WO2021169530A1 - 一种图像数据的真实性验证方法、装置及设备 - Google Patents

一种图像数据的真实性验证方法、装置及设备 Download PDF

Info

Publication number
WO2021169530A1
WO2021169530A1 PCT/CN2020/138023 CN2020138023W WO2021169530A1 WO 2021169530 A1 WO2021169530 A1 WO 2021169530A1 CN 2020138023 W CN2020138023 W CN 2020138023W WO 2021169530 A1 WO2021169530 A1 WO 2021169530A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
image data
image
light
generating device
Prior art date
Application number
PCT/CN2020/138023
Other languages
English (en)
French (fr)
Inventor
韩喆
Original Assignee
支付宝(杭州)信息技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 支付宝(杭州)信息技术有限公司 filed Critical 支付宝(杭州)信息技术有限公司
Publication of WO2021169530A1 publication Critical patent/WO2021169530A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2201/00General purpose image data processing
    • G06T2201/005Image watermarking
    • G06T2201/0201Image watermarking whereby only tamper or origin are detected and no embedding takes place

Definitions

  • This application relates to the field of computer applications, and in particular to a method, device and equipment for authenticating image data.
  • image data providers In order to achieve illegal purposes, image data providers usually falsify the image data they provide, with the intent to deceive the image data user, so that the data user can get wrong conclusions based on the above-mentioned falsified image data.
  • This application proposes a method for verifying the authenticity of image data, including: in response to an image acquisition instruction, collecting a light signal from an image acquisition environment; wherein the light signal includes the light generated by a light generating device deployed in the image acquisition environment.
  • Light signal the light signal emitted by the light generating device carries environmental information corresponding to the image collection environment; based on the collected light signal, the image data corresponding to the image collection environment is generated, so that the user of the image data can change from the above
  • the image data parses the light signal emitted by the light generating device, and matches the environmental information carried by the light signal with the information provided by the data provider of the image data to complete the authenticity verification.
  • This application proposes a method for authenticity verification of image data, including: analyzing the collected image data to obtain a light signal; wherein the light signal includes environmental information corresponding to the image collection environment; and the environmental information carried by the light signal Match with the information provided by the data provider of the above image data to complete the authenticity verification.
  • the present application proposes an image data authenticity verification device, including: a collection module, which collects light signals from an image collection environment in response to an image collection instruction; wherein, the above-mentioned light signals include light generating equipment deployed in the above-mentioned image collection environment
  • the light signal emitted by the light generating device carries environmental information corresponding to the image collection environment;
  • the generation module generates image data corresponding to the image collection environment based on the collected light signal, so that the image
  • the user of the data analyzes the light signal emitted by the light generating device from the image data, and matches the environmental information carried by the light signal with the information provided by the data provider of the image data to complete authenticity verification.
  • the present application proposes an image data authenticity verification device, which includes: an analysis module, which analyzes the collected image data to obtain an optical signal; wherein the optical signal includes environmental information corresponding to the image acquisition environment; and a matching module combines the foregoing The environmental information carried by the optical signal is matched with the information provided by the data provider of the above-mentioned image data to complete the authenticity verification.
  • the above-mentioned light signals can be collected at the same time, so that the environmental information corresponding to the above-mentioned image collection environment can be stored in the image data, so that when the authenticity of the image data is verified, it can be By analyzing the environmental information corresponding to the image acquisition environment, and matching the above environmental information with the information provided by the data provider, the authenticity verification of the image data is completed. Therefore, on the one hand, it can be determined that the image data has started since the acquisition process. It has not been tampered with at the current moment and has authenticity; on the other hand, it can be determined that the above-mentioned image data is collected in a real data collection environment.
  • FIG. 1 is a method flowchart of a method for authenticating image data shown in this application
  • FIG. 2 is a method flowchart of a method for authenticating image data shown in this application
  • FIG. 3 is a diagram of a collection scene of image data shown in this application.
  • Figure 4 is a flow chart of the financing party using warehouse receipts to raise funds from investors as shown in the application;
  • FIG. 5 is a structural diagram of a device for authenticating image data shown in this application.
  • Fig. 6 is a structural diagram of a device for authenticating image data shown in this application.
  • FIG. 7 is a hardware structure diagram of an image data authenticity verification device shown in this application.
  • FIG. 8 is a hardware structure diagram of an image data authenticity verification device shown in this application.
  • the image data provider usually falsifies the image data with the intention of deceiving the image data user, so that the data user can get wrong conclusions based on the above-mentioned falsified image data.
  • the financier may provide the investor (data user) with falsified image data for illegal financing, so that the investor may use the aforementioned falsified image
  • the data draws the conclusion that the goods listed in the warehouse receipts actually exist, and provide funds to the financing party.
  • the aforementioned warehouse receipt refers to the certificate issued by the custodian for the withdrawal of the aforementioned warehousing goods after receiving the warehousing goods.
  • the warehouse receipt usually lists the storage items, the storage location of the aforementioned storage items, and the time period during which the aforementioned storage items are stored in the aforementioned storage location, and other information.
  • the financier needs to prove to the investor that the goods listed in the warehouse receipts actually exist.
  • the financing party When proving the actual existence of the goods listed in the above-mentioned warehouse receipt, the financing party will usually prove that the storage goods listed in the above-mentioned warehouse receipt are actually stored in the above-mentioned warehouse receipt within the time period listed in the above-mentioned warehouse receipt.
  • the image data of the clear storage location (for example, the image and video of the storage site) is provided to the above-mentioned investor.
  • the investor can compare the storage location and storage items shown in the above-mentioned image data, as well as the time period during which the above-mentioned storage items are stored in the above-mentioned storage location, in accordance with the above-mentioned items listed on the warehouse receipt provided by the financing party. Information is compared; if the above comparison results are consistent, it can be concluded that the goods listed in the above warehouse receipts actually exist, and funds are provided to the financing party; if the above comparison results are inconsistent, it can be concluded that the above warehouse receipts are listed Concluded that the goods may not exist, and refused to provide funds to the financing party.
  • the data provider in order to verify the authenticity of the image data, can usually add a digital watermark to the image data; and notify the data user of the content of the digital watermark.
  • the data user receives the image data with the above digital watermark, it can parse out the digital watermark carried by the image data, and compare the parsed digital watermark with the digital watermark provided by the data provider. If the two are consistent, then It is determined that the above-mentioned image data has not been tampered with, and the authenticity of the above-mentioned image data is confirmed.
  • the data provider can add a digital watermark (for example, a digital signature) to the original image data through a specific algorithm (for example, a spatial algorithm or a frequency domain algorithm) to obtain the image data to be verified.
  • a digital watermark for example, a digital signature
  • a specific algorithm for example, a spatial algorithm or a frequency domain algorithm
  • the data user can parse the image data to be verified to obtain the digital watermark information it carries, and compare the obtained digital watermark with the digital watermark provided by the data provider; if both If they are consistent, it can be determined that the above-mentioned image data has not been tampered with and is authentic.
  • the digital watermark is added after the image data is collected. Therefore, using the above method can only prove that the image data obtained after adding the digital watermark has not been tampered with and is authentic, and cannot be proved. Whether the image data before adding the digital watermark has been tampered with, and it is also impossible to prove whether the image data is collected in a real data collection environment.
  • the data provider adds a digital watermark to the image data collected in a false collection environment and provides it to the data user for verification
  • the data user can only confirm that the digital watermarked image data is It has not been tampered with, but it cannot be recognized that the above-mentioned image data was collected in a false collection environment.
  • this application proposes a method for authenticity verification of image data, which is applied to image data providers.
  • the light signal can be collected from the image acquisition environment in response to the image acquisition instruction; wherein the light signal includes the light signal emitted by the light generating device deployed in the image acquisition environment; the light emitted by the light generating device
  • the signal carries environmental information corresponding to the above-mentioned image collection environment; based on the collected light signal, image data corresponding to the above-mentioned image collection environment is generated, so that the user of the above-mentioned image data can analyze from the above-mentioned image data that the light-generating device emits And match the environmental information carried by the above-mentioned optical signal with the information provided by the data provider of the above-mentioned image data to complete the authenticity verification.
  • This application also proposes a method for authenticity verification of image data, which is applied to the user of the image data.
  • This method enables the data user to parse out the environmental information corresponding to the image collection environment when verifying the authenticity of the above-mentioned image data, and match the above-mentioned environmental information with the information provided by the data provider to complete the image data
  • Authenticity verification determines whether the above-mentioned image data has been tampered with from the start of the collection process to the current moment, and whether it has authenticity; on the other hand, it determines whether the above-mentioned image data is collected in a real data collection environment.
  • the collected image data is analyzed to obtain an optical signal; wherein the optical signal includes environmental information corresponding to the image acquisition environment; the environmental information carried by the optical signal is compared with the information provided by the data provider of the image data. Match to complete the authenticity verification.
  • the optical signal includes environmental information corresponding to the image acquisition environment; the environmental information carried by the optical signal is compared with the information provided by the data provider of the image data. Match to complete the authenticity verification.
  • FIG. 1 is a flowchart of a method for authenticating image data shown in this application. As shown in Figure 1, the method can be applied to a data collection device, including steps S101 to S102.
  • S101 In response to an image acquisition instruction, collect a light signal from an image acquisition environment; wherein the light signal includes a light signal emitted by a light generating device deployed in the image acquisition environment; the light signal emitted by the light generating device carries Environmental information corresponding to the aforementioned image collection environment;
  • S102 Generate image data corresponding to the image collection environment based on the collected light signal, so that the user of the image data can analyze the light signal emitted by the light generating device from the image data, and carry the light signal
  • the environmental information of the image data is matched with the information provided by the data provider of the above-mentioned image data to complete the authenticity verification.
  • the aforementioned image data may refer to video data or pictures collected by a data provider through a collection device.
  • the above-mentioned collection device may be a camera, monitoring or mobile terminal with a camera or photographing function (which can collect the above-mentioned light signal at the same time).
  • the above-mentioned environmental information corresponding to the above-mentioned image collection environment may refer to the corresponding spatial environment and time environment when the above-mentioned image data is collected; wherein, the above-mentioned spatial environment refers to the storage environment where the target involved in the above-mentioned image data is located; and the above-mentioned time The environment refers to the corresponding time stamp data when the light generating device sends the light signal when the image data is collected.
  • the above environmental information can be matched with the information provided by the data provider of the above image data to complete the authenticity verification.
  • the above-mentioned environmental information may include address information when the above-mentioned image data is collected, and time stamp data corresponding to when the above-mentioned light generating device sends a light signal when the above-mentioned image data is collected.
  • the environmental information carried by the optical signal can be matched with the information provided by the data provider of the image data; if the optical signal is If the carried environmental information corresponds to the information provided by the data provider of the image data, the authenticity of the image data can be confirmed; otherwise, it is determined that the image data is not authentic.
  • the data provider may provide the data user with the storage location of the warehoused item and the time period information for the warehoused item to be stored at the location.
  • the data user obtains the image data provided by the data provider, it can analyze the optical signal carried by the image data, and obtain from the optical signal the time carried by the optical signal sent by the above-mentioned light generating device when the image data is collected.
  • stamp information after obtaining the above-mentioned time stamp information, the data user can determine whether the time period information indicated by the above-mentioned time stamp is consistent with the time provided by the data provider; if they are consistent, determine whether the address information carried by the image data is consistent with the data The address information provided by the provider matches; if it also matches, it can be concluded that the storage items involved in the image data are indeed stored in the storage location provided by the data provider at the above-mentioned time provided by the data provider.
  • the aforementioned light generating device specifically refers to a device that can encode information into an optical signal.
  • the above-mentioned light generating device may be independently deployed in a data collection environment.
  • a light-generating device can be placed in the storage location where the target is located.
  • the light-generating device encodes information, it can use its location (in this case, the storage location where the target is located) as the address information.
  • the time stamp information when the image data is collected is encoded as time information into the optical signal emitted by the device for the collection device to collect.
  • the aforementioned light generating device can be integrated into the aforementioned collecting device as a module.
  • the collection device is a mobile phone terminal
  • the light generating device can be an infrared emission module in the mobile terminal.
  • the above infrared emission module can use its location as address information to collect the image.
  • the time stamp information carried in the optical signal sent by the light generating device is encoded as time information into the optical signal sent by the device for collection by the above-mentioned mobile phone terminal.
  • the optical signal may also be encrypted.
  • the above-mentioned light generating device may use a preset encryption algorithm to encrypt the encoded optical signal.
  • the data user can decrypt the above-mentioned optical signal through a preset decryption algorithm to obtain the information carried by the optical signal.
  • the foregoing preset encryption and decryption algorithm may refer to an algorithm that uses public and private keys to perform encryption and decryption.
  • the foregoing light generating device may be an invisible light generating device (for example, an infrared light generating device), and the device is assigned a public and private key pair in advance.
  • the above-mentioned invisible light generating device may encrypt the above-mentioned encoded invisible light through the public key in the above-mentioned public-private key pair, and then encode it into invisible light (for example, infrared light).
  • the encrypted environment information is obtained by analyzing the image data, the data user can decrypt the environment through the private key in the public-private key pair to obtain the unencrypted environment information carried in the invisible light.
  • the information can be encoded into the optical signal of a specific frequency.
  • the above-mentioned light generating device can encode the environmental information corresponding to the image data into the frequency band with the least influence of natural light, thereby minimizing the influence of natural light.
  • the light generating device is an invisible light generating device (for example, an infrared light generating device)
  • the device can emit invisible light with a frequency significantly different from that of natural light, so that the collection device can reduce the amount of invisible light as much as possible. Under the influence of natural light.
  • optical signals with specific frequencies can also increase the security of optical signal transmission.
  • the optical signal when analyzing the collected image data, if the data analysis party does not know the frequency of the above-mentioned optical signal, the optical signal cannot be analyzed from the image data, that is, the information carried by the optical signal cannot be known, thereby improving The safety of optical signal transmission.
  • the foregoing optical signal may specifically be an optical signal of any type or combination of types that carries data environment information.
  • the above-mentioned optical signal may be various types of visible light or invisible light, and so on.
  • the above-mentioned light generating device may be an infrared light generating device, and the above-mentioned device may encode environmental information into infrared light and send it out for collection by the collection device.
  • the above-mentioned invisible light may be any one or a combination of several of the following: infrared rays; ultraviolet rays; far infrared rays; radio waves; microwaves, which are not limited herein.
  • FIG. 2 is a method flowchart of a method for authenticating image data shown in this application. As shown in Figure 2, the method includes steps S201 to S202.
  • S201 Analyze the collected image data to obtain an optical signal; wherein the optical signal includes environmental information corresponding to the image acquisition environment;
  • S202 Match the environmental information carried by the optical signal with the information provided by the data provider of the image data to complete authenticity verification.
  • the authenticity of the above-mentioned image data can be specifically understood from two aspects.
  • the first aspect means that the above-mentioned image data has not been tampered with and is true and reliable; the second aspect means that the above-mentioned image data is in a real data collection environment. Collected.
  • the above-mentioned optical signal may be an invisible light signal or a visible light signal.
  • the above-mentioned optical signal is an invisible light signal as an example.
  • the above-mentioned image data can be filtered according to the preset filtering rules to obtain the invisible light part, and the obtained light can be converted into a light intensity curve; then, through spectral analysis of the above light intensity curve, And remove the noise in it to obtain the above-mentioned invisible light signal.
  • the above filtering rule may be Kalman filtering
  • the above spectrum analysis method may be wavelet transform.
  • the light data of the invisible light part of the image data can be filtered through Kalman filter, and the filtered light data can be converted into the abscissa as time and ordinate. It is the light intensity curve of light intensity; after being transformed into a light intensity curve, wavelet transform can be performed on the curve and the noise in it can be removed to obtain an invisible light signal.
  • the data user can analyze the aforementioned invisible light signal to obtain the environmental information carried by the invisible light, and then can match with the information provided by the data provider of the aforementioned image data to complete authenticity verification.
  • the above-mentioned environment information may include the address information when the above-mentioned image data is collected, and the time stamp data corresponding to the time when the above-mentioned light generating device sends the light signal when the above-mentioned image data is collected.
  • the information determines the authenticity of the above-mentioned image data if the above-mentioned environmental information is the same as the information provided by the above-mentioned image data provider, on the one hand, it can be confirmed whether the above-mentioned image data is collected in a real data collection environment; on the other hand, , It can be confirmed that the above-mentioned image data has not been tampered with from the moment it was collected to the current moment, and it is true.
  • the data provider may provide the data user with the storage location of the warehoused item and the time period information for the warehoused item to be stored at the location.
  • the data user obtains the image data provided by the data provider, it can analyze the optical signal carried by the image data, and obtain from the optical signal the time carried by the optical signal sent by the above-mentioned light generating device when the image data is collected.
  • stamp information after obtaining the above-mentioned time stamp information, the data user can determine whether the time period information indicated by the above-mentioned time stamp is consistent with the time provided by the data provider; if they are consistent, determine whether the address information carried by the image data is consistent with the data The address information provided by the provider matches; if it also matches, it can be concluded that the storage items involved in the image data are indeed stored in the storage location provided by the data provider at the above-mentioned time provided by the data provider.
  • the private key corresponding to the public key can be used in this step (usually pre-allocated to the optical signal).
  • the private key of the generating device decrypts the environmental information to obtain the corresponding unencrypted environmental information.
  • the optical signal in the image data can be analyzed, the environmental information corresponding to the above-mentioned image collection environment can be obtained, and then the environmental information carried by the above-mentioned optical signal is compared with the above-mentioned image data.
  • the information provided by the data provider is matched to complete the authenticity verification. Therefore, on the one hand, it can be determined that the above-mentioned image data has not been tampered with from the beginning of the collection process to the current moment and has authenticity; on the other hand, it can be determined that the above-mentioned image data is Collected in a real data collection environment.
  • the light generating device can be integrated into the collection device as a module.
  • the data user can determine whether the related information of the light-generating module carried in the image data is consistent with the agreed collection device.
  • the relevant information of the light generating module is the same. If the two are the same, it can be confirmed that the above-mentioned image data is collected by the agreed collection device.
  • the light-generating device when the image data is collected, the light-generating device (module) can encode the ID information of the light-generating device into the light signal for the collection device to collect;
  • the device ID information carried by the parsed optical signal can be compared with the ID information of the light generation module carried by the agreed collection device; if the two are consistent, it can be determined
  • the above-mentioned image data is collected by the agreed collection equipment.
  • the light-generating device when collecting image data, can encode the private key information of the light-generating device into the optical signal for collection Equipment collection; when verifying whether the image data is collected by the agreed collection device, the private key information carried by the parsed optical signal can be compared with the private key information of the light generation module carried by the agreed collection device; if the two are consistent, It can be determined that the above-mentioned image data is collected by an agreed collection device.
  • the time stamp information when each frame of image is collected can be recorded in the corresponding optical signal.
  • the light signal carried by the image data can be parsed, and the first frame image and the image data of the image data can be obtained from the light signal.
  • the time stamp information corresponding to the last frame of the image after obtaining the above time stamp information, it is determined whether the time period composed of the above time stamp matches the time period provided by the data provider; if they do, it is determined whether the address information carried by the image data It is consistent with the address information provided by the data provider; if it is also consistent, on the one hand, it can be confirmed whether the above image data is collected in a real data collection environment; on the other hand, it can be confirmed that the above image data is collected from the moment of collection to The current moment has not been tampered with, it is true.
  • the light signal carried by each frame of the image included in the above video data can be analyzed to obtain the time stamp data corresponding to each frame of image; then, Determine whether the time stamp data corresponding to each frame of the above image is continuous and uninterrupted; if so, determine that the individual frame of the image data has not been modified or deleted; otherwise, determine that the individual frame of the image data has been modified Or delete.
  • a vibration signal can be used for encoding.
  • a vibration motor can be deployed at the image data collection location, and a vibration signal receiving module (for example, an accelerometer) can be deployed on the collection device.
  • a vibration signal receiving module for example, an accelerometer
  • the collection can be set to correspond to the image collection environment described above.
  • the environmental information is encoded as a vibration signal according to certain coding rules, and is received by the vibration signal receiving module in the acquisition device, and then the received vibration signal is added to the image signal as a basis for authenticity verification of the image data.
  • a light intensity sensing module can also be deployed in the data collection environment.
  • the light signal encoding can be used to perform the environmental information. Encoding; if the light intensity sensing module determines that the light intensity of the current ambient light is greater than or equal to the above-mentioned preset threshold, the environment information can be encoded in the manner of vibration signal encoding.
  • FIG. 3 is an image data collection scene diagram shown in this application.
  • a storage object target object
  • at least one infrared light generating device and a video data collection device are deployed in the storage environment.
  • the aforementioned storage items are the target items listed on the warehouse receipt provided by the financing party; the aforementioned storage environment is the storage location listed on the aforementioned warehouse receipt.
  • the above infrared light generating device can obtain time stamp information in real time when it is turned on, and encode the obtained time stamp information and the storage location information of the storage environment into the infrared light emitted by itself, and the above infrared light generating device also You can use pre-distributed public and private keys to encrypt the emitted infrared light signals.
  • the aforementioned collection device can collect video data and the infrared light signal emitted by the aforementioned infrared light generating device at the same time, and can also integrate the aforementioned infrared light signal into the aforementioned video data.
  • Fig. 4 is a flowchart of the financing party using warehouse receipts to raise funds from the investor as shown in the application.
  • the financing party shown in Figure 4 usually the owner of the warehouse receipt, can provide the investor with the warehouse receipt to obtain funds; the investor shown in Figure 4, usually a financial lending institution, can be based on the warehouse receipt provided by the financing party Unilateral release of funds to financing parties.
  • the indicated financier When the indicated financier needs to make financing from the above-mentioned investor, it can first initiate a financing request and provide the warehouse receipt to the above-mentioned investor. When the investor receives the above financing request, it can require the financing party to provide a certification document that can prove the authenticity of the warehouse receipt information (not shown in Figure 4). After receiving the request to provide supporting documents, the financier can provide the investor with video data indicating that the storage items listed in the warehouse receipt are actually stored in the storage location listed in the warehouse receipt.
  • the financing party can use the collecting device shown in FIG. 3 (for example, on-site monitoring equipment or mobile phone terminal, etc.) to perform video recording of the above-mentioned storage items and infrared light signals in the storage environment.
  • the financing party can provide the video to the investor.
  • the financing party can upload the above video data to the blockchain.
  • the video data can be obtained from the above-mentioned blockchain, so as to ensure that the above-mentioned video data is not tampered with and ensure its safety and reliability.
  • the video data can be analyzed and the infrared light signal carried in the video data can be obtained.
  • the investor can decrypt it with the private key corresponding to the above-mentioned invisible light device to obtain the address information and time information carried by the above-mentioned infrared light signal.
  • the above-mentioned information can be compared with the relevant information listed in the warehouse receipt. If they are consistent, the investor can conclude that the above-mentioned warehouse receipt information is true and issue funds to the above-mentioned financing party. .
  • the financing party since the above-mentioned infrared light signal has been encoded with the storage location information of the current storage environment and the time stamp information when the video was recorded, if the financing party falsifies the video by tampering with the video or creating a false storage environment, the video data provided by the financing party is Will not carry the information consistent with the information listed in the warehouse receipt, therefore, the financing party will not be able to falsify.
  • FIG. 5 is a structural diagram of the device for authenticating image data shown in this application.
  • the above-mentioned device 500 includes: an acquisition module 510 and a generation module 520.
  • the collection module 510 collects light signals from the image collection environment in response to the image collection instructions; wherein the light signals include light signals emitted by light generating devices deployed in the image collection environment; light emitted by the light generating devices The signal carries environmental information corresponding to the aforementioned image collection environment;
  • the generating module 520 generates image data corresponding to the image capturing environment based on the collected light signal, so that the user of the image data can analyze the light signal emitted by the light generating device from the image data, and combine the light
  • the environmental information carried by the signal is matched with the information provided by the data provider of the above-mentioned image data to complete the authenticity verification.
  • the above-mentioned apparatus 500 further includes: a parsing module, which analyzes the optical signal emitted by the above-mentioned light generating device from the generated image data; and a matching module, which compares the environmental information carried by the above-mentioned optical signal with the above-mentioned image The information provided by the data provider is matched to complete the authenticity verification.
  • a parsing module which analyzes the optical signal emitted by the above-mentioned light generating device from the generated image data
  • a matching module which compares the environmental information carried by the above-mentioned optical signal with the above-mentioned image The information provided by the data provider is matched to complete the authenticity verification.
  • the light generating device includes light generating hardware built in the image capturing device; or, it is deployed in the image capturing environment and used in conjunction with the image capturing device.
  • the above-mentioned light signal is an invisible light signal; the above-mentioned light generating device is an invisible light generating device.
  • the above-mentioned environment information corresponding to the above-mentioned image collection environment includes address information corresponding to the above-mentioned image collection environment;
  • the foregoing matching of the environmental information carried by the foregoing optical signal with the information provided by the data provider of the foregoing image data to complete the authenticity verification includes:
  • the above-mentioned optical signal also carries time stamp data corresponding to the time when the above-mentioned light-generating device sends the above-mentioned optical signal;
  • Information matching to complete authenticity verification also includes: analyzing the invisible light signal to obtain the time stamp data; determining whether the time period indicated by the time stamp data is the same as the time period provided by the data provider of the image data; if so , It is determined that the above-mentioned on-site data is real data.
  • the light-generating device previously encrypts the environmental information carried by the emitted light signal based on the public key corresponding to the private key held by the device; the above-mentioned parsing the invisible light signal, It includes: decrypting the environmental information carried by the invisible light signal through the private key held by the invisible light generating device, and restoring the environmental information.
  • the above-mentioned invisible light includes any one or a combination of several of the following: infrared rays; ultraviolet rays; far infrared rays; radio waves; microwaves.
  • the above-mentioned image data includes: video data or picture data.
  • the above-mentioned apparatus 500 further includes: determining whether the light intensity of the above-mentioned data collection environment is lower than a preset intensity threshold; if so, instructing the above-mentioned invisible light generating device to emit the above-mentioned invisible light signal.
  • the above-mentioned image data is video data; the above-mentioned device 500 further includes: analyzing the light signal carried by each frame of image included in the above-mentioned video data to obtain the time stamp data corresponding to each frame of image; Whether the time stamp data corresponding to the image is continuous and uninterrupted; if so, it is determined that the individual frame image of the image data has not been modified or deleted; otherwise, it is determined that the individual frame image of the image data has been modified or deleted.
  • FIG. 6 is a structural diagram of an image data authenticity verification device shown in this application.
  • the above-mentioned device 600 includes a parsing module 610 and a matching module 620.
  • the analysis module 610 analyzes the collected image data to obtain an optical signal; wherein the optical signal includes environmental information corresponding to the image acquisition environment.
  • the matching module 620 matches the environmental information carried by the above-mentioned optical signal with the information provided by the data provider of the above-mentioned image data to complete authenticity verification.
  • the above-mentioned device 600 further includes: a collection module, which simultaneously collects the optical signals emitted by the light-generating equipment deployed in the data collection environment corresponding to the above-mentioned image data when collecting image data; wherein, the above-mentioned optical signals Including environmental information corresponding to the above-mentioned image capture environment.
  • the light generating device includes light generating hardware built in the image capturing device; or, it is deployed in the image capturing environment and used in conjunction with the image capturing device.
  • the above-mentioned light signal is an invisible light signal; the above-mentioned light generating device is an invisible light generating device.
  • the above-mentioned environment information corresponding to the above-mentioned image collection environment includes address information corresponding to the above-mentioned image collection environment;
  • Information matching to complete authenticity verification includes: parsing the above-mentioned invisible light signal to obtain the address information when the above-mentioned image data is collected; determining whether the above-mentioned address information is the same as the address information provided by the data provider of the above-mentioned image data; if so, It is determined that the above-mentioned on-site data is real data.
  • the above-mentioned optical signal also carries time stamp data corresponding to the time when the above-mentioned light-generating device sends the above-mentioned optical signal;
  • Information matching to complete authenticity verification also includes: analyzing the invisible light signal to obtain the time stamp data; determining whether the time period indicated by the time stamp data is the same as the time period provided by the data provider of the image data; if so , It is determined that the above-mentioned on-site data is real data.
  • the light-generating device previously encrypts the environmental information carried by the emitted light signal based on the public key corresponding to the private key held by the device; the above-mentioned parsing the invisible light signal, It includes: decrypting the environmental information carried by the invisible light signal through the private key held by the invisible light generating device, and restoring the environmental information.
  • the above-mentioned invisible light includes any one or a combination of several of the following: infrared rays; ultraviolet rays; far infrared rays; radio waves; microwaves.
  • the above-mentioned image data includes: video data or picture data.
  • the above-mentioned apparatus 600 further includes: determining whether the light intensity of the above-mentioned data collection environment is lower than a preset intensity threshold; if so, instructing the above-mentioned invisible light generating device to emit the above-mentioned invisible light signal.
  • the above-mentioned image data is video data; the above-mentioned device 600 further includes: analyzing the light signal carried by each frame of the image included in the above-mentioned video data to obtain the time stamp data corresponding to each frame of image; Whether the time stamp data corresponding to the image is continuous and uninterrupted; if so, it is determined that the individual frame image of the image data has not been modified or deleted; otherwise, it is determined that the individual frame image of the image data has been modified or deleted.
  • the embodiment of the image data acquisition device shown in this application can be applied to the authenticity verification device of the image data.
  • the device embodiments can be implemented by software, or can be implemented by hardware or a combination of software and hardware. Taking software implementation as an example, as a logical device, it is formed by reading the corresponding computer program instructions in the non-volatile memory into the memory through the processor of the electronic device where it is located. From a hardware perspective, as shown in FIG. 7, the hardware structure diagram of an image data authenticity verification device shown in this application, except for the processor, memory, network interface, and non-volatile memory shown in FIG. In addition to the sexual memory, the electronic device in which the device is located in the embodiment may also include other hardware according to the actual function of the electronic device, which will not be repeated here.
  • the device includes: a processor; a memory for storing executable instructions of the processor; wherein the processor executes the executable instructions to implement any of the foregoing.
  • the method of an embodiment includes: a processor; a memory for storing executable instructions of the processor; wherein the processor executes the executable instructions to implement any of the foregoing.
  • the embodiment of the device for authenticity verification of image data shown in this application can be applied to a device for authenticity verification of image data.
  • the device embodiments can be implemented by software, or can be implemented by hardware or a combination of software and hardware. Taking software implementation as an example, as a logical device, it is formed by reading the corresponding computer program instructions in the non-volatile memory into the memory through the processor of the electronic device where it is located. From a hardware perspective, as shown in FIG. 8, the hardware structure diagram of an image data authenticity verification device shown in this application, except for the processor, memory, network interface, and non-volatile memory shown in FIG. In addition to the sexual memory, the electronic device in which the device is located in the embodiment may also include other hardware according to the actual function of the electronic device, which will not be repeated here.
  • the above device includes: a processor; a memory for storing executable instructions of the processor; wherein, the above processor executes the above executable instructions to achieve the aforementioned The method of any embodiment.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Image Processing (AREA)

Abstract

一种图像数据的真实性验证方法、装置及设备。该方法包括,首先,响应于图像采集指令,从图像采集环境中采集光信号;其中,上述光信号包括部署于上述图像采集环境中的光发生设备所发出的光信号;上述光发生设备所发出的光信号携带与上述图像采集环境对应的环境信息;然后,基于采集到的光信号生成与上述图像采集环境对应的图像数据,以使上述图像数据的使用方从上述图像数据中解析出上述光发生设备所发出的光信号,并将上述光信号携带的环境信息与上述图像数据的数据提供方提供的信息进行匹配以完成真实性验证。

Description

一种图像数据的真实性验证方法、装置及设备 技术领域
本申请涉及计算机应用领域,尤其涉及一种图像数据的真实性验证方法、装置及设备。
背景技术
为了达到不法目的,图像数据提供方通常会对其提供的图像数据进行造假,意图欺骗图像数据使用方,使数据使用方根据上述造假后的图像数据得到错误的结论。
因此,需要一种图像数据的真实性验证方法,以使图像使用方可以验证图像数据的真实性。
发明内容
本申请提出一种图像数据的真实性验证方法,包括:响应于图像采集指令,从图像采集环境中采集光信号;其中,上述光信号包括部署于上述图像采集环境中的光发生设备所发出的光信号;上述光发生设备所发出的光信号携带与上述图像采集环境对应的环境信息;基于采集到的光信号生成与上述图像采集环境对应的图像数据,以使上述图像数据的使用方从上述图像数据中解析出上述光发生设备所发出的光信号,并将上述光信号携带的环境信息与上述图像数据的数据提供方提供的信息进行匹配以完成真实性验证。
本申请提出一种图像数据的真实性验证方法,包括:解析采集到的图像数据,得到光信号;其中,上述光信号包括与上述图像采集环境对应的环境信息;将上述光信号携带的环境信息与上述图像数据的数据提供方提供的信息进行匹配以完成真实性验证。
本申请提出一种图像数据的真实性验证装置,包括:采集模块,响应于图像采集指令,从图像采集环境中采集光信号;其中,上述光信号包括部署于上述图像采集环境中的光发生设备所发出的光信号;上述光发生设备所发出的光信号携带与上述图像采集环境对应的环境信息;生成模块,基于采集到的光信号生成与上述图像采集环境对应的图像数据,以使上述图像数据的使用方从上述图像数据中解析出上述光发生设备所发出的光信号,并将上述光信号携带的环境信息与上述图像数据的数据提供方提供的信息进行匹配以完成真实性验证。
本申请提出一种图像数据的真实性验证装置,包括:解析模块,解析采集到的图像数据,得到光信号;其中,上述光信号包括与上述图像采集环境对应的环境信息;匹配模块,将上述光信号携带的环境信息与上述图像数据的数据提供方提供的信息进行匹配以完成真实性验证。
在以上技术方案中,在采集图像数据时,可以同时采集上述光信号,从而可以将与上述图像采集环境对应的环境信息存储至图像数据中,使得在对图像数据进行真实性验证时,由于可以通过解析出与图像采集环境对应的环境信息,并将上述环境信息与数据提供方提供的信息进行匹配以完成对图像数据的真实性验证,因此,一方面,可以确定上述图像数据自采集过程开始至当前时刻未被篡改,具有真实性;另一方面,可以确定上述图像数据是在真实的数据采集环境中进行采集的。
附图说明
图1为本申请示出的一种图像数据的真实性验证方法的方法流程图;
图2为本申请示出的一种图像数据的真实性验证方法的方法流程图;
图3为本申请示出的一种图像数据的采集场景图;
图4为本申请示出的融资方利用仓单向投资方进行融资的流程图;
图5为本申请示出的一种图像数据的真实性验证装置的结构图;
图6为本申请示出的一种图像数据的真实性验证装置的结构图;
图7为本申请示出的一种图像数据的真实性验证设备的硬件结构图;
图8为本申请示出的一种图像数据的真实性验证设备的硬件结构图。
具体实施方式
为了达到不法目的,图像数据提供方通常会对图像数据进行造假,意图欺骗图像数据使用方,使数据使用方根据上述造假后的图像数据得到错误的结论。
例如,在利用仓单进行融资的应用场景中,融资方(数据提供方)为了非法融资,可能向投资方(数据使用方)提供造假后的图像数据,从而使投资方可能根据上述造假的图像数据得出仓单中列明的货物真实存在的结论,并向融资方提供资金。
上述仓单,是指保管人收到仓储物后,给存货人开付的提取上述仓储物的凭证。仓单中通常列明仓储物,上述仓储物的仓储地点,以及上述仓储物存储在上述存储地点的时间段等信息。
通常,在利用仓单进行融资时,融资方需要向投资方证明仓单中列明的货物真实存在。
在证明上述仓单中列明的货物真实存在时,融资方通常会将可以证明在上述仓单中列明的时间段内,上述仓单中列明的仓储物确实存储在上述仓单中列明的仓储地点的图像数据(例如,存储现场的图像视频)提供至上述投资方。
当接收到上述图像数据时,投资方可以将上述图像数据中展示出的仓储地点,仓储物,以及上述仓储物存储在上述仓储地点的时间段,与融资方提供的仓单上列明的上 述信息进行比较;如果上述比较结果一致,则可以得出上述仓单中列明的货物真实存在的结论,并向融资方提供资金;如果上述比较结果不一致,则可以得出上述仓单中列明的货物可能不存在的结论,并拒绝向融资方提供资金。
而现实中,许多不法融资方为了骗取投资人的资金,可能按照仓单列明的信息搭建虚假的仓储地点,并拍摄虚假的图像视频提供至投资方,使投资方遭受欺骗,提供资金。可见,目前需要一种图像数据的采集以及真实性验证的方法,使数据使用方可以对数据提供方提供的图像数据的真实性进行验证,避免遭受欺骗。
在相关技术中,为了验证图像数据的真实性,数据提供方通常可以为图像数据添加数字水印;并将数字水印的内容通知数据使用方。当数据使用方接收到添加上述数字水印的图像数据后,可以解析出图像数据携带的数字水印,并将解析出的数字水印与数据提供方提供的数字水印进行比较,如果二者一致,则可以确定上述图像数据未被篡改,确定上述图像数据的真实性。
例如,数据提供方在采集到原始图像数据后,可以通过特定算法(例如,空域算法或频域算法)将数字水印(例如,数字签名)加入到上述原始图像数据,以得到待验证图像数据。当数据使用方接收到该待验证图像数据后,可以解析该待验证图像数据,得到其携带的数字水印信息,并将得到的上述数字水印与数据提供方提供的数字水印进行比较;如果二者一致,则可以确定上述图像数据未被篡改,是真实的。
可是,由于上述方法中,上述数字水印是在对上述图像数据采集完毕之后加入的,因此,采用上述方法只能证明添加上述数字水印后得到的图像数据未被篡改,具有真实性,而无法证明添加上述数字水印前的图像数据是否被篡改,并且也无法证明上述图像数据是否是在真实的数据采集环境中进行采集的。
例如,当数据提供方为在虚假采集环境中采集的图像数据添加数字水印,并将其提供至数据使用方进行验证后,通过上述方法,数据使用方只能确认添加数字水印后的图像数据是未被篡改的,但是却无法识别出上述图像数据是在虚假采集环境中进行采集的。
基于此,本申请提出一种图像数据的真实性验证方法,应用于图像数据提供方。
具体地,可响应于图像采集指令,从图像采集环境中采集光信号;其中,上述光信号包括部署于上述图像采集环境中的光发生设备所发出的光信号;上述光发生设备所发出的光信号携带与上述图像采集环境对应的环境信息;基于采集到的光信号生成与上述图像采集环境对应的图像数据,以使上述图像数据的使用方从上述图像数据中解析出上述光发生设备所发出的光信号,并将上述光信号携带的环境信息与上述图像数据的数 据提供方提供的信息进行匹配以完成真实性验证。
本申请还提出一种图像数据的真实性验证方法,应用于图像数据使用方。该方法使数据使用方在对上述图像数据进行真实性验证时,可以通过解析出与图像采集环境对应的环境信息,并将上述环境信息与数据提供方提供的信息进行匹配以完成对图像数据的真实性验证,一方面,确定上述图像数据自采集过程开始至当前时刻是否被篡改,是否具有真实性;另一方面,确定上述图像数据是否是在真实的数据采集环境中进行采集的。
具体地,解析采集到的图像数据,得到光信号;其中,上述光信号包括与上述图像采集环境对应的环境信息;将上述光信号携带的环境信息与上述图像数据的数据提供方提供的信息进行匹配以完成真实性验证。以下结合具体实施例进行说明。
实施例一
请参见图1,图1为本申请示出的一种图像数据的真实性验证方法流程图。如图1所示,该方法可以应用于数据采集设备中,包括步骤S101~S102。
S101,响应于图像采集指令,从图像采集环境中采集光信号;其中,上述光信号包括部署于上述图像采集环境中的光发生设备所发出的光信号;上述光发生设备所发出的光信号携带与上述图像采集环境对应的环境信息;
S102,基于采集到的光信号生成与上述图像采集环境对应的图像数据,以使上述图像数据的使用方从上述图像数据中解析出上述光发生设备所发出的光信号,并将上述光信号携带的环境信息与上述图像数据的数据提供方提供的信息进行匹配以完成真实性验证。
上述图像数据,可以是指数据提供方通过采集设备采集的视频数据或图片。上述采集设备,可以是带有摄像或拍照(可以同时采集上述光信号)功能的相机、监控或者移动终端。
上述与上述图像采集环境对应的环境信息,可以是指采集上述图像数据时对应的空间环境和时间环境;其中,上述空间环境是指上述图像数据中涉及的目标物所处的存储环境;上述时间环境是指采集上述图像数据时,上述光发生设备发送光信号时对应的时间戳数据。上述环境信息,可以与上述图像数据的数据提供方提供的信息进行匹配以完成真实性验证。
在实际应用中,上述环境信息可以包括上述图像数据被采集时的地址信息,以及采集上述图像数据时,上述光发生设备发送光信号时对应的时间戳数据。
在上述情形下,当确认上述图像数据是否是在真实的数据采集环境中进行采集时, 可以将上述光信号携带的环境信息与上述图像数据的数据提供方提供的信息进行匹配;如果上述光信号携带的环境信息与上述图像数据的数据提供方提供的信息对应一致,则可以确认上述图像数据的真实性;否则,则确定上述图像数据不真实。
例如,在利用仓单进行融资的场景中,数据提供方可以向数据使用方提供仓储物的存储地点,以及该仓储物在该地点进行存储的时间段信息。当数据使用方获取到数据提供方提供的图像数据时,可以解析出该图像数据携带的光信号,并从该光信号中获取该图像数据被采集时上述光发生设备发送的光信号携带的时间戳信息;在获取到上述时间戳信息后,数据使用方可以判断上述时间戳指示的时间段信息与数据提供方提供的时间端是否吻合;如果吻合,再判断图像数据携带的地址信息是否与数据提供方提供的地址信息吻合;如果也吻合,则可以得出图像数据中涉及的仓储物在数据提供方提供的上述时间确实被存储在数据提供方提供的存储地点的结论。
上述光发生设备,具体是指可以将信息编码至光信号中的设备。在实际应用中,上述光发生设备可以是独立部署在数据采集环境中的。例如,可以在目标物所处的存储地点放置一台光发生设备,该光发生设备在编码信息时,可以将自身所处的地点(此时为上述目标物所处的存储地点)作为地址信息,将采集图像数据时的时间戳信息作为时间信息编码至该设备发出的光信号中以供采集设备采集。
在另一应用中,上述光发生设备可以作为一个模块集成在上述采集设备中。例如,假设采集设备是手机终端,那么光发生设备可以是手机终端中的红外发射模块,当数据提供方采集图像数据时,上述红外发射模块可以将自身所处的地点作为地址信息,将采集图像数据时,光发生设备发送的光信号携带的时间戳信息作为时间信息编码至该设备发出的光信号中供上述手机终端采集。
上述光发生设备在对光信号进行编码的过程中,考虑到编码信息的安全性,还可以对光信号进行加密。在实际应用中,上述光发生设备可以采用预设的加密算法对编码后的光信号进行加密。当获取到加密后的光信号后,数据使用方可以通过预设的解密算法对上述光信号进行解密,得到光信号携带的信息。
例如,上述预设的加解密算法可以是指利用公私钥进行加解密的算法,上述光发生设备可以是不可见光发生设备(例如,红外光发生设备),并且该设备预先被分配了公私钥对。当采集图像数据时,上述不可见光发生设备可以将与上述图像采集环境对应的环境信息通过上述公私钥对中的公钥对上述编码后的不可见光进行加密后,编码至不可见光(例如,红外光)中。当通过对图像数据进行解析而获取到加密后的环境信息时,数据使用方可以通过上述公私钥对中的私钥对上述环境进行解密,从而获得上述不可见 光中携带的未加密的环境信息。
上述光发生设备在对光信号进行编码的过程中,考虑到周边自然光对光信号的影响,可以将信息编码至特定频率的光信号中。在实际应用中,上述光发生设备可以将图像数据对应的环境信息编码至与自然光影响最小的频段内,以此将自然光的影响降到最低。例如,假设上述光发生设备为不可见光发生设备(例如,红外光发生设备),该设备可以发出与自然光频率明显不同的频率的不可见光,以使采集设备在采集上述不可见光时可以尽量的减少受到自然光的影响。本领域技术人员可以理解的是,采用特定频率的光信号还可以增加光信号传输的安全性。例如,在对采集到的图像数据进行解析时,如果数据解析方不知道上述光信号的频率,则无法从图像数据中解析出该光信号,也即无法获知光信号携带的信息,从而提升了光信号传输的安全性。
上述光信号,具体可以是携带数据环境信息的任意种类或任意种类组合的光信号。在实际应用中,上述光信号可以是各类可见光或者不可见光等等。例如,上述光发生设备可以是红外光发生设备,上述设备可以将环境信息编码至红外光中,并将其向外发出以供采集设备采集。本领域人员可以理解的是,上述不可见光可以是以下中的任一或若干的组合:红外线;紫外线;远红外线;无线电波;微波,在此不作限定。
通过上述方法不难发现,在采集图像数据时,同时采集上述光信号可以将与上述图像采集环境对应的环境信息存储至图像数据中,使得验证图像数据的真实性成为可能。
在通过图1示出的方法采集到图像数据后,数据使用方可以通过以下方法验证图像数据的真实性。请参见图2,图2为本申请示出的一种图像数据的真实性验证方法的方法流程图。如图2所示,该方法包括步骤S201~S202。
S201,解析采集到的图像数据,得到光信号;其中,上述光信号包括与上述图像采集环境对应的环境信息;
S202,将上述光信号携带的环境信息与上述图像数据的数据提供方提供的信息进行匹配以完成真实性验证。
上述图像数据的真实性,具体可以从两方面理解,第一方面,是指上述图像数据并未被篡改,是真实可靠的;第二方面,是指上述图像数据是在真实的数据采集环境下进行采集的。
上述光信号,可以是不可见光信号或可见光信号,以下以上述光信号为不可见光信号为例进行说明。
在解析采集到的图像数据时,通常可以先对上述图像数据进行过滤,得到不可见光部分的光线,并将上述光线转换为光强度曲线;对上述光强度曲线进行频谱分析,得 到上述不可见光信号。
在实际应用中,可以先按照预设的滤波规则对上述图像数据进行过滤,得到不可见光部分的光线,并将得到的光线转换为光强度曲线;然后,通过对上述光强度曲线进行频谱分析,并去除其中的噪音,得到上述不可见光信号。
例如,上述滤波规则可以是卡尔曼滤波,上述频谱分析方式可以是小波变换。在上述情形下,当获取到采集好的图像数据后,可以通过卡尔曼滤波将图像数据中的不可见光部分的光线数据过滤出来,并将过滤好的光线数据转化为横坐标为时间,纵坐标为光强度的光强度曲线;在转化为光强度曲线后,可以对该曲线进行小波变换并去除其中的噪音,得到不可见光信号。
在得到上述不可见光信号后,数据使用方可以解析上述不可见光信号得到不可见光携带的环境信息,然后,可以与上述图像数据的数据提供方提供的信息进行匹配以完成真实性验证。
在实际应用中,假设上述环境信息可以包括上述图像数据被采集时的地址信息,以及采集上述图像数据时,上述光发生设备发送光信号时对应的时间戳数据,在基于上述光信号包括的环境信息确定上述图像数据的真实性时,如果上述环境信息与上述图像数据提供方提供的信息相同,则一方面,可以确认上述图像数据是否是在真实的数据采集环境中进行采集的;另一方面,可以确认上述图像数据从被采集时刻至当前时刻并未被篡改,是真实的。
例如,在利用仓单进行融资的场景中,数据提供方可以向数据使用方提供仓储物的存储地点,以及该仓储物在该地点进行存储的时间段信息。当数据使用方获取到数据提供方提供的图像数据时,可以解析出该图像数据携带的光信号,并从该光信号中获取该图像数据被采集时上述光发生设备发送的光信号携带的时间戳信息;在获取到上述时间戳信息后,数据使用方可以判断上述时间戳指示的时间段信息与数据提供方提供的时间端是否吻合;如果吻合,再判断图像数据携带的地址信息是否与数据提供方提供的地址信息吻合;如果也吻合,则可以得出图像数据中涉及的仓储物在数据提供方提供的上述时间确实被存储在数据提供方提供的存储地点的结论。
在对不可见光进行解析时,如果上述不可见光信号携带的环境信息是经过公钥进行加密过的光信号,那么在此步骤中可以使用与上述公钥对应的私钥(通常是预先分配给光发生设备的私钥)对该环境信息进行解密,得到对应的未加密的环境信息。
通过上述方法可知,在对图像数据进行真实性验证时,由于可以通过解析图像数据中光信号,可以获得与上述图像采集环境对应的环境信息,然后将上述光信号携带的 环境信息与上述图像数据的数据提供方提供的信息进行匹配以完成真实性验证,因此,一方面,可以确定上述图像数据自采集过程开始至当前时刻未被篡改,具有真实性;另一方面,可以确定上述图像数据是在真实的数据采集环境中进行采集的。
实施例二
在本实施例中,光发生设备可以作为一个模块集成在采集设备中。在上述情形下,当验证图像数据是否为通过数据提供方与数据使用方约定的采集设备采集的时,数据使用方可以确定上述图像数据中携带的光发生模块的相关信息是否与约定的采集设备中光发生模块的相关信息相同,如果二者相同,则可以确认上述图像数据是通过约定的采集设备采集的。
在一种实现方法,在采集图像数据时,上述光发生设备(模块)可以将光发生设备的ID信息编码至光信号中供采集设备采集;
在验证图像数据是否为约定的采集设备采集的时,可以将解析出的光信号携带的设备ID信息与约定的采集设备携带的光发生模块的ID信息进行比较;如果二者一致,则可以确定上述图像数据是由约定的采集设备采集的。
在另一种实现方法中,在使用公私钥对光信号进行加密的场景下,在采集图像数据时,上述光发生设备(模块)可以将光发生设备的私钥信息编码至光信号中供采集设备采集;验证图像数据是否为约定的采集设备采集的时,可以将解析出的光信号携带的私钥信息与约定的采集设备携带的光发生模块的私钥信息进行比较;如果二者一致,则可以确定上述图像数据是由约定的采集设备采集的。
在此,需要说明的是,实施例二中示出的两种实施方法可以在一套方案中合并使用或者在两套方案中单独使用,在此中不作限定。
实施例三
当上述图像数据为视频数据时,由于视频数据通常由若干帧图像组成,因此,可以将每一帧图像被采集时的时间戳信息记录在对应的光信号中。
在上述情形下,在基于上述光信号包括的环境信息确定上述图像数据的真实性时,可以解析出该图像数据携带的光信号,并从该光信号中获取该图像数据的第一帧图像与最后一帧图像对应的时间戳信息;在获取到上述时间戳信息后,判断上述时间戳组成的时间段与数据提供方提供的时间段是否吻合;如果吻合,再判断图像数据携带的地址信息是否与数据提供方提供的地址信息吻合;如果也吻合,则一方面,可以确认上述图像数据是否是在真实的数据采集环境中进行采集的;另一方面,可以确认上述图像数据从被采集时刻至当前时刻并未被篡改,是真实的。
在本实施例中,在验证上述图像数据的个别帧图像是否被修改或者删减时,可以解析上述视频数据包括的每帧图像携带的光信号,得到每帧图像对应的时间戳数据;然后,确定上述每帧图像对应的时间戳数据是否为连续不间断的;如果是,则确定上述图像数据的个别帧图像未被修改或者删减;反之,则确定上述图像数据的个别帧图像已经被修改或者删减。
实施例四
在本实施例中,除了将环境信息利用上述实施例示出的编码方式编码以外,还可以使用其他编码方式。例如,可以采用震动信号进行编码。在上述情形下,可以在图像数据的采集地点部署一个震动马达、在采集设备上部署一个震动信号接收模块(例如,加速度计),在采集图像数据时,可以将采集与上述图像采集环境对应的环境信息按照一定的编码规则编码为震动信号,并由采集设备中的震动信号接收模块接收,然后将接收的震动信号加入图像信号中,作为图像数据真实性验证的依据。
在本实施例中,还可以采用若干种编码方式进行编码。在实际应用中,在数据采集环境中还可以部署一个光强感知模块,当该光强感知模块确定当前环境光的光强度低于预设阈值时,可以启用光信号编码的方式对环境信息进行编码;如果光强感知模块确定当前环境光的光强度大于等于上述预设阈值时,则可以采用震动信号编码的方式对环境信息进行编码。
采用上述方式,可以有效的避免由于环境光的强度太强而对光信号编码产生不良影响,从而提升对环境信息的编码效果。以下结合利用仓单进行融资的场景对本申请进行说明。
实施例五
请参见图3,图3为本申请示出的一种图像数据的采集场景图。如图3所示,所示仓储环境中放置了仓储物(目标物),所示仓储环境中部署了至少一个红外光发生设备,以及视频数据采集设备。
其中,上述仓储物即为融资方提供的仓单上列出的目标物;上述仓储环境为上述仓单上列明的仓储地点。
上述红外光发生设备,可以在开启状态时,实时获取时间戳信息,并将获取的时间戳信息,以及仓储环境的仓储地点信息编码至自身发出的红外光中,并且,上述红外光发生设备还可以使用预先分配的公私钥对对发射出的红外光信号进行加密。
上述采集设备,可以同时采集视频数据与上述红外光发生设备发出的红外光信号,并且还可以将上述红外光信号融合在上述视频数据中。
请参见图4,图4为本申请示出的融资方利用仓单向投资方进行融资的流程图。图4中示出的融资方,通常为仓单的所有者,可以向投资方提供仓单以获取资金;图4中示出的投资方,通常为金融贷款机构,可以根据融资方提供的仓单向融资方发放资金。
当所示融资方需要向上述投资方进行融资时,首先可以发起融资请求,并将仓单提供至上述投资方。当投资方接收到上述融资请求后,可以要求融资方提供可以证明仓单信息真实的证明文件(图4未示出)。融资方接收到提供证明文件的请求后,可以向投资方提供仓单中列明的仓储物确实存储在仓单中列明的存储地点的视频数据。
融资方在采集上述视频数据时,可以使用图3中示出的采集设备(例如,现场监控设备或手机终端等)在该仓储环境中对上述仓储物以及红外光信号进行视频录制。当视频数据录制完成后融资方可以将该视频提供至投资方。需要说明的是,在上述视频提供的过程中,为了保证视频数据的安全可靠,且不被篡改,融资方可以将上述视频数据上传至区块链中。在上述情形下,投资方在获取视频时,可以从上述区块链中获取该视频数据,从而保证上述视频数据不被篡改,确保其安全可靠。
当投资方获取到融资方提供的视频数据后,可以对该视频数据进行解析,并获取该视频数据中携带的红外光信号。在获取到红外光信号后,投资方可以通过上述不可见光设备对应的私钥对其进行解密得到上述红外光信号携带的地址信息和时间信息。在获取到上述地址信息和时间信息后,可以将上述信息与仓单列明的相关信息进行比较,如果一致,则投资方可以得出上述仓单信息是真实的结论,并向上述融资方发放资金。
在上述情形下,如果融资方提供的视频数据中携带的地址信息与时间信息与仓单中列明的不一致,则说明融资方提供的仓单不真实,投资方可以据此不向融资方提供资金。
通过上述方法,由于上述红外光信号已经被编码了当前仓储环境的仓储地点信息以及视频录制时的时间戳信息,如果融资方通过篡改视频或营造虚假的仓储环境造假,融资方提供的视频数据中将不会携带与仓单中列明的信息一致的系信息,因此,融资方将无法造假。
本申请还提供一种图像数据的真实性验证装置,请参见图5,图5为本申请示出的一种图像数据的真实性验证装置的结构图。如图所示,上述装置500包括:采集模块510和生成模块520。
采集模块510,响应于图像采集指令,从图像采集环境中采集光信号;其中,上述光信号包括部署于上述图像采集环境中的光发生设备所发出的光信号;上述光发生设备所发出的光信号携带与上述图像采集环境对应的环境信息;
生成模块520,基于采集到的光信号生成与上述图像采集环境对应的图像数据,以使上述图像数据的使用方从上述图像数据中解析出上述光发生设备所发出的光信号,并将上述光信号携带的环境信息与上述图像数据的数据提供方提供的信息进行匹配以完成真实性验证。
在示出的一实施例中,上述装置500还包括:解析模块,从生成的图像数据中解析出上述光发生设备所发出的光信号;匹配模块,将上述光信号携带的环境信息与上述图像数据的数据提供方提供的信息进行匹配以完成真实性验证。
在示出的一实施例中,上述光发生设备包括图像采集设备中内置的光发生硬件;或者,部署于上述图像采集环境中,与上述图像采集设备搭配使用的光发生设备。
在示出的一实施例中,上述光信号为不可见光信号;上述光发生设备为不可见光发生设备。
在示出的一实施例中,上述与上述图像采集环境对应的环境信息包括,与上述图像采集环境对应的地址信息;
上述将上述光信号携带的环境信息与上述图像数据的数据提供方提供的信息进行匹配以完成真实性验证,包括:
解析上述不可见光信号,得到上述图像数据被采集时的地址信息;
确定上述地址信息是否与上述图像数据的数据提供方提供的地址信息相同;
如果是,则确定上述现场数据为真实数据。
在示出的一实施例中,上述光信号还携带了上述光发生设备发送上述光信号的时刻对应的时间戳数据;上述将上述光信号携带的环境信息与上述图像数据的数据提供方提供的信息进行匹配以完成真实性验证,还包括:解析上述不可见光信号,得到上述时间戳数据;确定上述时间戳数据指示的时间段是否与上述图像数据的数据提供方提供的时间段相同;如果是,则确定上述现场数据为真实数据。
在示出的一实施例中,上述光发生设备基于该设备持有的私钥对应的公钥,预先对所发出的光信号携带的上述环境信息进行了加密处理;上述解析上述不可见光信号,包括:通过上述不可见光发生设备持有的私钥,对上述不可见光信号携带的环境信息进行解密,还原环境信息。
在示出的一实施例中,上述不可见光包括以下中的任一或若干的组合:红外线;紫外线;远红外线;无线电波;微波。
在示出的一实施例中,上述图像数据包括:视频数据或图片数据。
在示出的一实施例中,上述装置500还包括:确定上述数据采集环境的光强度是 否低于预设的强度阈值;如果是,则指示上述不可见光发生设备发出上述不可见光信号。
在示出的一实施例中,上述图像数据为视频数据;上述装置500还包括:解析上述视频数据包括的每帧图像携带的光信号,得到每帧图像对应的时间戳数据;确定上述每帧图像对应的时间戳数据是否为连续不间断的;如果是,则确定上述图像数据的个别帧图像未被修改或者删减;反之,则确定上述图像数据的个别帧图像已经被修改或者删减。
本申请还提供一种图像数据的真实性验证装置。请参见图6,图6为本申请示出的一种图像数据的真实性验证装置的结构图。
如图6所示,上述装置600包括,解析模块610和匹配模块620。
解析模块610,解析采集到的图像数据,得到光信号;其中,上述光信号包括与上述图像采集环境对应的环境信息。
匹配模块620,将上述光信号携带的环境信息与上述图像数据的数据提供方提供的信息进行匹配以完成真实性验证。
在示出的一实施例中,上述装置600还包括:采集模块,在采集图像数据时,同时采集上述图像数据对应的数据采集环境部署的光发生设备所发出的光信号;其中,上述光信号包括与上述图像采集环境对应的环境信息。
在示出的一实施例中,上述光发生设备包括图像采集设备中内置的光发生硬件;或者,部署于上述图像采集环境中,与上述图像采集设备搭配使用的光发生设备。
在示出的一实施例中,上述光信号为不可见光信号;上述光发生设备为不可见光发生设备。
在示出的一实施例中,上述与上述图像采集环境对应的环境信息包括,与上述图像采集环境对应的地址信息;上述将上述光信号携带的环境信息与上述图像数据的数据提供方提供的信息进行匹配以完成真实性验证,包括:解析上述不可见光信号,得到上述图像数据被采集时的地址信息;确定上述地址信息是否与上述图像数据的数据提供方提供的地址信息相同;如果是,则确定上述现场数据为真实数据。
在示出的一实施例中,上述光信号还携带了上述光发生设备发送上述光信号的时刻对应的时间戳数据;上述将上述光信号携带的环境信息与上述图像数据的数据提供方提供的信息进行匹配以完成真实性验证,还包括:解析上述不可见光信号,得到上述时间戳数据;确定上述时间戳数据指示的时间段是否与上述图像数据的数据提供方提供的时间段相同;如果是,则确定上述现场数据为真实数据。
在示出的一实施例中,上述光发生设备基于该设备持有的私钥对应的公钥,预先 对所发出的光信号携带的上述环境信息进行了加密处理;上述解析上述不可见光信号,包括:通过上述不可见光发生设备持有的私钥,对上述不可见光信号携带的环境信息进行解密,还原环境信息。
在示出的一实施例中,上述不可见光包括以下中的任一或若干的组合:红外线;紫外线;远红外线;无线电波;微波。
在示出的一实施例中,上述图像数据包括:视频数据或图片数据。
在示出的一实施例中,上述装置600还包括:确定上述数据采集环境的光强度是否低于预设的强度阈值;如果是,则指示上述不可见光发生设备发出上述不可见光信号。
在示出的一实施例中,上述图像数据为视频数据;上述装置600还包括:解析上述视频数据包括的每帧图像携带的光信号,得到每帧图像对应的时间戳数据;确定上述每帧图像对应的时间戳数据是否为连续不间断的;如果是,则确定上述图像数据的个别帧图像未被修改或者删减;反之,则确定上述图像数据的个别帧图像已经被修改或者删减。
本申请示出的图像数据的采集装置的实施例可以应用于图像数据的真实性验证设备上。装置实施例可以通过软件实现,也可以通过硬件或者软硬件结合的方式实现。以软件实现为例,作为一个逻辑意义上的装置,是通过其所在电子设备的处理器将非易失性存储器中对应的计算机程序指令读取到内存中运行形成的。从硬件层面而言,如图7所示,为本申请示出的一种图像数据的真实性验证设备的硬件结构图,除了图7所示的处理器、内存、网络接口、以及非易失性存储器之外,实施例中装置所在的电子设备通常根据该电子设备的实际功能,还可以包括其他硬件,对此不再赘述。
请参考图7所示的一种图像数据的真实性验证设备,上述设备包括:处理器;用于存储处理器可执行指令的存储器;其中,上述处理器通过运行上述可执行指令以实现前述任一实施例的方法。
本申请示出的图像数据的真实性验证装置的实施例可以应用在图像数据的真实性验证设备上。装置实施例可以通过软件实现,也可以通过硬件或者软硬件结合的方式实现。以软件实现为例,作为一个逻辑意义上的装置,是通过其所在电子设备的处理器将非易失性存储器中对应的计算机程序指令读取到内存中运行形成的。从硬件层面而言,如图8所示,为本申请示出的一种图像数据的真实性验证设备的硬件结构图,除了图8所示的处理器、内存、网络接口、以及非易失性存储器之外,实施例中装置所在的电子设备通常根据该电子设备的实际功能,还可以包括其他硬件,对此不再赘述。
请参考图8所示的一种图像数据的真实性验证设备,上述设备包括:处理器;用 于存储处理器可执行指令的存储器;其中,上述处理器通过运行上述可执行指令以实现如前述任一实施例的方法。
本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本申请的其它实施方案。本申请旨在涵盖本申请的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本申请的一般性原理并包括本申请未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本申请的真正范围和精神由下面的权利要求指出。
应当理解的是,本申请并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本申请的范围仅由所附的权利要求来限制。
以上上述仅为本申请的较佳实施例而已,并不用以限制本申请,凡在本申请的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本申请保护的范围之内。

Claims (26)

  1. 一种图像数据的真实性验证方法,包括:
    响应于图像采集指令,从图像采集环境中采集光信号;其中,所述光信号包括部署于所述图像采集环境中的光发生设备所发出的光信号;所述光发生设备所发出的光信号携带与所述图像采集环境对应的环境信息;
    基于采集到的光信号生成与所述图像采集环境对应的图像数据,以使所述图像数据的使用方从所述图像数据中解析出所述光发生设备所发出的光信号,并将所述光信号携带的环境信息与所述图像数据的数据提供方提供的信息进行匹配以完成真实性验证。
  2. 根据权利要求1所述的方法,还包括:
    从生成的图像数据中解析出所述光发生设备所发出的光信号;
    将所述光信号携带的环境信息与所述图像数据的数据提供方提供的信息进行匹配以完成真实性验证。
  3. 根据权利要求1所述的方法,所述光发生设备包括图像采集设备中内置的光发生硬件;或者,部署于所述图像采集环境中,与所述图像采集设备搭配使用的光发生设备。
  4. 根据权利要求1所述的方法,所述光信号为不可见光信号;所述光发生设备为不可见光发生设备。
  5. 根据权利要求4所述的方法,所述与所述图像采集环境对应的环境信息包括,与所述图像采集环境对应的地址信息;
    所述将所述光信号携带的环境信息与所述图像数据的数据提供方提供的信息进行匹配以完成真实性验证,包括:
    解析所述不可见光信号,得到所述图像数据被采集时的地址信息;
    确定所述地址信息是否与所述图像数据的数据提供方提供的地址信息相同;
    如果是,则确定所述现场数据为真实数据。
  6. 根据权利要求5所述的方法,所述光信号还携带了所述光发生设备发送所述光信号的时刻对应的时间戳数据;
    所述将所述光信号携带的环境信息与所述图像数据的数据提供方提供的信息进行匹配以完成真实性验证,还包括:
    解析所述不可见光信号,得到所述时间戳数据;
    确定所述时间戳数据指示的时间段是否与所述图像数据的数据提供方提供的时间段相同;
    如果是,则确定所述现场数据为真实数据。
  7. 根据权利要求6所述的方法,所述光发生设备基于该设备持有的私钥对应的公钥,预先对所发出的光信号携带的所述环境信息进行了加密处理;
    所述解析所述不可见光信号,包括:
    通过所述不可见光发生设备持有的私钥,对所述不可见光信号携带的环境信息进行解密,还原环境信息。
  8. 根据权利要求4所述的方法,所述不可见光包括以下中的任一或若干的组合:
    红外线;紫外线;远红外线;无线电波;微波。
  9. 根据权利要求1所述的方法,所述图像数据包括:
    视频数据或图片数据。
  10. 根据权利要求4所述的方法,还包括:
    确定所述数据采集环境的光强度是否低于预设的强度阈值;
    如果是,则指示所述不可见光发生设备发出所述不可见光信号。
  11. 根据权利要求6所述的方法,所述图像数据为视频数据;所述方法还包括:
    解析所述视频数据包括的每帧图像携带的光信号,得到每帧图像对应的时间戳数据;
    确定所述每帧图像对应的时间戳数据是否为连续不间断的;
    如果是,则确定所述图像数据的个别帧图像未被修改或者删减;反之,则确定所述图像数据的个别帧图像已经被修改或者删减。
  12. 一种图像数据的真实性验证方法,包括:
    解析采集到的图像数据,得到光信号;其中,所述光信号包括与所述图像采集环境对应的环境信息;
    将所述光信号携带的环境信息与所述图像数据的数据提供方提供的信息进行匹配以完成真实性验证。
  13. 根据权利要求12所述的方法,还包括:
    在采集图像数据时,同时采集所述图像数据对应的数据采集环境部署的光发生设备所发出的光信号;其中,所述光信号包括与所述图像采集环境对应的环境信息。
  14. 根据权利要求13所述的方法,所述光发生设备包括图像采集设备中内置的光发生硬件;或者,部署于所述图像采集环境中,与所述图像采集设备搭配使用的光发生设备。
  15. 根据权利要求12所述的方法,所述光信号为不可见光信号;所述光发生设备为不可见光发生设备。
  16. 根据权利要求15所述的方法,所述与所述图像采集环境对应的环境信息包括,与所述图像采集环境对应的地址信息;
    所述将所述光信号携带的环境信息与所述图像数据的数据提供方提供的信息进行匹配以完成真实性验证,包括:
    解析所述不可见光信号,得到所述图像数据被采集时的地址信息;
    确定所述地址信息是否与所述图像数据的数据提供方提供的地址信息相同;
    如果是,则确定所述现场数据为真实数据。
  17. 根据权利要求16所述的方法,所述光信号还携带了所述光发生设备发送所述光信号的时刻对应的时间戳数据;
    所述将所述光信号携带的环境信息与所述图像数据的数据提供方提供的信息进行匹配以完成真实性验证,还包括:
    解析所述不可见光信号,得到所述时间戳数据;
    确定所述时间戳数据指示的时间段是否与所述图像数据的数据提供方提供的时间段相同;
    如果是,则确定所述现场数据为真实数据。
  18. 根据权利要求17所述的方法,所述光发生设备基于该设备持有的私钥对应的公钥,预先对所发出的光信号携带的所述环境信息进行了加密处理;
    所述解析所述不可见光信号,包括:
    通过所述不可见光发生设备持有的私钥,对所述不可见光信号携带的环境信息进行解密,还原环境信息。
  19. 根据权利要求15所述的方法,所述不可见光包括以下中的任一或若干的组合:
    红外线;紫外线;远红外线;无线电波;微波。
  20. 根据权利要求12所述的方法,所述图像数据包括:
    视频数据或图片数据。
  21. 根据权利要求15所述的方法,还包括:
    确定所述数据采集环境的光强度是否低于预设的强度阈值;
    如果是,则指示所述不可见光发生设备发出所述不可见光信号。
  22. 根据权利要求18所述的方法,所述图像数据为视频数据;所述方法还包括:
    解析所述视频数据包括的每帧图像携带的光信号,得到每帧图像对应的时间戳数据;
    确定所述每帧图像对应的时间戳数据是否为连续不间断的;
    如果是,则确定所述图像数据的个别帧图像未被修改或者删减;反之,则确定所述 图像数据的个别帧图像已经被修改或者删减。
  23. 一种图像数据的真实性验证装置,包括:
    采集模块,响应于图像采集指令,从图像采集环境中采集光信号;其中,所述光信号包括部署于所述图像采集环境中的光发生设备所发出的光信号;所述光发生设备所发出的光信号携带与所述图像采集环境对应的环境信息;
    生成模块,基于采集到的光信号生成与所述图像采集环境对应的图像数据,以使所述图像数据的使用方从所述图像数据中解析出所述光发生设备所发出的光信号,并将所述光信号携带的环境信息与所述图像数据的数据提供方提供的信息进行匹配以完成真实性验证。
  24. 一种图像数据的真实性验证装置,包括:
    解析模块,解析采集到的图像数据,得到光信号;其中,所述光信号包括与所述图像采集环境对应的环境信息;
    匹配模块,将所述光信号携带的环境信息与所述图像数据的数据提供方提供的信息进行匹配以完成真实性验证。
  25. 一种图像数据的真实性验证设备,包括:
    处理器;
    用于存储处理器可执行指令的存储器;
    其中,所述处理器通过运行所述可执行指令以实现如权利要求1-11中任一项所述的方法。
  26. 一种图像数据的真实性验证设备,包括:
    处理器;
    用于存储处理器可执行指令的存储器;
    其中,所述处理器通过运行所述可执行指令以实现如权利要求12-22中任一项所述的方法。
PCT/CN2020/138023 2020-02-26 2020-12-21 一种图像数据的真实性验证方法、装置及设备 WO2021169530A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010121303.4 2020-02-26
CN202010121303.4A CN111310136B (zh) 2020-02-26 2020-02-26 一种图像数据的真实性验证方法、装置及设备

Publications (1)

Publication Number Publication Date
WO2021169530A1 true WO2021169530A1 (zh) 2021-09-02

Family

ID=71156777

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/138023 WO2021169530A1 (zh) 2020-02-26 2020-12-21 一种图像数据的真实性验证方法、装置及设备

Country Status (2)

Country Link
CN (2) CN111310136B (zh)
WO (1) WO2021169530A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20230274740A1 (en) * 2020-09-02 2023-08-31 Google Llc Arbitrating between multiple potentially-responsive electronic devices

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111310136B (zh) * 2020-02-26 2021-09-14 支付宝(杭州)信息技术有限公司 一种图像数据的真实性验证方法、装置及设备
CN112822219A (zh) * 2021-03-01 2021-05-18 浙江大华技术股份有限公司 多媒体数据的验证方法、装置、系统及存储介质
CN115708116A (zh) * 2021-08-10 2023-02-21 瑞庭网络技术(上海)有限公司 视频验证方法、装置及系统、电子设备和存储介质
CN113741596B (zh) * 2021-08-25 2022-10-04 中国铁路设计集团有限公司 一种铁路供配电的运维方法及系统
CN115936706B (zh) * 2023-03-10 2023-07-25 天聚地合(苏州)科技股份有限公司 一种基于区块链的数据要素辅助交易方法、装置和系统
CN117495551B (zh) * 2024-01-03 2024-03-12 蓝色火焰科技成都有限公司 一种物流金融产品解析方法、装置、系统及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103916435A (zh) * 2013-01-04 2014-07-09 阿里巴巴集团控股有限公司 判断信息真实性的方法和装置
CN106471795A (zh) * 2014-05-12 2017-03-01 飞利浦灯具控股公司 使用从来自经调制的光源的光照所解码的时间戳捕获的图像的验证
CN106529512A (zh) * 2016-12-15 2017-03-22 北京旷视科技有限公司 活体人脸验证方法及装置
CN111310136A (zh) * 2020-02-26 2020-06-19 支付宝(杭州)信息技术有限公司 一种图像数据的真实性验证方法、装置及设备

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4352260B2 (ja) * 2005-01-17 2009-10-28 ソニー株式会社 撮像装置、撮影画像データの記録方法、撮影画像データ処理装置および撮影画像データ処理方法
CN103024437B (zh) * 2012-12-28 2015-02-25 河南辉煌科技股份有限公司 视频数据完整性检测方法
US10002478B2 (en) * 2014-12-12 2018-06-19 Qualcomm Incorporated Identification and authentication in a shared acoustic space
CN105119883B (zh) * 2015-07-08 2019-04-12 Oppo广东移动通信有限公司 一种基于振动信号的验证方法及服务器
CN110022355B (zh) * 2019-03-04 2021-08-03 创新先进技术有限公司 特定场景下环境数据的存储方法、验真方法和设备
CN110661805B (zh) * 2019-09-29 2022-05-24 支付宝(杭州)信息技术有限公司 数据处理方法、装置、存储介质和客户端

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103916435A (zh) * 2013-01-04 2014-07-09 阿里巴巴集团控股有限公司 判断信息真实性的方法和装置
CN106471795A (zh) * 2014-05-12 2017-03-01 飞利浦灯具控股公司 使用从来自经调制的光源的光照所解码的时间戳捕获的图像的验证
CN106529512A (zh) * 2016-12-15 2017-03-22 北京旷视科技有限公司 活体人脸验证方法及装置
CN111310136A (zh) * 2020-02-26 2020-06-19 支付宝(杭州)信息技术有限公司 一种图像数据的真实性验证方法、装置及设备

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20230274740A1 (en) * 2020-09-02 2023-08-31 Google Llc Arbitrating between multiple potentially-responsive electronic devices
US12014738B2 (en) * 2020-09-02 2024-06-18 Google Llc Arbitrating between multiple potentially-responsive electronic devices

Also Published As

Publication number Publication date
CN114003874A (zh) 2022-02-01
CN111310136B (zh) 2021-09-14
CN111310136A (zh) 2020-06-19

Similar Documents

Publication Publication Date Title
WO2021169530A1 (zh) 一种图像数据的真实性验证方法、装置及设备
US12002127B2 (en) Robust selective image, video, and audio content authentication
US20200372184A1 (en) Method and arrangement for detecting digital content tampering
US20020056043A1 (en) Method and apparatus for securely transmitting and authenticating biometric data over a network
US10567708B2 (en) Surveillance server, method of processing data of surveillance server, and surveillance system
KR20180075586A (ko) 2차원 코드 처리 방법 및 장치
CN109891907B (zh) 使用可信平台模块验证在客户端设备处对视频内容的渲染
KR20020021080A (ko) 네트워크를 거쳐 생체 측정 데이터를 안전하게 전송하고인증하는 방법 및 장치
JP2017517783A (ja) 生体特徴画像の有用性を検証する方法及び装置
US20070050626A1 (en) Document management system, document processing computer, signature generating computer, storage medium storing program for document management, and document management method
US20230074748A1 (en) Digital forensic image verification system
US20170344728A1 (en) Secure recording and rendering of encrypted multimedia content
CN116383793B (zh) 人脸数据处理方法、装置、电子设备和计算机可读介质
JP2000324334A (ja) 画像処理装置、方法及びシステム、並びに撮像装置、撮像方法、コンピュータ読み取り可能な記憶媒体
CN111177748A (zh) 指纹存储加密方法、装置及系统
KR101628720B1 (ko) 진본성 및 무결성을 입증하기 위한 사본영상 증거관리시스템
US9264439B2 (en) Systems and methods to generate, preserve, collect, search, and certify authentic original documents
JP5142599B2 (ja) 情報処理装置及びその制御方法、コンピュータプログラム
CN116756750A (zh) 医疗敏感数据采集脱敏方法
Nyeem A digital watermarking framework with application to medical image security
CN113595741B (zh) 一种基于5g执法记录仪的可信数据链生成系统及方法
US10582083B2 (en) Method of securely transmitting an image from an electronic identity document to a terminal
Nagm et al. A New Approach for Image Authentication Framework for Media Forensics Purpose
US20240184904A1 (en) Method and System for Managing at Least One Unique Data Record
JP2014112773A (ja) デジタル画像情報の証拠力を高める方法及びシステム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20920876

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20920876

Country of ref document: EP

Kind code of ref document: A1