating or implying relative importance or implicitly indicating the number of indicated technical features. Thus, the features defined with “first”, “second”, and “third” may explicitly or implicitly include at least one of the features.
  • "a plurality of” means at least two, such as two, three, etc., unless otherwise specifically defined. All directional indicators (such as up, down, left, right, front, back%) in the embodiments of this application are only used to explain the relative positional relationship between the components in a specific posture (as shown in the drawings) , Movement status, etc., if the specific posture changes, the directional indication will also change accordingly.
  • FIG. 1 is a schematic flowchart of a method for authenticating image copyright according to the first embodiment of the present application. It should be noted that if there is substantially the same result, the method of the present application is not limited to the sequence of the process shown in FIG. 1. As shown in Figure 1, the method for authenticating image copyright includes the following steps:
  • S101 Obtain a user identification code based on the received picture authentication request.
  • a unique user identification code UID is created for each user for identification.
  • the user identification code UID can be used to determine the creator of the picture. Specifically, the length of the user identification code UID can be set to 64 characters .
  • step S101 when the user needs to upload a picture for authentication, a picture authentication request is sent.
  • the picture authentication request carries user information.
  • the user identification code is obtained based on the user information carried in the authentication request.
  • UID When the user identification code UID cannot be obtained, it means that the current user is a new user, and the user identification code UID is created for the current user.
  • the user identification code UID is a string of characters that can be identified and calculated, and can be created in the following manner: S1011: Obtain the registration information filled in when the user registers for the account.
  • the registration information includes the name, Date of birth, ID number (such as ID number, passport number, driver's license number, etc.) and account name; S1012, using a predetermined encryption algorithm to select and set multiple types of information from the registration information according to the set rules Combine and calculate the unique user identification code UID.
  • the registration information can be arranged in the order of name-account name-ID number to form an input value, and a hash algorithm is used to process the input value to obtain a user identification code UID.
  • S102 Receive an original picture uploaded by a user, and obtain identification information of the original picture.
  • the identification information of the original picture includes two parts, the first part is the picture itself of the original picture, and the second part is the parameters of the original picture. Specifically, first, the original picture uploaded by the user is received; then, the picture information of the original picture is extracted, and the picture information includes the picture size, resolution, shooting time, shooting location, shutter speed, aperture size, exposure, and whiteness. One or more of balancing; then, processing the original picture to obtain a picture summary of the original picture; finally, storing the picture summary and the picture information in the identification information of the original picture .
  • the shooting location, shutter speed, aperture size, exposure, and white balance can be adjusted artificially, and the source of the picture cannot be uniquely identified; because the size of a digital picture is difficult to forge, under normal circumstances It is difficult for the size of two pictures to be exactly the same.
  • the picture size is a relatively unique parameter, which can identify the source of the picture to a certain extent.
  • the picture summary representing the picture itself can be extracted by the following method: S1021, reduce the size of the original picture, and convert the reduced original picture into a corresponding grayscale picture; S1022, compare all Discrete cosine transform of the gray image to obtain a first DCT matrix; S1023, reduce the first DCT matrix to obtain a second DCT matrix; S1024, calculate the mean value of the second DCT matrix, and calculate the average value of the second DCT matrix according to the The mean value determines the picture summary of the original picture.
  • the original picture can be simplified by reducing the size and converting into a gray-scale picture in step S1021.
  • the simplification of the original picture is beneficial to improve the DCT (discrete cosine transform)
  • DCT discrete cosine transform
  • white balance processing and denoising processing can also be performed on the original picture to remove noise in the original picture and reduce the impact on the extraction process of the image summary.
  • the size of the first DCT matrix may be 32*32; in step S1023, the first DCT matrix is reduced to an 8*8 second DCT matrix; in step S1024, the second DCT is calculated After the average value of the matrix, the elements greater than or equal to the average value in the second DCT matrix are set to 1, and the elements less than the average value are set to 0, and then the modified elements in the second DCT matrix are set to A picture summary composed of 64-bit Hash values can be obtained.
  • the picture summary may not represent the picture itself, and the feature value of the original picture may be extracted, and the feature value and the picture information can be used together as the identification information of the original picture.
  • S103 Obtain a hash value of the identification information by using a secure hash algorithm.
  • the Secure Hash Algorithm may specifically be SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, and SHA-512/256.
  • the hash function compresses the identification information of the original picture into a summary, so that the amount of data becomes smaller and the format of the data is fixed. This function scrambles and mixes the data and recreates a fingerprint called a hash value (or hash value).
  • the hash value is usually represented by a short string of random letters and numbers.
  • this embodiment adopts the SHA-256 algorithm, and the SHA-256 algorithm generates a 64-character hash value TID regardless of the size of the original picture.
  • the maximum length of the SHA-256 algorithm input identification information does not exceed 2 ⁇ 64bit, the input is processed in 512-bit packets, and the output generated is a 256-bit hash value.
  • the second step is to append the length value.
  • the bit length of the initial identification information (before padding) represented by 64-bit is appended to the result of the first step (low byte first).
  • the third step is to initialize the cache and use a 256-bit cache to store the intermediate and final results of the hash function.
  • the fourth step is to process a 512-bit (16 words) information packet sequence.
  • the algorithm uses six basic logic functions and consists of 64 iterative operations. Each step takes the 256-bit cache value ABCDEFGH as input, and then updates the cache content. Each step uses a 32-bit constant value Kt and a 32-bitWt.
  • S104 Combine the user identification code and the hash value to form a picture key information string, and use an erasure code EC algorithm to encode the picture key information string to obtain fingerprint information of the original picture.
  • the fingerprint information includes fingerprint data and verification data for verifying the fingerprint data.
  • the user identification code UID and the hash value TID of the identification information both include 64 characters, and the two are combined to form a string containing 128 characters, which is the picture key information string of the original picture.
  • the EC algorithm that is, the (ErasureCode, erasure code) algorithm.
  • EC encoding is a data redundancy technology that can split a key image string of length L into N data blocks. Then calculate M check blocks based on these N data blocks, and the final stored data is these N+M data blocks. The EC coding algorithm can guarantee that in these N+M blocks, as long as the number of lost does not exceed M , Then the entire data is still complete.
  • the picture key information string is split into a first preset number of data blocks; the first preset number N of data blocks are encoded using an erasure code EC algorithm to generate a second preset number M check blocks; the first preset number N data blocks form the fingerprint data, and the second preset number M check blocks form the check data.
  • Each check block includes 32 characters, and the fingerprint information includes 224 characters.
  • the fingerprint information of the original picture includes not only the encoding information pointing to the picture itself, but also the encoding information pointing to the user identity.
  • the user identity can be directly determined according to the picture fingerprint information, and since the fingerprint information also points to the user identity, It is difficult to tamper with. If the fingerprint information is partially lost, the data can be restored through the check block, which further increases the difficulty of forging and tampering with the image fingerprint information.
  • S105 Embed the fingerprint information into the original picture, form an authentication picture including the fingerprint information, and store the authentication picture.
  • step S105 the fingerprint information is directly embedded in the original picture to form a corresponding authentication picture, and then the authentication picture is stored.
  • fingerprint information is needed, it is directly read from the authentication picture, and there is no need to save fingerprint information separately.
  • the fingerprint information embedded in it can be extracted directly from the pictures uploaded by others, reducing the workload of investigation.
  • a preset third number of pixels are extracted from all pixels of the original picture, where the preset third number is the same as the number of characters contained in the fingerprint information; then , Replacing the extracted pixels with the characters of the fingerprint information to embed the fingerprint information into the original picture to obtain an authentication picture; finally, storing the authentication picture and recording the storage of the authentication picture time.
  • each picture has its own horizontal axis and vertical axis, and each pixel has its own relative position (pixel position) according to the origin (0,0) coordinates of the upper left corner.
  • the original picture is divided into pixels according to the horizontal axis and the vertical axis.
  • Fig. 2 is a schematic flowchart of a method for authenticating image copyright according to a second embodiment of the present application. It should be noted that if there is substantially the same result, the method of the present application is not limited to the sequence of the process shown in FIG. 2. As shown in Figure 2, the method for authenticating image copyright includes the following steps:
  • S201 Receive a picture authentication request sent by a current user, determine whether the current user has a user identification code based on the user information carried in the picture authentication request, and obtain a first judgment result.
  • step S204 the original picture uploaded by the user is received, the identification information of the original picture is obtained, the hash value of the identification information is obtained using a secure hash algorithm, and the user identification code and the hash value are combined to form
  • the picture key information string is encoded using the erasure code EC algorithm to obtain the fingerprint information of the original picture.
  • the fingerprint information includes fingerprint data and is used for collating the fingerprint data. Verify the verification data.
  • step S204 reference may be made to the description of the first embodiment for details, which will not be repeated here.
  • S205 Determine whether the original picture is stored in the authentication picture database according to the fingerprint information of the original picture, and obtain a second determination result.
  • step S207 it also includes the following steps:
  • step S209 the infringer uses the authentication image, and the user identification code of the original creator is directly obtained based on the fingerprint information embedded in the serious image; in step S210, the infringer uses the authentication image instead of the authentication image, and the hash of the image needs to be extracted again Value, the hash value is compared with the fingerprint information embedded in the authentication picture in the authentication picture database, the fingerprint information matching the hash value is obtained, and the user identification code is obtained from the fingerprint information.
  • the information of the infringing network picture and the infringed event can be sent to the original creator.
  • step S211 corresponding summary information is obtained based on the fingerprint information.
  • the summary information is obtained by hashing the fingerprint information, for example, obtained by processing the sha256s algorithm.
  • Uploading summary information to the blockchain can ensure its security and fairness and transparency to users.
  • the user equipment can download the summary information from the blockchain to verify whether the fingerprint information has been tampered with.
  • the blockchain referred to in this example is a new application mode of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm.
  • Blockchain essentially a decentralized database, is a series of data blocks associated with cryptographic methods. Each data block contains a batch of network transaction information for verification. The validity of the information (anti-counterfeiting) and the generation of the next block.
  • the blockchain can include the underlying platform of the blockchain, the platform product service layer, and the application service layer.
  • FIG. 3 is a schematic structural diagram of a picture copyright authentication device according to a third embodiment of the application.
  • the device 30 includes: a user identification module 31, a picture information extraction module 32, a first encoding module 33, a second encoding module 34, and an authentication storage module 35, wherein the user identification module 31 is used for receiving
  • the picture authentication request obtains the user identification code
  • the picture information extraction module 32 is used to receive the original picture uploaded by the user and obtain the identification information of the original picture
  • the first encoding module 33 is used to obtain the hash of the identification information by using a secure hash algorithm.
  • the second encoding module 34 is used to combine the user identification code and the hash value to form a picture key information string, and use the erasure code EC algorithm to encode the picture key information string to obtain the
  • the fingerprint information of the original picture includes fingerprint data and verification data used to verify the fingerprint data
  • the authentication storage module 35 is used to embed the fingerprint information into the original picture to form Including the authentication picture of the fingerprint information and storing the authentication picture.
  • Fig. 4 is a schematic structural diagram of a picture copyright authentication device according to a fourth embodiment of the present application.
  • the image copyright authentication device 40 includes a processor 41 and a memory 42 coupled to the processor 41.
  • the memory 42 stores program instructions for implementing the image copyright authentication method of any of the above embodiments.
  • the processor 41 is configured to execute program instructions stored in the memory 42 to perform image copyright authentication.
  • the processor 41 may also be referred to as a CPU (Central Processing Unit, central processing unit).
  • the processor 41 may be an integrated circuit chip with signal processing capabilities.
  • the processor 41 may also be a general-purpose processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, a discrete gate or transistor logic device, a discrete hardware component .
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • FIG. 5 is a schematic structural diagram of a storage medium according to a fifth embodiment of the application.
  • the storage medium of the embodiment of the present application stores program instructions 51 that can implement all the above-mentioned image copyright authentication methods, and the storage medium may be non-volatile or volatile.
  • the program instructions 51 may be stored in the above-mentioned storage medium in the form of a software product, and include several instructions for making a computer device (may be a personal computer, a server, or a network device, etc.) or a processor to execute the program. Apply for all or part of the steps of the method described in each embodiment.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM, Read-OnlyMemory), random access memory (RAM, Random Access Memory), magnetic disks or optical disks and other media that can store program codes, or terminal devices such as computers, servers, mobile phones, and tablets.
  • the disclosed system, device, and method can be implemented in other ways.
  • the device embodiments described above are merely illustrative, for example, the division of units is only a logical function division, and there may be other divisions in actual implementation, for example, multiple units or components can be combined or integrated. To another system, or some features can be ignored, or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may be in electrical, mechanical or other forms.
  • the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit. The above are only implementations of this application, and do not limit the scope of this application. Any equivalent structure or equivalent process transformation made using the content of the description and drawings of this application, or directly or indirectly applied to other related technical fields, The same reason is included in the scope of patent protection of this application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

一种图片版权认证方法、装置及存储介质,为每个认证的用户创建唯一的用户识别码,并将原始图片的标识信息进行编码,得到标识信息的散列值,再将用户识别码和散列值组合形成的图片关键信息字符串进行编码处理,得到所述原始图片的指纹信息,将指纹信息嵌入原始图片中形成认证图片并存储,通过上述方式,由于该指纹信息同时指向图片标识和用户身份,难以伪造和篡改的同时便于用户进行版权证明,并且,若认证图片中嵌入的指纹信息部分丢失,还可进行数据还原,进一步增加了指纹信息伪造和篡改的难度。

Description

图片版权认证方法、装置及存储介质
本申请要求于2020年07月28日提交中国专利局、申请号为202010737237.3,发明名称为“图片版权认证方法、装置及存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及图片处理技术领域,还涉及人工智能领域,尤其涉及一种图片版权认证方法、装置及存储介质。
背景技术
随着图片在互联网上传播的越来越广、越来越快,图片已成为人与人之间交流的主要方式方法。充满美感的照片可以被用于商业用途,经典的图片示例就是windowsxp的默认背景桌面。既然图片是有商业价值的,需要解决图片的版权归属问题。现有技术中,若客户需要维护自己的图片版权时,需要自己证明图片的来源,但是由于存储时长问题,太久远的原始文件可能存在丢失或者被篡改。这种情况下,发明人意识到如何证明文件的原创性就成了一个难以解决的问题。
因此,有必要提供一种图片版权认证方法。
技术问题
本申请的目的在于提供一种图片版权认证方法、装置及存储介质,解决现有技术中指纹信息容易被篡改以及版权证明难的技术问题。
技术解决方案
本申请的技术方案如下:提供一种图片版权认证方法,包括:
基于接收的图片认证请求获取用户识别码;
接收用户上传的原始图片,获取所述原始图片的标识信息;
利用安全散列算法获取所述标识信息的散列值;
将所述用户识别码和所述散列值组合形成图片关键信息字符串,利用纠删码EC算法对所述图片关键信息字符串进行编码处理,得到所述原始图片的指纹信息,所述指纹信息包括指纹数据以及用于对所述指纹数据进行校验的校验数据;
将所述指纹信息嵌入至所述原始图片中,形成包括所述指纹信息的认证图片并对所述认证图片进行存储。
本申请的另一技术方案如下:提供一种图片版权认证装置,包括:
用户识别模块,用于基于接收的图片认证请求获取用户识别码;
图片信息提取模块,用于接收用户上传的原始图片,获取所述原始图片的标识信息;
第一编码模块,用于利用安全散列算法获取所述标识信息的散列值;
第二编码模块,用于将所述用户识别码和所述散列值组合形成图片关键信息字符串,利用纠删码EC算法对所述图片关键信息字符串进行编码处理,得到所述原始图片的指纹信息,所述指纹信息包括指纹数据以及用于对所述指纹数据进行校验的校验数据;
认证存储模块,用于将所述指纹信息嵌入至所述原始图片中,形成包括所述指纹信息的认证图片并对所述认证图片进行存储。
本申请的另一技术方案如下:提供一种图片版权认证装置,所述装置包括处理器、以及与所述处理器耦接的存储器,所述存储器存储有用于实现上述的图片版权认证方法的程序指令;所述处理器执行所述存储器存储的所述程序指令时实现如下步骤:
基于接收的图片认证请求获取用户识别码;
接收用户上传的原始图片,获取所述原始图片的标识信息;
利用安全散列算法获取所述标识信息的散列值;
将所述用户识别码和所述散列值组合形成图片关键信息字符串,利用纠删码EC算法对所述图片关键信息字符串进行编码处理,得到所述原始图片的指纹信息,所述指纹信息包括指纹数据以及用于对所述指纹数据进行校验的校验数据;
将所述指纹信息嵌入至所述原始图片中,形成包括所述指纹信息的认证图片并对所述认证图片进行存储。
本申请的另一技术方案如下:提供一种存储介质,所述存储介质内存储有能够实现上述的图片版权认证方法的程序指令,所述程序指令被处理器执行时实现如下步骤:
基于接收的图片认证请求获取用户识别码;
接收用户上传的原始图片,获取所述原始图片的标识信息;
利用安全散列算法获取所述标识信息的散列值;
将所述用户识别码和所述散列值组合形成图片关键信息字符串,利用纠删码EC算法对所述图片关键信息字符串进行编码处理,得到所述原始图片的指纹信息,所述指纹信息包括指纹数据以及用于对所述指纹数据进行校验的校验数据;
将所述指纹信息嵌入至所述原始图片中,形成包括所述指纹信息的认证图片并对所述认证图片进行存储。
有益效果
本申请的有益效果在于:本申请的图片版权认证方法、装置及存储介质,为每个认证的用户创建唯一的用户识别码,并将原始图片的标识信息进行编码,得到标识信息的散列值,再将用户识别码和散列值组合形成的图片关键信息字符串进行编码处理,得到所述原始图片的指纹信息,将指纹信息嵌入原始图片中形成认证图片并存储,通过上述方式,由于该指纹信息同时指向图片标识和用户身份,难以伪造和篡改的同时便于用户进行版权证明,并且,若认证图片中嵌入的指纹信息部分丢失,还可进行数据还原,进一步增加了指纹信息伪造和篡改的难度。
附图说明
图1为本申请第一实施例的图片版权认证方法的流程示意图;
图2为本申请第二实施例的图片版权认证方法的流程示意图;
图3为本申请第三实施例的图片版权认证装置的结构示意图;
图4为本申请第四实施例的图片版权认证装置的结构示意图;
图5为本申请第五实施例的存储介质的结构示意图。
本发明的实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅是本申请的一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
本申请中的术语“第一”、“第二”、“第三”仅用于描述目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”、“第三”的特征可以明示或者隐含地包括至少一个该特征。本申请的描述中,“多个”的含义是至少两个,例如两个,三个等,除非另有明确具体的限定。本申请实施例中所有方向性指示(诸如上、下、左、右、前、后……)仅用于解释在某一特定姿态(如附图所示)下各部件之间的相对位置关系、运动情况等,如果该特定姿态发生改变时,则该方向性指示也相应地随之改变。此外,术语“包括”和“具有”以及它们任何变形,意图在于覆盖不排他的包含。例如包含了一系列步骤或单元的过程、方法、系统、产品或设备没有限定于已列出的步骤或单元,而是可选地还包括没有列出的步骤或单元,或可选地还包括对于这些过程、方法、产品或设备固有的其它步骤或单元。
在本文中提及“实施例”意味着,结合实施例描述的特定特征、结构或特性可以包含在本申请的至少一个实施例中。在说明书中的各个位置出现该短语并不一定均是指相同的实施例,也不是与其它实施例互斥的独立的或备选的实施例。本领域技术人员显式地和隐式地理解的是,本文所描述的实施例可以与其它实施例相结合。
图1是本申请第一实施例的图片版权认证方法的流程示意图。需注意的是,若有实质上相同的结果,本申请的方法并不以图1所示的流程顺序为限。如图1所示,该图片版权认证方法包括步骤:
S101,基于接收的图片认证请求获取用户识别码。
在本申请实施例中,为每个用户创建唯一的用户识别码UID进行身份标识,通过该用户识别码UID可以确定图片的创作者,具体地,用户识别码UID的长度可以设置为64个字符。在步骤S101中,用户需要上传图片进行认证时,发送图片认证请求,所述图片认证请求携带有用户信息,接收当前用户发送的图片认证请求后,基于该认证请求携带的用户信息获取用户识别码UID;当无法获取用户识别码UID时,说明当前用户为新用户,为当前用户创建用户识别码UID。在一个可选的实施方式中,用户识别码UID是一串可进行识别和计算的字符串,可以采用如下方式创建:S1011,获取用户注册账号时填写的注册信息,所述注册信息包括姓名、出生日期、证件号(例如身份证号、护照号、驾驶证号等)以及账号名称;S1012,采用预定加密算法根据设定的规则从所述注册信息中选择设定的多个类型的信息进行组合计算得到的唯一的用户标识码UID。进一步地,在步骤S1012中,可以按照姓名-账号名称-身份证号的顺序对注册信息进行排列形成输入值,采用散列算法对输入值进行处理,得到用户标识码UID。
S102,接收用户上传的原始图片,获取所述原始图片的标识信息。
在步骤S102中,原始图片的标识信息包括两个部分,第一个部分是原始图片的图片本身,第二个部分是原始图片的各项参数。具体地,首先,接收用户上传的原始图片;然后,提取所述原始图片的图片信息,所述图片信息包括图片大小、分辨率、拍摄时间、拍摄地点、快门速度、光圈大小、曝光度和白平衡中的一种或多种;然后,对所述原始图片进行处理以获取所述原始图片的图片摘要;最后,将所述图片摘要和所述图片信息存储至所述原始图片的标识信息中。更具体地,在图片信息中,拍摄地点、快门速度、光圈大小、曝光度和白平衡等内容是可以进行人为调整的,并不能唯一鉴别图片来源;由于数字图片的大小难以伪造,一般情况下两张图片的大小很难完全相同,图片大小是个相对唯一的参数,一定程度上能够鉴别图片来源。
在一个可选的实施方式中,代表图片本身的图片摘要可以通过以下方法提取:S1021,缩小所述原始图片的尺寸,将缩小后的所述原始图片转化为对应灰度图片;S1022,对所述灰度图片进行离散余弦变换,得到第一DCT矩阵;S1023,对所述第一DCT矩阵进行缩小处理,得到第二DCT矩阵;S1024,计算所述第二DCT矩阵的均值,并根据所述均值确定所述原始图片的图片摘要。其中,通过步骤S1021中缩小尺寸和转化为灰度图片可以将该原始图片简化,对原始图片进行简化后有利于提高后续过程中的进行DCT(discrete cosine transform)离散余弦变换的计算效率。进一步地,在进行尺寸缩小和灰度转化之前,还可以对该原始图片进行白平衡处理及去噪处理,以去除原始图片中的噪声,减小对图像摘要的提取过程产生影响。在步骤S1022中,第一DCT矩阵的大小可以为32*32;在步骤S1023中,将第一DCT矩阵缩小为8*8的第二DCT矩阵;在步骤S1024中,计算得到所述第二DCT矩阵的均值之后,将所述第二DCT矩阵中大于或等于所述均值的元素设置为1,小于所述均值的元素设置为0,然后再根据所述第二DCT矩阵中修改后的元素即可得到由64位Hash值组成的图片摘要。
本领域技术人员应当理解,在其他实施方式中,也可以不用图片摘要代表图片本身,可以提取原始图片的特征值,将该特征值与图片信息共同作为原始图片的标识信息。
S103,利用安全散列算法获取所述标识信息的散列值。
在本实施例中,安全散列算法(Secure Hash Algorithm),具体可以是SHA-224、SHA-256、SHA-384、SHA-512、SHA-512/224以及SHA-512/256。散列函数把原始图片的标识信息压缩成摘要,使得数据量变小,将数据的格式固定下来。该函数将数据打乱混合,重新创建一个叫做散列值(或哈希值)的指纹。散列值通常用一个短的随机字母和数字组成的字符串来代表。
具体地,本实施例采用SHA-256算法,SHA-256算法无论原始图片的图片大小有多大,都会生成64个字符的散列值TID。SHA-256 算法输入标识信息的最大长度不超过2^64bit,输入按512-bit分组进行处理,产生的输出是一个256-bit的散列值。该算法处理包括以下几步:第一步,附加填充比特,对标识信息进行填充使其长度与448模512同余(长度=448 mod 512),填充的比特数范围是1到512,填充比特串的最高位为1,其余位为0。第二步,附加长度值,将用64-bit表示的初始的标识信息(填充前)的位长度附加在第一步的结果后(低位字节优先)。第三步,初始化缓存,使用一个256-bit的缓存来存放该散列函数的中间及最终结果。例如,该缓存可以表示为A=0x6A09E667,B=0xBB67AE85,C=0x3C6EF372,D=0xA54FF53A,E=0x510E527F,F=0x9B05688C,G=0x1F83D9AB,H=0x5BE0CD19。第四步,处理512-bit(16个字)信息分组序列。该算法使用了六种基本逻辑函数,由64步迭代运算组成。每步都以256-bit缓存值ABCDEFGH为输入,然后更新缓存内容。每步使用一个32-bit常数值Kt和一个32-bitWt。
S104,将所述用户识别码和所述散列值组合形成图片关键信息字符串,利用纠删码EC算法对所述图片关键信息字符串进行编码处理,得到所述原始图片的指纹信息,所述指纹信息包括指纹数据以及用于对所述指纹数据进行校验的校验数据。
在本实施例中,用户识别码UID和标识信息的散列值TID均包括64个字符,二者组合形成一个含有128个字符的字符串,即为原始图片的图片关键信息字符串。在本实施例中,EC算法:即,(ErasureCode,纠删码)算法,EC编码是一种数据冗余技术,可以将一个长度为L的图片关键信息字符串拆分为N个数据块,然后根据这N个数据块计算出M个校检块,最终存储的数据是这N+M个数据块,EC编码的算法能够保证在这N+M个块中,只要丢失的数量不超过M个,则整个数据仍然是完整的。具体地,将所述图片关键信息字符串拆分为第一预设数量的数据块;利用纠删码EC算法对所述第一预设数量N的数据块进行编码,生成第二预设数量M的校验块;所述第一预设数量N的数据块形成所述指纹数据,所述第二预设数量M的校验块形成校验数据。例如:N=4,M=3,则可以保证在最多丢失3个数据块的情况下,这样存储的数据仍然可以是完整的,于是,本实施例中,每个数据块包括32个字符,每个校验块包括32个字符,指纹信息包括224个字符。
在本实施例中,原始图片的指纹信息不仅包括指向图片本身的编码信息,还包括指向用户身份的编码信息,根据图片指纹信息可以直接确定用户身份,并且,由于该指纹信息还指向用户身份,难以篡改,若指纹信息部分丢失,还可通过校验块进行数据还原,进一步增加了图片指纹信息伪造和篡改的难度。
S105,将所述指纹信息嵌入至所述原始图片中,形成包括所述指纹信息的认证图片并对所述认证图片进行存储。
在步骤S105中,将指纹信息直接嵌入原始图片中形成对应的认证图片,再对认证图片进行存储,需要使用指纹信息时,直接从认证图片上读取,无需单独再保存指纹信息,并且,用户在使用过程中,可以使用嵌入了指纹信息的认证图片,无需使用原始图片,当认证图片被他人使用时,可以直接从他人上传的图片中提取嵌入其中的指纹信息,减少排查工作量。
在一个可选的实施方式中,首先,从所述原始图片的所有像素点中抽取预设第三数量的像素点,所述预设第三数量与所述指纹信息包含的字符数量相同;然后,将所述指纹信息的字符分别替换抽取的像素点,以将所述指纹信息嵌入至所述原始图片中得到认证图片;最后,对所述认证图片进行存储,并记录所述认证图片的存储时间。具体地,每张图片都有自己的横轴和纵轴,每个像素点根据左上角的原点(0,0)坐标,都有一个自己的相对位置(像素点位置),根据原始图片大小,将原始图片按照横轴和纵轴,切分成像素点,例如,一张1024*768分辨率的原始图片,可以切分成1024*768=786432个像素点,而每个像素点,在图片存储时都将转换成为十六进制。而指纹信息包含的224个字符本身就是英文和数字的组合。将像素点按照顺序进行编号(1,2,3,……,786432),用指纹信息中224个字符替换编号为10的倍数的像素点,例如10、20、30...1280。在几十万个点中,更换224个点,比例只有224/786432=0.028%,根本无法察觉到图片差异。
图2是本申请第二实施例的图片版权认证方法的流程示意图。需注意的是,若有实质上相同的结果,本申请的方法并不以图2所示的流程顺序为限。如图2所示,该图片版权认证方法包括步骤:
S201,接收当前用户发送的图片认证请求,基于所述图片认证请求中携带的用户信息判断所述当前用户是否拥有用户识别码,得到第一判断结果。
S202,当第一判断结果为是时,获取所述用户识别码。
S203,当第一判断结果为否时,为所述当前用户创建用户识别码。
S204,利用指纹算法提取原始图片的指纹信息。
在步骤S204中,接收用户上传的原始图片,获取所述原始图片的标识信息,利用安全散列算法获取所述标识信息的散列值,将所述用户识别码和所述散列值组合形成图片关键信息字符串,利用纠删码EC算法对所述图片关键信息字符串进行编码处理,得到所述原始图片的指纹信息,所述指纹信息包括指纹数据以及用于对所述指纹数据进行校验的校验数据。步骤S204可以具体参见第一实施例的描述,在此不进行一一赘述。
S205,根据所述原始图片的指纹信息判断所述原始图片是否存储于所述认证图片数据库中,得到第二判断结果。
S206,当第二判断结果为是时,拒绝当前用户的图片认证请求。
S207,当第二判断结果为否时,将所述指纹信息嵌入至所述原始图片中,形成包括所述指纹信息的认证图片并对所述认证图片进行存储。
在步骤S207之后,还包括如下步骤:
S208,采用图片爬虫工具从网络中爬取和下载网络图片。
S209,当从所述网络图片中获取到嵌入的指纹信息时,根据所述指纹信息生成对应的所述图片关键信息字符串,根据所述图片关键信息字符串获取指向原创者的所述用户识别码。
S210,当无法从所述网络图片中获取到嵌入的指纹信息时,获取所述网络图片的标识信息;利用安全散列算法获取所述标识信息的散列值;根据所述网络图片的散列值判断所述网络图片是否存储于所述认证图片数据库中,得到第三判断结果;当第三判断结果为是时,根据存储于所述认证图片数据库中的对应认证图片中嵌入的指纹信息获取指向原创者的所述用户识别码。
S211,将所述指纹信息上传至区块链中,以使得所述区块链对所述指纹信息进行加密存储。
在步骤S209中,侵权者使用的为认证图片,基于认真图片上嵌入的指纹信息直接获取原创者的用户识别码;在步骤S210中,侵权者使用的不是认证图片,需要重新提取图片的散列值,将该散列值与认证图片数据库中的认证图片中嵌入的指纹信息进行对比,获取与散列值匹配的指纹信息,从该指纹信息中获取用户识别码。获取原创者的用户识别码之后,可以将侵权网络图片的信息以及被侵权事件发送给该原创者。
在步骤S211中,基于所指纹信息得到对应的摘要信息,具体来说,摘要信息由所述指纹信息进行散列处理得到,比如利用sha256s算法处理得到。将摘要信息上传至区块链可保证其安全性和对用户的公正透明性。用户设备可以从区块链中下载得该摘要信息,以便查证所述指纹信息是否被篡改。本示例所指区块链是分布式数据存储、点对点传输、共识机制、加密算法等计算机技术的新型应用模式。区块链(Blockchain),本质上是一个去中心化的数据库,是一串使用密码学方法相关联产生的数据块,每一个数据块中包含了一批次网络交易的信息,用于验证其信息的有效性(防伪)和生成下一个区块。区块链可以包括区块链底层平台、平台产品服务层以及应用服务层等。
图3为本申请第三实施例的图片版权认证装置的结构示意图。如图3所示,该装置30包括:用户识别模块31、图片信息提取模块32、第一编码模块33、第二编码模块34和认证存储模块35,其中,用户识别模块31用于基于接收的图片认证请求获取用户识别码;图片信息提取模块32用于接收用户上传的原始图片,获取所述原始图片的标识信息;第一编码模块33用于利用安全散列算法获取所述标识信息的散列值;第二编码模块34用于将所述用户识别码和所述散列值组合形成图片关键信息字符串,利用纠删码EC算法对所述图片关键信息字符串进行编码处理,得到所述原始图片的指纹信息,所述指纹信息包括指纹数据以及用于对所述指纹数据进行校验的校验数据;认证存储模块35用于将所述指纹信息嵌入至所述原始图片中,形成包括所述指纹信息的认证图片并对所述认证图片进行存储。
图4是本申请第四实施例的图片版权认证装置的结构示意图。如图4所示,该图片版权认证装置40包括处理器41及和处理器41耦接的存储器42。
存储器42存储有用于实现上述任一实施例的图片版权认证方法的程序指令。
处理器41用于执行存储器42存储的程序指令以进行图片版权认证。
其中,处理器41还可以称为CPU(Central Processing Unit,中央处理单元)。处理器41可能是一种集成电路芯片,具有信号的处理能力。处理器41还可以是通用处理器、数字信号处理器(DSP)、专用集成电路(ASIC)、现场可编程门阵列(FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
参阅图5,图5为本申请第五实施例的存储介质的结构示意图。本申请实施例的存储介质存储有能够实现上述所有图片版权认证方法的程序指令51,所述存储介质可以是非易失性,也可以是易失性。其中,该程序指令51可以以软件产品的形式存储在上述存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)或处理器(processor)执行本申请各个实施方式所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-OnlyMemory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质,或者是计算机、服务器、手机、平板等终端设备。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。以上仅为本申请的实施方式,并非因此限制本申请的专利范围,凡是利用本申请说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本申请的专利保护范围。
以上所述的仅是本申请的实施方式,在此应当指出,对于本领域的普通技术人员来说,在不脱离本申请创造构思的前提下,还可以做出改进,但这些均属于本申请的保护范围。

Claims (20)

1、一种图片版权认证方法,其中,包括:
基于接收的图片认证请求获取用户识别码;
接收用户上传的原始图片,获取所述原始图片的标识信息;
利用安全散列算法获取所述标识信息的散列值;
将所述用户识别码和所述散列值组合形成图片关键信息字符串,利用纠删码EC算法对所述图片关键信息字符串进行编码处理,得到所述原始图片的指纹信息,所述指纹信息包括指纹数据以及用于对所述指纹数据进行校验的校验数据;
将所述指纹信息嵌入至所述原始图片中,形成包括所述指纹信息的认证图片并对所述认证图片进行存储。
2、根据权利要求1所述的图片版权认证方法,其中,所述接收用户上传的原始图片,获取所述原始图片的标识信息,包括:
接收用户上传的原始图片;
提取所述原始图片的图片信息,所述图片信息包括图片大小、分辨率、拍摄时间、拍摄地点、快门速度、光圈大小、曝光度和白平衡中的一种或多种;
对所述原始图片进行处理以获取所述原始图片的图片摘要;
将所述图片摘要和所述图片信息存储至所述原始图片的标识信息中。
3、根据权利要求2所述的图片版权认证方法,其中,所述对所述原始图片进行处理以获取所述原始图片的图片摘要,包括:
缩小所述原始图片的尺寸,将缩小后的所述原始图片转化为对应灰度图片;
对所述灰度图片进行离散余弦变换,得到第一DCT矩阵;
对所述第一DCT矩阵进行缩小处理,得到第二DCT矩阵;
计算所述第二DCT矩阵的均值,并根据所述均值确定所述原始图片的图片摘要。
4、根据权利要求1所述的图片版权认证方法,其中,所述利用纠删码EC算法对所述图片关键信息字符串进行编码处理,得到所述原始图片的指纹信息,包括:
将所述图片关键信息字符串拆分为第一预设数量的数据块;
利用纠删码EC算法对所述第一预设数量的数据块进行编码,生成第二预设数量的校验块;
所述第一预设数量的数据块形成所述指纹数据,所述第二预设数量的校验块形成校验数据。
5、根据权利要求1所述的图片版权认证方法,其中,所述将所述指纹信息嵌入至所述原始图片中,形成包括所述指纹信息的认证图片并对所述认证图片进行存储,包括:
从所述原始图片的所有像素点中抽取预设第三数量的像素点,所述预设第三数量与所述指纹信息包含的字符数量相同;
将所述指纹信息的字符分别替换抽取的像素点,以将所述指纹信息嵌入至所述原始图片中得到认证图片;
对所述认证图片进行存储,并记录所述认证图片的存储时间。
6、根据权利要求1所述的图片版权认证方法,其中,所述基于接收的图片认证请求获取用户识别码,包括:
接收当前用户发送的图片认证请求,基于所述图片认证请求中携带的用户信息判断所述当前用户是否拥有用户识别码,得到第一判断结果;
当第一判断结果为是时,获取所述用户识别码;
当第一判断结果为否时,为所述当前用户创建用户识别码。
7、根据权利要求6所述的图片版权认证方法,其中,所述将所述指纹信息嵌入至所述原始图片中,形成包括所述指纹信息的认证图片并对所述认证图片进行存储之前,还包括:
根据所述原始图片的指纹信息判断所述原始图片是否存储于所述认证图片数据库中,得到第二判断结果;
当第二判断结果为否时,将所述指纹信息嵌入至所述原始图片中;
当第二判断结果为是时,拒绝当前用户的图片认证请求。
8、根据权利要求1所述的图片版权认证方法,其中,所述将所述指纹信息嵌入至所述原始图片中,形成包括所述指纹信息的认证图片并对所述认证图片进行存储之后,还包括:
采用图片爬虫工具从网络中爬取和下载网络图片;
当从所述网络图片中获取到嵌入的指纹信息时,根据所述指纹信息生成对应的所述图片关键信息字符串;
根据所述图片关键信息字符串获取指向原创者的所述用户识别码;
或,所述将所述指纹信息嵌入至所述原始图片中,形成包括所述指纹信息的认证图片并对所述认证图片进行存储之后,还包括:
采用图片爬虫工具从网络中爬取和下载网络图片;
当无法从所述网络图片中获取到嵌入的指纹信息时,获取所述网络图片的标识信息;
利用安全散列算法获取所述标识信息的散列值;
根据所述网络图片的散列值判断所述网络图片是否存储于所述认证图片数据库中,得到第三判断结果;
当第三判断结果为是时,根据存储于所述认证图片数据库中的对应认证图片中嵌入的指纹信息获取指向原创者的所述用户识别码;
或,所述图片版权认证方法,还包括:
将所述指纹信息上传至区块链中,以使得所述区块链对所述指纹信息进行加密存储。
9、一种图片版权认证装置,其中,包括:
用户识别模块,用于基于接收的图片认证请求获取用户识别码;
图片信息提取模块,用于接收用户上传的原始图片,获取所述原始图片的标识信息;
第一编码模块,用于利用安全散列算法获取所述标识信息的散列值;
第二编码模块,用于将所述用户识别码和所述散列值组合形成图片关键信息字符串,利用纠删码EC算法对所述图片关键信息字符串进行编码处理,得到所述原始图片的指纹信息,所述指纹信息包括指纹数据以及用于对所述指纹数据进行校验的校验数据;
认证存储模块,用于将所述指纹信息嵌入至所述原始图片中,形成包括所述指纹信息的认证图片并对所述认证图片进行存储。
10、一种图片版权认证装置,其中,所述装置包括处理器、以及与所述处理器耦接的存储器,所述存储器存储有可被所述处理器执行的程序指令;所述处理器执行所述存储器存储的所述程序指令时实现以下步骤:
基于接收的图片认证请求获取用户识别码;
接收用户上传的原始图片,获取所述原始图片的标识信息;
利用安全散列算法获取所述标识信息的散列值;
将所述用户识别码和所述散列值组合形成图片关键信息字符串,利用纠删码EC算法对所述图片关键信息字符串进行编码处理,得到所述原始图片的指纹信息,所述指纹信息包括指纹数据以及用于对所述指纹数据进行校验的校验数据;
将所述指纹信息嵌入至所述原始图片中,形成包括所述指纹信息的认证图片并对所述认证图片进行存储。
11、根据权利要求10所述的图片版权认证装置,其中,所述接收用户上传的原始图片,获取所述原始图片的标识信息,包括:
接收用户上传的原始图片;
提取所述原始图片的图片信息,所述图片信息包括图片大小、分辨率、拍摄时间、拍摄地点、快门速度、光圈大小、曝光度和白平衡中的一种或多种;
对所述原始图片进行处理以获取所述原始图片的图片摘要;
将所述图片摘要和所述图片信息存储至所述原始图片的标识信息中。
12、根据权利要求11所述的图片版权认证装置,其中,所述对所述原始图片进行处理以获取所述原始图片的图片摘要,包括:
缩小所述原始图片的尺寸,将缩小后的所述原始图片转化为对应灰度图片;
对所述灰度图片进行离散余弦变换,得到第一DCT矩阵;
对所述第一DCT矩阵进行缩小处理,得到第二DCT矩阵;
计算所述第二DCT矩阵的均值,并根据所述均值确定所述原始图片的图片摘要。
13、根据权利要求10所述的图片版权认证装置,其中,所述利用纠删码EC算法对所述图片关键信息字符串进行编码处理,得到所述原始图片的指纹信息,包括:
将所述图片关键信息字符串拆分为第一预设数量的数据块;
利用纠删码EC算法对所述第一预设数量的数据块进行编码,生成第二预设数量的校验块;
所述第一预设数量的数据块形成所述指纹数据,所述第二预设数量的校验块形成校验数据。
14、根据权利要求10所述的图片版权认证装置,其中,所述将所述指纹信息嵌入至所述原始图片中,形成包括所述指纹信息的认证图片并对所述认证图片进行存储,包括:
从所述原始图片的所有像素点中抽取预设第三数量的像素点,所述预设第三数量与所述指纹信息包含的字符数量相同;
将所述指纹信息的字符分别替换抽取的像素点,以将所述指纹信息嵌入至所述原始图片中得到认证图片;
对所述认证图片进行存储,并记录所述认证图片的存储时间。
15、根据权利要求10所述的图片版权认证装置,其中,所述基于接收的图片认证请求获取用户识别码,包括:
接收当前用户发送的图片认证请求,基于所述图片认证请求中携带的用户信息判断所述当前用户是否拥有用户识别码,得到第一判断结果;
当第一判断结果为是时,获取所述用户识别码;
当第一判断结果为否时,为所述当前用户创建用户识别码。
16、根据权利要求15所述的图片版权认证装置,其中,所述将所述指纹信息嵌入至所述原始图片中,形成包括所述指纹信息的认证图片并对所述认证图片进行存储之前,还包括:
根据所述原始图片的指纹信息判断所述原始图片是否存储于所述认证图片数据库中,得到第二判断结果;
当第二判断结果为否时,将所述指纹信息嵌入至所述原始图片中;
当第二判断结果为是时,拒绝当前用户的图片认证请求。
17、根据权利要求10所述的图片版权认证装置,其中,所述将所述指纹信息嵌入至所述原始图片中,形成包括所述指纹信息的认证图片并对所述认证图片进行存储之后,还包括:
采用图片爬虫工具从网络中爬取和下载网络图片;
当从所述网络图片中获取到嵌入的指纹信息时,根据所述指纹信息生成对应的所述图片关键信息字符串;
根据所述图片关键信息字符串获取指向原创者的所述用户识别码;
或,所述将所述指纹信息嵌入至所述原始图片中,形成包括所述指纹信息的认证图片并对所述认证图片进行存储之后,还包括:
采用图片爬虫工具从网络中爬取和下载网络图片;
当无法从所述网络图片中获取到嵌入的指纹信息时,获取所述网络图片的标识信息;
利用安全散列算法获取所述标识信息的散列值;
根据所述网络图片的散列值判断所述网络图片是否存储于所述认证图片数据库中,得到第三判断结果;
当第三判断结果为是时,根据存储于所述认证图片数据库中的对应认证图片中嵌入的指纹信息获取指向原创者的所述用户识别码;
或,所述图片版权认证方法,还包括:
将所述指纹信息上传至区块链中,以使得所述区块链对所述指纹信息进行加密存储。
18、一种存储介质,其中,所述存储介质内存储有程序指令,所述程序指令被处理器执行时实现以下步骤:
基于接收的图片认证请求获取用户识别码;
接收用户上传的原始图片,获取所述原始图片的标识信息;
利用安全散列算法获取所述标识信息的散列值;
将所述用户识别码和所述散列值组合形成图片关键信息字符串,利用纠删码EC算法对所述图片关键信息字符串进行编码处理,得到所述原始图片的指纹信息,所述指纹信息包括指纹数据以及用于对所述指纹数据进行校验的校验数据;
将所述指纹信息嵌入至所述原始图片中,形成包括所述指纹信息的认证图片并对所述认证图片进行存储。
19、根据权利要求18所述的存储介质,其中,所述接收用户上传的原始图片,获取所述原始图片的标识信息,包括:
接收用户上传的原始图片;
提取所述原始图片的图片信息,所述图片信息包括图片大小、分辨率、拍摄时间、拍摄地点、快门速度、光圈大小、曝光度和白平衡中的一种或多种;
对所述原始图片进行处理以获取所述原始图片的图片摘要;
将所述图片摘要和所述图片信息存储至所述原始图片的标识信息中。
20、根据权利要求18所述的存储介质,其中,所述利用纠删码EC算法对所述图片关键信息字符串进行编码处理,得到所述原始图片的指纹信息,包括:
将所述图片关键信息字符串拆分为第一预设数量的数据块;
利用纠删码EC算法对所述第一预设数量的数据块进行编码,生成第二预设数量的校验块;
所述第一预设数量的数据块形成所述指纹数据,所述第二预设数量的校验块形成校验数据。
 
PCT/CN2020/118500 2020-07-28 2020-09-28 图片版权认证方法、装置及存储介质 WO2021120781A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010737237.3A CN111881425A (zh) 2020-07-28 2020-07-28 图片版权认证方法、装置及存储介质
CN202010737237.3 2020-07-28

Publications (1)

Publication Number Publication Date
WO2021120781A1 true WO2021120781A1 (zh) 2021-06-24

Family

ID=73200382

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/118500 WO2021120781A1 (zh) 2020-07-28 2020-09-28 图片版权认证方法、装置及存储介质

Country Status (2)

Country Link
CN (1) CN111881425A (zh)
WO (1) WO2021120781A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113255008B (zh) * 2021-07-01 2021-10-22 支付宝(杭州)信息技术有限公司 一种输出多媒体文件的方法及系统
CN113722680B (zh) * 2021-08-27 2023-07-25 苏州浪潮智能科技有限公司 一种图片版权保护方法、装置、设备及可读存储介质

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180068091A1 (en) * 2016-09-06 2018-03-08 Intel Corporation Blockchain-Based Shadow Images to Facilitate Copyright Protection of Digital Content
CN109376504A (zh) * 2018-09-26 2019-02-22 福州大学 一种基于区块链技术的图片隐私保护方法
CN109409030A (zh) * 2018-10-19 2019-03-01 微梦创科网络科技(中国)有限公司 一种数字版权生成方法及装置
WO2019141294A2 (en) * 2019-05-20 2019-07-25 Alibaba Group Holding Limited Identifying copyrighted material using copyright information embedded in tables
CN110533572A (zh) * 2019-08-29 2019-12-03 哈尔滨工业大学(深圳) 一种水印嵌入方法、系统及相关装置
CN110580405A (zh) * 2019-08-16 2019-12-17 湖北工业大学 一种基于社交网络的图片版权保护系统及方法
CN110869927A (zh) * 2019-05-20 2020-03-06 阿里巴巴集团控股有限公司 基于隐藏式版权信息的版权保护

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102279909A (zh) * 2010-06-08 2011-12-14 阿里巴巴集团控股有限公司 一种鉴定图片的归属权的方法及装置
JP5837795B2 (ja) * 2011-10-21 2015-12-24 株式会社コナミデジタルエンタテインメント 管理装置
CN103177111B (zh) * 2013-03-29 2016-02-24 西安理工大学 重复数据删除系统及其删除方法
CN106709963B (zh) * 2016-12-28 2018-01-02 平安科技(深圳)有限公司 验证图像真伪的方法和装置
CN109727134B (zh) * 2018-12-29 2024-04-05 三六零科技集团有限公司 一种图片的版权交易方法及装置
CN109740317A (zh) * 2018-12-29 2019-05-10 北京奇虎科技有限公司 一种基于区块链的数字指纹存证方法及装置

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180068091A1 (en) * 2016-09-06 2018-03-08 Intel Corporation Blockchain-Based Shadow Images to Facilitate Copyright Protection of Digital Content
CN109376504A (zh) * 2018-09-26 2019-02-22 福州大学 一种基于区块链技术的图片隐私保护方法
CN109409030A (zh) * 2018-10-19 2019-03-01 微梦创科网络科技(中国)有限公司 一种数字版权生成方法及装置
WO2019141294A2 (en) * 2019-05-20 2019-07-25 Alibaba Group Holding Limited Identifying copyrighted material using copyright information embedded in tables
CN110869927A (zh) * 2019-05-20 2020-03-06 阿里巴巴集团控股有限公司 基于隐藏式版权信息的版权保护
CN110580405A (zh) * 2019-08-16 2019-12-17 湖北工业大学 一种基于社交网络的图片版权保护系统及方法
CN110533572A (zh) * 2019-08-29 2019-12-03 哈尔滨工业大学(深圳) 一种水印嵌入方法、系统及相关装置

Also Published As

Publication number Publication date
CN111881425A (zh) 2020-11-03

Similar Documents

Publication Publication Date Title
CN111213139B (zh) 基于区块链的无纸化文档处理
CN111226249B (zh) 基于区块链的可信平台
CN111108522B (zh) 基于区块链的传票送达
US11056023B2 (en) Copyright protection based on hidden copyright information
US11080671B2 (en) Identifying copyrighted material using embedded copyright information
EP3673392B1 (en) Copyright protection based on hidden copyright information
JP4625841B2 (ja) デジタルコンテンツセキュリティのためのシステムおよび方法
US11062000B2 (en) Identifying copyrighted material using embedded copyright information
US11017061B2 (en) Identifying copyrighted material using copyright information embedded in electronic files
EP3662637B1 (en) Identifying copyrighted material using embedded copyright information
US20190332810A1 (en) Method and server for authenticating and verifying file
JP2003309559A (ja) 透かしを使用してデータ・セットの配布と認証を行う装置および方法
US11216898B2 (en) Identifying copyrighted material using copyright information embedded in tables
WO2021120781A1 (zh) 图片版权认证方法、装置及存储介质
Lin et al. A copyright protection scheme based on PDF
WO2019041769A1 (zh) 图片处理方法及应用服务器
JP3770732B2 (ja) 画像への情報添付方法および画像からの情報抽出方法
CN113784011A (zh) 公文流程印章图片的防伪方法
Nyeem et al. Modelling attacks on self-authentication watermarking
US20240195626A1 (en) Methods and systems for generating limited access non-fungible tokens
CN118172051A (zh) 基于区块链的传票送达

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20902781

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20902781

Country of ref document: EP

Kind code of ref document: A1